DoD 23.4 SBIR Annual BAA (2024)

Agency:

Department of Defense

Branch:

N/A

Program / Phase / Year:

SBIR / BOTH / 2023

Solicitation Number:

23.4 SBIR Annual BAA

NOTE: The Solicitations and topics listed on this site are copies from the various SBIR agency solicitations and are not necessarily the latest and most up-to-date. For this reason, you should use the agency link listed below which will take you directly to the appropriate agency server where you can read the official version of this solicitation and download the appropriate forms and rules.

The official link for this solicitation is: https://www.defensesbirsttr.mil/


Release Date:

November 15, 2022

Open Date:

November 15, 2022

Application Due Date:

February 01, 2024

Close Date:

February 01, 2024

Available Funding Topics

  • A234-001 : AI/ML for Nitramine Recrystallization and Coating

    Open date: November 30, 2022 Close date: January 04, 2023

  • A234-002: Non-Hydrofluorocarbon-Based Fire Extinguishing

    Open date: November 30, 2022 Close date: January 04, 2023

  • A234-003: Non-Refrigerant Based Cooling System for Cabin Cooling

    Open date: November 30, 2022 Close date: January 04, 2023

  • A234-004: Diver Performance Monitoring System

    Open date: January 10, 2023 Close date: January 31, 2023

  • A234-005: Holistic Health and Fitness Readiness Kit (H2H Readiness Kit)

    Open date: January 17, 2023 Close date: February 14, 2023

  • A234-006: Wearable Radiation Sensors

    Open date: January 10, 2023 Close date: January 31, 2023

  • A234-007: Artificial Intelligence (AI)/ Machine Learning (ML) Open Topic

    Open date: January 10, 2023 Close date: January 31, 2023

  • A234-008: Army Tech Marketplace

    Open date: March 16, 2023 Close date: April 11, 2023

  • A234-009: Casualty Care Training- Mixed Reality Manikin Solution for Female Soldier Survivability

    Open date: April 05, 2023 Close date: May 04, 2023

  • A234-P010: xTechSBIR Pacific Finalist Open Topic Competition

    Open date: September 20, 2023 Close date: October 11, 2023

  • A234-011: Conformable Hydrogen Storage

    Open date: March 30, 2023 Close date: May 02, 2023

  • A234-012: Hydrogen Generator

    Open date: March 30, 2023 Close date: May 02, 2023

  • A234-013: Dual Band Imager

    Open date: May 18, 2023 Close date: June 13, 2023

  • A234-P014: Sustainable Building Materials and Technologies Open Topic

    Open date: May 18, 2023 Close date: June 13, 2023

  • A234-P015 : xTechPrime Finalist Open Topic Competition

    Open date: January 02, 2024 Close date: February 01, 2024

  • A234-016: Lethal Payloads for Small Unmanned Aerial Systems

    Open date: June 01, 2023 Close date: June 27, 2023

  • A234-P017 : xTechSBIR Autonomy Finalist Open Topic Competition

    Open date: October 10, 2023 Close date: October 17, 2023

  • A234-018: Digital Erasure of Sensitive FPGA Systems

    Open date: June 14, 2023 Close date: July 18, 2023

  • A234-P019: xTech Search 7 SBIR Finalist Open Topic Competition

    Open date: June 22, 2023 Close date: July 25, 2023

  • A234-020: DEEP-BIM: Dynamic Enhanced Environment Perception - Building Information Models

    Open date: July 06, 2023 Close date: August 08, 2023

  • A234-021: Machine Translation for Indo-Pacific Low Resource Languages

    Open date: July 06, 2023 Close date: August 08, 2023

  • A234-022: Heavy Lift Vertical Take-off and Landing; Heavy VTOL

    Open date: July 06, 2023 Close date: August 01, 2023

  • A234-023: Knowledge-Level Distributed Active Data Platforms for Ops-Log Synchronization

    Open date: July 27, 2023 Close date: September 05, 2023

  • A234-024: Low Cost SWIR Laser Sensor

    Open date: August 24, 2023 Close date: September 26, 2023

  • A234-025: Medium-Format Displays for Mixed Reality (MR) Systems

    Open date: August 24, 2023 Close date: September 26, 2023

  • A234-026: Porting RTK to High Assurance Kernel

    Open date: August 24, 2023 Close date: September 26, 2023

  • A234-P027: Energy Demand Reduction and Clean Energy Tech Open Topic

    Open date: September 28, 2023 Close date: October 31, 2023

  • A234-028: Remote Breaching of Obstacles

    Open date: October 24, 2023 Close date: November 14, 2023

  • N234-P01: MCSC Open Topic for Logistics in a Contested Environment

    Open date: July 13, 2023 Close date: August 15, 2023

  • N234-P02: NAVAIR Open Topic for Logistics in a Contested Environment

    Open date: July 13, 2023 Close date: August 15, 2023

  • N234-P03: NAVSEA Open Topic for Operations and Logistics in a Contested Environment: Improve/Manage Energy Efficiency for the DON's Non-nuclear Deployable Power Generators

    Open date: July 13, 2023 Close date: August 15, 2023

  • N234-P04: NAVSEA Open Topic for Operations and Logistics in a Contested Environment: Improve Launch and Recovery of Air, Sea Surface, and UUV from Naval Vessels

    Open date: July 13, 2023 Close date: August 15, 2023

  • N234-P05: NAVSEA Open Topic for Operations and Logistics in a Contested Environment: Enhance Mission Capabilities of USV/UUV and Systems

    Open date: July 13, 2023 Close date: August 15, 2023

  • N234-P06: NAVSEA Open Topic for Operations and Logistics in a Contested Environment: Expand Lethality of Technologies of Maritime Mining and Mine Countermeasures

    Open date: July 13, 2023 Close date: August 15, 2023

  • N234-P07: NAVWAR Open Topic for Holistic Common Operational Picture (COP): PMW 170

    Open date: July 13, 2023 Close date: August 15, 2023

  • N234-P08: NAVWAR Open Topic for Holistic Common Operational Picture (COP): PMW 150

    Open date: July 13, 2023 Close date: August 15, 2023

  • CBD234-P001: Decontamination of Open Wounds - Open Topic

    Open date: October 12, 2023 Close date: November 14, 2023

  • HR0011SB20234-01: Vibe: Innovation in Commodity Coherence

    Open date: February 02, 2023 Close date: March 07, 2023

  • HR0011SB20234-02: Synthetic User Personas (SUP)

    Open date: February 02, 2023 Close date: March 07, 2023

  • HR0011SB20234-03: Space Metamaterial Electronically Scanned Array (Space-MESA)

    Open date: February 02, 2023 Close date: March 07, 2023

  • HR0011SB20234-04: Super-resolution Thermal Metrology for High Power Density Devices

    Open date: March 07, 2023 Close date: April 06, 2023

  • HR0011SB20234-05: Wearables at the Edge to Augment Readiness (WEAR)

    Open date: March 07, 2023 Close date: April 06, 2023

  • HR0011SB20234-06: Exploiting Sparsity in Python (ESPy)

    Open date: March 07, 2023 Close date: April 06, 2023

  • HR0011SB20234XL-01: Safe Food for Everyone (SaFE) - SBIR XL

    Open date: March 29, 2023 Close date: May 02, 2023

  • HR0011SB20234-07: Deuce Coupe

    Open date: April 26, 2023 Close date: May 31, 2023

  • HR0011SB20234XL-02: Empirical Proving Ground for Cryptographic Engineering Challenges in Large-scale Deployments (EPiC EagLe) – SBIR XL

    Open date: May 18, 2023 Close date: June 15, 2023

  • HR0011SB20234-08: 2D Polyglots

    Open date: May 18, 2023 Close date: June 15, 2023

  • HR0011SB20234-09: Passive Analytics for Remote Quantification of External Resources (PARQER)

    Open date: May 18, 2023 Close date: June 15, 2023

  • HR0011SB20234-10: Assessing Virtual Private Network (VPN) Networthiness (AVN)

    Open date: May 18, 2023 Close date: June 15, 2023

  • HR0011SB20234-11: Electronic Control Unit Authentication in Autonomous Vehicles (ECU2A)

    Open date: May 18, 2023 Close date: June 15, 2023

  • HR0011SB20234-12: Network Black Box (NBB)

    Open date: May 18, 2023 Close date: June 15, 2023

  • HR0011SB20234-13: 5G Test Environment (5GTE)

    Open date: May 18, 2023 Close date: June 15, 2023

  • HR0011SB20234-P01: Autonomous Systems at Scale - Open Topic

    Open date: July 12, 2023 Close date: August 10, 2023

  • HR0011SB20234-14: Canopies for High-speed Ultra-Long Terrain Execution (CHUTE)

    Open date: July 18, 2023 Close date: August 22, 2023

  • HR0011SB20234XL-03: Bright ELectron and Light Sources (BELLS) - SBIR XL

    Open date: June 07, 2023 Close date: July 11, 2023

  • HR0011SB20234XL-04: Fast, Light, Airworthy, Repackable ParachutE (FLARE) - SBIR XL

    Open date: July 18, 2023 Close date: August 22, 2023

  • HR0011SB20234-15: Additive Components Enhanced for Extreme Environments (ACE3)

    Open date: July 25, 2023 Close date: August 24, 2023

  • HR0011SB20234-16: Prospero: Modernizing Secure Facility Design, Construction, and Accreditation

    Open date: July 25, 2023 Close date: August 24, 2023

  • HR0011SB20234-17: Artificial Intelligence Cyber Challenge (AIxCC)

    Open date: August 17, 2023 Close date: October 03, 2023

  • HR0011SB20234XL-05: Project CAPTURE: Capturing Aerial Payloads To Unleash Reliable Exploitation – SBIR XL

    Open date: August 22, 2023 Close date: September 21, 2023

  • DHA234-D001: Anti-Shock Drug, Pre-Hospital (ASD-PH)

    Open date: March 23, 2023 Close date: April 25, 2023

  • DHA234-P001: Open Topic for Temporary Stabilization of Corneal and Corneoscleral Injuries

    Open date: May 30, 2023 Close date: August 23, 2023

  • DMEA234-D01: High Performance Clock Oscillator

    Open date: October 12, 2023 Close date: November 14, 2023

  • DTRA234-001: Portable Automated Solution for the Library Preparation for Sequencing

    Open date: September 20, 2023 Close date: October 18, 2023

  • DTRA234-002: Capability to Determine the Effect of Dust and Debris on the Chemistry Environment post CWMD Weapons Strike

    Open date: September 20, 2023 Close date: October 18, 2023

  • DTRA234-003: Deep Learning and Extraction of Chemical Synthesis or Biosynthetic Pathways from Scientific Literature

    Open date: September 20, 2023 Close date: October 18, 2023

  • DTRA234-004: Remote Through-Container Identification of CBRNE materials

    Open date: September 20, 2023 Close date: October 18, 2023

  • DTRA234-005: Signature Detection and Training via Application of Digital Product-Insertion Technologies

    Open date: September 20, 2023 Close date: October 18, 2023

  • DTRA234-006: Acoustic Agglomeration to aid fine aerosol particulate collection

    Open date: September 20, 2023 Close date: October 18, 2023

  • OSD234-P001: 5G Radio Frequency (RF) Coverage in Challenging Interior Spaces Open Topic

    Open date: July 25, 2023 Close date: August 29, 2023

  • DTRA234-P01: OPEN TOPIC: Replacing User Name/Password Defaults - Alternative User Authentication Methods

    Open date: September 20, 2023 Close date: October 18, 2023

  • OSD234-P002: Strategic Capabilities Office SBIR Open Topic Call

    Open date: September 06, 2023 Close date: October 17, 2023

  • OSD234-P003: Rapid development of effective behaviorally aligned training simulations for human relations practitioners (Open Topic)

    Open date: October 04, 2023 Close date: November 07, 2023

  • SOCOM234-001: Analyzing Narrative Evolution Across Social Networks

    Open date: February 21, 2023 Close date: March 23, 2023

  • SOCOM234-P002: Open Topic for Family of Special Operations Vehicles

    Open date: April 19, 2023 Close date: May 18, 2023

  • SOCOM234-003: Visual Augmentation Systems (VAS) Range Finder

    Open date: July 20, 2023 Close date: August 22, 2023

  • SOCOM234-004: Out-of-Band GNSS Tracker

    Open date: September 06, 2023 Close date: October 05, 2023

  • SOCOM234-005: Slim Form Cargo Loader/Unloader

    Open date: September 06, 2023 Close date: October 05, 2023

AI/ML for Nitramine Recrystallization and Coating

OUSD (R&E) MODERNIZATION PRIORITY: Artificial Intelligence/Machine Learning TECHNOLOGY AREA(S): Information SystemsTOPIC OBJECTIVE:  To develop a suite of probe technology and machine learning algorithms which can be used throughout the energetics manufacturing process to reduce cost and increase product consistency.TOPIC DESCRIPTION:  Currently, nitramine energetic materials have unacceptably high rework/scrap rates in a number of different munitions’ energetics manufacturing processes, such as dissolution, recrystallization, and slurry coating. This is largely due to the plant operators inability to control critical manufacturing parameters such as cooling water temperature, nitramine concentration, and solvent/antisolvent ratios. To further exacerbate the problem, munitions’ energetics manufacturing processes are poorly understood ‘black boxes,’ so the reason behind any deviation from spec is difficult to ascertain. We believe that by deploying a number of different measurement probes during various manufacturing steps, and analyzing the data via machine learning, we can dramatically reduce or even eliminate out of spec batches. The probes will collect data in real time as materials are manufactured, and the machine learning algorithms will provide nearly instantaneous recommendations to the plant operators on how to adjust their processes to target the desired properties. Beyond reducing out of spec batches, we would also like to reduce cost, environmental footprint (by mainly increasing energy efficiency and reducing solvent use), and increase throughput from existing lines. We believe in the long run, the insights gained for this program will enable easier transition of novel energetic formulations.   The purpose of this topic is to explore probe technology and machine learning algorithms that will be examined from the offerors and will be down selected based on time resolution, ruggedness, data output, safety, and suitability.There are two key steps for this technology to be successful. The first is the development and deployment of novel probes that produce large amounts of data in real time. The second is an advanced machine learning system that can take the probe readings and provide adjustments in real time during manufacturing to produce the desired product.PHASE I: Demonstrate proposed probe technology can produce the data required over the course of several manufacturing runs. The Phase I Base amount must not exceed $100,000 for a 6-month period of performance. PHASE II:  Implement the probes during the manufacturing process and collect data. Use data with machine learning algorithms. •Phase II Sequential: Expand the probes to more manufacturing lines, increasing the amount of data for machine learning systems. Direct and control energetics manufacturing based on machine learning recommendations to realize benefits PHASE III and DUAL USE APPLICATIONS:  Applying AI/ML to chemical manufacturing has a ton of commercial potential, although this specific topic is geared towards energetics; therefore, landing this topic at moderate dual-use potential for commercial capabilities. All HMX/RDX batches are currently examined via a multitude of techniques to determine if they are meet specifications. These include assessing purity, particle size, and thermal stability. This analysis can compared against the predictions of the machine learning algorithms and the measurements provided by the probes. We will also test the machine learning predictions against the predictions of crystallization modeling software, when appropriate.  KEYWORDS:    Probe; Algorithms; Machine Learning; Manufacturing process; Energetic materials; Energy  REFERENCES:  1.http://site.iugaza.edu.ps/ajubeh/files/2012/05/B00k-Mechanics-of-Materials-Mcgraw-2012-Ed6-978-0-07-338028-5.pdf2.https://books.google.com/books/about/Particle_Size_Measurements.html?id=lLx4GzA-7AUC3.https://books.google.com/books/about/Chemical_Reactor_Modeling.html?id=mrP6RNajRs0C

Non-Hydrofluorocarbon-Based Fire Extinguishing

OUSD (R&E) MODERNIZATION PRIORITY: General Warfighting Requirements TECHNOLOGY AREA(S): Materials; Battlespace TOPIC OBJECTIVE: The objective of this topic is to explore potential opportunities surrounding a non-HFC based fire extinguishing agent or system. This is needed for ground vehicle crew automatic fire extinguishing systems (AFES) to protect Soldiers and their equipment.TOPIC DESCRIPTION:  The Army relies on HFC-227ea for many of its safety-critical ground vehicle crew fire protection systems. However, production and import of hydrofluorocarbons (HFC) are now being phased down due to their high global warming potentials (GWP), as mandated by the Kigali Amendment to the Montreal Protocol and the American Innovation and Manufacturing (AIM) Act of 2020. Development and fielding of non-HFC fire extinguishing systems directly supports Executive Order 14008: Tackling the Climate Crisis at Home and Abroad as well as the Army Climate Strategy. Meanwhile Section 103 of the Consolidated Appropriations Act, 2021 (P.L. 116-260) calls for an 85% phasedown of the production and import of HFCs by 2036.i.Executive Order 14008: Tackling the Climate Crisis at Home and Abroad, 2021. https://www. federalregister.gov/documents/2021/02/01/2021-02177/ tackling-the-climate-crisis-at-home-and- abroad.ii.Department of the Army, Office of the Assistant Secretary of the Army for Installations, Energy and Environment. February 2022. United States Army Climate Strategy. Washington, DC.iii.Order 13990: Protecting Public Health and the Environment and Restoring Science to Tackle the Climate Crisis, 2021. 2021-01765.pdf (govinfo.gov)Rather than relying on recovered HFCs or trying to establish a stockpile to address the impending shortages of these chemicals, our proposed strategy is to minimize, or eliminate, the Army’s uses of HFC-227ea for ground vehicle crew fire protection applications. PHASE I:  Subscale proof of concept of extinguishing effectiveness. Once developed, the technology would be tested at the US Army Aberdeen Test Center in one of its full-scale testbeds for performance and safety. The Phase I Base amount must not exceed $250,000 for a 12-month period of performance.PHASE II:  Full scale system demonstrated and tested in laboratory environment•Phase II Sequential: Full scale system integrated and tested in vehicle•Phase II Enhancement: Toxicology assessment, resolve any issues, documentPHASE III and DUAL USE APPLICATIONS:  While many different industries will need to eventually switch to non-HFC extinguishers in the coming years, there remains barriers to adoption and scaling. Once capabilities of the system have been established, it would be integrated onto a ground vehicle(s) and evaluated against the Army’s criteria.  KEYWORDS:    Non-HFC; Fire Extinguish; Ground combat vehicles; Soldier safety  REFERENCES:  1. https://www.congress.gov/committee-print/116th-congress/house-committee-print/427702.https://apps.dtic.mil/sti/citations/ADA517470#:~:text=Historically%20the%20US%20Army%20USA,of%20peacetime%20and%20combat%20fires.

Non-Refrigerant Based Cooling System for Cabin Cooling

OUSD (R&E) MODERNIZATION PRIORITY: General Warfighting Requirements TECHNOLOGY AREA(S): MaterialsTOPIC OBJECTIVE: The objective of this topic is to develop alternative air handling units or systems to cool the cabin area and/or electronics. TOPIC DESCRIPTION: This topic calls for selected proposer(s) to design a non-refrigerant based low Global Warming Potential (GWP) Hydrofluorocarbon (HFC) Hydrofluoroolefin (HFO) free cooling system. HFC 134a is being phased out globally due to its high global warming potential (GWP), the automotive industry has switched over to HFO-1234yf which is flammable and not suitable for current military system designs.The idea to design a non-refrigerant based cooling system directly supports the Army Climate Strategy. The HFC 134a phase down plan included in Section 103 of the Consolidated Appropriations Act, 2021 (P.L. 116-260) calls for a phase down of the production and import of HFC’s down to 15% of the current levels by 2036. Rather than trying to adapt military air conditioning system designs to address the flammability of HFO-1234yf, this design strategy is to eliminate the refrigerant loop altogether. A non-refrigerant based system would eliminate the need for the purchase and storage of refrigerants as well as the leakage issues of current systems. It would eliminate the need for large specialty equipment recovery machines which are required to maintain refrigerant systems, thus saving cost for Army wide infrastructure. PHASE I:  Quarter scale proof of concept version of cooling system. This would be tested in the Special Systems and Component Engineering (SSCE) laboratory in a thermal chamber for performance. The Phase I Base amount must not exceed $250,000 for a 12-month period of performance.PHASE II:  Full size breadboard system tested in laboratory environment •Phase II Sequential: Full size system installed in vehicle •Phase II Enhancement: Resolve any issues, document, demonstrate in-vehicle performance PHASE III and DUAL USE APPLICATIONS: As global regulations tighten around the kinds of refrigerants that can be used, all industries that require refrigeration in their operations will require a new, effective, and compliant refrigerant moving forward. However, widespread adoption and scalability remain concerns. This system would eventually be installed on a vehicle and evaluated for performance. KEYWORDS:    System cooling; Non-refrigerant; air conditioning; refrigerant loop  REFERENCES:  1.https://www.exair.com/solutions/cooling-solutions.html2.https://tetech.com/peltier-thermoelectric-cooler-modules/3.https://thermoelectricsolutions.com/list-of-thermoelectric-peltier-manufactures-companies-suppliers/

Diver Performance Monitoring System

OUSD (R&E) MODERNIZATION PRIORITY: BiotechnologyTECHNOLOGY AREA(S): Sensors; Electronics; Information SystemsOBJECTIVE: Develop a solution that monitors relevant physiological markers and can alert divers of predetermined thresholds on risk. This solution includes form factor developments, accurate biomarker readings from sensors, durability for fresh, chlorinated, and salt-water environments, and on device computing to activate alerts based on predetermined thresholds. DESCRIPTION: Despite significant safety and overwatch, fatalities of student divers occasionally occur during training, with causes unknown in some cases. It is necessary to accurately monitor student biomarkers to determine when to alert nearby instructors and safety divers as special operations diving safety is paramount. Technology enabling systems that can alert divers in multiple environments can provide another tool for the military to use to ensure safe operations in high risk, high stress environments. Desired capabilities are broken up into critical, essential, and enhancing to articulate the minimum acceptable capabilities up to fully desired capabilities for product development. Critical (essential needs/must have):●Accurate measurement of the following vital signs in fresh and chlorinated environments oHeart rate tracking -Within 5 beats of clinical-grade device oBlood or tissue oxygen saturation - SpO2/StO2 (within 2-5% of clinical-grade device)●Bluetooth and/or WiFi capabilities for transferring recorded data●Capable of implementing compatibility with the USSOCOM Human Performance Data Management System (HPDMS), i.e. Smartabase (API)●24-hour continuous runtime●Adequate storage to capture 24 hours of critical dataDesired (strongly wanted features):●Accurate measurement of the following vital signs in fresh, chlorinated and salad water oHeart rate tracking -Within 5 beats of clinical-grade device oBlood or tissue oxygen saturation - SpO2/StO2 (within 2-5% of clinical-grade device)●Heart Rate Variability (HRV)oSampling rate 500-1000Hz (can record data at a lower rate) ●Present real-time physiological data to the user on a wearable display●Accurate measurement of water depth and ambient temperature (air or water)●Ability to set alert thresholds (preferably by a dive instructor)oInstructors will edit thresholds in HPDMS ●Ability to alert the wearer oInstructors will have ability to toggle alert ●Ability to alert nearby divers underwater of the wearers alert condition●Functional at depths up to 130ft●Functional at water temperatures between 34O-100O F ●Accurate respiratory rate measurement in fresh, chlorinated, and saltwater environmentsEnhancing (increases value to the user):●Skin temperature measurement in fresh, chlorinated, and saltwater environments●Core temperature measurement in fresh, chlorinated, and saltwater environments●Ability to measure any other parameters vendors deem important ●Any other additional features vendors propose as potentially usefulConstraints:●The device cannot interfere with training or other gear (BCD, dive computer, mask, etc.)●The device shall minimize the use of buttons to display physiological parametersPHASE I: Design a proof-of-concept solution for a device capable of accurately monitoring physiological markers vendors conclude are necessary (e.g. heart rate, SpO2, etc.) which can alert divers and instructors on predetermined thresholds of risk. The design should include, but not limited to, accurate measurements of heart rate and SpO2 or StO2 (in dry, fresh, and chlorinated environments), Bluetooth and/or WiFi capabilities, battery life and memory for a 24-hour continuous runtime, and should be capable of interfacing with the Human Performance Data Management System (HPDMS), i.e. Smartabase (API). The device can be standalone or integrated with standard dive equipment. Other features, capabilities, and/or solutions not addressed in this solicitation that vendors determine will be beneficial to improving safety of Army divers are encouraged.Phase I will award $150,000 over a 3-month period of performance (PoP). The 3 month period will include several virtual sessions with TPOCs and an option to travel to San Diego to assist with refinement of a final presentation on month 3. The final presentation will take into account adjustments to approach, desire to work with other vendors to solve the proposed problem, and cost effectiveness of the solution. Proposals will be evaluated on a holistic basis based on their relevance, total cost, developmental timeline, ability to integrate into a system of systems, modularity, compatibility with open architecture, and any additional features the proposer includes.Companies can voluntarily participate in the Army Applications Laboratory (AAL) 12-week cohort program. The AAL cohort program is designed to solve specific Army modernization challenges on a compressed timeline. The cohort program matches qualified companies with Army problems owners to speed capability development, accelerate transition, and de-risk or inform requirements. This program is designed for businesses that own unique, applicable technology and are interested in growing a new line of business into the DoD.The cohort program will enhance technology development through the rapid exposure to Army stakeholders and the sustainment, maneuver, and robotics acquisition communities. Planned activities include a problem topic deep dive, a field week with Army sustainment and maneuver leaders and soldiers, hands-on experience with currently fielded military equipment and weapon systems, and stakeholder engagement from the requirements writer to acquisition manager to the end-user. An example cohort program for this topic is:Week 1 – Orientation and problem deep dive (virtual)Week 2 – Soldier Touchpoint (in-person at a military installation)Week 3-6 – Concept research and planningWeek 7 – Mid-point concept design brief to stakeholders and SME roundtable discussion (virtual)Week 8-11 – Concept design refinementWeek 12 – Final concept design brief to Army Senior Leaders (virtual)Cohort programming will be provided free of charge. Proposers that plan to participate in the cohort (if awarded a Phase I) are encouraged to include travel costs for one cohort trip, within the continental US, of 4-5 days each for in-person programming. In-person events may be substituted for virtual events depending on COVID-19 travel restrictions. Details will be provided to awardees under this topic at Phase I award. PHASE II:Demonstrate a prototype device capable of monitoring physiological markers, established in Phase I, which can alert divers on predetermined thresholds of risk. Vendors will have quarterly touchpoints with military stakeholders and develop said prototype to conform to listed parameters throughout the 21-month PoP. Soldier touchpoints will be provided free of charge. Proposers that plan to participate in the Soldier touchpoints (if awarded a Phase II) are encouraged to include travel costs for 7 touchpoints, within the continental US, of 1-2 days each for in-person events. It is incumbent on the vendor to provide proposed, iterative deliverables over the PoP (or sooner) to complete the identified solution. Vendors will interact with military diving experts prior to delivering physical solutions to combat divers. Potential solutions can iterate and the ability to test potential solutions with a military unit is available free of charge. Solutions will be evaluated in priority of critical, essential, and enhancing priorities. Access to military diving experts during the touchpoints for feedback is free of charge, and companies should include the estimated cost of travel (assume quarterly multi day trips to various dive training locations such as San Diego, Key West, Panama City, or Pensacola for set-up, iterative prototyping, final product delivery & testing) to these touchpoints in their budget. In addition to the Phase II deliverable of a prototype for extended Soldier touch points, companies will provide deliverable and final reports detailing performance and associated deliverables, any iterative adjustments based on user feedback, and final product details. The final report should also include plans to adopt the solution onto a military network with associated security protocols and logical access points.PHASE III: The objective of Phase III, where appropriate, is for the small business to pursue commercialization objectives through the effort by improving the device and developing the technology to TRL 7 and document the final design. Companies will iterate on and deliver final prototypes, make modifications to adapt to the required COTS wearables as identified through extended Soldier touch points and create a viable prototype for combat divers in various underwater scenarios. Prototypes shall be in their final form factor, capable of being worn and used by divers, and may be subjected to environmental testing at the government’s discretion.Phase III deliverables include integration with USSOCOM Human Performance Data Management System (HPDMS), i.e. Smartabase (API), user documentation, and prototype(s) for demonstration and government-sponsored testing.WEBINAR DATE:Tuesday December 13, 2022 10:00 am CTTo learn more about this topic, and ask questions of Army stakeholders involved in the project register for a webinar: https://diver-performance.eventbrite.com The Link to the video recording of the webinar will be posted in the DSIP portal in the days following. KEYWORDS: Human performance optimization, HPO, underwater sensors, under water, underwater, sensor, HP, high risk, high stress, combat diver, heart rate, SpO2, StO2REFERENCES1.Optimizing sampling rate of wrist-worn optical sensors for physiologic monitoring | Journal of Clinical and Translational Science | Cambridge Core2.Wearable Pulse Oximeter for Swimming Pool Safety - PMC (nih.gov)3.Frontiers | Using Underwater Pulse Oximetry in Freediving to Extreme Depths to Study Risk of Hypoxic Blackout and Diving Response Phases (frontiersin.org)4.The Dewey Monitor: Pulse Oximetry can Warn of Hypoxia in an Immersed Rebreather Diver in Multiple Scenarios | SpringerLink5.AAL | Resource Center6.http://aal.army/assets/files/pdf/sbir-phase-1-template.pdf7.http://aal.army/assets/files/pdf/sbir-optional-slide-template.pdf

Holistic Health and Fitness Readiness Kit (H2H Readiness Kit)

OUSD (R&E) MODERNIZATION PRIORITY: Advanced MaterialsTECHNOLOGY AREA(S): Advanced MaterialsOBJECTIVE: Develop a solution to provide the requisite infrastructure for the Holistic Health and Fitness (H2F) Soldier Performance Readiness Center (SPRC). This facility has several critical requirements, but key innovation is focused on construction materials and techniques that drive the overall cost of the structure significantly below Army costs of ~$16M. Additionally, the solution should be developed with efficiency in maintenance and operating costs over a period of 25 years. This solution is to be implemented in the harshest climates of US Army installations ranging from heavy snow and wind to high heat and humidity. DESCRIPTION: The Army’s Holistic Health and Fitness Program is missioned to resource 110 brigades across the Army by FY2030 with people, equipment, and facilities. Specifically to facilities, H2F has designed and budgeted for SPRCs for each brigade at 43,189 square feet. Unfortunately due to traditional construction costs and requirements from existing construction contracts, the facility as designed has an unfeasible cost of over $16 million. Without a different solution in construction materials/techniques, the program office will need to continue forward with a facility of less than half the size. This equates individuals within brigades using the SPRC 2-3 times per week to only having access once every 10 days. In reference to human performance across all five domains of health and fitness (physical, mental, nutrition, sleep, and spiritual), the SPRC is the primary facility meant to service Soldiers for their holistic health, enable appropriate levels of readiness, and improve their human performance baseline to accomplish the mission.Key Capabilities include: Critical:-43,183 sf minimum with 16ft clear ceiling height in Zone 3 of the Physical Training Area. -Must withstand wind gusts of 115 mph for minimum of 3 second gusts.-Must handle a minimum of 15-92 pounds per square foot of snow load on the roof, depending on final project site.-Must follow anti-terrorism force protection per UFC 04-010-01 02 (30 JUL 2022)-Must include a fire protection system for safety purposes, following UFC 3-600-01 (06 MAY 2021).-Must include costs for foundation preparation and installation. Unique approaches to foundation are encouraged.-Must have commercial internet established for low cost upkeep with end-user. -Energy efficiency ratings will meet or exceed traditional “brick & mortar” standards for environmental control.-Must include all plumbing and electrical connections for HVAC, hygiene (hand washing, drinking water stations, restrooms), and lighting. Desired:-25-year warranty on major structural defects to include enclosure materials (roofing/siding). Enhancing: -25-year warranty on defects in wiring, piping, and ductwork in the electrical, plumbing, heating, cooling, ventilating, and mechanical systems. -3-year warranty on defects in workmanship and materials such as facility equipment, finishes, doors & windows. PHASE I: Design a proof-of-concept solution for a full scale prototype facility to service the required throughput in H2F designed programming. Other features, capabilities, and/or solutions not addressed in this solicitation that vendors determine will be beneficial to improving safety of Army Soldiers are encouraged.Phase I will award up to $200,000 over a 3-month period of performance (PoP). The 3 month period will include several virtual sessions with TPOCs and an option to travel to Fort Benning, GA to assist with refinement of a final presentation on month 3. The final presentation will take into account adjustments to approach, ability to innovate on semi-permanent/semi-portable techniques, and cost effectiveness of the solution. Proposals will be evaluated holistically based on their relevance, total cost, development timeline, material uses, foundational preparation and establishment, and additional features the proposer includes.Week 1 – Orientation and problem deep dive (virtual)Week 2 – Soldier Touchpoint (in-person at a military installation)Week 3-6 – Concept research and planningWeek 7 – Mid-point concept design brief to stakeholders and SME roundtable discussion (virtual)Week 8-11 – Concept design refinementWeek 12 – Final concept design brief to Army Senior Leaders (virtual)PHASE II:Demonstrate a full scale prototype facility, established in Phase I, to service the required throughput in H2F designed programming. Vendors will deploy to a specified site location (either Fort Drum, Fort Bragg, or Fort Benning), prepare the ground, build the foundation and structure for testing. The target timeline for this activity is the first 6 months of the PoP. Vendors will have direct interaction with units and facilities managers at the specified site throughout the PoP. Upon completion of the build, the facility will be tested with the associated operational brigade for 9 months to ensure effective construction and can withstand heavy throughput. If awarded for phase II, proposers are encouraged to include travel costs for the project development throughout the build, along with 3 quarterly touch points for operational unit feedback on the prototype. Assume 1-2 days for each in-person touch point at whichever location selected to perform (Fort Drum, Fort Bragg, or Fort Benning). Vendors will interact with military H2F professionals, leaders, and facilities experts at each installation. Solutions will be evaluated in priority of critical, desired, and enhancing priorities. Companies should include the estimated cost of travel for build and quarterly touchpoints at the specified location in their budget. In addition to the Phase II deliverable of a prototype for extended Soldier touch points, companies will provide deliverable and final reports detailing performance and associated deliverables, any iterative adjustments based on user feedback, and final product details. The final report should also include price structures, cost sheets itemized, and design documentation with any adjustments due to environmental considerations by location.PHASE III: The objective of Phase III, where appropriate, is for the small business to pursue commercialization objectives through the effort by improving the sourcing, design, technique, or actual materials to develop the technology to Technology Readiness Level 7 and document the final design. Companies will deliver final prototypes, make modifications to adapt the facility to different environments, or customize the facility for specific unit needs. Prototypes are to be subjected to environmental testing at the government’s discretion.Phase III deliverables include final price structures, full scale prototype with final design documentation, and a cost sheet itemized for consideration.WEBINAR DATE:Wednesday Jan 11, 2023 11:00 am CTTo learn more about this topic, and ask questions of Army stakeholders involved in the project register for a webinar: https://H2FReadinessKit.eventbrite.comThe Link to the video recording of the webinar will be posted in the DSIP portal in the days following. KEYWORDS: Human performance optimization, HPO, construction, advanced materials, foundation, materials, utilities, structure, facilityREFERENCES1.SPRC Army Standard, 05 MAY 2021https://mrsi.erdc.dren.mil/cos/hnc/sprc/2.SPRC Standard Design, 30 SEP 2021 https://rfpwizard.mrsi.erdc.dren.mil/MRSI/content/cos/hnc/sprc/Library/Standard%20Designs/Standard_Design_SPRC_Medium_Sept_2021.pdf3.UFC 04-010-01 DoD Minimum Antiterrorism Standards for Buildings, with Change 2 https://www.wbdg.org/ffc/dod/unified-facilities-criteria-ufc/ufc-4-010-014.UFC 3-600-01 Fire Protection Engineering for Facilities, with Change 6, 06 MAY 2021https://www.wbdg.org/ffc/dod/unified-facilities-criteria-ufc/ufc-3-600-015.https://www.nrel.gov/docs/fy22osti/82447.pdf

Wearable Radiation Sensors

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Advanced MaterialsTOPIC OBJECTIVE: The topic focuses on developing technology that will allow the radiation detection industry to develop and propose low-cost dose rate meters that is significantly smaller and better wearable than those based on current GM-tube. Smaller RADIACs (radiation detectors) will decrease the weight burden of equipment on its users, reducing fatigue and improving maneuverability. The impact of this topic will be lighter and smaller equipment that the wearer may carry. The scale has potential to be throughout the Army and other commercial platforms.TOPIC DESCRIPTION: The innovative approach of this topic is the focus on SWAP (size, weight, and power) in addition to performance. Since the 1920’s, Geiger-Muller tubes (GM tubes) have been the technology used in almost all military RADAICs. The current systems, UDR-13, UDR-14, and UDR-15, all use GM-tubes. While the GM tubes can offer the needed performance, they have major drawbacks that limit the reduction of SWAP. The GM tubes’ low sensitivity per volume and relatively high-power consumption will severely limit any SWAP reduction. If a new suitable technology is not matured and the JPD-S must use GM-tube technology, then the new JPD-S will be about the same size as the current 30-year-old UDR-13. Evolving ground-breaking technology such as solid-state gamma dose rate sensors offers the potential to greatly reduce the SWAP, with an overall objective of reducing SWAP by half. The potential end users of this technology may be the ground combat troops. Those RADIACs are deployed at one RADIAC per squad level (about 10 soldiers). The soldiers will rely on the JPD-S to provide accurate information about the radiation levels throughout the operational environment from response to disasters such as the Army’s response in Operation Tomodachi (the US support to Japan after the 2011 earthquake, tsunami, and nuclear power plant accident) to operations on the nuclear battlefield. Soldiers rely on their RADIACs to provide accurate information about the radiation level to help minimize and document exposures.PHASE I:  Starting in FY23, Phase I would be multiple awards for 6-month efforts focused on scientific, technical, commercial merit and feasibility of proposed solutions. If a performer proposed an existing detector, then the performer would need to demonstrate a clear path for temperature range and nuclear survivability. If a performer proposed a new sensor material, then the performer would need to demonstrate that the new sensor material can accurately measure radiation.PHASE II: Starting in FY 24, Phase II would be at least two awards focused on development of the technology, integration into a detector, and testing. JPEO would consider the possibility of a Phase II enhancement depending on the progress made by the performers in Phase II.PHASE III and DUAL USE APPLICATIONS:  In FY27, JPEO plans to start the program of record. Based on previous successes, JPEO plans to the following path:•Issue an RFP (request for proposal) requiring extensive data showing that their proposed equipment meets the needs of the Army and is low risk at that point plus an operating prototype•Select 3 to 5 prototypes for testing•Based on test results, down select to one system•Complete development•Conduct Development and operational test•Develop logistic (manuals, repair process, etc.)•Procure and field  KEYWORDS: Radiation detectors; RADAIC; ground combat troops; dose rate meter; meter  REFERENCES:  Fabjan, C. W. and Schopper, H. (eds.) 2020, Particle Physics Reference Library, Volume 2: Detectors for Particles and RadiationKrutul, K, et. al., “Radiation Hardness Studies of PIN-Diode Detectors Irradiated with Heavy Ions”, Acta Physica Polonica B Proceedings Supplement, Vol. 13 (2020)Menichelli, M., et. al., “Hydrogenated amorphous silicon detectors for particle detection, beam flux monitoring and dosimetry in high-dose radiation environment”, arXiv:2002.10848 [physics.ins-det]

Artificial Intelligence (AI)/ Machine Learning (ML) Open Topic

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Trusted AI and Autonomy TOPIC OBJECTIVE: The purpose of an Artificial Intelligence (AI)/ Machine Learning (ML) focused Open Topic is to bring potentially valuable small business innovations to the Army and create an opportunity to expand the relevance of the Army SBIR program to firms who do not normally compete for SBIR awards. TOPIC DESCRIPTION: This open topic is a Phase I submission only. The period of performance is a maximum of 3 months and a maximum funding limit of $150,000 per award. While the AI/ML Open Topic will accept proposals on any technical challenge requiring an AI/ML application, submissions addressing the following six out of eleven AI/ML TBT core priorities will be prioritized for award:•Synthetic data generation – production data applicable to a given situation that are not obtained by direct measurement.•Automated detection and prevention – automated systemic-based controls where they can stop threats automatically as well as predict the next attack for better future prevention.•Automated data label – quickly curate and label data for an AI model.•Biometrics – authentication is used in computer science as a form of identification and access control•Natural language technology – focused on programming computers to process and analyze large amounts of natural language data.•Supply chain resilience – automating risks and vulnerabilities within the supply chains to prevent major impacts.PHASE I:  The Phase 1 period of performance will be 3 months. Small businesses shall deliver a proof of technical feasibility at the end of the Period of Performance. Phase 1 submission materials:•5-page technical volume for down-select•8-slide commercialization plan; template provided in announcement.•A Statement of Work” is required outlining intermediate and final anticipated deliverables during the Phase 1 award periodPost-Phase 1 Deliverables: •Small Business: A feasibility study to demonstrate the technical and commercial practicality of the concept to include an assessment of its technical readiness and potential applicability to military and commercial markets.•TPOC and Transition Partner: Commitment secured from TPOC and Transition Partner to associate with potential P2 work.PHASE II: Produce prototype solutions that will be easy to operate by a Soldier. These products will be provided to select Army units for further evaluation by the soldiers. In addition, companies will provide a technology transition and commercialization plan for DOD and commercial markets.PHASE III and DUAL USE APPLICATIONS:  Complete the maturation of the company’s technology developed in Phase II to TRL 6/7 and produce prototypes to support further development and commercialization. The Army will evaluate each product in a realistic field environment and provide small solutions to stakeholders for further evaluation. Based on soldier evaluations in the field, companies will be requested to update the previously delivered prototypes to meet final design configuration.  KEYWORDS: Artificial Intelligence; Machine Learning; Open topic; automation; synthetic data generation; data labeling; supply chain resilience  REFERENCES:  https://www.armysbir.army.mil/topics/

Army Tech Marketplace

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Advanced Computing and Software, Integrated Network Systems-of-Systems and Trusted AI and AutonomyTOPIC OBJECTIVE: To develop, integrate and deploy a technology with a simple intuitive user interface to improve information exchange and the discovery of collaboration opportunities within the Army R&D and Acquisitions communities as well as between the Army and private sector technology providers and private sector technology integrators. The intent is to improve the transition of R&D-funded technologies into the Army enterprise. TOPIC DESCRIPTION: The Army research and development ecosystem does not have a simple, intuitive portal for Army research centers and acquisition offices to access information related to Army R&D investments, including technology capabilities, technology maturity level, milestone delivery schedules, etc. The lack of direct access to internal information and data limits internal Army awareness and analysis of potentially valuable technologies to support the Army enterprise. The result is a less robust use of R&D investments, missed collaborations and co-investments, and an overall decrease in the likelihood of critical technologies transitioning into the Army enterprise to support the Soldier. The Army Tech Marketplace is envisioned as a web-based knowledge management and collaboration platform with an intuitive user-friendly interface that enhances transparency and simplifies access to R&D-funded technologies for Army stakeholders and private sector innovators to share, retrieve, and analyze information, and collaborate. The Army Tech Marketplace should provide an artificial intelligence and data-fusion capability to assess the probability of technologies to transition, identify trends within the Army enterprise, and maximize the value of business intelligence data to support agile Army decision-making. This effort seeks to create a platform for sharing information at the appropriate level first between different Army offices and second with members of the innovation economy. The effort will prioritize an internal Army-focused side connecting R&D needs and gaps with funding and resource opportunities. Internally, it must be a common, IL4 secure space for the Army and eventually, Joint Service research centers, acquisitions, and SBIR programs to learn of cross-organizational activities, mitigate R&D risks by learning from others, and dynamically exploit opportunities for collaboration. It will also have a generally accessible, external-to-the-Army side connecting innovation economy firms with Army technology challenges and the Army Program Executive Offices working to address those challenges. Externally, the Army Tech Marketplace permits Army, Joint Services, and innovation economy members to appropriately share information, build relationships, and facilitate collaboration, contracts, and integration of innovations into the Army enterprise. Integral to the platform must be data analytics and artificial intelligence enabled tools to assist internal Army Tech Marketplace users to assess technologies and trends to improve interactions with external members, as well as leverage the total value of the data on the platform to improve Army Tech Marketplace operations. These capabilities should be accessed through a simple graphical intuitive user interface that can serve users of various proficiencies and knowledge. The platform should be vetted from both a software and usability standpoint. The following are the generalized steps required of the company performing this work to frame and inform their proof-of-concept deliverable: 1.Work with Army SBIR Program to align project goals, requirements, and roles. 2.Engage key stakeholders identified by Army SBIR Program to conduct problem framing and stakeholder mapping activities to engage, discover questions, clarify language, and develop instruments useful to the stakeholders. 3.Review and present findings on similar products and services that other military Services and private organizations use that may have similar or overlapping use cases. 4.Collaborate with Army SBIR Program to identify and outline a detailed project plan, timeline, goals, scoping, and discovery outline intended to form the basis of anticipated Phase 2 work. The following are success criteria for this effort: 1.Internal Army and External Innovation Economy: Separation within the platform of internal Army stakeholder site from external emerging technology accessible site. The internal, Army-only site must achieve DOD IL-4 to handle Army data up to Controlled Unclassified Information (CUI). The external, innovative economy-oriented side of the platform should achieve DOD IL 2 (Public or Non-Critical Mission Information). 2.Collaboration: Enable collaboration across multiple Army users and private sector innovation economy firms. 3.Ease of Use: An intuitive interface informed by a human-centered design approach that results in a layout and graphics requiring minimal familiarization for basic portal navigation. Must be easy to customize fields to provide flexibility and offer a simplified Search Engine. 4.Workflow: Process tracking, routing, reminders, and ability to assign follow-on tasks. 5.Platform Modularity: Build a modular platform capable of easy expansion in both scale of participants and the scope of capabilities. 6.Reporting & Accountability: The ability to easily retrieve data and insights and track progress on pre-determined metrics. Includes but not limited to reporting and dashboards or other business intelligence tools to help visualize the data. 7.Analytics: Offer data analytics and artificial intelligence enabled tools for trend analysis, customer discovery, and continuous improvement actions across the platform. 8.Lifecycle Cost: Respecting the platform’s modular approach, create a total lifecycle cost model to account for implementation, training, and ongoing licensing/support costs. PHASE I: Starting in FY23, Phase I would be for multiple awards of $200,000 each with a 4-month period focused on technical value, commercial merit, and feasibility of proposed solutions. At a minimum, the deliverable from Phase I would be a detailed technical presentation on the design and attributes of the proposed platform conforming to the eight success criteria listed in the Topic Description. PHASE II: In FY 23, an award would be made to refine the plan developed in Phase I and create a minimum viable platform for testing and evaluation by the Army Applied SBIR Program and its stakeholders employing the eight success criteria listed in this Topic Description. These criteria are subject to revision based on the results of the outcome of the Phase I effort. PHASE III DUAL USE APPLICATIONS: The proposed technology has potential use within the Army Small Business Innovation Research Program as well as other Army Research Centers and acquisition programs.   KEYWORDS: R&D; research and development; portal; Webpage integration; knowledge management; collaboration platform; innovation economy; tech marketplace; software; website  REFERENCES:  https://www.armysbir.army.mil/topics/https://www.ausa.org/sites/default/files/SR-1990-A-Primer-on-Research-and-Development-in-the-US-Army.pdf

Casualty Care Training- Mixed Reality Manikin Solution for Female Soldier Survivability

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Combat Casualty Care; Human-Machine InterfacesOBJECTIVE:Develop, demonstrate, and deliver solutions for enhanced female combat trauma mixed reality (MR) training manikin that incorporates open architecture utilizing high fidelity simulations for combat-trauma-related scenarios. DESCRIPTION:A study of the Army’s medical training literature found significant disregard for the anatomical and physiological differences between males and females resulting in lower survivability rates for female casualties in comparison to males: 35.9% vs 17% and 14.5% vs 12% (Operation Iraqi Freedom) (Cross, Johnson, Wenke, Bosse, & Ficke, 2011). The Army currently trains Soldiers using male manikins when teaching Tactical Combat Casualty Care (TCCC). The Army is looking to invest in technology that improves training to better care for Soldiers, specifically female Soldiers, on the battlefield and save lives at point of injury. Training using realistic, female anatomy can help reduce hesitation to provide treatment of battlefield injuries and reduce female deaths.The Army is seeking a solution for a hybrid training tool utilizing a combination of augmented reality, virtual reality, and physical manikins to address female combat casualty care. To build out the best-in-breed training solution, all components need to be open architecture with plug-and-play capabilities to develop modular training independent of gender or scenario. While medical training is extremely hands-on, and the ability to physically feel what is happening is critical in training, virtual training provides ease and modularity for creating different training scenarios and reduces the cost of training. Currently, trauma medical training is done in either virtual or physical training environments. There are limitations for both approaches but combining the two will increase training effectiveness and reduce costs overall.Current Army medical training is male-centric with significant gaps in female trauma care (Bell, Thomson, Mazzeo, & Pike, 2020). According to the Department of Defense Personnel and Readiness Report of 2019, 14.9% of the United States Army population is female (2019, p. 93). This effort will not only move the needle to address female needs on the battlefield for the military, but it will also have applications in the civilian sector, better preparing medical professionals for trauma cases.PHASE I:Design a proof-of-concept solution for an end-to-end system, or components of a system that effectively trains Soldiers utilizing an anatomically correct physical female manikin, physical task trainers, software simulators/trainers, and provides Soldier training feedback. Solutions will be evaluated based on a holistic view of factors including the ability to integrate designated Army open standards, cost of development, adaptability of solution based on individual Soldiers’ needs or scenarios, and any additional factors proposed. The objective of Phase I is to establish the technical merit, feasibility, and commercial potential of the proposed effort, and to determine the quality of performance of the awarded companies prior to providing further support in Phase II. Final deliverable will be a concept design presentation, proof of technology demonstration, and plans for follow-on Phase II work. Companies can voluntarily participate in the Army Applications Laboratory (AAL) 12-week cohort program. The AAL cohort program is designed to solve specific Army modernization challenges on a compressed timeline. The cohort program matches qualified companies with Army problem owners to speed capability development, accelerate transition, and de-risk or inform requirements. This program is designed for businesses that own unique, applicable technology and are interested in growing a new line of business through the DoD.The cohort program will enhance technology development through rapid exposure to Army stakeholders and the Army medical simulation community. Planned activities include a problem topic deep dive, a field week with Army leaders and Soldiers, hands-on experience with currently fielded military equipment, and stakeholder engagement from the requirements writer, to the acquisition manager, to the end-user. An example cohort program for this topic is: Week 1 – Orientation and problem deep-dive (virtual) Week 2 – Soldier Touchpoint (in-person at an Army installation)Week 3-6 – Concept research and planning Week 7 – Mid-point concept design brief to Army Senior Leaders and SME roundtable discussion (in-person at an Army installation) Week 8-11 – Concept design refinement Week 12 – Final concept design brief to Army Senior Leaders (in-person at an Army installation)Cohort programming will be provided free of charge. Proposers who plan to participate in the cohort (if awarded a Phase I) are encouraged to include travel costs for three cohort trips, within the continental US, for four to five days each for in-person programming. In-person events may be substituted for virtual events depending on COVID-19 travel restrictions. Details will be provided to awardees under this topic at Phase I award.PHASE II:Design a prototype demonstration for the continued development efforts initiated in Phase I. Prototypes should be capable of integration with existing Army systems or newly developed systems from other awardees. They should also showcase modularity and prove effective during simulated or operational demonstrations. Phase II deliverables include a demonstration and delivery of a Technology Readiness Level (TRL) 6 prototype for further Army evaluation, as well as quarterly and final reports detailing design and performance analysis of the prototype.Awardees may also be eligible for Phase IIb award after completion of Phase II period of performance. Phase IIb can extend the period of performance with additional funding and additional matching opportunities to finish building out solutions with the stakeholders’ discretion.PHASE III:The objective of Phase III, where appropriate, is for the small business to pursue commercialization objectives through the effort. Companies may develop a manufacturing-ready product design, capable of integration with the existing or future system, and demonstrate technology integration. Low-rate production will occur as required. Companies will engage in laboratory or operational testing as required. Phase III deliverables include system-level integration technical data package, installation documentation, and system-level prototype for demonstration and government-sponsored testingWEBINAR DATE:Two Webinars will be conducted with this solicitation on Tuesday, 21 March: Webinar 1 (1500-1600 CST) and Thursday, 23 March: Webinar 2 (1200-1300 CST). Please register at: https://casualtycaretrainingwebinar.eventbrite.com KEYWORDS:Female Manikin, Combat Casualty Trauma, Combat Trauma Manikin, MOHSES, Augmented Reality Medical Training, Virtual Reality Medical Training, Open ArchitectureREFERENCES:Bell, E. Thomson, R., Mazzeo, M. Pike, W. (2020). Same injury, different outcome? Investigating hesitation while treating female casualties. Proceedings of the 2020 Interservice/Industry Training, Simulation, and Education Conference. https://media.defense.gov/2023/Mar/06/2003173353/-1/-1/1/BELL_THOMSON_CASUALTIES.PDF Cross, J. D., Johnson, A. E., Wenke, J. C., Bosse, M. J., & Ficke, J. R. (2011). Mortality in female war veterans of Operations Enduring Freedom and Iraqi Freedom. Clinical Orthopaedics and Related Research®, 469(7), 1956-1961.Retrieved November 21 from https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3111768/ MoHSES, the Advanced Modular Manikin Phase 2 Standards(2015). Retrieved November 3 from https://www.mohses.org/ Office of the Under Secretary for Personnel and Readiness Report, 2019. Retrieved October 2, 2019 from https://prhome.defense.gov/M-RA/Inside-M-RA/TFM/Reports/ Reed, A. M., Janak, J. C., Orman, J. A., & Hudak, S. J. (2018). Genitourinary injuries among female US service members during Operation Iraqi Freedom and Operation Enduring Freedom: findings from the Trauma Outcomes and Urogenital Health (TOUGH) project. Military Medicine, 183(7-8), e304-e309. https://pubmed.ncbi.nlm.nih.gov/29420771/Sotomayor, T. M., Mazzeo M. V., Maraj, C. S., & Page, A. J. (2018). Saving female lives using simulation: elevating the training experience.. Launching Innovation Through Medical Modeling and Simulation Technologies, 6(4), 28 – 37. Retrieved October 2, 2019, from https://csiac.org/articles/saving-female-lives-using-simulation-elevating-the-training-experience/

xTechSBIR Pacific Finalist Open Topic Competition

Critical Technical Area(s): Advanced Computing and Software; Integrated Network Systems-of-Systems; Renewable Energy Generation and Storage; Human-machine InterfacesOBJECTIVE: It has been noted that when it comes to conflict, America is often the “away team.” The U.S. is often fighting wars in areas thousands of miles from U.S. shores. This fact creates a “tyranny of distance,” meaning that, distance lessens military strength and increases the cost of conflicts. The impact of long distances can affect overall strategy, tactics, and logistics. Even with unrivaled capabilities, the ability to collect and understand intelligence can decay over distance. The supply chain is also heavily impacted, as distance increases, the time to provide supplies increases, supply routes can be contested, and even when supplies arrive safely, upkeep and maintenance are still a concern. These are just a few of the ways that distance impacts the effectiveness of our military overseas.The U.S. Army is interested in enabling technologies that could help overcome the “tyranny of distance”. Examples of technologies that address this issue include but are not limited to the following domains:•Logistics/Supply Chain: To ensure rapid resupply of material and aid.•Sustainment and Climate: To limit the need for resupply across geographically dispersed troops.•Communications: To ensure secured communication in degraded environments over extraordinary distances.•Internet of Things (IoT)/Sensing: To increase force control and introduce autonomous capabilities in Theater.•Information Advantage: To increase real-time situational awareness through information operations and a commons intelligence picture.DESCRIPTION: The U.S. Army would like to invite interested entities to participate in the xTech Small Business Innovation Research (SBIR) Pacific competition, a forum for eligible small businesses in the U.S. Pacific region to engage with the Army, earn prize money, participate in the accelerator program, and submit for a Phase I SBIR award. xTechSBIR Pacific offers an opportunity for eligible participants to pitch novel technology solutions directly to the Army addressing tyranny of distance challenges faced by the U.S. Pacific region.The U.S. Army Combat Capabilities Development Command (DEVCOM)-Pacific, U.S. Army Pacific (USAPAC), and Hawaii Technology Development Corporation (HTDC) in partnership with the Assistant Secretary of the Army (Acquisition, Logistics, and Technology) (ASA(ALT)), recognizes that the Army must enhance engagements with eligible small businesses by: (1) understanding the spectrum of ‘world-class’ technologies being developed commercially that may benefit the Army; (2) integrating the sector of commercial innovators into the Army’s Science and Technology (S&T) ecosystem; and (3) providing mentorship and expertise to accelerate, mature, and transition technologies of interest to the Army.The xTechSBIR Pacific competition will consist of three-rounds: (1) Call for concept white papers (2) Virtual Technology Pitch event and (3) Final Pitch event, awarding up to $800,000 in cash prizes to select eligible entities throughout the competition. Ultimately, up to 20 finalists will be selected from the virtual technology pitch event and will receive a cash prize of $20,000 each and an invitation to demonstrate their innovative technology solutions to Army challenges during the final pitch event. Up to 10 participants will be selected as the final winners of the competition upon conclusion of the finals pitch event and will receive an additional cash prize of $25,000 each and the opportunity to submit for a Phase I SBIR award of up to $250,000 each or a Direct to Phase II SBIR award of up to $1,900,000 each. Details on the prize structure are listed in this announcement. In addition to non-dilutive cash prizes, participants will have the opportunity to engage with Army partners through information sharing and networking opportunities. Finalists will be entered into the xTech Accelerator to receive intensive mentorship and access to networking events to help grow their companies for Army and commercial users. The efforts described in this notice are being pursued under the authorities of 10 U.S.C. § 4025 (formerly 2374a, Prizes for Advanced Technology Achievements) and 15 U.S.C. § 638 and 10 U.S.C. § 4003 (Prototype Projects) to award cash prizes and SBIR awards to only those eligible entities as described in this announcement. While the authority of this program is 10 U.S.C. § 4025, the xTechSBIR Pacific competition may generate interest by another U.S. Army, DOD or USG organization for a funding opportunity outside of this event. The interested organization may contact the participant to provide additional information which may or may not result in partnership opportunities. PHASE I: Companies will complete a feasibility study that demonstrates the firm’s competitive technical advantage relative to other commercial products (if other products exist) and develop concept plans for how the company’s technology can be applied to Army modernization priority areas. Studies should clearly detail and identify a firm’s technology at both the individual component and system levels, provide supporting literature for technical feasibility, highlight existing performance data, showcase the technology’s application opportunities to a broad base of customers outside the defense space, a market strategy for the commercial space, how the technology directly addresses the Army’s modernization area as well as include a technology development roadmap to demonstrate scientific and engineering viability. At the end of Phase I, the company will be required to provide a concept demonstration of their technology to demonstrate a high probability that continued design and development will result in a Phase II mature product. PHASE II: Produce prototype solutions that will be easy to operate by a Soldier. These products will be provided to select Army units for further evaluation by the soldiers. In addition, companies will provide a technology transition and commercialization plan for DOD and commercial markets.PHASE III DUAL USE APPLICATIONS: Complete the maturation of the company’s technology developed in Phase II to TRL 6/7 and produce prototypes to support further development and commercialization. The Army will evaluate each product in a realistic field environment and provide small solutions to stakeholders for further evaluation. Based on soldier evaluations in the field, companies will be requested to update the previously delivered prototypes to meet final design configuration. REFERENCES: https://www.xtech.army.mil/competitions/KEYWORDS: logistics; supply chain; climate; xTech; xTechSBIR Pacific; internet of things; information collection; data collection; sensing; communications

Conformable Hydrogen Storage

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Renewable Energy Generation and Storage; BiotechnologyTOPIC OBJECTIVE: The goal of this topic is to develop conformable hydrogen storage vessels that can store hydrogen at 700 bar (10,000 psi). TOPIC DESCRIPTION: As the Army moves towards electrifying its vehicle fleet, storing enough energy onboard vehicles to match or exceed their current performance is a challenge. While batteries have made great strides in recent decades, they remain heavy and cumbersome. A potential solution for heavy vehicles is hydrogen fuel cells. Fuel cells can provide the benefits of electrification (silent mobility, silent watch, export power, high torque on demand, etc.) while maintaining current vehicle range and allowing for refueling in the same amount of time as liquid fuels. One drawback of hydrogen fuel cells is storage of the hydrogen itself. Current solutions are bulky composite overwrapped pressure vessels (COPVs) that take up significant space. A potential solution is conformable tanks that can be designed to fit unusually shaped space claims, allowing for more energy to be stored in containers, on vehicles, or in other energy storage use cases. This technology has been developed and validated to 350 bar (5,000 psi) applications, but further work is required to meet the goal of 700 bar operating pressures. Evaluation of these tanks under military ballistic testing also revealed some potential areas of improvement for this technology. It is important to develop this technology as it will enable high energy density storage that can be refilled as quickly as current liquid fuels while enabling electrification technologies and reducing thermal and acoustic footprints for energy generation systems. Note: This technology uses emerging manufacturing techniques along with a unique design that allows for the hydrogen storage tank to fit the shape of any space claim, utilizing a higher percentage of empty space than the current state of the art. The materials used are also lower cost and have been optimized to meet the demanding requirements for vehicle use.PHASE I: This is a Direct to Phase II topic. To justify a Direct to Phase 2, the company should provide data showing a tank system made up of multiple segments (more than one) capable of 350 bar operations. At minimum, there should be data demonstrating the system can comply with proof testing and burst testing outlined in CSA/ANSI HGV 2.DIRECT TO PHASE II: Design a 700-bar system for vehicle use that qualifies applicable to HGV 2 standards identified by both TPOC and contractor. Demonstrate the performance of the system on an applicable vehicle system. Potential Phase II Sequential and Enhancement: Scale up the design of the 700-bar system for larger storage quantities. Undergo ballistic testing of the system with military specific ballistic threats. Incorporate lessons learned from previous testing and develop 700 bar systems for specific military vehicle applications.PHASE III DUAL USE APPLICATIONS: There is a multitude of industries that would benefit from improved hydrogen storage, with new use cases, like P2G tech, that will rely on hydrogen storage technology for operation. Efficient hydrogen storage will become a necessity as various industries, including transportation, metal refining, and chemical manufacturing, increase their hydrogen usage. The proposed technology has potential use within the Army Small Business Innovation Research Program as well as other Army Research Centers and acquisition programs.   KEYWORDS: Hydrogen; Storage; fuel; battlespace; tank; refuel point; electrification  REFERENCES:  1.Lithium Ion Battery, Clean Energy Institute, https://www.cei.washington.edu/education/science‐of‐solar/battery‐technology/2.Physical Hydrogen Storage, https://www.energy.gov/eere/fuelcells/physical‐hydrogen‐storage 3.Conformable Hydrogen Pressure Vessel, https://www.osti.gov/servlets/purl/14591844.Innovative pressurized hydrogen storage for integrated vehicle structures using composites, 5.https://www.compositesworld.com/news/innovative‐pressurized‐hydrogen‐storage‐for‐integrated‐vehicle‐structures‐using‐composites 6.Materials challenges to enable hydrogen deployment at scale by 2050, https://www.google.com/url?sa=i&rct=j&q=&esrc=s&source=web&cd=&cad=rja&uact=8&ved=0CCYQw7AJahcKEwjg37GFo_f7AhUAAAAAHQAAAAAQAw&url=https%3A%2F%2Fwww.royce.ac.uk%2Fcontent%2Fuploads%2F2021%2F06%2FRoyce‐Hydrogen‐Conformable‐Tanks-Summary.pdf&psig=AOvVaw1WyXFqJZkfpV3vNpk4zMmc&ust=1671044241186277

Hydrogen Generator

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Renewable Energy Generation and Storage; BiotechnologyTOPIC OBJECTIVE: The purpose of this topic is to develop an on-demand hydrogen generation system that can be used to quickly refuel a vehicle in situations where its main fuel tank is empty. The end user for this system would be fuel cell system operators. In the event a fuel cell system depletes the main fuel tank and battery power (assuming a hybrid fuel cell/battery electric architecture), this system can be used to provide hydrogen to the fuel tank (or directly to the fuel cell) to allow the system to provide power and return to safety. The system would be sized to be portable while providing enough energy to travel back to base, similar to how jerrycans are currently used.TOPIC DESCRIPTION: As the Army moves towards more electrified platforms, new challenges arise, such as running out of fuel or energy while executing a mission. Current vehicles can be refueled quickly from a jerrycan, allowing them to travel to the refueling point. Fully electrified platforms are not as easily refueled on the side of the road, which puts both Soldiers and materiel in danger. As the Army explores electrification technologies, preparing for situations such as this are important to keep both Soldiers safe and protect next generation platforms. Hydrogen fuel cells are a potential electrification technology that can provide near-silent power and mobility for military vehicles while providing high torque with inherently scalable power and energy, capable of providing range beyond that of purely battery-powered electric vehicles. Hydrogen can also be refueled more quickly than batteries can charge, providing an opportunity to solve the problem of a fuel-depleted vehicle on a mission. Several technologies exist that can provide hydrogen on-demand from solid materials that can be easily and safely transported and stored. One such technology of interest is aluminum alloys that react with water to provide hydrogen.Note: Hydrogen generators that utilize aluminum alloy and water are like an extra fuel tank, butless volatile. Aluminum powder can be safely handled and stored as a solid material, unlike liquid fuel. Several recent advances in the technology allow for the material to be manufactured at scale from scrap aluminum, providing a large source of energy in an inexpensive manner (1, 2). Compared to domestically sourcing lithium for battery production (and in order to meet future energy needs), this technology provides significant energy density without requiring rare earth metals, while at the same time needing significantly less infrastructure be developed. When exposed to water, the alloys produce hydrogen rapidly and at pressure, allowing a vehicle to be fueled quickly while providing enough energy to travel back to safety or a refueling point. The system can be designed with safety at the forefront, incorporating pressure relief devices and intrinsically safe controls.PHASE I: It is important to note that this is a Direct to Phase II topic. To justify a Direct to Phase 2, This Direct to Phase 2 effort should have data demonstrating the operation of an aluminum-water hydrogen generation system. The data should show the flow rate of hydrogen from the system, pressure during operation, temperature of the system, the amount of aluminum and water used, and control over the reaction (data showing a controlled stop/start cycle of the reaction). The proposal should also demonstrate the hydrogen from the reaction is pure enough to operate a fuel cell by either providing performance data from a fuel cell connected to the system or analysis of the hydrogen purity.PHASE II: Design a hydrogen generation system that can be man-portable while providing a meaningful range for vehicles in the case that fuel is depleted. Manage the thermal performance of the system, reducing both the exterior touch temperature to safe levels and overall thermal signature. Fabricate and demonstrate such a system. Demonstrate aluminum alloy production capable of supporting the manufacturing of several systems. Testing required for this technology would include measuring the flow rate of hydrogen from the system, demonstrating that the system can operate at the designated pressure, maintaining a safe external touch temperature, and effectively removing heat from the reaction.PHASE III DUAL USE APPLICATIONS: There is high dual-use potential for hydrogen fuel cells, as users across industries continue to adopt this technology, especially in vehicles and industrial power. The high CAGR indicated rapid, significant projected growth across all sectors. Popular use cases for fuel cells in general include power generation for electric individual and mass transportation vehicles, industrial processes, data centers, and utilities, as well as residential heating. Hydrogen fuel cells can be used to build stacks, which can allow for modular power systems that can adapt to energy requirements based on the use case.The proposed technology has potential use within the Army Small Business Innovation Research Program as well as other Army Research Centers and acquisition programs.   KEYWORDS: Hydrogen; Storage; fuel; battlespace; tank; refuel point; electrification; generator; generation system; power supply  REFERENCES:  1.Using aluminum and water to make clean hydrogen fuel—when and where it’s needed, https://energy.mit.edu/news/using-aluminum-and-water-to-make-clean-hydrogen-fuel-when-and-where-its-needed/2.Nanogalvanic Aluminum Powder For Hydrogen Generation, https://www.arl.army.mil/wp-content/uploads/2019/11/AlNanogalvanicPowder-Marketing-Sheet.pdf3.The production of hydrogen as an alternative energy carrier from aluminium waste, https://energsustainsoc.biomedcentral.com/articles/10.1186/s13705-017-0110-7

Dual Band Imager

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Integrated Sensing and CyberOBJECTIVE: The innovative approach of this topic is the focus on reduced SWAP (size, weight, and power) in addition to performance. DESCRIPTION: Missions require the use of multiple sensors in order to achieve specific objectives. The sensors used extended range imaging applications relies on antiquated technology resulting in extreme sensitivity to Size, Weight, and Power (SWaP). Current dismounted sensors configurations either necessitate separate imaging devices, or complex optical filtering schemes that increase system SWaP in order to maintain operational effectiveness in all environments. Lastly, imaging sensors allow for more advanced target discrimination against advanced threats in multiple bands, complex scenes and various atmospheric conditions. If multiple sensor bands can be imaged simultaneously on the same detector, lower SWaP and less sensitive subcomponent alignments (lower SWaP/environmental factors) is gained resulting in less complex systems. PHASE I: Phase I is anticipated 3 months to complete a System Design Review, covering systems trade analysis and optimization of performance vs anticipated SWaP, with the goals of phase II below as the basis. The final design will be illustrated with conceptual drawings and performance predictions to at the detector level to support system-level feasibility studies by the Government. Additional details/specifications to be provided to firm upon award.PHASE II: Phase II is anticipated <20 months to further develop and finalize dual-band detectors specifically tailored for the dismounted Soldier on stacked structures for simultaneous imaging capabilities in the Short Wave and Mid-Wave Infrared. This project will study varying detector design parameters to minimize crosstalk while improving the detector Modulation Transfer Function (MTF) when paired with optimized optical configurations while producing prototypes for test and integration. The Integrated Dewar Cooler Assembly shall be tailored for dismounted applications and be light weight with minimal power consumption. The IDECA FPA shall have a minimum format of 1280 x 720 with a minimal detector pixel pitch. The project will be validated in two approaches; one with Government Furnished Equipment (GFE) optics for demonstration of final imaging performance, then retrofitted into an existing host prototype. Additional details/specifications to be provided to firm upon award.PHASE III DUAL USE APPLICATIONS: Complete the maturation of the company’s technology developed in Phase II and produce prototypes to support further development and commercialization. KEYWORDS: Infrared; sensors; imager; camera systems; dual-band optics; laser guidanceREFERENCES: High Operating Temperature (HOT) SWIR/MWIR Dual-band 2-channel and Broadband Detectors for Weapon Targeting and IR Seekers | SBIR.govHexaBlu | Commercial Infrared Solutions (leonardodrs.com)

Sustainable Building Materials and Technologies Open Topic

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Advanced MaterialsOBJECTIVE: The purpose of a Sustainable Building Materials and Technologies focused Open Topic is to bring potentially valuable small business innovations to the Army and create an opportunity to expand the relevance of the Army SBIR program to firms who do not normally compete for SBIR awards.Building materials and technologies are ubiquitously used by the Army CONUS and OCONUS, and account for a significant percentage of the overall Army carbon/climate footprint. This Sustainable Building Materials and Technologies topic seeks to address this carbon intensive aspect of military operations through disruptive materials, logistics, and technologies from a life-cycle assessment (LCA)perspective to meet the goals of the DoD Climate Adaptation plan and Army Climate Strategy.DESCRIPTION: This open topic is a Phase I or Direct to Phase II submission. For Phase I awards period of performance is a maximum of 6 months and a maximum funding limit of $250,000 per award. For Direct to Phase II awards period of performance is a maximum of 18 months and a maximum funding limit of $1,900,000 per award.While the Sustainable Building Materials and Technologies Open Topic will accept proposals on any technical challenge requiring an application to reduce lifecycle fossil fuel consumption and/or emissions, submissions addressing the applications of those technologies in enduring facilities and infrastructure on installations as well as low-logistics contingency construction applications will be prioritized along with efforts focused on the following technical areas:•Low-logistics indigenous materials utilization•Sustainability-centered materials-by-design•Scalable sustainable building material technologies•Forward waste utilization for sustainable low-logistics manufacturing•Low-energy bio-based building materials•Terrestrial carbon sequestration materials and technologiesPHASE I: The Phase I period of performance will be 6 months. Small businesses shall deliver a proof of technical feasibility at the end of the Period of Performance. Phase I submission materials:•5-page technical volume •8-slide commercialization plan; template provided in announcementPost-Phase I Deliverables:•Small Business: A feasibility study to demonstrate the technical and commercial practicality of the concept to include an assessment of its technical readiness and potential applicability to both military and commercial markets.•Technical POC and Transition Partner: Commitment secured from TPOC and Transition Partner to associate with potential Phase II work. (Transition Partner is defined as an Army organization planning to integrate and fund the technology after SBIR funding has expired).Proposers interested in submitting a Direct to Phase II (DP2) proposal must provide documentation to substantiate that the scientific and technical merit and feasibility described above has been met and describes the potential military and/or commercial applications. Documentation should include all relevant information including, but not limited to: technical reports, test data, prototype designs/models, and performance goals/results. PHASE II: Produce prototype solutions targeted toward construction and other Army sustainability requirements. These solutions should be vetted through standard testing procedures and modeling focused on mechanical /structural performance, lifecycle durability, lifecycle sustainability, and an understanding of lifecycle cost factors. Prototypes will focus on demonstrating technology at scale including requirements for design and specifications that can easily transition for adoption by the Army. In addition, companies will provide a technology transition and commercialization plan for DOD and commercial markets.PHASE III DUAL USE APPLICATIONS: Complete the maturation of the company’s technology developed in Phase II to TRL 6/7 and produce prototypes to support further development and commercialization. The Army will evaluate each product in a realistic field environment and provide small solutions to stakeholders for further evaluation. Based on technical evaluations in the field, companies will be requested to update the previously delivered prototypes to meet final design configurationKEYWORDS: Clean Technology; Sustainable Construction; Open topic; Materials, Sustainability, Resilience; Emissions; Green; Environmental, Facilities, Buildings, Infrastructure REFERENCES:  https://www.armysbir.army.mil/topics/

xTechPrime Finalist Open Topic Competition

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Trusted AI and Autonomy; Advanced Computing and Software; Integrated Sensing and Cyber; Microelectronics; Integrated Network Systems-of-Systems; Renewable Energy Generation and Storage; Advanced Materials; Human-Machine InterfacesOBJECTIVE: xTechPrime is seeking novel, disruptive concepts and technology solutions with dual-use capabilities that can assist in tackling the Army’s current needs and apply to current Army concepts. The intent is to provide the Army with transformative technology solutions while enabling cost savings throughout the Army systems’ life cycle. Critical technology focus areas include Artificial Intelligence/Machine Learning (AI/ML); Autonomy; Climate and Clean Technologies; Immersive/Wearables; and Sensors. See attached document on the Valid Eval registration page for a list of the top Army SBIR Transition Broker Team topic areas. DESCRIPTION: The U.S. Army would like to invite interested entities to participate in the xTechPrime competition, a forum for eligible small businesses and technology integrators to form teams in order to bring forward innovative technology solutions to solve current Army needs. A technology integrator is defined for this competition as “any business outside of the selected small business in Part 1, who has directly worked with the U.S. government. They have experience managing at least one subcontractor and are responsible for ensuring that the work is completed as defined in the contract, this can include but is not limited to, other small businesses, Primes, and sole proprietors.” The xTechPrime competition will challenge small businesses to work together in teams with technology integrators to submit their innovative solutions that contribute to the Army’s current modernization goals. xTechPrime will assist in driving innovation, ultimately delivering novel, and often overlooked, technologies to the Army. Through the xTechPrime competition, the Army is encouraging collaboration between small businesses and technology integrators by providing an opportunity to form teams to compete for non-dilutive cash prizes and, for the original small business submitters, the potential for a Direct to Phase II SBIR contract award. The efforts described in this notice are being pursued under the authorities of 10 U.S.C. § 4025 (formerly 2374a) and 15 U.S.C. § 638 and 10 U.S.C. § 4022 (Prototype Projects) to award cash prizes and SBIRs to only those eligible entities as described in this announcement. The xTechPrime competition will serve as the proof-of-principle that is required to receive a Direct to Phase II SBIR award. While the authority of this program is 10 U.S.C. § 4025, the xTechPrime competition may generate interest by another DOD organization for a funding opportunity outside of this program (e.g., submission of a proposal under a Broad Agency Announcement). The interested DOD organization may contact the participant to provide additional information or ask for a request for proposal in a separate solicitation. PHASE I: This is a Direct to Phase II submission. In order for proposers to submit a Direct to Phase II (DP2) proposal, they must provide the justification documentation to substantiate that the scientific and technical merit and feasibility described above has been met and describes the potential military and/or commercial applications. Documentation should include all relevant information including, but not limited to: technical reports, test data, prototype designs/models, and performance goals/results. PHASE II: Produce prototype solutions that will be easy to operate by a Soldier. These products will be provided to select Army units for further evaluation by the soldiers. In addition, companies will provide a technology transition and commercialization plan for DOD and commercial markets.PHASE III DUAL USE APPLICATIONS: Complete the maturation of the company’s technology developed in Phase II to TRL 6/7 and produce prototypes to support further development and commercialization. The Army will evaluate each product in a realistic field environment and provide small solutions to stakeholders for further evaluation. Based on soldier evaluations in the field, companies will be requested to update the previously delivered prototypes to meet final design configuration. REFERENCES: https://www.xtech.army.mil/competitions/KEYWORDS: logistics; supply chain; climate; xTech; xTechPrime; internet of things; information collection; data collection; sensing; communications; autonomy; artificial intelligence; sensors; AI/ML

Lethal Payloads for Small Unmanned Aerial Systems

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Air Platforms OBJECTIVE:Develop a lethal payload capability that can be employed on a Small Unmanned Aerial System (sUAS). The capability should employ munitions (ammunition or explosives) that are currently in the U.S. inventory and attach to one or more sUAS platforms on the Defense Innovation Unit (DIU) Blue UAS Cleared List, excluding the WingtraOne platform. DESCRIPTION:The ability to employ lethal payloads on existing sUAS is vital for future Army combat operations. Lethal payloads for sUAS will provide capabilities at the small unit level beyond the current use of sUAS, which focuses only on intelligence, surveillance, and reconnaissance (ISR) capabilities. Successful development of lethal payloads for sUAS would advance the U.S. Army’s modernization priorities and increase the lethality of its Infantry Brigade Combat Teams (IBCTs). Currently only one sUAS platform is fielded at the small unit level: the Short Range Reconnaissance (SRR) platform, fielded by Program Executive Office (PEO) Aviation and referred to commercially as the Skydio X2D. The SRR was developed to give infantry platoons a UAS platform for intelligence, surveillance, and reconnaissance. Under the SRR program there is currently no capability to employ the system as a lethal asset. The Defense Innovation Unit (DIU), under the Blue UAS program, has worked with vendors to vet and scale commercial UAS technology for the Department of Defense (DoD). This program consists of five lines of effort that curate, maintain, and improve a roster of policy-approved commercial UAS which suit the diverse needs of DoD users. This effort currently has vetted 16 different platforms for DoD use. Government labs are currently undertaking efforts to develop lethal UAS. These efforts include DEVCOM Armament Center’s latest payload for the SRR platform, which delivers an M67 fragmentation grenade as the munition.The design goals of this effort are the development of modular lethal payloads that can be employed by the current Program of Record SRR and/or any of the platforms on the DIU Blue UAS Cleared List excluding the WingtraOne platform.These payloads should:•Be attachable by Soldiers in the field•Employ ammunition or explosives currently in the Government inventory, allowing units to order through standard channels•Increase the lethal capability beyond that of the M67 fragmentation grenade-based solution currently in development•Integrate into the selected platform•Operate on the platform controller or include a simple system to initiate the payload (long term desire is for ATEK integration)•Be able to pass applicable safety testing•Be able to be made safe and dismounted from the platform if not detonatedPrimary obstacles to overcome for successful operation of lethal payloads for sUAS is the integration and control of the payload to the selected platform while maintaining safe flight of the platform. Cost should be considered in the SBIR proposals.PHASE I:Design a preliminary lethal payload for the Short Range Reconnaissance (SRR) platform or any sUAS platform from the DIU Blue UAS Cleared List, excluding the WingtraOne platform. Preliminary design should describe the selected sUAS platform(s) and munition(s), consist of a concept for physical attachment and electrical and software integration, and a description of the method of fire control.This topic is accepting Direct to Phase II (DP2) proposals only. Proposers interested in submitting a DP2 proposal must provide documentation to substantiate that the scientific and technical merit and feasibility described in above has been met and describes the potential commercial applications. Documentation should include all relevant information including, but not limited to: technical reports, test data, prototype designs/models, and performance goals/results.PHASE II:Refine the preliminary design, produce, and deliver a prototype at Technology Readiness Level (TRL) 5 of a lethal payload for a sUAS platform. The system refinement should include mechanical and electrical integration into the selected platform, fire control, and targeting. Required Phase II deliverables include all necessary components (hardware and software) to integrate the payload to the platform, attachment of munitions, safe handling procedures for munitions, arming munitions, targeting or aiming, delivery of munition, making system safe, returning to operator, and removal of munitions and payload to be utilized again if not employed. The prototype will be demonstrated using a simulated, dummy, or inert munition at a vendor-provided, government-approved location to evaluate performance. The performer will provide the sUAS platform necessary to conduct the demonstration but is not required to deliver the sUAS platform to the Government. Additionally, the performer will deliver monthly progress reports describing all technical challenges, technical risk, and progress against the schedule, and a final technical report.PHASE III:The objective of Phase III, where appropriate, is to transition the technology to a U.S. Army Combat Capabilities Development Command (DEVCOM) lab for further development, or to a Program Executive Office (PEO) for potential acquisition pathways. Phase III goals may include live-fire demonstration of the technology at an appropriate test range, testing to applicable safety and airworthiness standards, end user touchpoints, and development of operator, maintenance, and safety instructions and training procedures.KEYWORDS:UAS, sUAS, Small Unmanned Aerial Systems, Blue UAS, SRR, Lethal PayloadsREFERENCES:1.DIU Blue UAS Cleared Drone List, https://www.diu.mil/blue-uas-cleared-list2.DIU UAS Policy Guidance, https://www.diu.mil/blue-uas-policy 3.U.S. Army Weapon Systems Handbook, https://asc.army.mil/docs/wsh2/2020-2021-wsh.pdf

xTechSBIR Autonomy Finalist Open Topic Competition

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Autonomy; Advanced MaterialsOBJECTIVE: xTechSBIR Autonomy is seeking novel capabilities and technology solutions within the Autonomy space, that can assist in tackling the Army’s current and future needs, enabling new capabilities, improved performance, faster production, or cost savings for Army systems. Examples of technologies that address the issue include but are not limited to the following domains: •Novel Materials for Additive Manufacturing – The U.S. Army is interested in enabling technologies that could replace conventional subtractive production methods. Novel feedstocks and 3D printable materials can be used to produce parts more with increased efficiency and superior performance. •Future Additive Production Capabilities – The U.S. Army is seeking novel and unique additive production technologies. These may include revolutionary production capabilities, or improved processes that can increase efficiency to reduce cost, waste, and production time.•Additive Production Systems & Analysis – The U.S. Army is interested in solutions to produce parts through additive manufacturing with improved efficiency, reliability, and quality. These technologies may include:•Manufacturing Equipment for Expeditionary Environments – The U.S. Army manufacturers parts in harsh environments including deserts, high altitude locations, and the Arctic. Such environments may be remote with limited logistical support, and may experience high humidity, dust, sand, and temperatures below -50C. Expeditionary production equipment must survive being stored in extreme environments and may also be required to operate in difficult conditions. •Advanced and Convergent Manufacturing Capabilities - The U.S. Army is also interested in novel non-additive production methods and hybrid/convergent manufacturing capabilities that combine additive and subtractive processes. •Advanced Materials – The U.S. Army is seeking research and development in the areas of novel advanced materials. There is particular interest in materials that exhibit improved strength, durability, and performance at both extremely low and high temperatures. A wide variety of applications for advanced materials include personnel protection, aerospace, avionics, and hypersonic systems.DESCRIPTION: The U.S. Army would like to invite interested entities to participate in the xTech Small Business Innovation Research Autonomy competition, an opportunity for eligible small businesses to engage and pitch their novel technology solutions directly to the Department of Defense, earn prize money and potentially receive a Phase I SBIR award of up to $250,000 each. The Army recognizes that the DoD must enhance engagements with eligible small businesses, by: (1) understanding the spectrum of ‘world-class’ technologies being developed commercially that may benefit the DoD in the autonomy space; (2) integrating the sector of non-traditional innovators into the DoD Science and Technology (S&T) ecosystem; and (3) providing expertise and feedback to accelerate, mature, and transition technologies of interest to the DoD.The xTechSBIR Autonomy competition will consist of four-rounds: (1) Call for concept white papers; (2) Final Technology Pitch event; (3) Request for Phase I SBIR Proposal Submission; and (4) Request for Phase II SBIR Demonstration. The competition will be awarding up to $500,000 in cash prizes to select eligible entities throughout the competition. Ultimately, up to 20 winners will be selected from the technology pitch event round and will be invited to submit an application for a potential Phase I SBIR Proposal worth up to $250,000. Up to 20 companies will be selected to receive a Phase I SBIR award and then will be invited back after six months of award to conduct a live demonstration to a key panel of DoD experts. Details on the prize structure and phases, are listed in this announcement below. In addition to non-dilutive cash prizes, participants will have the opportunity to engage with U.S. DoD and winners from the Part 1: Concept White Paper round will be invited to conduct an in-person pitch at Grace’s Quarters in Maryland. The efforts described in this notice are being pursued under the authorities of 10 U.S.C. § 4025 (formerly 2374a, Prizes for Advanced Technology Achievements) to award cash prizes as described in this announcement and potential SBIR contracts (15 U.S. Code §638) to only those eligible and selected entities as described in this announcement. In addition, 10 U.S.C. § 4003 (Prototype Projects) can be utilized to award additional follow-on contracts for additional proof-of-concept or prototype development. While the authority of this program is 10 U.S.C. § 4025, the xTechSBIR Autonomy competition may generate interest by another U.S. Army, DoD or USG organization for a funding opportunity outside of this event. The interested organization may contact the participant to provide additional information which may or may not result in partnership opportunities. PHASE I: Companies will complete a feasibility study that demonstrates the firm’s competitive technical advantage relative to other commercial products (if other products exist) and develop concept plans for how the company’s technology can be applied to Army modernization priority areas. Studies should clearly detail and identify a firm’s technology at both the individual component and system levels, provide supporting literature for technical feasibility, highlight existing performance data, showcase the technology’s application opportunities to a broad base of customers outside the defense space, a market strategy for the commercial space, how the technology directly addresses the Army’s modernization area as well as include a technology development roadmap to demonstrate scientific and engineering viability. At the end of Phase I, the company will be required to provide a concept demonstration of their technology to demonstrate a high probability that continued design and development will result in a Phase II mature product. PHASE II: Produce prototype solutions that will be easy to operate by a Soldier. These products will be provided to select Army units for further evaluation by the soldiers. In addition, companies will provide a technology transition and commercialization plan for DOD and commercial markets. PHASE III DUAL USE APPLICATIONS: Complete the maturation of the company’s technology developed in Phase II to TRL 6/7 and produce prototypes to support further development and commercialization. The Army will evaluate each product in a realistic field environment and provide small solutions to stakeholders for further evaluation. Based on soldier evaluations in the field, companies will be requested to update the previously delivered prototypes to meet final design configuration.REFERENCES: https://www.xtech.army.mil/competitions/KEYWORDS: autonomy; manufacturing; additive manufacturing; xTech; xTechSBIR; 3D printing; additive fabrication; direct digital manufacturing; freeform fabrication; solid freeform fabrication; rapid manufacturing; rapid prototyping; expeditionary manufacturing; convergent manufacturing; additive production; advanced materials; advanced manufacturing; advanced manufacturing;

Digital Erasure of Sensitive FPGA Systems

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Trusted AI and Autonomy; Advanced Computing and SoftwareOBJECTIVE: Modern and future battlefields will see increasing use of automated platforms; however, single-use, leave-behind, or unattended U.S. military systems require sufficient protection against hardware and software components from being reverse engineered. Currently, there is not yet a cost-effective, adequate solution for this requirement. Practices such as traditional physical anti-tamper methods or warfighters having direct physical access to attempt platform destruction are not feasible for the new ecosystem of low-cost, high-count platforms. Conversely, digital erasure with its low barrier-to-entry, in terms of cost and implementation, is the suitable alternative. DESCRIPTION: Through reverse engineering techniques, adversaries can extract information stored in non-volatile memory from abandoned, misused, single-use, leave-behind, or unattended U.S. military systems. Furthermore, utilizing volatile memory storage (i.e., Random Access Memory, RAM) for a system’s Critical Program Information (CPI), proprietary information, or intellectual property (IP) is not an adequate design technique to ensure the information is unrecoverable as new, sophisticated techniques are able to “freeze” binary signatures etched onto the storage medium hardware. These capabilities enable adversaries and other nation-state actors to potentially modify, exploit, exfiltrate, or leverage U.S. military systems, including their design and information, risking Original Equipment Manufacturer (OEM) business advantages and the U.S. military’s technological superiority. However, systems designed with reconfigurable logic hardware (e.g., Field Programmable Gate Arrays, FPGAs) instead of Application Specific Integrated Circuits (ASICs) to execute system functions provides a hardware fabric that can be completely erased in order to protect sensitive designs and information from being reverse engineered.PHASE I: This is a Direct to Phase II topic (DP2). Small businesses, at the time of proposal, must have a solution capable of and, at the time of award, be able to demonstrate a proof-of-concept digital erasure solution capable of modifying the FPGA fabric to ensure the original data within memory is no longer recoverable.DIRECT TO PHASE II: As a Direct to Phase II, proposal submissions should include discussion on the following:•Demonstrate digital erasure functionality on commercial platforms/systems/controllers that, once activated by a trigger mechanism, will successfully erase the FPGA fabric in order to prevent data recovery through reverse engineering of the memory hardware. •Coordination with partners will reveal applications and preferred trigger mechanisms, thus the trigger functions themselves must be protected to mitigate the potential for adversaries to attack platforms through digitally erasing systems. •The developed tool will automatically implement digital erasure functionality onto FPGAs despite differences in vendors, components, interfaces, etc. to achieve platform-agnostic support.•To provide resiliency against reverse engineering, digital erasure function should erase FPGA fabric by writing randomized data to memory instead of writing only 0s or only 1s.•Optimization steps to reduce total erasure/overwrite times and resource utilization will be identified and implemented during development. •Streamline user experience and requirements both for warfighters to trigger digital erasure and for FPGA developers to implement digital erasure functionality. •Conduct commercialization strategy to integrate solution with existing toolchains and developer applications utilized by industry for FPGA development.•Solution testing and evaluation will be conducted through FPGA developer tools to digitally verify that the memory has been successfully erased, and later through performing simulated data remanence attacks, where the hardware is manipulated to retain memory states which are then analyzed, to provide realistic verification whether the original data can be recovered through sophisticated reverse engineering techniques after a memory erase.PHASE III DUAL USE APPLICATIONS: Data security is a top priority for organizations across all industries, which has companies rushing to adopt and implement the latest capabilities in data destruction and sanitation. The moderately high CAGR of 14.3% indicates sustained growth. Complete the maturation of the company’s technology developed in Phase II and produce prototypes to support further development and commercialization. KEYWORDS: Reconfigurable, Logic, Zeroize, Circuit, FPGA, System On A Chip, SoC, ASIC, Tamper, Data Assurance, Electronics, Microelectronics, Zeroization, Sanitization, Hardware, MemoryREFERENCES:1.NIST Special Publication 800-88: Guidelines for Media Sanitization, Revision 1 https://csrc.nist.gov/publications/detail/itl-bulletin/2015/02/nist-special-publication-800-88-revision-1-guidelines-for-media/final#:~:text=NIST%20has%20published%20an%20updated%20version%20of%20Special,on%20the%20categorization%20of%20confidentiality%20of%20their%20information2.Lohrke, H., Tajik, S., Krachenfels, T., Boit, C., & Seifert, J. P. (2018). Key extraction using thermal laser stimulation: A case study on xilinx ultrascale fpgas. IACR Transactions on Cryptographic Hardware and Embedded Systems, 573-595. https://tches.iacr.org/index.php/TCHES/article/download/7287/6464/3.Courbon, F., Skorobogatov, S., & Woods, C. (2016, November). Direct charge measurement in floating gate transistors of flash EEPROM using scanning electron microscopy. In ISTFA 2016 (pp. 327-335). ASM International. https://aspace.repository.cam.ac.uk/bitstream/handle/1810/262365/Courbon_et_al2016-International_Symposium_for_Testing_and_Failure_Analysis-AM.pdf?sequence=1&isAllowed=y4.Gupta, K., & Nisbet, A. (2016). Memory forensic data recovery utilising RAM cooling methods. https://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1162&context=adf5.Gutmann, P. (2001). Data remanence in semiconductor devices. In 10th USENIX Security Symposium (USENIX Security 01). https://www.usenix.org/events/sec01/full_papers/gutmann/gutmann_html6.Skorobogatov, S. (2002). Low temperature data remanence in static RAM (No. UCAM-CL-TR-536). University of Cambridge, Computer Laboratory. https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR536.pdf

xTech Search 7 SBIR Finalist Open Topic Competition

OUSD (R&E) CRITICAL TECHNOLOGY AREA: Trusted AI and Autonomy; Advanced Computing and Software; Emerging Threat Reduction

OBJECTIVE:

xTechSearch is seeking novel, disruptive concepts and technology solutions with dual-use capabilities that can assist in tackling the Army’s current needs and apply to current Army concepts. The intent is to provide the Army with transformative technology solutions while enabling cost savings throughout the Army systems’ life cycle. Critical technology focus areas include Artificial Intelligence / Machine Learning (AI/ML); Advanced Materials; Advanced Manufacturing; Autonomy; Cyber; Electronics; Human Performance; Immersive; Network Technologies; Position, Navigation and Timing (PNT); Power; Software Modernization; and Sensors. See attached document on the Valid Eval registration page for a list of the top Army Modernization Priorities and other critical Army Focus Areas.

DESCRIPTION:

The xTechSearch competition strives to integrate small businesses into the Army’s S&T ecosystem by providing research opportunities with Army labs, including authorized access to the Army’s organic intellectual and technical capital. Participants will receive detailed feedback from Army and Department of Defense (DoD) stakeholders. Participants will have access to training, mentorship and other support infrastructure as they progress through the contest to determine how best to align their technology solutions with real users and buyers within the Army. Finalists will be entered into the xTech Accelerator to receive intensive mentorship and access to networking events to help grow their companies for Army and commercial users. xTechSearch is an opportunity for eligible participants to pitch novel technology solutions – a new application for an existing technology or an entirely new technology concept – to the Army.

PHASE I: Companies will complete a feasibility study that demonstrates the firm’s competitive technical advantage relative to other commercial products (if other products exist) and develop concept plans for how the company’s technology can be applied to Army modernization priority areas. Studies should clearly detail and identify a firm’s technology at both the individual component and system levels, provide supporting literature for technical feasibility, highlight existing performance data, showcase the technology’s application opportunities to a broad base of customers outside the defense space, a market strategy for the commercial space, how the technology directly addresses the Army’s modernization area as well as include a technology development roadmap to demonstrate scientific and engineering viability.

At the end of Phase I, the company will be required to provide a concept demonstration of their technology to demonstrate a high probability that continued design and development will result in a Phase II mature product.

PHASE II: Produce prototype solutions that will be easy to operate by a Soldier. These products will be provided to select Army units for further evaluation by the soldiers. In addition, companies will provide a technology transition and commercialization plan for DOD and commercial markets.

PHASE III DUAL USE APPLICATIONS: Complete the maturation of the company’s technology developed in Phase II to TRL 6/7 and produce prototypes to support further development and commercialization. The Army will evaluate each product in a realistic field environment and provide small solutions to stakeholders for further evaluation. Based on soldier evaluations in the field, companies will be requested to update the previously delivered prototypes to meet final design configuration.

REFERENCES: https://www.xtechsearch.army.mil

KEYWORDS: AI/ML; Electronics; Human performance; open topic; prize competition; autonomy; dual-use

DEEP-BIM: Dynamic Enhanced Environment Perception - Building Information Models

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Trusted AI and Autonomy; Advanced Computing and Software

OBJECTIVE: The proposed topic is a Direct-to-Phase-II effort to develop and integrate advanced building model generation capabilities into the Defense Threat Reduction Agency (DTRA) Edge-Enhanced Mapping And Positioning System (E2MAPS) program.

DESCRIPTION: Charged with supporting operations to counter weapons of mass destruction (WMDs), DTRA leads a broad range of R&D programs that support Army, SOCOM, and DoD stakeholders. DTRA research includes technologies fielded to support missions conducted in underground facilities (UGFs) and subterranean (SubT) environments, such as E2MAPS.

The E2MAPS program is seeking a capability to perform real-time conversion of dense 3D point clouds to lightweight Building Information Models (Scan-to-BIM, collectively). Such a capability would benefit Army operators by enabling quicker identification of critical facility infrastructure, supporting mission planning, reducing cognitive load, and reducing network bandwidth. Existing capabilities to perform Scan-to-BIM in post-processing exist but cannot be applied to maps generated during fast-paced tactical operations. For this reason, DTRA is actively seeking the means to fund and integrate the proposed work.

PHASE I: This is a Direct to Phase II. The technologies to enable DEEP-BIM currently exist but have not yet been collectively applied to enable real-time Scan-to-BIM capabilities at the edge. Building information models of large facilities are currently able to be generated with commercial software using reasonable computer resources and little human correction. Object recognition using imaging and LiDAR exists to support these capabilities as well as a host of other applications. Edge computing capabilities are widely available and applied in multiple forms with the E2MAPS program. The proposed DEEP-BIM project will integrate these technologies and enable them to be directly applied to subterranean counter-WMD operations performed by the Army, SOCOM, and other mission stakeholders

PHASE II: This topic is a Direct-to-Phase-II. Expected Deliverables include, but are not limited to a ROS-based Scan-to-BIM software module, Phase III transition plan, and Technology roadmap outline:

  • Stage 0: Requirements definition. Coordinate with E2MAPS Soldier end users to prioritize features of interest, including objects, extended infrastructure, and environment.
  • Milestone 0: Delivery of prioritized requirements.
  • Stage 1: Development of modular, ROS-based Scan-to-BIM framework. Integration into E2MAPS.
  • Stage 2: Integration of basic WMD object models into Scan-to-BIM framework using existing DTRA datasets for laboratory object identification.
  • Milestone 1: DEEP-BIM Minimum Viable Product integrated into to E2MAPS.
  • Stage 3: Integration of Scan-to-BIM models for extended infrastructure in UGFs.
  • Milestone 2: Assessment of Scan-to-BIM ROS module at Army end user SubT realistic training event.
  • Stage 4: Refinement of Scan-to-BIM ROS module. Binary, licensing, and documentation delivery.
  • Milestone 3: Delivery of stable binary, licensing, and documentation.

PHASE III DUAL USE APPLICATIONS: There is high dual-use potential for building information modeling. Investments in new construction are constantly being made in both the private and public sector. There are many opportunities for government programs and private firms to use this technology in their planning.

KEYWORDS: information model; mapping; computation; BIM; point cloud; edge computing

REFERENCES:

1. https://www.united-bim.com/ultimate-guide-of-scan-to-bim/

2. https://www.truepointscanning.com/using-3d-laser-scanning-for-facility-design-modifications

3. Wang, et al., Vision-assisted BIM reconstruction from 3D LiDAR point clouds for MEP scenes,

Automation in Construction, October 2021. https://doi.org/10.1016/j.autcon.2021.103997

4. Wallbaum, et al., Towards Real-Time Scan-Versus-BIM: Methods, Applications, and Challenges,

European Conference on Computing in Construction, July 2021.

http://dx.doi.org/10.35490/EC3.2021.17

Machine Translation for Indo-Pacific Low Resource Languages

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Trusted AI and Autonomy; Advanced Computing and Software

OBJECTIVE: US Army Pacific executes Operation Pathways within the INDOPACOM AOR and the multitude of languages, populations, and cultures within the INDOPACOM AOR. In order to provide effects that instantiate and reinforce the INDOPACOM Desired Perceptions (available at the SECRET//NOFORN Level), the Theater Army requires a range of Natural Language Processing (NLP) capabilities from Machine Translation to stance detection and summarization technologies to both produce effects and assess the information environment for the range of Low Resource Languages resident within this AOR.

DESCRIPTION: Recent relevant research on this topic focuses on languages within Western, educated, industrialized, rich, and democratic demographic populations. But due to the emergence of Large Language Models such as GPT-3 and 4 and BLOOM, generational improvements in Low Resource Language NLP capabilities are technically viable. USARPAC seeks to leverage those advances for languages resident in this AOR.

Most commercial access translation technologies through API and do not perform bespoke

model training. Further, most commercial services perform higher level analysis (stance detection) on already translated media where best practices would necessitate development in the source language.

Computing resources are inexpensive and scalable and available training data is likely

acquirable through crowd-sourced manual labeling. Some zero-shot approaches may be effective for lower-fidelity requirements. Further, this technology leverages LLMs available through open-source repositories and emerging techniques such as Dictionary-based Phrase-level Prompting of Large Language Models for Machine Translation.

By translating and assessing media in source languages, these technologies would enable reach

into previously inaccessible populations and enable at-scale assessment tools rather than endure knowledge losses due to default to-English approaches.

PHASE I: A successful Phase I will have a justifiable and solidified proof of concept for low resource language.

PHASE II: Expected deliverables of this phase include a Deployed Machine Translation model. Testing and Evaluation would be executed in accordance with standard-practice metrics based on widely accepted and emerging evaluation benchmarks (FLORES) via GEMBA, Word Error Rate, Bilingual Evaluation Understudy, and other academic-grade metrics.

PHASE III DUAL USE APPLICATIONS: Initial model development will transition to continuous training and development for use-cases specific to the transition partner, US Army Pacific. There is high dual-use potential for machine translation. The technology can be used by many industries as globalization occurs and multi-lingual communications become a priority.

KEYWORDS: large language model; natual language processing; machine translation; Low resource languages

REFERENCES:

Costa-jussà, Marta R., et al. "No language left behind: Scaling human-centered machine translation." ArXivpreprint arXiv:2207.04672 (2022).

Hendy, Amr, et al. "How good are gpt models at machine translation? a comprehensive evaluation." arXivpreprint arXiv:2302.09210 (2023).

Ghazvininejad, Marjan, Hila Gonen, and Luke Zettlemoyer. "Dictionary-based Phrase-level Prompting of Large Language Models for Machine Translation." arXiv preprint arXiv:2302.07856 (2023).

Heavy Lift Vertical Take-off and Landing; Heavy VTOL

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Trusted AI/Autonomy; Sustainment & Logistics

OBJECTIVE:

Design, Develop and Demonstrate Heavy-lift Vertical Takeoff and Landing (HVTOL) Systems to enhance the U.S. Army’s resupply capability.

DESCRIPTION:

Heavy Vertical Takeoff and Landing (HVTOL) Systems will provide unique capabilities over currently planned VTOL systems in that they will provide upward of 10X the lift capability. This ability is vital for future Army combat operations. Successful advancement of Heavy-Lift Vertical Takeoff and Landing (HVTOL) Systems would enhance U.S. Army modernization priorities by increasing the amount of equipment that can be carried by a single platform at one time. This will reduce the number of flights it takes to resupply a forward unit, allow for heavier modular mission payloads to be carried and ultimately take Soldiers out of harm’s way by utilizing an uncrewed platform.

Currently there are no uncrewed systems being fielded to US Army units. The Joint Tactical Autonomous Aerial Resupply System (JTAARS) is only requiring a lift capability of 125 lbs payload capability while other efforts are crewed cargo lift platforms at or above 3000lbs, on autonomous conversions utilizing full-sized helicopter platforms.Primary obstacles to overcome for successful operation of Heavy-Lift Vertical Takeoff and Landing (HVTOL) Systems is the balance of lift capability versus the distance a platform can fly to resupply units while displaying to Army units the time and effort saved by utilizing these platforms.

The goals of this effort are the design, development, and demonstration of Heavy Vertical Takeoff and Landing (HVTOL) Systems that can lift a threshold or minimum of 800lbs and goal of 1400lbs while having the ability to fly 100 miles threshold/minimum and a goal of greater than 100 miles.

These designs should be able to be loaded and unloaded in the field either by soldiers or autonomously, be able to fly autonomously or with human takeover, assist and fly routes while avoiding obstacles, select multiple routes, have an override system that allows soldiers to divert or modify resupply locations, autonomously select safe landing zones, have an override for human landing zone selection. Systems should be able to utilize or integrate modular mission payloads moving forward and common attachment systems are of benefit.

PHASE I:

This topic is accepting Direct to Phase II proposals only. Feasibility documentation should describe a design for a new or improved existing VTOL craft to achieve threshold or minimum of 800lbs and goal of 1400lbs payload capacity, while having the ability to fly 100 miles threshold/minimum and a goal of greater than 100 miles. The resulting design should include any relevant features or modifications to include air frame, propulsion, fuel/power systems, control, autonomy, navigation, hazardous cargo handling, and safety/loss of signal.

PHASE II:

In this Direct to Phase II solicitation, companies should be able to clearly indicate progress beyond the goals outlined in phase I in their proposals. For Direct to Phase II, companies will Develop and Demonstrate Heavy-Lift Vertical Takeoff and Landing (HVTOL) Systems. The system should include navigation controls, obstacle avoidance, override systems, loading and unloading controls, instructions, and training and safety instructions. Required Phase 2 deliverables include all necessary components (hardware and software) to control the platform, attach payload to the platform (TBD), ability to select navigation route, route override, landing or delivery zone selection, zone selection override, lost link control, system safety, remote payload controls, ammo safe capability, soldier safety capable, a final report, and monthly progress reports. The system will be demonstrated in future Army experimentation or test events to evaluate performance.

Phase II evaluation goals will include:

  • Demonstrated lift capability at test ranges, with a stage-gate lift of 500lbs at an Army experimentation or test event in early-mid 2024, prior to completion of the period of performance (PoP). Success is required to become eligible for a sequential phase II.
  • Full systems, plans, designs, or other documentation that clearly shows how this technology will progress to a demonstrated lift in the 800-1400lb range during a potential phase II sequential award. Companies that do not include these detailed plans will not be eligible for full technical consideration.

Phase II duration is not to exceed 12 months and a cost of $3 million.

This topic is planning for an immediate sequential phase II award to demonstrate lift/transport progress from the 500lb milestone to a demonstrated lift of 800 – 1400 lbs following the conclusion of the original PoP. Further requirements to be addressed in the sequential award will include ability to integrate with DoD’s Modular Open Systems Architecture (MOSA), control systems, spectrum management, hardening/security,etc.

  • Preferred integration with an externally supplied autonomous payload (selected vendors will be informed following contracting)
  • Final performance demonstration of minimum 800lb lift at an Army experimentation or test event in spring 2025, with external autonomous payload integration.
  • Test reports detailing solution performance.
  • Product documentation detailing operation of prototype.
  • Monthly progress reports describing all technical challenges, technical risk, and progress against the schedule.
  • Final technical report, to specifically include system cost.

Sequential Phase II duration is not to exceed 12 months and a cost of $3 million.

In accordance with the Small Business Act (15 U.S.C. §638, subsection (aa)(1)), no Federal agency may issue an award under the SBIR program or the STTR program if the size of the award exceeds the award guidelines established under this section by more than 50 percent without a waiver from the SBA. SBA shall adjust the maximum dollar amount every year for inflation. As of October 2022, agencies may issue a Phase I award (including modifications) up to $295,924 and a Phase II award (including modifications) up to $1,972,828 without seeking SBA approval. Any award above those levels will require a waiver. Any award resulting from this solicitation that exceeds these amounts is subject to the SBA’s prior approval of such waiver as a pre-requisite to funds availability; this solicitation does not guarantee any award.

Army Applications Laboratory has secured a waiver to exceed the maximum phase II award amount for this solicitation as well as the follow-on sequential award.

PHASE III:

The objective of Phase III, where appropriate, is for the small business to pursue commercialization objectives through the effort. Companies may develop a manufacturing-ready product design, capable of integration with the existing or future system, and demonstrate technology integration. Low-rate production will occur as required. Companies will engage in laboratory or operational testing as required. Phase III deliverables include system-level integration technical data package, installation documentation, and system-level prototype for demonstration and government-sponsored testing.

Additionally, Phase III goals will include:

  • Additional capability developments
  • Performance measurement in a variety of different operational test environments
  • Test reports detailing solution performance.
  • Operationally relevant demonstration of lift system integration with payload system
  • Working toward further technology improvements, additional testing/modifications, and integration with Army stakeholders toward large scale adoption and commercialization.

KEYWORDS:

VTOL; Heavy UAS; Cargo UAS; Contested Logistics; Resupply; Autonomous UAS;

REFERENCES:

  1. https://www.army.mil/article/219887/jtaars_concept_presented_to_industry
  2. https://www.army.mil/article/265428/army_focuses_on_contested_logistics_a_threat_to_enemy
  3. https://www.forbes.com/sites/davidhambling/2021/03/16/us-army-pushes-ahead-with-battlefield-resupply-drones/?sh=b67f5796b94f
  4. https://www.sciencedirect.com/science/article/abs/pii/S1570870522000178 (The introduction section gives good information on potential mission types and needs; the inclusion of this reference is not intended to endorse any of the article’s methods or conclusions)
  5. https://warontherocks.com/2022/05/flying-dirty-unmanned-casualty-evacuation-on-the-contaminated-battlefield/

Knowledge-Level Distributed Active Data Platforms for Ops-Log Synchronization

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Artificial Intelligence/ Machine Learning (AI/ML)

OBJECTIVE: The purpose of this topic is to significantly extend the Army’s current effort to establish a tactical-level data platform for collecting and disseminating relevant battlefield data by improving its representation and information value to the human decision-making process and provide a foundation for autonomy and automated analytic reasoning (AI/ML) through the data mesh construct. Tactical operational forces and sustainment forces prosecuting missions in contested environments, need the ability to improve understanding, synchronization, and situational awareness. This effort will expand and improve the ongoing efforts of the data-level tactical data platform which have established a number of use cases, benefits, and process flows. The topic team intends to leverage existing partnerships and experimentation to test, evaluate, and refine the concepts and usage over this effort as well.

DESCRIPTION: This capability should fold into the ongoing PEO C3T Tactical Data Platform effort, adding technology for hybrid knowledge graph technology, richer knowledge-based representations, and facilitating more advanced decision support and reasoning capabilities utilizing AI/ML. This would be fielded as part of the C3T Tactical Data Platform across the full spectrum of tactical level operational and sustainment units, leveraging the computing infrastructure and communications channels already defined for the current Tactical Data Platform capabilities. The expectation is that companies can solve several problems with one solution; therefore, the request has identified five (5) areas of improvement: Automated Transformation of Data to Knowledge, Knowledge-Level Representation of the Tactical Situational Awareness with embedded meaning, Representing and Continuously Reasoning over Plans, Space, Time, and Entity State, Situational pattern recognition and model projection for automated detection of potentially impacting Patterns/events, and bridging Knowledge between Operations and Logistics to ensure synchronized and orchestrated awareness and unity of effort.

PHASE I: This is a Direct to Phase II topic (DP2). The commercial market for these knowledge-level automation and reasoning enhancements are at a high enough Technology Readiness Level (TRL) for this to be a Phase II topic. As part of the submission package, the proposing company will be required to include specific tangible examples of existing capabilities within each of the sub-areas they are proposing. The existing capabilities should be described with details of demonstrated capability, screenshots and references where available, and details of the companies, organizations, or events in which they were demonstrated. The company will be asked to demonstrate each of these capabilities in an Army tactical scenario or event that will occur 9 months into the Direct-to-Phase II award. The company submissions package will also need to provide specific evidence or demonstration of the technologies ability to operate in the constraints of a tactical environment, including intermittent communications, low-bandwidth, noisy data, and limited computational power.

(DIRECT TO) PHASE II: As a Direct to Phase II proposal, proposal submission should include a roadmap of the expected deliverables:

  • 3MAC: Design and Model Review
  • 6MAC: Phase I validation of Key Technologies
  • 9MAC: Build 1 Demonstration of Base Knowledge-level capabilities
  • 12MAC: Build 2 Integration with current Tactical Data Platform
  • 15MAC: Build 3 Experimentation/First Evaluation Release
  • 18MAC: Build 4 Exp Revision / Ops-Log Sync
  • 22MAC: Build 5 Final Release / Second Evaluation Release
  • 24MAC: Final Report

PHASE III DUAL USE APPLICATIONS: There is high dual-use potential for automated data platforms. They can help companies make better decisions and improve efficiency. As businesses grow, they will need the ability to manage and analyze large sets of data. These platforms will allow them to make informed decisions from the results of these analyses. Complete the maturation of the company’s technology developed in Phase II and produce prototypes to support further development and commercialization.

KEYWORDS: AI/ML; Autonomy; Data-driven; Decision-making; Data Platforms; Knowledge; Pattern Recognition

REFERENCES:

  1. https://access.redhat.com/documentation/en-us/reference_architectures/2017/html/microservice_architecture/microservice_architecture
  2. https://www.ibm.com/cloud/architecture/architectures/aiAnalyticsArchitecture/reference-architecture/

Low Cost SWIR Laser Sensor

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Integrated Sensing and Cyber; Microelectronics

OBJECTIVE: Develop a Short-Wave Infrared (SWIR) detector capable of asynchronously locating short laser pulses for target marking with the potential of an order of magnitude lower cost than current sensors. Utilize new detector technology to lower manufacturing cost for SWIR sensors. A lower cost laser sensor would enable integration into platforms that support Soldier Lethality and Next Generation Combat Vehicles (NGCV).

DESCRIPTION: Short Wave InfraRed (SWIR) cameras with Asynchronous Laser Pulse Detection (ALPD) are an emerging technology. This has the potential to be used as a multi-function solution for various marking and detection tasks. The major barrier to the proliferation of current SWIR ALPD cameras is cost. At high price points, these SWIR ALPD cameras are unlikely to proliferate across the armed forces. A low-cost, next-generation laser detection sensor is needed. Current detectors use Indium Gallium Arsenide (InGaAs) focal plane arrays (FPA) that are meticulously bump bonded onto a Read Out Integrated Circuit (ROIC). This process requires both expensive materials and intensive labor, thus lowering yield and driving costs up. Previous efforts to lower the cost of this technology have proven unsuccessful. This SBIR effort aims to pair a low-cost detector material, such as quantum dots or other innovations, to a ROIC with laser detection capability. A novel approach to laser detection could have significant cost implications in production. This moderate-risk, high-payoff approach to a low-cost SWIR laser detector should produce a device that can detect laser pulses at operationally relevant ranges for marking tasks.

PHASE I: This is a Direct to Phase II (DP2) topic. A DP2 award is requested because of the demonstrations we have observed during lab and field evaluations of the candidate technology. The Colloidal Quantum Dots (CQD) material and process has been successfully applied to a standard ROIC and does have sensitivity in the SWIR spectrum to detect the laser spots. Awarding a phase II SBIR would allow for the development of the CQD process on a Read Out Integrated Circuit (ROIC) designed for laser pulse detection, as well as optimizing the quantum dot sensitivity at the laser wavelength. Much of the potential in this technology has been identified and we wish to expand its application to better fit our customers’ needs.

(DIRECT TO) PHASE II: Develop and demonstrate a 2D SWIR detector with asynchronous laser pulse detection. This device should use a detector material and process that has the potential to be significantly lower cost than existing solutions in production quantities. An imaging function is desired but not a requirement for this effort.

PHASE III DUAL USE APPLICATIONS: This system could be used in a broad range of military applications where laser detection is necessary. Optimize system design for size, weight and power, to include ruggedization to survive in a military environment. Recent advances in methods for synthesis and surface functionalization of CQDs have driven the commercialization of display and lighting applications and provide promising developments in the related fields of lasing and IR sensors. Current market applications, including start-up usage, for quantum dot technology embedded into semiconductors include:

  • Multimedia technology provides more immersive and realistic experiences.
  • Smartphone sensing recognition and augmented facial ID recognition.
  • Augment solar panels energy collection capabilities, which can be leveraged for renewable energy as well as agriculture production.
  • Medical usage, namely bio-imaging and modeling of protein structures as well as infrared sensing.
  • Quantum computing research in the nascent and pivotal future sector.

KEYWORDS: Sensors; Short Wave InfraRed (SWIR); Lasers; Detection; Cameras; Colloidal Quantum Dots (CQD); Low Cost; Read Out Integrated Circuit (ROIC)

REFERENCES:

  1. ST’s Quantum Dot Sensor set for volume Swir Imaging. ST’s quantum dot sensor set for volume SWIR imaging | Imaging and Machine Vision Europe. (2021, December 15). https://www.imveurope.com/news/sts-quantum-dot-sensor-set-volume-swir-imaging
  2. Palomaki, P., & Keuleyan, S. (2022a, November 22). Move over, CMOS: Here come snapshots by Quantum Dots. IEEE Spectrum. https://spectrum.ieee.org/move-over-cmos-here-come-snapshots-by-quantum-dots
  3. SWIR Vision Systems. (2022). SWIR Vision Systems Acuros® vs Sony® IMX990: A Closer Look at Key Metrics and Performance [White paper]. https://www.swirvisionsystems.com/wp-content/uploads/WhitePaper_SWIR-Vision-Systems-Acuros-vs-Sony.pdf

Medium-Format Displays for Mixed Reality (MR) Systems

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Microelectronics; Integrated Sensing and Cyber; Advanced Computing and Software

OBJECTIVE: Recent advances in head-mounted displays have identified an opportunity for low-cost and high-performance systems based on medium format size display panels, where the diagonal is on the order of 2.0"" - 3.5"" as opposed to the older techniques using small ""microdisplays"" with diagonal screen sizes of 1.0"" or less. Likewise, the pixel pitch of the larger medium format displays is on the order of 15-80 microns, as opposed to 9-12 microns for the micro-displays. The larger scale of the medium format relieves the requirement for magnification by the eyepiece optics, and hence a lower cost system can result. The problem is in obtaining military-grade medium format display panels with sufficient pixel resolution, since the commercial market for medium formats is more focused on low-pixel resolutions devices such as the iWatch. Also, daylight readability is a requirement not currently met by commercial units. This topic involves the development of daylight readable, medium format (1.6” – 3.0” diag.) display panels for use in mixed reality (MR) head mounted display systems.

DESCRIPTION: Perform research & fabrication for a medium format (1.6" - 3.5" diag) display with at least 1280 x 720 color pixels, frame rate 60 Hz, adjustable brightness from 1 to 800 fL for daylight readability, contrast ratio of 1000:1, and AA-battery powered drive electronics to receive external video input. The display's physical size & weight shall be minimized to support packaging into a head-mounted display system. Deliverables shall include as appropriate design review materials, electrical schematics, trade study results, and functioning hardware samples & test data. This device will help solve many problems encountered by the Integrated Visual Augmentation System (IVAS). This new display component would enable the use of low-cost visor optics to complete a display system with performance compatibility.

PHASE I: This is a Direct to Phase II topic. A Direct to Phase II (DP2) is recommended because the Government has received a proof of concept monochrome version of the medium format display as well as research regarding the path to achieve full color operation using similar principles. The level of maturity that the new display device offers indicates that a Phase I can justifiably be foregone and prototyping can begin to complete the desired development timeline.

DIRECT TO PHASE II: Upon acknowledging and (potentially) utilizing the research provided in Phase 1 description as premises for technical approach within proposal submission, awardees will then begin Prototype Kickoff, Design Review, Fabrication, Test, Delivery/Demonstration.

PHASE III DUAL USE APPLICATIONS:

  • The high-resolution display market has received attention and capital from large tech companies.
    • Google and LG completed a joint venture to create a high-resolution OLED VR headset, which leverages identical technology to OLED displays.
  • Current market applications, including start-up usage, for OLED high-resolution display panels include:
    • VR/AR augmentation, especially the ability to create a more vibrant and realistic environment.
      • This especially benefits the video game industry.
    • Video games, TV, mobile phones, and computer monitors will have brighter portable displays, thereby creating a better user experience.
    • Healthcare and surgery capabilities can leverage OLED displays that are less harmful because they are cooler to the touch.

KEYWORDS: Display systems; Micro-displays; Integrated Visual Augmentation System (IVAS); Visor optics; panels

REFERENCES:

  1. Hamer, et. al., ""High-performance OLED microdisplays made with multi-stack OLED formulations on CMOS backplanes"", SPIE Proceedings Volume 11473, Organic and Hybrid Light Emitting Materials and Devices XXIV; 114730F (2020), https://doi.org/10.1117/12.2569848
  2. Vogel, et. al., ""OLED microdisplays in near-to-eye applications: challenges and solutions"", SPIE Proceedings Volume 10335, Digital Optical Technologies 2017; 1033503 (2017)

https://doi.org/10.1117/12.2270224

Porting RTK to High Assurance Kernel

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Trusted AI and Autonomy; Advanced Computing and Software

OBJECTIVE: Develop innovative techniques and tools to run the Robotic Technology Kernel (RTK) software library securely and efficiently on a high-assurance separation kernel. Demonstrate feasibility via proof-of-concept and practical prototype. Validate the new capabilities using a high-assurance separation kernel, Robot Operating System (ROS) test suite, RTK applications and a representative hardware platform under realistic concept of operations.

DESCRIPTION: This topic seeks innovative technology and demonstration that showcases the feasibility, security and performance of running the RTK and ROS software library on a high-assurance separation kernel. Supported by the DARPA High-Assurance Cyber Military Systems (HACMS) program, both seL4 and CertiKOS have made great leaps in terms of software capabilities and maturity. However, significant challenges exist to bridge the gap between research prototypes and adoption. It is critical to leverage such innovative techniques and tools and build assured systems based on appropriate techniques and tools applying sound security design and engineering principles. The ported RTK/ROS over a separation kernel should function and perform with added security and it should maintain the features of (1) cross-platform: new RTK capabilities can be leveraged by all RTK-enabled platforms; (2) cross-controller: any RTK-enabled platforms can be controlled by any RTK compatible controller; and (3) cross-effort: an effort delivers new capabilities to the RTK, which in turn is leveraged for new efforts. In addition to memory isolation, the ported RTK/ROS should be amenable to other security checks such as the concept of Monitor and Policy Enforcement, as applicable and needed in DoD use cases including Autonomy and Swarm.

PHASE I: Develop the technical approach, analyze trade-off options, and justify design choices. All design choices, including a representative hardware platform, should be made in agreement with the Government counterpart. Finalize the overall design that can securely and efficiently run RTK (and ROS) on a high-assurance separation kernel. Analyze the costs and benefits, accounting for practical implementation constraints in Army platforms and use cases. Prepare the path for a proof-of-concept demonstration. Document all lessons learned for way forward.

PHASE II: Fully develop the technology and a practical prototype. Test and evaluate the security and performance of the ported RTK (and ROS) running on a high-assurance separation kernel, under various ROS/RTK test cases as well as relevant mission scenarios. Demonstrate the capabilities using a representative hardware platform under realistic concept of operations, such as those adopted in previous Army efforts [5]. Enhance and mature the technology and prototype for transition.

PHASE III DUAL USE APPLICATIONS:

  • High Assurance Kernel Technology and Robotic Technology Kernel (RTK) have medium adoption across a range of industries including autonomous vehicles, aerospace and defense, and Internet of Things (IoT). The use of this technology helps to enable security, reliability, and trustworthiness of critical systems.
  • The IoT and software segment registers in highest share of revenue as well as innovation. The growing use of digital manufacturing and IoT integration in production of smart and autonomous vehicles will likely drive continued growth.
  • The integration of high assurance kernel security solutions will enable companies to improve their cybersecurity stature as well as offer more security in a myriad of arenas, including the continued growth of autonomous offerings, signaling sustained demand for this technology in future years as technology evolves and new economies accelerate digitalization and industrialization in manufacturing processes.

KEYWORDS: Robotics; Robot Operating System; Robot Technology Kernel; Cybersecurity; Software; Performance

REFERENCES:

  1. M. Vai, D. Whelihan, K. Denny, R. lychev, J. Hughes, D. Kava, A. Lee, N. Evancich, R. Chark, D. Lide, K. Kwak, J. Li, D. Schafer, M. Lych, K. Tilloton, and W. Tirenin, “Agile and Resilient Embedded Systems”, IEEE Conference on Military Communications, 2021.
  2. D. Whelihan, M. Vai, N. Evanich, K.J. Kwak, J. H. Li, M. Britton, B. Frantz, D. Hadco*ck, M. Lynch, D. Schafer, J. DeMatteis, and D. Russo, “Designing Agility and Resilience into Embedded Systems,” IEEE Conference on Military Communications, 2017.
  3. Cynthia Irvine, “Combining ROS with seL4 for Trustworthy Autonomous Systems,” Second Annual Trusted Computing Center of Excellence Summit, 2019.
  4. Robot Operating System (ROS) - https://www.ros.org/
  5. US Army – TARDEC Ground Vehicle Robotics, “Introduction to Robotic Technology Kernel (RTK),” Distribution Statement A.
  6. Gerwin Klein, June Andronick, Kevin Elphinstone, Toby Murray, Thomas Sewell, Rafal Kolanski, and Gernot Heiser, “Comprehensive formal verification of an OS microkernel,” ACM Trans. Comput. Syst. 32, 1, Article 2, February 2014.
  7. Certified Kit Operating System (CertiKOS), https://flint.cs.yale.edu/certikos/
  8. Trusted Computing Center of Excellence - https://trustedcomputingcoe.org/
  9. TCCOE Summits - https://trustedcomputingcoe.org/summits/
  10. https://sel4.systems/Foundation/Services/home.pml
  11. Daniel Limbrick, “Performance Evaluation of ROS on an seL4-based Raspberry Pi / Jetson TK1,” Second Annual Trusted Computing Center of Excellence Summit, 2019.
  12. Gernot Heiser, “The seL4 Microkernel - An Introduction.” White Paper. The seL4 Foundation, Revision 1.2 of 2020-06-10.

Energy Demand Reduction and Clean Energy Tech Open Topic

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Renewable Energy Generation and Storage;

OBJECTIVE: The purpose of the Energy Demand Reduction and Clean Energy Tech Open Topic is to bring potentially valuable small business innovations to the Army and create an opportunity to expand the relevance of the Army SBIR program to firms who do not normally compete for SBIR awards.

DESCRIPTION: While the Energy Demand Reduction and Clean Energy Tech Open Topic will accept proposals on any technical challenge requiring the application of Energy Demand Reduction and clean energy technologies, submissions addressing the following core technical areas will be prioritized for award:

  1. Energy Storage (man-portable, ground vehicle and support equipment applications, and airborne vehicle solutions)
  2. Clean Energy Generation (primary but not exclusive range of 1kW-200kW and 20-1,000 energy consumption endpoints)
  3. Micro-grid components compatible with the DoD’s Tactical Microgrid Standard
  4. Electric and Hybrid Electric Transportation (ground vehicles, ground support equipment, UAV, helicopter, and small-fixed wing aircraft solutions)
  5. Charging of electrified transportation in austere environments

PHASE I:

The purpose of Phase I is to demonstrate or determine the scientific, technical, and commercial merit and feasibility of the concept. The Phase I period of performance will be 6 months. Small businesses shall deliver a proof of technical feasibility at the end of the Period of Performance.

Phase I Submission Materials:

  • 5-page technical volume for down-select.
  • 8-slide commercialization plan; template provided in announcement.

Post-Phase I Deliverables:

  • Small Business: A feasibility study to demonstrate the technical and commercial practicality of the concept to include an assessment of its technical readiness and potential applicability to military and commercial markets.
  • Technical POC and Transition Partner: Commitment secured from TPOC and Transition Partner to associate with potential Phase II work. (Transition Partner is defined as an Army organization planning to integrate and fund the technology after SBIR funding has expired).

(DIRECT TO) PHASE II:

Proposers interested in submitting a Direct to Phase II (DP2) proposal must provide documentation to substantiate that the scientific and technical merit and feasibility described above has been met and describes the potential military and/or commercial applications. Documentation should include all relevant information including, but not limited to: technical reports, test data, prototype designs/models, and performance goals/results.

DP2 Submission Materials:

  • 10-page technical volume for down-select.
  • 5 pages showing how technical feasibility has already been achieved.
  • 8-slide commercialization plan; template provided in announcement.

PHASE II: Produce prototype solutions that will be practical and feasible to operate in edge and austere environments. Companies will provide a technology transition and commercialization plan for DOD and commercial markets. The Army will evaluate each product in a realistic field environment and provide solutions to stakeholders for further evaluation. Based on Soldier field evaluations, companies will be requested to update the previously delivered prototypes to meet final design configuration.

PHASE III DUAL USE APPLICATIONS:

  • The renewable energy sector can use energy storage technologies to store excess energy that is generated during periods of low demand or high production.
  • The transportation industry can utilize energy storage technologies in electric vehicles. Batteries with new storage capabilities can enable longer driving ranges and shorter charging times for the vehicles.
  • By integrating clean energy into their grids, electric utilities can reduce their reliance on fossil fuels and lower their greenhouse gas emissions.
  • The manufacturing industry consumes significant amounts of energy. By adopting alternative methods of energy generation, manufacturers can reduce their carbon footprint and the operational costs that they currently have.
  • The are countless opportunities to apply the use of the technologies that come out of this effort into a wide variety of industries.

KEYWORDS: Energy Storage; Clean Energy Generation; Clean Micro-Grid; Electric Transportation; Clean Industry Technology

REFERENCES:

Remote Breaching of Obstacles

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Human-Machine Interfaces, Directed Energy, Integrated Sensing and Cyber, Trusted AI and Autonomy

The technology within this topic is restricted under the International Traffic in Arms Regulation (ITAR), 22 CFR Parts 120-130, which controls the export and import of defense-related material and services, including export of sensitive technical data, or the Export Administration Regulation (EAR), 15 CFR Parts 730-774, which controls dual use items. Offerors must disclose any proposed use of foreign nationals (FNs), their country(ies) of origin, the type of visa or work permit possessed, and the statement of work (SOW) tasks intended for accomplishment by the FN(s) in accordance with the Announcement. Offerors are advised foreign nationals proposed to perform on this topic may be restricted due to the technical data under US Export Control Laws.

OBJECTIVE:

Develop and demonstrate solutions or components of solutions for remote breaching of obstacles to decrease risk by removing Soldiers from the point of breach.

DESCRIPTION:

Breaching is a key task performed by Army forces in order to move through enemy-emplaced obstacles intended to block, disrupt, turn, or fix friendly forces. Mined wire obstacles consist of anti-vehicle and/or anti-personnel mines or other explosive hazards that may be surface-laid or buried, with trigger mechanisms to include pressure plate, magnetic, vibration, radar, and others. Mines and explosive hazards can be manually emplaced or scattered by quick-delivery mechanisms such as aircraft or artillery. Mined obstacles are often accompanied by concertina wire, anti-tank ditches, berms, and physical barriers such as “tetrahedrons” to slow vehicle and personnel movement. Obstacles are usually overwatched by enemy forces to engage friendly forces attempting to breach the obstacle.

The Army’s current breaching methods require Soldiers at the point of breach, introducing the possibility of catastrophic loss of personnel and equipment and creating a risk to mission accomplishment. To conduct a breaching operation, Soldiers must locate the obstacle and decide where to breach a lane through the obstacle. Then they use an explosive device such as a Mine Clearing Line Charge (MICLIC) or mechanical means such as a plow or flail to detonate mines or move them out of the breach lane. Soldiers then “proof” the lane to verify that the obstacle has been neutralized, often using a mine roller to detonate any remaining mines. Finally, they mark the breach lane to guide passage of friendly forces through the lane.

The Army is seeking solutions for remote breaching to decrease risk by removing Soldiers from the point of breach. We are particularly seeking technologies that contribute to one or more tasks associated with breaching mine and wire obstacles, to include but not limited to:

  • Detecting mines and other surface or subsurface explosive hazards and communicating or marking their locations
  • Detecting physical obstacles such as wire, anti-tank ditches, berms, tetrahedrons, or other types of barriers
  • Neutralizing mines, explosive hazards, and physical barriers through explosive, mechanical, kinetic, electromagnetic, directed energy, or other means
  • Verifying (proofing) the breach lane to ensure the obstacle has been neutralized
  • Marking the breach lane to guide safe passage of vehicular or personnel traffic
  • Command and control of the breaching operation

Solutions should allow Soldiers to conduct breaching from a safe distance of approximately 1000 meters or more from the point of breach. This may include technologies that can be employed by air or ground uncrewed systems or launched from a safe distance.

Solutions should be capable of integrating as part of a larger breaching concept and may be employed alongside other systems either fielded or in development, such as a remotely controlled Assault Breacher Vehicle or other technologies resulting from this solicitation. The Army is open to solutions in the form of modular mission payloads that integrate with existing or planned robotic platforms such as the Robotic Combat Vehicle (RCV) or other ground or air platforms.

The Army desires speed and flexibility in remote breaching methods. Solutions should be employable quickly in response to a hastily-employed enemy obstacle, such as air-delivered scatterable mines, or as part of a deliberate breaching operation against a larger, more complex obstacle. Ideally, solutions should be scalable for use against obstacles with greater depth.

There is likely to be significant technology overlap with solutions that can be used for non-combat operations such as locating and clearing legacy minefields. However, the focus of this solicitation is on technologies for creating a breach lane in an enemy-emplaced obstacle in the context of a fast-paced, contested combat environment.

PHASE I:

Design a proof-of-concept solution or component(s) of a solution for remote breaching of obstacles to remove Soldiers from the point of breach. Solutions may include technologies for detecting or neutralizing mines, explosive hazards, or barriers, verifying that the obstacle has been neutralized, marking the breach lane, controlling the breaching operation, or other components that contribute to a successful breaching operation. Proposals will be evaluated based on the contributions they can provide to the overall breaching effort and the likelihood of the technology providing an effective solution. The objective of Phase I is to establish the technical merit, feasibility, and commercial potential of the proposed effort, and to determine the quality of performance of the awarded companies prior to providing further support in Phase II. Final deliverable will be a concept design presentation, optional proof of technology demonstration, and plans for follow-on Phase II work.

Companies selected for a Phase I award may voluntarily participate in the Army Applications Laboratory (AAL) 12-week cohort program. The AAL cohort program is designed to solve specific Army modernization challenges on a compressed timeline. The cohort program matches qualified companies with Army problem owners to speed capability development, accelerate transition, and de-risk or inform requirements. This program is designed for businesses that have unique, applicable technology and are interested in growing a new line of business through the DoD.

The cohort program will enhance technology development through rapid exposure to Army stakeholders and the Army maneuver support community. Planned activities include a problem topic deep dive, in-person exposure to current breaching techniques, and stakeholder engagement with requirements writers, acquisitions managers, and end users. An example cohort program for this topic is:

Week 1 (15 Jan 2024) Orientation and problem deep-dive (in-person: Ft. Stewart, GA)

Week 2 (22 Jan 2024) Concept research and planning

Week 3 (29 Jan 2024) Concept confirmation brief (virtual)

Week 4-6 5 Feb 2024) Concept research and planning

Week 7 (26 Feb 2024) Mid-point concept refinement brief (in-person: Ft. Leonard Wood, MO)

Week 8-11 (4 Mar 2024) Concept design refinement

Week 12 (1 Apr 2024) Final concept design brief (in-person: Austin, TX)

Cohort programming will be provided free of charge. Proposers who plan to participate in the cohort (if awarded a Phase I) are encouraged to include travel costs for three cohort trips, within the continental US, for five days each (including travel days) for in-person programming. Details will be provided to awardees under this topic at Phase I award.

PHASE II:

Develop, build, and demonstrate a prototype of the concept advanced during Phase I. Prototypes should be capable of integration with existing Army systems and/or newly developed systems from other awardees. They should also showcase modularity and prove effective during simulated or operational demonstrations. Phase II deliverables include a demonstration and delivery of a Technology Readiness Level (TRL) 6 prototype for further Army evaluation, as well as quarterly and final reports detailing design and performance analysis of the prototype. Phase II proposals will be evaluated, in part, on cost reasonableness and speed to delivery of a TRL 6 prototype.

Awardees may also be eligible for Phase IIb award after completion of Phase II period of performance. Phase IIb can extend the period of performance with additional funding and additional matching opportunities to finish building out solutions with the stakeholders’ discretion.

PHASE III:

The objective of Phase III, where appropriate, is for the small business to pursue commercialization objectives through the effort. Companies may develop a manufacturing-ready product design, capable of integration with the existing or future system, and demonstrate technology integration. Low-rate production will occur as required. Companies will engage in laboratory or operational testing as required. Phase III deliverables include system-level integration technical data package, installation documentation, and system-level prototype for demonstration and government-sponsored testing.

WEBINAR DATE:

A Webinar will be conducted for this solicitation on Wednesday, October 11, at 10:00am CST. Please register at: https://remotebreachingwebinar.eventbrite.com.

KEYWORDS:

Obstacle, Barrier, Mine, Wire, Ditch, Breach, Reduce, Clear, Remote, Robotic, Autonomous, Unmanned, Uncrewed

REFERENCES:

  1. Combined Arms Breach. TRADOC G2 G&V. https://www.youtube.com/watch?v=ZZ-sCT_maAQ
  2. US Army digs deep to develop robot minefield ‘breachers’. C4ISRNET. https://www.c4isrnet.com/newsletters/unmanned-systems/2022/11/03/us-army-digs-deep-to-develop-robot-minefield-breachers/

MCSC Open Topic for Logistics in a Contested Environment

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Renewable Energy Generation and Storage; Sustainment; Trusted AI and Autonomy

OBJECTIVE: DEPARTMENT OF THE NAVY OPEN TOPIC - DON is seeking proposals for enhancing existing prototypes or concepts to improve operations in contested environments for extended periods of time through heightened tensions and conflict by significantly reducing or eliminating the need for replenishment or sustainment.

DESCRIPTION: A contested logistics environment means an environment in which armed forces engage in conflict with an adversary that presents challenges in all domains and directly targets logistics operations, facilities, and activities in the United States, abroad, or in transit from one location to the other. State and non-state actors employ space, cyberspace, and electromagnetic spectrum (EMS) capabilities, as well as information operations, against friendly naval forces. Adversaries may use these capabilities in attempts to deny, degrade, and exploit our use of our historic command, control, communications, computer, intelligence, surveillance, and reconnaissance (C4ISR) strengths. Resilient logistics connects the foundry to the Fleet, is enabled by secure communications and information technology, and includes all activities and technologies needed to refuel, rearm, resupply, repair, and revive distributed naval forces down to the last tactical mile.

The Department of the Navy requests proposals for existing technology demonstration platforms, prototypes, and commercial products to assess their relevance to Naval missions through operational experimentation. Proposers should have an existing solution, either hardware and/or software, which can be evaluated through military utility assessments with end users.

The areas of interest for the Marine Corps are improved fuel efficiency and/or methods to utilize fossil fuel alternatives, such as hydrogen, for: Marine Corps Tactical Vehicles, Mobile Power Systems, Batteries, and energy storage systems for human portable devices such as radios. Examples of current Marine Corps systems are provided in the references.

Proposal for this topic shall address one or more of the following:

  • generation
  • storage
  • distribution

PHASE I: Phase I feasibility will describe the existing proposed technology, existing DON system(s) to improve, modifications required, anticipated improvements to existing capabilities, impacts to current logistics if any (i.e., transportation, storage, maintenance, safety, etc.) and transition approach to the DON system. Results of Phase I Base will be detailed in a final technical report (Final Report). The Results of Phase I Option (if exercised) will further refine the final technical report.

Phase I deliverables include:

  • Kick-Off Briefing, due 15 days from start of Base award
  • Final Report, due 120 days from start of Base award
  • Initial Phase II Proposal, due 120 days from start of Base award
  • Report of Inventions and subcontractors, due 120 days from start of Base award

Phase I Option (if exercised) deliverables include:

  • Kick-Off Briefing, due 15 days from start of Option award
  • Final Report, due 180 days from start of Option award
  • Updated Report of Inventions and subcontractors, due 180 days from start of Option

PHASE II: All Phase I awardees may submit an Initial Phase II proposal for evaluation and selection. The evaluation criteria for Phase II is the same as Phase I (as stated in this BAA). The Phase I Final Report and Initial Phase II Proposal will be used to evaluate the small business concern’s potential to adapt commercial products to fill a capability gap, improve performance, or modernize an existing capability for DON and transition the technology to Phase III. Details on the due date, content, and submission requirements of the Initial Phase II Proposal will be provided by the awarding SYSCOM either in the Phase I contract or by subsequent notification.

Develop and deliver a functional prototype(s) which can be tested, evaluated through a military utility assessments with end users, and/or certified (as appropriate), develop transition plan including production and fielding approach (including updated logistics and safety consideration) and further commercialization (non-DoD).

PHASE III DUAL USE APPLICATIONS: Improve the technology per the Phase II guidance and transition to a fielding activity. Dual-Use applications may include commercially available trucks, generators, batteries, and energy storage systems.

REFERENCES:

  1. Marine Corps Portfolios, Logistics Combat Element Systems, Light Tactical Vehicles: https://www.marcorsyscom.marines.mil/Portfolios/Logistics-Combat-Element-Systems/Light-Tactical-Vehicles/
  2. Marine Corps Portfolios, Logistics Combat Element Systems, Medium and Heavy Tactical Vehicles: https://www.marcorsyscom.marines.mil/LCES/Medium-Heavy-Tactical-Vehicles/
  3. Marine Corps Portfolios, Logistics Combat Element Systems, Mobile Power: https://www.marcorsyscom.marines.mil/Portfolios/Logistics-Combat-Element-Systems/Engineer-Systems/Power-Team/Mobile-Power/
  4. Marine Corps Portfolios, Logistics Combat Element Systems, Advanced Power Systems: https://www.marcorsyscom.marines.mil/Portfolios/Logistics-Combat-Element-Systems/Engineer-Systems/Power-Team/Advanced-Power-Systems/

KEYWORDS: Contested Logistics Environment; Marine Corps Tactical Vehicles; Mobile Power Systems; Batteries; Energy Storage Systems; Fuel Efficiency; Fossil Fuel Alternatives

NAVAIR Open Topic for Logistics in a Contested Environment

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S) - Advanced Computing and Software; Integrated Sensing and Cyber; Trusted AI and Autonomy

The technology within this topic is restricted under the International Traffic in Arms Regulation (ITAR), 22 CFR Parts 120-130, which controls the export and import of defense-related material and services, including export of sensitive technical data, or the Export Administration Regulation (EAR), 15 CFR Parts 730-774, which controls dual use items. Offerors must disclose any proposed use of foreign nationals (FNs), their country(ies) of origin, the type of visa or work permit possessed, and the statement of work (SOW) tasks intended for accomplishment by the FN(s) in accordance with the Announcement. Offerors are advised foreign nationals proposed to perform on this topic may be restricted due to the technical data under US Export Control Laws.

OBJECTIVE: DEPARTMENT OF THE NAVY OPEN TOPIC: DON is seeking proposals for enhancing existing prototypes or concepts to improve operations in contested environments for extended periods of time through heightened tensions and conflict by significantly enhancing or reducing or eliminating the need for replenishment or sustainment.

DESCRIPTION: A contested logistics environment means an environment in which armed forces engage in conflict with an adversary that presents challenges in all domains and directly targets logistics operations, facilities, and activities in the United States, abroad, or in transit from one location to the other. State and non-state actors employ space, cyberspace, and electromagnetic spectrum (EMS) capabilities, as well as information operations, against friendly naval forces. Adversaries may use these capabilities in attempts to deny, degrade, and exploit our use of our historic command, control, communications, computer, intelligence, surveillance, and reconnaissance (C4ISR) strengths. Resilient logistics connects the foundry to the Fleet, is enabled by secure communications and information technology, and includes all activities and technologies needed to refuel, rearm, resupply, repair, and revive distributed naval forces down to the last tactical mile. Please indicate the technology area of interest within the Abstract section of the Cover Sheet, Volume 1. The technology areas of interest are:

  • NEXT-GENERATION LOGISTICS AIRCRAFT. Design refinement/experimentation of tactical unmanned resupply aircraft that are attritable and/or offer reduced detectability (last-tactical mile delivery); large capacity, intra-theater, cargo and medevac aircraft which are not reliant upon large airfields. Short takeoff and landing (STOL), vertical takeoff and landing (VTOL), novel shipboard launch and recovery and automated cargo handling systems. Air to Air refueling capability.
  • AIRCRAFT BATTLE-DAMAGE REPAIR. Non-destructive inspection methods; expedient battle-damage analysis and safe flight envelope modification; composite and low-observable materiel repairs; fiber-optic repairs; damage tolerant/resistant structures and systems; access to maintenance data with limited or no reachback to home station.
  • REDUCED FUEL/SUPPLY DEMAND. Increased energy efficiency and/or methods to generate energy or fuel substitutes for aircraft and support equipment. Electric or Hybrid-Electronic STOL/ VTOL systems. Reliable engines for UAVs that utilize common, existing aviation fuels. Reduced consumable usage and/or ability to manufacture consumables and limited-life parts in austere locations.
  • LOGISTICS C3 IMPROVEMENTS. Sense and avoid systems for UAS. Increased autonomy for unmanned resupply aircraft. Alternative PNT systems, including optical ship-relative navigation. Reduced data-exchange requirements. Low Probability of Intercept/Detection (LPI/D) communications methods. Innovative air traffic control and/ or space de-confliction systems.

PHASE I: The DON is planning to issue multiple Phase I awards for this topic but reserves the right to issue no awards. Each Phase I proposal must include a Base and Option period of performance. The Phase I Base must have a period of performance of four (4) months at a cost not to exceed $75,000. The Phase I Option must have a period of performance of six (6) months at a cost not to exceed $100,000.

Phase I feasibility will describe the existing proposed technology, existing DON system(s) to improve, modifications required, anticipated improvements to existing capabilities, impacts to current logistics if any (i.e., transportation, storage, maintenance, safety, etc.) and transition approach to the DON system. Results of Phase I will be detailed in a final technical report (Final Report).

Phase I deliverables include:

  • Kick-Off Briefing, due 15 days from start of Base award
  • Final Report, due 120 days from start of Base award
  • Initial Phase II Proposal, due 120 days from start of Base award

PHASE II: All Phase I awardees may submit an Initial Phase II proposal for evaluation and selection. The evaluation criteria for Phase II is the same as Phase I (as stated in this BAA). The Phase I Final Report and Initial Phase II Proposal will be used to evaluate the small business concern’s potential to adapt commercial products to fill a capability gap, improve performance, or modernize an existing capability for DON and transition the technology to Phase III. Details on the due date, content, and submission requirements of the Initial Phase II Proposal will be provided by the awarding SYSCOM either in the Phase I contract or by subsequent notification.

The scope of the Phase II effort will be specific to each project but is generally expected to harden, ruggedize, and/or marinize the technology for integration into an operational environment. The outcome to be a working prototype that can be tested and/or certified, including a fielding approach (including updated logistics and safety consideration) and further commercialization (non-DoD), if appropriate.

PHASE III DUAL USE APPLICATIONS: Field capability and logistics support.

REFERENCES:

  1. Chief of Naval Operations (CNO) Navigation Plan. Released January 2021, Updated 2022. https://media.defense.gov/2022/Jul/26/2003042389/-1/-1/1/NAVIGATION%20PLAN%202022_SIGNED.PDF
  2. Force Design 2030. Strategic guidance for surviving and thriving inside contested spaces. Integrated planning teams study and analyze the concepts for validation and refinement. https://www.marines.mil/Force-Design-2030/
  3. O’Rourke, Brian. "Prepare for Contested Logistics." US Naval Institute. Vol. 148/4/1,430. April 2022 https://www.usni.org/magazines/proceedings/2022/april/prepare-contested-logistics

KEYWORDS: contested logistics; next-generation logistics aircraft; battle-damage repair; reduced fuel/supply demand; logistics C3 improvement

NAVSEA Open Topic for Operations and Logistics in a Contested Environment: Improve/Manage Energy Efficiency for the DON's Non-nuclear Deployable Power Generators

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Renewable Energy Generation and Storage; Sustainment; Trusted AI and Autonomy

OBJECTIVE: DEPARTMENT OF THE NAVY OPEN TOPIC - NAVSEA is seeking proposals for commercial technology to ensure resilient logistics and technology in a contested environment.

DESCRIPTION: NAVSEA requests proposals for existing technology demonstration platforms, prototypes, and commercial products in a contested environment to assess their relevance to Naval missions through operational experimentation. For Phase I awardees, NAVSEA will provide an operational context which technologies will be assessed against and provide feedback and guidance on enhancements to align with the Fleet’s warfighting objectives. The proposing small business concern should have an existing solution, either hardware and/or software, which can be evaluated through operational experimentation with end users.

A contested environment means an environment in which armed forces engage in conflict with an adversary that presents challenges in all domains and directly targets operations, facilities, and activities in the United States, abroad, or in transit from one location to the other. State and non-state actors employ space, cyberspace, and electromagnetic spectrum (EMS) capabilities, as well as information operations, against friendly naval forces. Adversaries may use these capabilities in attempts to deny, degrade, and exploit our use of our historic command, control, communications, computer, intelligence, surveillance, and reconnaissance (C4ISR) strengths.

As stated in the instruction, only one proposal from a single small business concern will be accepted for this topic. The proposed capability will address:

Commercial technology (Technology Readiness Level TRL 8/9) to improve/manage energy efficiency for the Department of the Navy’s non-nuclear deployable power generators (ground vehicle engines, aircraft engines, ship main and auxiliary engine, free standing portable generators, batteries). These may include alternate fuel sources such as hydrogen. Increased fuel efficiency and/or methods to generate fuel or fuel substitutes. Deployable power generator that utilize alternate fuel sources such as hydrogen. Improved batteries and energy storage systems for human transportable devices such as radios.

PHASE I: The DON is planning to issue multiple Phase I awards for this topic but reserves the right to issue. Each Phase I proposal must include a Base and Option period of performance. The Phase I Base must have a period of performance of four (4) months at a cost not to exceed $75,000. The Phase I Option must have a period of performance of six (6) months at a cost not to exceed $100,000.

Phase I feasibility will describe the existing proposed technology, existing DON system(s) to improve, modifications required, anticipated improvements to existing capabilities, impacts to current logistics if any (i.e. transportation, storage, maintenance, safety, etc.) and transition approach to the DON system. Results of Phase I will be detailed in a final technical report (Final Report).

The Phase I Option, if exercised, will include the initial design specifications and capabilities description to build a prototype solution in Phase II.

Phase I deliverables include:

  • Kick-Off Briefing, due 15 days from start of Base award
  • Final Report, due 120 days from start of Base award
  • Initial Phase II Proposal, due 120 days from start of Base award

PHASE II: All Phase I awardees may submit an Initial Phase II proposal for evaluation and selection. The evaluation criteria for Phase II is the same as Phase I (as stated in this BAA). The Phase I Final Report and Initial Phase II Proposal will be used to evaluate the small business concern’s potential to adapt commercial products to fill a capability gap, improve performance, or modernize an existing capability for DON and transition the technology to Phase III. Details on the due date, content, and submission requirements of the Initial Phase II Proposal will be provided by the awarding SYSCOM either in the Phase I contract or by subsequent notification.

The scope of the Phase II effort will be specific to each project but is generally expected to develop a functional prototype to demonstrate the capability, develop transition plan including production and fielding approach (including updated logistics and safety consideration) and further commercialization (non-DoD).

PHASE III DUAL USE APPLICATIONS: Field capability and logistics support. Since the Navy is seeking commercial technologies, these technologies already have commercial applications.

REFERENCES:

  1. GAO Report GAO-23-105608; “CONTESTED INFORMATION ENVIRONMENT: Actions Needed to Strengthen Education and Training for DOD Leaders”; https://www.gao.gov/assets/gao-23-105608.pdf
  2. Marine Corp Association; “Littoral Operations in a Contested Environment”; https://www.marines.mil/News/News-Display/Article/2708135/littoral-operations-in-a-contested-environment-loce/#:~:text=Littoral%20Operations%20in%20a%20Contested%20Environment%20(LOCE)%20is%20a%20concept,depth%2C%20complexity%2C%20and%20lethality.

KEYWORDS: Contested Logistics; Contested Environment; UUV and USV; Energy efficiency; Launch and recovery; Maritime mining and MCM

NAVSEA Open Topic for Operations and Logistics in a Contested Environment: Improve Launch and Recovery of Air, Sea Surface, and UUV from Naval Vessels

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Renewable Energy Generation and Storage; Sustainment; Trusted AI and Autonomy

OBJECTIVE: DEPARTMENT OF THE NAVY OPEN TOPIC - NAVSEA is seeking proposals for commercial technology to ensure resilient logistics and technology in a contested environment.

DESCRIPTION: NAVSEA requests proposals for existing technology demonstration platforms, prototypes, and commercial products in a contested environment to assess their relevance to Naval missions through operational experimentation. For Phase I awardees, NAVSEA will provide an operational context which technologies will be assessed against and provide feedback and guidance on enhancements to align with the Fleet’s warfighting objectives. The proposing small business concern should have an existing solution, either hardware and/or software, which can be evaluated through operational experimentation with end users.

A contested environment means an environment in which armed forces engage in conflict with an adversary that presents challenges in all domains and directly targets operations, facilities, and activities in the United States, abroad, or in transit from one location to the other. State and non-state actors employ space, cyberspace, and electromagnetic spectrum (EMS) capabilities, as well as information operations, against friendly naval forces. Adversaries may use these capabilities in attempts to deny, degrade, and exploit our use of our historic command, control, communications, computer, intelligence, surveillance, and reconnaissance (C4ISR) strengths.

As stated in the instruction, only one proposal from a single small business concern will be accepted for this topic. The proposed capability will address:

Commercial technology (TRL 8/9) to improve launch and recovery of air, sea surface, and undersea unmanned vehicles from Naval Vessels (architecture, artificial Intelligence applications, automated guidance).

PHASE I: The DON is planning to issue multiple Phase I awards for this topic but reserves the right to issue. Each Phase I proposal must include a Base and Option period of performance. The Phase I Base must have a period of performance of four (4) months at a cost not to exceed $75,000. The Phase I Option must have a period of performance of six (6) months at a cost not to exceed $100,000.

Phase I feasibility will describe the existing proposed technology, existing DON system(s) to improve, modifications required, anticipated improvements to existing capabilities, impacts to current logistics if any (i.e., transportation, storage, maintenance, safety, etc.) and transition approach to the DON system. Results of Phase I will be detailed in a final technical report (Final Report).

The Phase I Option, if exercised, will include the initial design specifications and capabilities description to build a prototype solution in Phase II.

Phase I deliverables include:

  • Kick-Off Briefing, due 15 days from start of Base award
  • Final Report, due 120 days from start of Base award
  • Initial Phase II Proposal, due 120 days from start of Base award

PHASE II: All Phase I awardees may submit an Initial Phase II proposal for evaluation and selection. The evaluation criteria for Phase II is the same as Phase I (as stated in this BAA). The Phase I Final Report and Initial Phase II Proposal will be used to evaluate the small business concern’s potential to adapt commercial products to fill a capability gap, improve performance, or modernize an existing capability for DON and transition the technology to Phase III. Details on the due date, content, and submission requirements of the Initial Phase II Proposal will be provided by the awarding SYSCOM either in the Phase I contract or by subsequent notification.

The scope of the Phase II effort will be specific to each project but is generally expected to develop a functional prototype to demonstrate the capability, develop transition plan including production and fielding approach (including updated logistics and safety consideration) and further commercialization (non-DoD).

PHASE III DUAL USE APPLICATIONS: Field capability and logistics support. Since the Navy is seeking commercial technologies, these technologies already have commercial applications.

REFERENCES:

  1. GAO Report GAO-23-105608; “CONTESTED INFORMATION ENVIRONMENT: Actions Needed to Strengthen Education and Training for DOD Leaders”; https://www.gao.gov/assets/gao-23-105608.pdf
  2. Marine Corp Association; “Littoral Operations in a Contested Environment”; https://www.marines.mil/News/News-Display/Article/2708135/littoral-operations-in-a-contested-environment-loce/#:~:text=Littoral%20Operations%20in%20a%20Contested%20Environment%20(LOCE)%20is%20a%20concept,depth%2C%20complexity%2C%20and%20lethality.

KEYWORDS: Contested Logistics; Contested Environment; UUV and USV; Energy efficiency; Launch and recovery; Maritime mining and MCM

NAVSEA Open Topic for Operations and Logistics in a Contested Environment: Enhance Mission Capabilities of USV/UUV and Systems

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Renewable Energy Generation and Storage; Sustainment; Trusted AI and Autonomy

OBJECTIVE: DEPARTMENT OF THE NAVY OPEN TOPIC - NAVSEA is seeking proposals for commercial technology to ensure resilient logistics and technology in a contested environment.

DESCRIPTION: NAVSEA requests proposals for existing technology demonstration platforms, prototypes, and commercial products in a contested environment to assess their relevance to Naval missions through operational experimentation. For Phase I awardees, NAVSEA will provide an operational context which technologies will be assessed against and provide feedback and guidance on enhancements to align with the Fleet’s warfighting objectives. The proposing small business concern should have an existing solution, either hardware and/or software, which can be evaluated through operational experimentation with end users.

A contested environment means an environment in which armed forces engage in conflict with an adversary that presents challenges in all domains and directly targets operations, facilities, and activities in the United States, abroad, or in transit from one location to the other. State and non-state actors employ space, cyberspace, and electromagnetic spectrum (EMS) capabilities, as well as information operations, against friendly naval forces. Adversaries may use these capabilities in attempts to deny, degrade, and exploit our use of our historic command, control, communications, computer, intelligence, surveillance, and reconnaissance (C4ISR) strengths.

As stated in the instruction, only one proposal from a single small business concern will be accepted for this topic. The proposed capability will address:

Commercial technology (TRL 8/9) to enhance mission capabilities of unmanned surface and subsurface vessels (USV/UUV) and systems. Global Positioning System (GPS) denied navigation, small unmanned underwater vehicles and bottom crawlers, improved C3 (Command, Control and Communications), resilient communications paths, high throughput data exfiltration/infiltration paths, replenishment, and monitoring, sustainment, repair and maintenance of unmanned systems. Sense and avoid systems for small UUVs. Increased autonomy for unmanned resupply USV. Alternative Position Navigation and Timing (PNT) systems, including optical ship-relative navigation. Reduced data-exchange requirements. Low Probability of Intercept/Detection (LPI/D) communications methods.

PHASE I: The DON is planning to issue multiple Phase I awards for this topic but reserves the right to issue. Each Phase I proposal must include a Base and Option period of performance. The Phase I Base must have a period of performance of four (4) months at a cost not to exceed $75,000. The Phase I Option must have a period of performance of six (6) months at a cost not to exceed $100,000.

Phase I feasibility will describe the existing proposed technology, existing DON system(s) to improve, modifications required, anticipated improvements to existing capabilities, impacts to current logistics if any (i.e., transportation, storage, maintenance, safety, etc.) and transition approach to the DON system. Results of Phase I will be detailed in a final technical report (Final Report).

The Phase I Option, if exercised, will include the initial design specifications and capabilities description to build a prototype solution in Phase II.

Phase I deliverables include:

  • Kick-Off Briefing, due 15 days from start of Base award
  • Final Report, due 120 days from start of Base award
  • Initial Phase II Proposal, due 120 days from start of Base award

PHASE II: All Phase I awardees may submit an Initial Phase II proposal for evaluation and selection. The evaluation criteria for Phase II is the same as Phase I (as stated in this BAA). The Phase I Final Report and Initial Phase II Proposal will be used to evaluate the small business concern’s potential to adapt commercial products to fill a capability gap, improve performance, or modernize an existing capability for DON and transition the technology to Phase III. Details on the due date, content, and submission requirements of the Initial Phase II Proposal will be provided by the awarding SYSCOM either in the Phase I contract or by subsequent notification.

The scope of the Phase II effort will be specific to each project but is generally expected to develop a functional prototype to demonstrate the capability, develop transition plan including production and fielding approach (including updated logistics and safety consideration) and further commercialization (non-DoD).

PHASE III DUAL USE APPLICATIONS: Field capability and logistics support. Since the Navy is seeking commercial technologies, these technologies already have commercial applications.

REFERENCES:

  1. GAO Report GAO-23-105608; “CONTESTED INFORMATION ENVIRONMENT: Actions Needed to Strengthen Education and Training for DOD Leaders”; https://www.gao.gov/assets/gao-23-105608.pdf
  2. Marine Corp Association; “Littoral Operations in a Contested Environment”; https://www.marines.mil/News/News-Display/Article/2708135/littoral-operations-in-a-contested-environment-loce/#:~:text=Littoral%20Operations%20in%20a%20Contested%20Environment%20(LOCE)%20is%20a%20concept,depth%2C%20complexity%2C%20and%20lethality.

KEYWORDS: Contested Logistics; Contested Environment; UUV and USV; Energy efficiency; Launch and recovery; Maritime mining and MCM

NAVSEA Open Topic for Operations and Logistics in a Contested Environment: Expand Lethality of Technologies of Maritime Mining and Mine Countermeasures

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Renewable Energy Generation and Storage; Sustainment; Trusted AI and Autonomy

OBJECTIVE: DEPARTMENT OF THE NAVY OPEN TOPIC - NAVSEA is seeking proposals for commercial technology to ensure resilient logistics and technology in a contested environment.

DESCRIPTION: NAVSEA requests proposals for existing technology demonstration platforms, prototypes, and commercial products in a contested environment to assess their relevance to Naval missions through operational experimentation. For Phase I awardees, NAVSEA will provide an operational context which technologies will be assessed against and provide feedback and guidance on enhancements to align with the Fleet’s warfighting objectives. Proposing small business concern’s should have an existing solution, either hardware and/or software, which can be evaluated through operational experimentation with end users.

A contested environment means an environment in which armed forces engage in conflict with an adversary that presents challenges in all domains and directly targets operations, facilities, and activities in the United States, abroad, or in transit from one location to the other. State and non-state actors employ space, cyberspace, and electromagnetic spectrum (EMS) capabilities, as well as information operations, against friendly naval forces. Adversaries may use these capabilities in attempts to deny, degrade, and exploit our use of our historic command, control, communications, computer, intelligence, surveillance, and reconnaissance (C4ISR) strengths.

As stated in the instruction, only one proposal from a single small business concern will be accepted for this topic. The proposed capability will address:

Commercial technology (TRL 8/9) to expand the lethality of technologies that enhance ability of both maritime mining and mine countermeasures (MCM) systems to detect, classify, identify, neutralize, and assess battle damage. Additional interest in technologies supporting maritime mining operations, minefield management, and associated enabling technologies such as, but not limited to, data exfiltration from expeditionary assets.

PHASE I: The DON is planning to issue multiple Phase I awards for this topic but reserves the right to issue. Each Phase I proposal must include a Base and Option period of performance. The Phase I Base must have a period of performance of four (4) months at a cost not to exceed $75,000. The Phase I Option must have a period of performance of six (6) months at a cost not to exceed $100,000.

Phase I feasibility will describe the existing proposed technology, existing DON system(s) to improve, modifications required, anticipated improvements to existing capabilities, impacts to current logistics if any (i.e., transportation, storage, maintenance, safety, etc.) and transition approach to the DON system. Results of Phase I will be detailed in a final technical report (Final Report).

The Phase I Option, if exercised, will include the initial design specifications and capabilities description to build a prototype solution in Phase II.

Phase I deliverables include:

  • Kick-Off Briefing, due 15 days from start of Base award
  • Final Report, due 120 days from start of Base award
  • Initial Phase II Proposal, due 120 days from start of Base award

PHASE II: All Phase I awardees may submit an Initial Phase II proposal for evaluation and selection. The evaluation criteria for Phase II is the same as Phase I (as stated in this BAA). The Phase I Final Report and Initial Phase II Proposal will be used to evaluate the small business concern’s potential to adapt commercial products to fill a capability gap, improve performance, or modernize an existing capability for DON and transition the technology to Phase III. Details on the due date, content, and submission requirements of the Initial Phase II Proposal will be provided by the awarding SYSCOM either in the Phase I contract or by subsequent notification.

The scope of the Phase II effort will be specific to each project but is generally expected to develop a functional prototype to demonstrate the capability, develop transition plan including production and fielding approach (including updated logistics and safety consideration) and further commercialization (non-DoD).

PHASE III DUAL USE APPLICATIONS: Field capability and logistics support. Since the Navy is seeking commercial technologies, these technologies already have commercial applications.

REFERENCES:

  1. GAO Report GAO-23-105608; “CONTESTED INFORMATION ENVIRONMENT: Actions Needed to Strengthen Education and Training for DOD Leaders”; https://www.gao.gov/assets/gao-23-105608.pdf
  2. Marine Corp Association; “Littoral Operations in a Contested Environment”; https://www.marines.mil/News/News-Display/Article/2708135/littoral-operations-in-a-contested-environment-loce/#:~:text=Littoral%20Operations%20in%20a%20Contested%20Environment%20(LOCE)%20is%20a%20concept,depth%2C%20complexity%2C%20and%20lethality.

KEYWORDS: Contested Logistics; Contested Environment; UUV and USV; Energy efficiency; Launch and recovery; Maritime mining and MCM

NAVWAR Open Topic for Holistic Common Operational Picture (COP): PMW 170

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Advanced Computing and Software; Trusted AI and Autonomy

OBJECTIVE: DEPARTMENT OF THE NAVY OPEN TOPIC - The resultant capability will provide a DEVSECOPS environment to mature efforts that feed the Maritime Tactical Command and Control production. It will also provide an AI tool that will sift data and identify potential Global Positioning System (GPS) threats in near real-time.

DESCRIPTION: The Department of Navy is seeking proposals to improve the quality and speed of decision making for operational and tactical commanders through advanced technology. These technologies may include, but not limited to, solutions that support force maneuver, effects and data synchronization, and course of action (COA) decision making. Specifically, PEO C4I (PMW 170) requires a software (SW)-based Navigation Warfare Situational Awareness (SA) tool that uses Artificial Intelligence (AI) to sift data and identify potential GPS threats in near real-time. The solution should go beyond training neural networks or other machine learning (ML) methodologies.

The benefit to the warfighter will be a solution to provide real-time GPS threats and can integrate into the Navigation Warfare COP, which can be used by operational commanders at the Combatant Command (COCOM) level down to individual platform/units to make informed decisions with a better understanding of warfighting capability.

Work produced in Phase II may become classified. The prospective contractor(s) must be U.S. owned and operated with no foreign influence as defined by DoD 5220.22-M, National Industrial Security Program Operating Manual, unless acceptable mitigating procedures have been implemented and approved by the Defense Counterintelligence Security Agency (DCSA). The selected contractor must be able to acquire and maintain an appropriate security-level facility and Personnel Security Clearances to perform on advanced phases of this project as set forth by DCSA and NAVWAR to gain access to classified information about the national defense of the United States and its allies. This will be an inherent requirement. The selected company will be required to safeguard classified material IAW DoD 5220.22-M during the advanced phases of this contract.

PHASE I: The DON is planning to issue multiple Phase I awards for this topic but reserves the right to issue no awards. Each Phase I proposal must include a Base and Option period of performance. The Phase I Base must have a period of performance of four (4) months at a cost not to exceed $75,000. The Phase I Option must have a period of performance of six (6) months at a cost not to exceed $100,000.

Phase I feasibility will describe the existing proposed technology, existing DON system(s) to improve, modifications required, anticipated improvements to existing capabilities, impacts to current logistics if any (i.e., transportation, storage, maintenance, safety, etc.) and transition approach to the DON system. Results of Phase I will be detailed in a final technical report (Final Report).

Phase I deliverables include:

  • Kick-Off Briefing, due 15 days from start of Base award
  • Final Report, due 120 days from start of Base award
  • Initial Phase II Proposal, due 120 days from start of Base award

Deliverables specific to this topic and in addition to those listed above: A study describing research and results of potential algorithms, taking into account the GPS-Based Positioning, Navigation and Timing Services (GPNTS) architecture and interfaces. Phase I should also include Modeling & Simulation (M&S) to support outcome/recommendations.

PHASE II: All Phase I awardees may submit an Initial Phase II proposal for evaluation and selection. The evaluation criteria for Phase II is the same as Phase I (as stated in this BAA). The Phase I Final Report and Initial Phase II Proposal will be used to evaluate the small business concern’s potential to adapt commercial products to fill a capability gap, improve performance, or modernize an existing capability for DON and transition the technology to Phase III. Details on the due date, content, and submission requirements of the Initial Phase II Proposal will be provided by the awarding SYSCOM either in the Phase I contract or by subsequent notification.

Develop software that will be integrated into GPNTS and performance validation in a fleet experimentation/demonstration, or relevant environment. Develop transition plan including production and fielding approach (including updated logistics and safety consideration) and further commercialization (non-DoD).

It is highly likely that the work, prototyping, test, simulation, and validation may become classified in Phase II (see Description for details). However, the proposal for Phase II will be UNCLASSIFIED.

PHASE III DUAL USE APPLICATIONS: Field capability and logistics support.

REFERENCES:

  1. P. Bethi, S. Pathipati and A. P, "Stealthy GPS Spoofing: Spoofer Systems, Spoofing Techniques and Strategies," 2020 IEEE 17th India Council International Conference (INDICON), New Delhi, India, 2020, pp. 1-7, doi:10.1109/INDICON49873.2020.9342317.
  2. Keller, John, “The growing problem of jamming and spoofing of GPS satellite navigation signals just keeps getting worse.” Military Aerospace Electronics, July 20, 2021 https://www.militaryaerospace.com/rf-analog/article/14207023/gps-signals-jamming

KEYWORDS: Maritime; Tactical; Command; Control; Positioning; Navigation; Timing

NAVWAR Open Topic for Holistic Common Operational Picture (COP): PMW 150

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Advanced Computing and Software; Trusted AI and Autonomy

OBJECTIVE: DEPARTMENT OF THE NAVY OPEN TOPIC - The resultant capability will provide a DEVSECOPS environment to mature efforts that feed the Maritime Tactical Command and Control production. It will also provide an AI tool that will sift data and identify potential Global Positioning System (GPS) threats in near real-time.

DESCRIPTION: The Department of Navy is seeking proposals to improve the quality and speed of decision making for operational and tactical commanders through advanced technology. These technologies may include, but not limited to, solutions that support force maneuver, effects and data synchronization, and course of action (COA) decision making. Specifically, PEO C4I (PMW 150) requires a resultant capability that will provide a DEVSECOPS environment to mature efforts that feed the Maritime Tactical Command and Control (MTC2) production process.

The benefit to the warfighter is to enable rapid COA response options to continuously assess and hold at risk dynamic maritime threats.

Work produced in Phase II may become classified. The prospective contractor(s) must be U.S. owned and operated with no foreign influence as defined by DoD 5220.22-M, National Industrial Security Program Operating Manual, unless acceptable mitigating procedures have been implemented and approved by the Defense Counterintelligence Security Agency (DCSA). The selected contractor must be able to acquire and maintain an appropriate security-level facility and Personnel Security Clearances to perform on advanced phases of this project as set forth by DCSA and NAVWAR to gain access to classified information about the national defense of the United States and its allies. This will be an inherent requirement. The selected company will be required to safeguard classified material IAW DoD 5220.22-M during the advanced phases of this contract.

PHASE I: The DON is planning to issue multiple Phase I awards for this topic but reserves the right to issue no awards. Each Phase I proposal must include a Base and Option period of performance. The Phase I Base must have a period of performance of four (4) months at a cost not to exceed $75,000. The Phase I Option must have a period of performance of six (6) months at a cost not to exceed $100,000.

Phase I feasibility will describe the existing proposed technology, existing DON system(s) to improve, modifications required, anticipated improvements to existing capabilities, impacts to current logistics if any (i.e., transportation, storage, maintenance, safety, etc.) and transition approach to the DON system. Results of Phase I will be detailed in a final technical report (Final Report).

Phase I deliverables include:

  • Kick-Off Briefing, due 15 days from start of Base award
  • Final Report, due 120 days from start of Base award
  • Initial Phase II Proposal, due 120 days from start of Base award

PHASE II: All Phase I awardees may submit an Initial Phase II proposal for evaluation and selection. The evaluation criteria for Phase II is the same as Phase I (as stated in this BAA). The Phase I Final Report and Initial Phase II Proposal will be used to evaluate the small business concern’s potential to adapt commercial products to fill a capability gap, improve performance, or modernize an existing capability for DON and transition the technology to Phase III. Details on the due date, content, and submission requirements of the Initial Phase II Proposal will be provided by the awarding SYSCOM either in the Phase I contract or by subsequent notification.

The scope of the Phase II effort will be specific to each project but is generally expected to develop a functional prototype to demonstrate the capability, develop transition plan including production and fielding approach (including updated logistics and safety consideration) and further commercialization (non-DoD).

Deliverables include all software, scripts, architecture models, system/software design artifacts, user and transition assessment documentation, and fleet experimentation (FLEX) reports.

It is highly likely that the work, prototyping, test, simulation, and validation may become classified in Phase II (see Description for details). However, the proposal for Phase II will be UNCLASSIFIED.

PHASE III DUAL USE APPLICATIONS: Field capability and logistics support.

REFERENCES:

  1. SBIR@Connect Spotlight: Meet NAVWAR’s Program Offices. Information on PEO C4I and Space Systems. Better understand the needs of the government, specifically NAVWAR https://vimeo.com/569585983
  2. Official U.S. Navy Web site for Naval Information Warfare Systems Command (NAVWAR) https://www.navwar.navy.mil/

KEYWORDS: Maritime; Tactical; Command; Control; Positioning; Navigation; Timing

Decontamination of Open Wounds - Open Topic

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Biotechnology

OBJECTIVE: The purpose of developing an effective man-portable capability that will rapidly remove chemical warfare agents (CWAs) and other toxic industrial chemicals (TICs) of interest to the U.S. Department of Defense from both intact and wounded human skin, under austere conditions is to bring potentially valuable small business innovations to the Chemical and Biological Defense Program portfolio to discover and develop chemical medical countermeasures (cMCMs) capable of neutralizing CWAs in wounds and on the skin for the treatment of the Warfighter.

DESCRIPTION: Although decontamination issues have been studied since the onset of chemical warfare, decontamination of chemical warfare agents (CWAs) from the skin remains a thorny problem for a variety of reasons.

These include, first and foremost, the ability to rapidly and effectively remove a diversity of toxic chemicals that currently are, or could be, CWAs, without harming or damaging the contaminated skin or wound. Prompt and rapid post-exposure decontamination is critical to reduce the post-exposure effects of CWAs.

In addition, a practical decontamination product needs to satisfy a plethora of secondary requirements, which include but are not limited to:

  • Being simple to use in the field under harsh and likely confusing situations.
  • Be light weight, compact, and easily stowed in a soldier’s pack.
  • Be fast acting and effective under a wide range of environmental conditions.
  • Meet and satisfy Federal Drug Agency (FDA) requirements.
  • Meet and satisfy major DoD logistical requirements, i.e., long shelf-life, ease of transportation, manufacturability, and cost-effectiveness.
  • Last, but not least, in addition to removing the toxic agents from skin, the product should be able to detoxify these chemical agents, both while it is being applied on the skin and after its removal. Rapid agent detoxification and decontamination effectiveness are intricately linked because in-situ detoxification is an effective method of reducing agent concentration on the skin before the agent has time to diffuse into the sub-dermal region. Detoxification of the agent also attenuates or prevents secondary contamination of medical or other personnel, and of the environment.

Chemical warfare agents (CWAs) are among the most lethal and sinister substances manufactured by man (1). They are designed to kill, maim, immobilize, or psychologically threaten enemy troops.

CWAs can attack the skin which is not only the body’s interface with the outside environment, but also the largest organ of the body, with a surface area of roughly 1.6 m² for women and 1.8 m² for men (6). Skin exposure to warfare agents is also a major problem during non- conventional war (5), or terrorist attack. Over the eons, a wide variety of materials in gas, liquid or solid form have been mobilized for this purpose. At present, CWAs of greatest concern in military operations are relatively low volatility organic liquids that attack the skin (vesicants) or attack the nervous system (nerve agents) (2-4).

Human skin, the largest human organ, developed as a physical barrier to the environment (to keep things out) but also maintains the aqueous nature of the human body (to keep things in). Mammalian skin consists of three major layers: stratum corneum, epidermis, and dermis. The stratum corneum, the thin outer layer of keratin-filled dead cells (corneocytes) bounded by densely crosslinked protein and embedded in crystalline lamellar lipids, represents the major barrier protecting the body from loss of internal components and entry of undesirable external materials. The stratum corneum, composed of keratinized dead cells that are continually being replaced, is the first major barrier to chemical agents. The layer underneath the stratum corneum, the epidermis, contains cells that differentiate from viable keratinocytes to corneocytes during their migration from the dermis to the stratum corneum. It also contains a large number of specialized cells. The dermis is the main component of living skin.

The purpose of decontamination is to reduce an initial amount of harmful material deposited on the surface of a person or object from the environment to a level that is low enough allow it to continue to safely function. It should be noted that permeability of the contaminant through the surface of the person or object is a complicating issue for any surface decontamination process. Contaminant permeability renders decontamination more difficult to perform, places time limitations on the window of opportunity for its performance.

The alternative to decontamination is discarding the object, which in the case of living beings, is not an option.

Current skin decontamination methods rely heavily on “wet” decontamination practices, which include washing the body with water, or soap and water (Roul et al., 2017). Alternatively, rapid decontamination makes extensive use of “dry” decontamination, which is based on adsorptive properties of powders, such as activated carbon or Fuller’s Earth (FE) (Roul et al., 2017).

Improved personal decontamination methods/products should consider:

  • The effects on both intact skin and open wounds.
  • Impacts on the subsequent wound healing process.
  • Agent variable decontamination efficiency.
  • Post-decontamination CWA detoxification capability. Rapid agent detoxification and decontamination effectiveness are intricately linked because in-situ detoxification is an effective method of reducing agent concentration on the skin before the agent has time to diffuse into the sub-dermal region. Post-decontamination detoxification of the contaminant(s)will also attenuate or prevent secondary contamination of medical or other personnel, and of the environment.

There is a clear need to develop an effective man-portable capability that will rapidly remove chemical warfare agents (CWAs) and other toxic industrial chemicals (TICs) of interest to the U.S. Department of Defense from human skin, both intact and wounded, under austere conditions.

PHASE I: A feasibility study to demonstrate the technical and commercial practicality of the concept to include an assessment of its technical readiness and potential applicability to military and commercial markets.

PHASE II: Businesses will produce practical and feasible prototype solutions that can operate in edge and austere environments. Companies will provide a technology transition and commercialization plan for Department of Defense and commercial markets. The DoD will evaluate each product in a realistic field environment and provide solutions to stakeholders for further evaluation. Based on Soldier field assessment, the DoD will request companies to update the previously delivered prototypes to meet final design configuration.

REFERENCES:

  1. R.K. Gordon and E.D. Clarkson,(2009), “Rapid Decontamination of Chemical Warfare Agents”, Chapter 71, p. 1069 - 1081, Handbook of Toxicology of Chemical Warfare Agents”, CHAPTER 71 - Rapid Decontamination of Chemical Warfare Agents (prevor.com.cn)
  2. K.J. Smith, K.J., et al. (1995). Sulfur mustard: its continuing threat as a chemical warfare agent, the cutaneous lesions induced, progress in understanding its mechanism of action, its long-term health effects, and new developments for protection and therapy. J. Am. Acad. Dermatol. 32: 765–76
  3. C. Bismuth, C., et al. (2004). Chemical weapons: documented use and compounds on the horizon. Toxicol. Lett. 149: 11–18
  4. M. Ghanei and A.A. Harandi (2007). Long term consequences from exposure to sulfur mustard: a review. Inhal. Toxicol. 19: 451–6
  5. S. Reutter, (1999). Hazards of chemical weapons release during war: new perspectives. Environ. Health Perspect. 107: 985–90.
  6. Surface Area of Human Skin - The Physics Factbook (hypertextbook.com).
  7. G.K. Menon, (2002). New insights into skin structure: scratching the surface. Adv. Drug Deliv. Rev. 54: S3–17.
  8. J. Hadgraft, and M.E. Lane (2005). Skin permeation: the years of enlightenment. Int. J. Pharmacol. 305: 2–12.
  9. B. Godin, and E., Touitou, E. (2012). Dermal and Transdermal Delivery. In: Bhushan, B. (eds) Encyclopedia of Nanotechnology. Springer, Dordrecht. https://doi.org/10.1007/978-90-481-9751-4_81
  10. H.I, Maibach, and R.C. Wester, “Percutaneous Absorption: In Vivo Methods in Humans and Animals”, Journal of the American College of Toxicology. 1989;8(5):803-813. doi:10.3109/10915818909018039
  11. Handbook of Toxicology of Chemical Warfare Agents, 2009 Handbook of Toxicology of Chemical Warfare Agents | ScienceDirect).
  12. H.Z. Zhu, et al, “Effect of Soap-Water Wash on Human Epidermal Penetration”, pp. 87-99, Chapter 6, “Skin Decontamination”, H. Zhu and H.I. Mailbach, Ed., G. Springer Nature Switzerland, 2020 https://oi.org/10.1007/978-3-030-24009-7_6
  13. A. Roul et al., “Fuller’s Earth Efficiency in Skin Decontamination”, pp. 121-139, Chapter 8 “Skin Decontamination”, H. Zhu and H.I. Mailbach, Ed., G. Springer Nature Switzerland, 2020 https://oi.org/10.1007/978-3-030-24009-7_8
  14. Fuller's Earth - Medical Countermeasures Database - CHEMM (hhs.gov)
  15. (11) (PDF) ADSORPTION STUDIES OF FULLERS EARTH NANOCOMPOSITES FOR THE REMOVAL OF COPPER AND REACTIVE YELLOW 18 (researchgate.net)
  16. A. Roul et al., “Fuller’s Earth Efficiency in Skin Decontamination”, pp. 121-139, Chapter 8 “Skin Decontamination”, H. Zhu and H.I. Mailbach, Ed., G. Springer Nature Switzerland, 2020 https://oi.org/10.1007/978-3-030-24009-7_8
  17. S. Dachir, et al, «Fuller’s Earth: Old and Faithful Skin Decontamination Against Toxic Agents”, p. 101 -117, Chapter 7, “Skin Decontamination”, H. Zhu and H.I. Mailbach, Ed., G. Springer Nature Switzerland, 2020 https://oi.org/10.1007/978-3-030-24009-7_7
  18. M291 Skin Decontamination Kit | CCDC-CBC | MRIGlobal CBRNE Tech Index
  19. U.S. DHS, CHEMM, “Reactive Skin Decontamination Lotion (RSDL) – Medical Counter Measures Data Base ( 2017) Reactive Skin Decontamination Lotion (RSDL) - Medical Countermeasures Database - CHEMM (hhs.gov)
  20. E.H. Braue, Jr., et al, «Evaluation of RSDL, M291 SDK, 0.5% Bleach, 1% Soapy Water and SERWACWA”, Part 1: Challenge with VX, USAMRICD-TR-09-01, U.S. Army Medical Research Institute of Chemical Research, Aberdeen Proving Ground, MD 21010-5400, June 2009.
  21. E.H. Braue, Jr., et al, «Evaluation of RSDL, M291 SDK, 0.5% Bleach, 1% Soapy Water and SERWACWA”, Part2: Challenge with Soman, USAMRICD-TR-09-01, U.S. Army Medical Research Institute of Chemical Research, Aberdeen Proving Ground, MD 21010-5400, July 2010.
  22. I. Koplovitz, «Comparison of Four Skin Decontamination Procedures Using Reactive Skin Decontamination Lotion (RSDL) Following Cutaneous VX Exposure in Guinea Pigs, USAMRICD-TR-17-01, U.S. Army Medical Research Institute of Chemical Research, Aberdeen Proving Ground, MD 21010-5400, January 2016.
  23. Emergent Biosolutions Inc., Resources – RSDL
  24. Emergent Biosolutions Inc., RSDL – Reactive Skin Decontamination Lotion Kit
  25. L. Taysse et al., 2007, Cutaneous challenge with chemical warfare agents in the SKH-1 hairless mouse (II): effects of some currently used skin decontaminants (RSDL and Fuller's earth) against liquid sulphur mustard and VX exposure - PubMed (nih.gov)
  26. S. Tang et al, 2019, Hydrophilic scaffolds of oxime as the potent catalytic inactivator of reactive organophosphate - ScienceDirect
  27. T.J. Walters, et al.,” Effect of reactive skin decontamination lotion on skin wound healing in laboratory rats”. Mil. Med. 172: 318–21 2007.
  28. B.A. Mantooth et al, “Transport and Reactivity of Decontaminants to Provide Hazard Mitigation of Chemical Warfare Agents from Materials”, ECBC-TR-1383, p. 2, June 2016
  29. O. Koper, “The Development of FAST-ACT® by Nanoscale Corporation”, Chapter 14, pp 235-248, ACS Symposium Series, Vol. 1045, “Nanoscale Materials in Chemistry: Environmental Applications”, edited by L.E. Erickson et al, 2010.
  30. 30. Battelle Memorial Institute, “Determination of Surface Removal and Reactivity of Three Powder Formulations with Selected Chemical Warfare Agents”, Final Report (Battelle Study No. 337-G004762), June 2002.
  31. P.W. Bartram and J.T. Lynn, Evaluation of FAST-ACTTM Formulations (Phase III, Test Service Agreement No. 0219T), ECBC-TR-378, Edgewood Chemical Biological Center, Aberdeen Proving Ground, MD 21010-5424, April 2004
  32. A. Pinhal et al, 2021, (a_Andreia-Pinhal-EPA-2021.pdf (herts.ac.uk)).
  33. H. H. Hill, Jr. and S.J. Martin, “Conventional analytical methods for chemical warfare agents”, Pure Appl. Chem., Vol. 74, No. 12, pp. 2281–2291, 2002.
  34. Ch. E. Kientz. “Chromatography and mass spectrometry of chemical warfare agents, toxins and related compounds: state of the art and future prospects”, J. Chromatogr. A814, 1–23 (1998).
  35. J. R. Smith, M. L. Shih, E. O. Price, G. E. Platoff, J. J. Schlager. “Army medical laboratory telemedicine: Role of mass spectrometry in telediagnosis for chemical and biological defense”, J. Appl. Toxicol.21, S35–S41 (2001).
  36. “A Literature Review of Wipe sampling Methods for Chemical Warfare Agents and Toxic Industrial Chemicals”, EPA/600/R-11/079 January 2007). Document Display | NEPIS | US EPA
  37. S.A. Willison and et al, (2019) The imp(act of wipe sampling variables on method performance associated with indoor pesticide misuse and highly contaminated areas (nih.gov)
  38. NIOSH Manual of Analytical Methods (NMAM), 5th Edition (2022) NMAM 5th Edition Web Book | NIOSH | CDC
  39. ASTM D6661-17, Standard Practice for Field Collection of Organic Compounds from Surfaces Using Wipe Sampling, 2017
  40. Karen Rossington, 2012 (The attraction of presat wipes (manufacturingchemist.com),
  41. Karen Rossington, 2017 ( Methods for testing presaturated wipes (cleanroomtechnology.com),
  42. Y. Liu et al, “Skin Exposure to Aliphatic Polyisocyanates in the Auto Body Repair and Refinishing Industry: III. A personal Exposure Algorithm”, Ann. Occup. Hyg., 53 (1), 33-40, 2009 (Skin_Exposure_to_Aliphatic_Polyisocyanates_in_the_auto_body_industry, Y Liu et al 2008.pdf).
  43. M. N. Richards, et al, “An approximate analytical approach to estimate the diffusivity of toxic chemicals in polymer barrier materials from the time evolution of sessile drop profiles”, Polymer Bulletin,76,339–364, 2019, An approximate analytical approach to estimate the diffusivity of toxic chemicals in polymer barrier materials from the time evolution of sessile drop profiles | SpringerLink

KEYWORDS:

Decontamination; Chemical Warfare Agents; Personnel Decontamination; Casualty Decontamination; Skin Decontamination; Open Wound Decontamination; Chemical Agent Detoxification

Vibe: Innovation in Commodity Coherence

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Integrated Network Systems-of-SystemsThe technology within this topic is restricted under the International Traffic in Arms Regulation (ITAR), 22 CFR Parts 120-130, which controls the export and import of defense-related material and services, including export of sensitive technical data, or the Export Administration Regulation (EAR), 15 CFR Parts 730-774, which controls dual use items. Offerors must disclose any proposed use of foreign nationals (FNs), their country(ies) of origin, the type of visa or work permit possessed, and the statement of work (SOW) tasks intended for accomplishment by the FN(s) in accordance with the Announcement. Offerors are advised foreign nationals proposed to perform on this topic may be restricted due to the technical data under US Export Control Laws.OBJECTIVE: Beamforming is utilized in numerous applications from wireless communications, acoustics, radar, and sonar as a means to direct a specific signal towards a particular receiver. Such applications typically require computing power to perform the signal processing and a sensor array to send or receive signals. These requirements are tailored to the specific application and may cause significant impact to the overall resources available for operations. Given the ubiquity of Commercial Off-the-Shelf (COTS) compute, sensors, and sensor platforms, there are multiple applications that could benefit from utilizing commodity hardware in lieu of requiring application-specific technologies. Beamforming requires relative time synchronization between nodes within an array and the ability to establish range metrics between senders prior to being able to beamform to a specific receiver. Typically, arrays are custom built where such information is already known or can easily be calculated. However, the creation of an array from heterogeneous commodity hardware requires such calculations to be performed on-the-fly and repeatedly as there could be modifications to the array during signal emissions. This Defense Advanced Research Projects Agency (DARPA) topic is seeking technologies for achieving time synchronization and coherence from a cooperating set of commodity devices. Vibe performers will explore novel approaches and develop prototypes for establishing distributed frequency coherence between a set of commodity devices to be able to achieve beamforming to a known receiver. Vibe is interested in any hardware/software methods that can achieve beamforming while also minimizing customized hardware solutions, maintaining a small form factor, and leaving the hardware inconspicuous.DESCRIPTION: Performers will develop novel approaches for utilizing commodity hardware for achieving distributed coherence and beamforming. Vibe prototypes should be able to demonstrate the ability to establish and maintain time synchronization necessary for coherent beamforming of a given frequency and waveform to a receiver. This can range from audible acoustic, ultrasonic, GSM, LTE, Bluetooth, WiFi, or other frequencies and waveforms of commercial/military interest and value. This receiver will also be controlled by the performer, but must also utilize COTS technologies to validate the transmitted signal.PHASE I: This topic is soliciting Direct to Phase II (DP2) proposals only. Therefore, Phase I proposals will not be accepted or reviewed. Phase I feasibility will be demonstrated through evidence of: a completed feasibility study or a basic prototype system; definition and characterization of properties desirable for both Department of Defense (DoD) and civilian use; and comparisons with alternative state-of-the-art methodologies (competing approaches). This includes determining, insofar as possible, the scientific and technical merit and feasibility of ideas appearing to have application to the core objective of achieving coherence between a cooperating set of commodity devices. Proposers interested in submitting a DP2 proposal must provide documentation to substantiate that the scientific and technical merit and feasibility described above have been met and describe the potential military or commercial applications. DP2 documentation should include: •technical reports describing results and conclusions of existing work, particularly regarding the commercial opportunity or DoD insertion opportunity, and risks/mitigations, assessments; •presentation materials and/or white papers;•technical papers; •test and measurement data;•prototype designs/models;•performance projections, goals, or results in different use cases This collection of material will verify mastery of the required content for DP2 consideration. DP2 proposers must also demonstrate knowledge, skills, and ability in computer science, mathematics, physics, electrical engineering, and software engineering. For detailed information on DP2 requirements and eligibility, please refer to the DoD BAA and the DARPA Instructions for this topic.PHASE II: The goal of Vibe is to design and evaluate an array to achieve coherent signal transmission and beamforming utilizing commodity hardware. Proposals should include development, installation, integration, demonstration and/or test and evaluation of the proposed prototype system. These activities should focus specifically on:1.Evaluating the adapted solution against the proposed objectives.2.Describing in detail how the installed solution differs from the non-defense commercial offering to solve DoD need(s) as well as how it can be scaled for wide adoption, i.e., modified for scale and broader signals. 3.Identifying the proposed solution's clear transition path considering input from affected stakeholders, including but not limited to, end users, engineering, sustainment, contracting, finance, legal, and cyber. Specifying the solution's integration with other current and potential future solutions.4.Describing the solution's sustainability, i.e., supportability. Identifying other specific DoD or Governmental customers for the solution. Phase II will culminate in a system demonstration using one or more compelling use case(s) consistent with commercial opportunities, DoD opportunities, and/or insertion into a DARPA program. The below schedule of milestones and deliverables is provided to establish expectations and desired results for the Phase II effort. Schedule/Milestones/Deliverables: Proposers will execute Research and Development (R&D) plan as described in their proposal. Proposers will also complete a commercialization plan that addresses relevant material costs and potential material/equipment suppliers. •Month 1: Phase II Kickoff briefing (with annotated slides) to the DARPA Program Manager (PM) (in person or virtual, as needed) including: any updates to the proposed plan and technical approach, risks/mitigations, schedule (inclusive of dependencies) with planned capability milestones and deliverables, proposed metrics, and plan for prototype demonstration/validation. •Months 3, 5, 7: Technical progress reports detailing technical progress made, tasks accomplished, major risks/mitigations, a technical plan for the remainder of Phase II (while this will normally report progress against the plan detailed in the proposal or presented at the Kickoff briefing, it is understood that scientific discoveries, competition, and regulatory changes may all have impacts on the planned work and DARPA must be made aware of any revisions that result), planned activities, trip summaries, and any potential issues or problem areas that require the attention of the DARPA PM. •Month 9: Interim technical progress briefing (live system demo with annotated slides) to the DARPA PM (in-person or virtual as needed) detailing progress made (include quantitative assessment of capability developed to date), tasks accomplished, major risks/mitigations, planned activities, and technical plan for the remainder of Phase II, the demonstration/verification plan for the end of Phase II, trip summaries, and any potential issues or problem areas that require the attention of the DARPA PM.•Month 12, 15, 18: Quarterly technical progress reports detailing technical progress made, tasks accomplished, major risks/mitigations, a technical plan for the remainder of Phase II (with necessary updates as in the parenthetical remark for Months 3, 5, and 7), planned activities, trip summaries, and any potential issues or problem areas that require the attention of the DARPA PM. •Month 21/Final Phase II Deliverables: Final architecture demonstration with documented details, demonstrating the establishment of an array using commodity hardware with sufficient timing and ranging capabilities; demonstrating beamforming to a designated receiver, documented application programming interfaces; any other necessary documentation (including, at a minimum, user manuals and a detailed system design document; and the end of phase commercialization plan). Proposers must demonstrate in their proposal the ability to apply for and obtain a Facility Clearance Letter (FCL) with secret safeguarding, or already possess an FCL with secret safeguarding by Phase III. Proposals must outline the proposer’s security plan for conducting prototyping, software development and testing of DoD applications at the collateral secret level by Phase III. All proposals must be unclassified, but proposers may submit classified annexes with prior approval of the DARPA Information Innovation Office Program Security Officer (I2O PSO); for instructions on classified annex submittals, contact I2Osecurity@DARPA.mil. Security Classification Guides governing potential classified Vibe applications may be provided to authorized U.S. contractor proposers upon request.PHASE III DUAL USE APPLICATIONS: Phase III work will be oriented towards transition and commercialization of the developed Vibe technologies. Phase III refers to work that derives from, extends, or completes an effort made under prior SBIR funding agreements, but is funded by sources other than the SBIR Program. Primary Vibe support will be to national efforts in both commercial and military applications for novel signal delivery and resilient communications. Such technology can be used for protecting transmitters, localizing specific receivers, and providing signal in non-traditional environments.REFERENCES:1.K. Alemdar, D. Varshey, S. Mohanti, U. Muncuk, K. Chowdhury, "RFClock: Timing, Phase and Frequency Synchronization for Distributed Wireless Networks,” ACM International Conference on Mobile Computing and Networking (MobiCom 2021), New Orleans, LA, USA, 2021.2.F. Quitin, M. M. U. Rahman, R. Mudumbai and U. Madhow, "A Scalable Architecture for Distributed Transmit Beamforming with Commodity Radios: Design and Proof of Concept," in IEEE Transactions on Wireless Communications, vol. 12, no. 3, pp. 1418-1428, March 2013, doi: 10.1109/TWC.2013.012513.121029.KEYWORDS: coherence, ranging, distributed coordination, beamforming

Synthetic User Personas (SUP)

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Integrated Sensing and CyberOBJECTIVE: The objective of Synthetic User Personas (SUP) is to generate labeled, synthetic cyber data suitable for enabling machine learning algorithms that support holistic cyber defenses.DESCRIPTION: Currently there is little to no labeled unified host and network data available to the cyber research community to facilitate the development and testing of machine learning algorithms for cyber defenses. Both network data, that captures network connections and packet flows, and host or endpoint data, that captures the use of applications and other activities on a machine, are necessary to build comprehensive cyber defenses. There are two categories of existing datasets. The first is anonymized data from networks with human users such as that provided by the Los Alamos National Laboratory [1]. The second is synthetic data generated and collected from a cyber exercise [2]. The data generated using each approach has significant problems that prevent its use in developing and testing machine learning algorithms. One strength of anonymized data is that none of the events are synthetic. The data represents the actual activity on the network from which it was collected. What anonymized data typically lacks, however, is any sense of ground truth. Anonymized data usually contains limited events, preventing more realistic enrichments and limiting the scope of detection algorithms that can be trained. Using anonymized data from a real network also raises the question of whether there was a malicious actor active when collecting the data, and as a result, there is malicious activity represented in the dataset. If there was a malicious actor, there is no reliable or practical way to identify the specific events that were produced by the actor’s activity. As a result, such datasets are not suitable for training machine learning algorithms. Further, elements of anonymized datasets may not be consistent amongst each other since there may be correlations in the actual collected data that are not recognized and preserved by the anonymization process. Alternatively, synthetic data can be easily and automatically annotated with ground truth (e.g., accurately identify and label benign and malicious events). However, to date, synthetic datasets lack the realism required to fully support development, training, and testing of machine learning algorithms. Synthetic datasets also typically contain unwanted artifacts that reduce or eliminate their value (e.g., artificial artifacts introduce biases when training machine learning algorithms). The existence of unified endpoint and network data is rare because of several issues. First, the anonymization of endpoint data and network data both present unique challenges. Notably, the limitless variations of potential endpoint data makes anonymizing it impossible for arbitrary use cases. Preserving correlations among data elements in both types of data is also incredibly challenging, and again impossible for generalized cases. Second, the collection of endpoint data for research purposes typically requires Institutional Review Board approval. Third, the configuration management of and policies governing the endpoints may prohibit the deployment of a collection agent. Finally, most commercial agents do not make collected endpoint telemetry available for local analysis, instead sending it for centralized (e.g., cloud) processing. SUP will implement synthetic agents designed to generate user activity without creating spurious network or host artifacts. SUP will not create a self-hosted agent that generates activity and filters out its own events from the event stream. Rather, SUP will passively and remotely interpret data (e.g., from a computer screen) to understand the machine state, and then interact with the machine using external input sources (e.g., keyboard and mouse), thus emulating human users. All of the generation activity is “off box” so that no generational artifacts contaminate the collected data. This is a key factor in ensuring that the collected data is free of any spurious artifacts that may incorrectly bias machine learning algorithms generated from the synthetic data. The “off box” synthetic agents implemented by SUP will be capable of scaling to at least five hundred (500) hosts within an enterprise test network. Additionally, SUP will provide for the ability to generate and record user activity and associated data without the addition of software on the subject hosts and without relying on remote logins to the subject hosts. Ideally, the lightweight “off box” synthetic agents will be built with a language that natively supports concurrency, enabling straightforward scaling well beyond the 500-host requirement. SUP will be able to respond correctly and continue proper operation after unexpected pop-ups and other operating system notifications occur. This will be implemented without reliance on timeouts or waiting periods to avoid unknown dialogs; and SUP will not make any assumptions as to when dialogs may or may not appear. SUP will continue to operate properly when the screen resolution changes unexpectedly (i.e., dependencies on image matching should work at any resolution without the need for code changes or a collection of images at every possible resolution). Within an enterprise environment, typically there are many different types of employees and departments that need to be protected, each of which may represent different types of user behavior, with communications closely matching organizational groups and software use differing as well. SUP will enable the emulation of multiple user profiles to provide a variety of realistic user behaviors across the environment. User modeling efforts may span multiple levels of complexity. For example, activities may be performed at random, quickly changing from web browsing tasks to e-mail. Alternatively, a specific workflow may be defined, providing scripts or playbooks from which to draw on actions. Finally, complex emergent behaviors may be built on models of real human behavior. Previous work has explored many approaches to user behavior modeling. Amirkhanyan et al. [3] looked at modeling user behavior using graphical methods called user behavior state graphs. Drawing on human factors research, Garg et al. [4] included features such as nervousness, typing speed, and mouse movement behaviors into user behavior patterns that could then be replicated in a testbed environment. Blythe et. al [5] explored using the Belief-Desire-Intention model for creating intelligent agents that were capable of using planning and reaction to achieve preset goals. These methods were demonstrated as part of the Deter Agents Simulating Human-Behavior module that is a part of DeterLab [6]. Additionally, the GHOSTS-SPECTRE project has also demonstrated use of machine learning methods to drive web browsing behavior in support of data generation while modeling changing user preferences [7]. Traditionally, user data generation has used an agent “on box.” The agent creates artifacts as a result of its activity and those artifacts must be filtered out if possible; otherwise, they may introduce biases into any learned algorithm. PHASE I: This topic is soliciting Direct to Phase II (DP2) proposals only. Phase I feasibility will be demonstrated through evidence of: a completed feasibility study or a basic prototype system; definition and characterization of properties desirable for both Department of Defense (DoD) and civilian use; and comparisons with alternative state-of-the-art methodologies (competing approaches). Proposers interested in submitting a DP2 proposal must provide documentation to substantiate that the scientific and technical merit and feasibility described above have been met and describe the potential commercial applications. DP2 documentation should include: •technical reports describing results and conclusions of existing work, particularly regarding the commercial opportunity or DoD insertion opportunity, and risks/mitigations, and assessments; •presentation materials and/or white papers;•technical papers;•test and measurement data;•prototype designs/models;•performance projections, goals, or results in different use cases; and,•documentation of related topics such as how the proposed SUP solution can enable more realistic cyber training. This collection of material will verify mastery of the required content for DP2 consideration. DP2 proposers must also demonstrate knowledge, skills, and ability in networking, computer science, mathematics, and software engineering. For detailed information on DP2 requirements and eligibility, please refer to the DoD BAA and the DARPA Instructions for this topic.PHASE II: The goal of SUP is to generate realistic synthetic data that is void of artifacts and capable of scaling. An average cyber operator should not be able to determine that the data is synthetic by looking at the generated data, even when the operator has knowledge of typical human activity that was modeled when generating the synthetic data. The operator’s view of user behavior is limited to the event activity of the user; the operator will not have visibility of the actual content created by the user. The SUP prototype should easily scale as a result of its architecture and implementation language. DP2 proposals should present systems that: •generate realistic synthetic data without artifacts such that an average operator cannot determine that the event data is synthetic; and •scale to at least five hundred (500) end user machines. •Phase II will culminate in a system demonstration using one or more compelling use cases consistent with commercial opportunities and/or insertion into a DARPA program. The below schedule of milestones and deliverables is provided to establish expectations and desired results/end products for the Phase II effort. Deliverables must include: •a software implementation of SUP for a virtualized test environment; and •an example dataset generated by SUP suitable for machine learning research. The Phase II Option period will further mature the technology for insertion into a larger DARPA Program, DoD/Intelligence Community (IC) Acquisition Program, another Federal agency; or commercialization into the private sector.Schedule/Milestones/Deliverables: Proposers will execute the research and development (R&D) plan as described in the proposal. •Month 1: Phase I Kickoff briefing (with annotated slides) to the DARPA Program Manager (PM) including: any updates to the proposed plan and technical approach, risks/mitigations, schedule (inclusive of dependencies) with planned capability milestones and deliverables, proposed metrics, and plan for prototype demonstration/validation. •Months 4, 7, 10: Quarterly technical progress reports detailing technical progress made, tasks accomplished, major risks/mitigations, a technical plan for the remainder of Phase II (while this will normally report progress against the plan detailed in the proposal or presented at the Kickoff briefing, it is understood that scientific discoveries, competition, and regulatory changes may all have impacts on the planned work and DARPA must be made aware of any revisions that result), planned activities, trip summaries, and any potential issues or problem areas that require the attention of the DARPA PM. •Month 12: Interim technical progress briefing (with annotated slides) to the DARPA PM detailing progress made (include quantitative assessment of capabilities developed to date), tasks accomplished, major risks/mitigations, planned activities, technical plan for the second half of Phase II, the demonstration/verification plan for the end of Phase II, trip summaries, and any potential issues or problem areas that require the attention of the DARPA PM.•Month 15, 18, 21: Quarterly technical progress reports detailing technical progress made, tasks accomplished, major risks/mitigations, a technical plan for the remainder of Phase II (with necessary updates as in the parenthetical remark for Months 4, 7, and 10), planned activities, trip summaries, and any potential issues or problem areas that require the attention of the DARPA PM. •Month 24 (Final Phase II Deliverables): Final technical progress briefing (with annotated slides) to the DARPA PM. Final architecture with documented details; a demonstration of the ability to generate artifact-free data at scale; documented application programming interfaces; and any other necessary documentation (including, at a minimum, user manuals and a detailed system design document; and the end-of-phase commercialization plan). Month 30 (Phase II Option period): Interim Option period technical progress briefing (with annotated slides) to the DARPA PM. Interim report of prototype performance against existing state-of-the-art technologies documenting key technical gaps towards productization.•Month 36 (Phase II Option period): Final Option period technical progress briefing (with annotated slides) to the DARPA PM. Final Phase II Option period report of prototype performance against existing state-of-the-art technologies, including quantitative metrics for scalability, assessments of realism, and costs, risks, and schedule for implementation of the full prototype capability into a government-chosen test facility.PHASE III DUAL USE APPLICATIONS: SUP has potential applicability across DoD, IC, U.S. Government (USG), and commercial entities. For DoD/IC/USG, SUP is extremely well-suited for large-scale cyber exercises, smaller-scale operator training, weapon system software testing, and automation of rote tasks. SUP has the same applicability as DoD/IC/USG for the commercial sector. The Phase III work will be oriented towards transition and commercialization of the developed SUP technologies. The proposer is required to obtain funding from either the private sector, a non-SBIR Government source, or both, to develop the prototype into a viable product or non-R&D service for sale in military or private sector markets. Phase III refers to work that derives from, extends, or completes an effort made under prior SBIR funding agreements, but is funded by sources other than the SBIR Program. Primary SUP support will be to national efforts to explore application of artificial intelligence (AI) to improve generation of realistic user events captured during cyber-security testing on synthetic ranges. AI technologies will provide the foundation for developing sophisticated user behavior models that can be used in cyber range exercises. In particular, it is important that these models are realistic and do not bias machine learning approaches because of predictable artifacts. Results of SUP are intended to improve the quality of cyber ranges used across academia, industry, and governmentREFERENCES:1.Los Alamos National Laboratory. “Advanced Research in Cyber Systems Data Sets.” Triad National Security, LLC for the U.S. Department of Energy's National Nuclear Security Administration, https://csr.lanl.gov/data/. July 5, 2022. 2.DARPA (2020) Operationally Transparent Cyber Data Release [Data Set]. Available at: https://github.com/FiveDirections/OpTC-data 3.Amirkhanyan, A., Sapegin, A., Gawron, M., Cheng, F., & Meinel, C. (2015, September). Simulation user behavior on a security testbed using user behavior states graph. In Proceedings of the 8th International Conference on Security of Information and Networks (pp. 217-223). Available at: https://www.researchgate.net/publication/279535149_Simulation_User_Behavior_on_A_Security_Testbed_Using_User_Behavior_States_Graph 4.Garg, A., Vidyaraman, S., Upadhyaya, S., & Kwiat, K. (2006, April). USim: a user behavior simulation framework for training and testing IDSes in GUI based systems. In 39th Annual Simulation Symposium (ANSS'06) (pp. 8-pp). IEEE. Available at: https://cse.buffalo.edu/~shambhu/documents/pdf/USim.pdf 5.Blythe, J., Botello, A., Sutton, J., Mazzocco, D., Lin, J., Spraragen, M., & Zyda, M. (2011, August). Testing cyber security with simulated humans. In Twenty-Third IAAI Conference. Available at: https://www.researchgate.net/publication/221016543_Testing_Cyber_Security_with_Simulated_Humans6.University of Southern California Information Sciences Institute (USC-ISI). “The cyber DEfense Technology Experimental Research (DETER) Lab Capabilities.” The DETER Project, USC-ISI, https://deter-project.org/deterlab_capabilities#dash. July 5, 2022. 7.Carnegie Mellon University Software Engineering Institute (2020) GHOSTS-SPECTRE [Source Code] Available at: https://github.com/cmu-sei/GHOSTS-SPECTREKEYWORDS: Machine Learning, Cyber, Artificial Intelligence, Automation, Data, Analytics

Space Metamaterial Electronically Scanned Array (Space-MESA)

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Space TechnologyThe technology within this topic is restricted under the International Traffic in Arms Regulation (ITAR), 22 CFR Parts 120-130, which controls the export and import of defense-related material and services, including export of sensitive technical data, or the Export Administration Regulation (EAR), 15 CFR Parts 730-774, which controls dual use items. Offerors must disclose any proposed use of foreign nationals (FNs), their country(ies) of origin, the type of visa or work permit possessed, and the statement of work (SOW) tasks intended for accomplishment by the FN(s) in accordance with the Announcement. Offerors are advised foreign nationals proposed to perform on this topic may be restricted due to the technical data under US Export Control Laws.OBJECTIVE: Develop a proof of concept metamaterial antenna specifically designed to provide space-based detection, tracking, and imaging of moving targets. The prototype should include fabrication of a metasurface aperture (sub tile) that can support wide angle, high-speed beamsteering, as well as any testing capabilities needed for capturing full antenna patterns from the prototype.DESCRIPTION: Providing persistent, global, space-based detection, tracking, and imaging requires high-capacity and low-cost sensors. This cost is most acutely felt in the new low-cost “proliferated” space domain where space vehicle costs have been plummeting. The most suitable type of sensor for performance is a synthetic aperture radar (SAR) due to its ability to provide fast, wide field of regard to detect, track, and image multiple moving objects of interest regardless of weather. However, SARs are not cost effective to deploy aboard spacecraft in the numbers necessary to provide a persistent, global capability. Another option could be lower-cost fixed mesh-reflectors or planar arrays as they are capable of generating adequate antenna gain, but they lack the ability to electronically steer a beam, and can only image one or two targets per pass. Due to the lack of capability offered by fixed-beam systems and the prohibitive cost of using traditional SAR-equipped satellites for global coverage, DARPA is looking for cost-effective, fully-steerable track-while-scan radars that can be deployed in low earth orbit (LEO). To provide the cost-effective capability DARPA is looking for, metamaterial electronically scanned array (MESA) radars are of particular interest due to their ability to offer similar performance to traditional Active Electronically Scanned Arrays (AESAs), but at an order of magnitude less cost due to their simpler design. While MESAs technology has been developed for both ground and air applications, it has not yet been developed for deployment to and usage in space environments. To detect and track objects over large areas (100s of square kilometers), the MESA would need to be constructed of coherent, digital tiles. A super-array of digital tiles though would require new means to solve coherence and calibration challenges, while also burdened with the extreme temperature variations and high orbital velocities experienced in a space environment. In this effort, proposers will design and develop an operational electronically-steerable metamaterial antenna sub tile prototype, as well as:•Design and develop a near-field probe antenna test system to capture full antenna patters out of the antenna prototype•Document manufacturing development steps necessary for the metamaterial antenna•Develop all hardware and software to control drive electronics of active components of sub-tile to electronically steer a beam.PHASE I: This topic is soliciting Direct to Phase II (DP2) proposals only. Previous Phase 1 qualified efforts should have demonstrated that they can design and produce an electronically steerable antenna capable of achieving the metrics listed below. Results should be supported by prior demonstration or laboratory testing. •Steerable to ± 60° in azimuth and elevation with sub 1° steps•Ability to survive high peak radiofrequency powers from 800W to 1200W for apertures 1m2 and greater Efficiency data of 40% or greater at broadside•Peak sidelobe levels of 15dB or greater at broadside•Ability to steer large apertures (150?? Lambda or greater) in 10us or lessPHASE II: The Phase II effort consists of a Phase II base of 12 months and a Phase II option of 12 months. Phase II fixed payable milestones for this program should include: •Month 2: Initial report on architecture and program plan •Month 6: Interim report on system trade study and architecture, antenna design, and system requirements •Month 12: Phase II report documenting status of X-band antenna design and development, antenna test platform, antenna manufacturing process development, and hardware/software to control drive electronics progress•Month 18: Interim report documenting X-band antenna design and fabrication, antenna test platform design, antenna manufacturing results, and hardware/software to control drive electronics progress •Month 24: Final Phase II report documenting X-band antenna design and test results, antenna test platform design and specifications, antenna manufacturing process, and verification results of hardware and software to control drive electronicsPHASE III DUAL USE APPLICATIONS: Metasurface Electronically Scanned Array (MESA) radars are currently high technology readiness level and in full-rate production, providing high-performance at low cost for both air and ground usage, for military and commercial applications. Further developing this metamaterial antenna technology to be operable in space while providing the performance needed for wide-area moving target indication would attract significant interest from space-focused agencies within the Department of Defense, and potentially commercial partners as well.REFERENCES:1.https://en.wikipedia.org/wiki/Active_electronically_scanned_array 2.https://en.wikipedia.org/wiki/Metamaterial_antenna 3.https://www.microwavejournal.com/articles/27373-metamaterial-advances-for-radar-and-communicationsKEYWORDS: Metamaterials, Synthetic Aperture Radar, Electronical Scanned Arrays

Super-resolution Thermal Metrology for High Power Density Devices

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Microelectronics OBJECTIVE: This topic seeks to develop a super-resolution thermal metrology tool to enable accurate characterization of semiconductor materials and devices, and wide bandgap and ultra-wide bandgap materials and devices, in particular, at nanometer length scale.DESCRIPTION: Radar and communication systems are ubiquitous in both military and commercial applications. In these platforms, system performance can be improved by increasing the radio frequency (RF) output power of the transmitter power amplifier (PA), which is directly proportional to the output power density of the PA transistor. However, the operating output power densities achieved in today’s wide bandgap transistors are thermally limited to values substantially below theoretical electronic limits. The government has an interest in developing technologies to overcome these thermal limitations and realize robust, high-power density transistors that operate near their fundamental electronic limit of RF output power, with a focus on achieving high power density through reduction in transistor thermal resistance [1]. Success requires metrology that can accurately measure thermal resistance and interfacial thermal resistance of a variety of material and device structures. Furthermore, these measurements are required to verify that performer high-power transistors meet program metrics. Existing thermal metrology tools often use pump-probe laser-based techniques, such as time-domain thermoreflectance (TDTR), frequency-domain thermoreflectance (FDTR), and recent variants such as steady state thermoreflectance (SSTR)[2] . While these techniques are useful for the measurement of thermal resistance in thin films and interfaces, they are are limited in spatial resolution [2,3], and cannot measure thermal resistance and thermal resistance gradients in submicron devices. The ability to measure thermal resistance beyond the surface film (i.e., in the buried channel layer of a heterojunction device) and also characterize at both nanoscale and microscale dimensions, is critical to the development of high power density devices. The purpose of this direct to Phase II (DP2) SBIR topic is to develop a super-resolution thermal metrology tool that enables accurate characterization of the thermal resistance of semiconductor materials, heterostructures and devices, particularly wide bandgap and ultra-wide bandgap materials and devices at nanometer length scale. The tool must be capable of measuring both epilayers and operating devices with a thermal resolution less than 0.25 oC, thermal precision of 1 oC, spatial resolution below 50 nm, accuracy above 90%, and reproducibility and repeatability less than 2%. Specific measurement capabilities include thermal resistance, thermal boundary resistance of interfaces, and temperature of an operating device and, in particular, buried channel layers. The device-scale measurements must characterize both the surface and cross-section of a multi-finger, submicron GaN high-electron-mobility transistor (HEMT) and an ultra-wide bandgap AlGaN HEMT. In addition, a comprehensive validation plan should be provided. For example, the plan should include device-relevant material structures, such as GaN transistor layers, that are compared to other thermal measurement techniques for verification of results. The plan may also incorporate National Institute of Standards and Technology (NIST) standards. The final Phase II base deliverable will be a laboratory demonstration of the thermal metrology tool, along with a plan for construction of tool and delivery to a U.S. government organization. The Phase II option of this topic will address the development of this thermal metrology tool into an automated, turnkey system that will be delivered to a U.S. government laboratory. The deliverables of the Phase II option will include both the tool, calibration standards, and any necessary software for demonstrating material and device thermal characterization. Finally, on-site support will be required to ensure proper installation and operation at the U.S. government organization.PHASE I: This topic is soliciting Direct to Phase II (DP2) proposals only. This DP2 SBIR requires documentation of existing thermal metrology capabilities and a proposed plan with supporting analysis showing that achieving 50 nm spatial resolution with high precision and accuracy is feasible. The documentation must include measured data, including thermal resistance, from existing thermal metrology techniques demonstrating less than 2 µm spatial resolution and the ability to resolve interfaces beyond the surface film. In addition, validation data from the existing thermal metrology tool should be provided.PHASE II: The proposed plan must describe the path towards a successful final DP2 SBIR deliverable which meets the requirements listed below. This DP2 SBIR will have an 18-month duration in which the super-resolution thermal metrology tool will be designed, developed, validated, and tested for performance goals. The requirements of the thermal metrology tool are: 1.Capable of measuring thermal resistance, thermal boundary resistance, and temperature of operating multi-finger, submicron GaN HEMT and ultra-wide bandgap AlGaN HEMT with the following specifications: a.Spatial resolution < 50 nm b.Thermal resolution < 0.25 oC c.Thermal precision: 1 oC d.Accuracy > 90% e.Reproducibility and repeatability < 2% 2.Tool validation using a comparison of measured results of device relevant structures to other thermal metrology techniques. In addition, validation may use available NIST standards. Phase II (base) fixed milestones include: •Month 1: Detailed report on super-resolution thermal metrology tool design, including documentation of path towards achieving in-situ device testing and meeting DP2 SBIR goals. •Month 3: Report on progress towards final design and demonstration of thermal metrology tool. •Month 6: Report on progress towards final design and demonstration of thermal metrology tool. •Month 9: Report on progress towards final design and demonstration of thermal metrology tool. •Month 12: Initial prototype demonstration of super-resolution thermal metrology tool. Detailed report should include validation data as well as thermal resistance, temperature, and thermal resolution of the surface and cross-section of GaN and AlGaN transistors with less than 100 nm spatial resolution. Documentation should also describe the path towards the final DF2 SBIR deliverable. •Month 15: Detailed report on progress towards final design and demonstration of the thermal metrology tool, including validation data and transistor thermal characterization. •Month 18: Final demonstration of a prototype thermal metrology tool that meets requirements listed above. Detailed data report containing final validation measurements and thermal characterization of surface and cross-section of GaN and AlGaN transistors with less than 50 nm spatial resolution. Plan for construction of tool and delivery to a U.S. government organization. Phase II (option) This DP2 SBIR will have a 6-month option in which the super-resolution thermal metrology tool demonstrated in Phase II will be developed into a turn-key, push-button, automated system. A Phase II option final report will detail the successful demonstration of a fully-automated measurement of the thermal resistance, thermal boundary resistance, temperature, and thermal resolution of an operating multi-finger, submicron GaN HEMT and ultra-wide bandgap AlGaN HEMT. The DP2 option will also include: 1.Delivery of prototype automated, turnkey thermal metrology tool to a designated U.S. government organization. 2.Support for installation and operation at the U.S. government laboratory. 3.Demonstration of thermal characterization of GaN HEMT and ultra-wide bandgap AlGaN HEMT on-site at the U.S. government organization. Phase II (option) fixed milestones include: •Month 1: Detailed report on automated, push-button thermal metrology tool design and path toward achieving DP2 Option goals. Coordinate with the designated U.S. government organization to provide a preliminary plan for delivery and installation. •Month 3: Report on thermal metrology tool development progress. •Month 6: Delivery of final prototype thermal metrology tool, including calibration standards and any necessary software for demonstrating material and device thermal characterization. Detailed report containing final validation measurements and thermal characterization of surface and cross-section of GaN and AlGaN transistors with less than 50 nm spatial resolution.PHASE III DUAL USE APPLICATIONS: This SBIR will enable a commercially available, automated thermal metrology tool for use by academia, semiconductor foundries (commercial and defense), and material vendors. Specifically, this technology will provide high resolution thermal metrology so that transistor developers can accurately characterize the thermal resistance and temperature of a wide variety of films, material structures, devices, and packages. This thermal characterization data can be incorporated into device modeling and design, enabling devices with higher power density and improved robustness for a wide range of defense and commercial radar and communication applications.REFERENCES:[1] DARPA Broad Agency Announcement, Technologies for Heat Removal in Electronics at the Device Scale (THREADS), Microsystems Technology Office, HR001123S0013, November 18, 2022. [2] Olson, David, et al., "Spatially resolved thermoreflectance techniques for thermal conductivity measurements from the nanoscale to the mesoscale", Journal of Applied Physics 126, 2019. [3] Yuan, Chao, et al., “A review of thermoreflectance techniques for characterizing wide bandgap semiconductors’ thermal properties and devices’ temperatures,” Journal of Applied Physics 132, 2022.KEYWORDS: Microelectronics, thermal metrology, thermoreflectance, thermal resistance, temperature, transistor, wide bandgap, ultra-wide bandgap

Wearables at the Edge to Augment Readiness (WEAR)

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Advanced Materials, MicroelectronicsOBJECTIVE: The objective of the Wearables at the Edge to Augment Readiness (WEAR) SBIR topic is to develop a secure and lightweight framework for real-time analysis of sensory data from wearables to monitor warfighter health and readiness at the edge.DESCRIPTION: Wearable technology is now fundamental to all areas of the human ecosystem. The term wearable technology refers to small electronic and mobile devices, or computers with wireless communications capability that are incorporated into gadgets, accessories, or clothes, which can be worn on the human body [1]; for the purposes of this SBIR topic, it does not apply to invasive versions such as micro-chips or smart tattoos. Wearable technology can provide invaluable physiological and environmental data that can potentially be used to assess a warfighters’ physical/mental wellness and readiness. Modern edge devices, like smartphones and smart watches, are equipped with an ever-increasing set of sensors, such as accelerometers, magnetometers, gyroscopes, etc., that can continuously record users’ movements and motion [2]. The observed patterns can be an effective tool for seamless Human Activity Recognition which is the process of identifying and labeling human activities by applying Artificial Intelligence (AI)/Machine Learning (ML) to sensor data generated by smart devices both in isolation and in combination [3, 4]. However, smartphone and wearable sensor signals are typically noisy and can lack context/causality due to inaccurate timestamps when the device sleeps, goes into low-power mode, or experiences high resource utilization. Thus, it can be challenging to fuse any of the various raw sensor data to achieve positive or negative assessment in wellness areas such as personal healthcare, injuries, fall detection, as well as monitoring functional/behavioral health. For instance, sensor data can be processed into feature data related to sleep or different physical activities that potentially correlate to effects on an individual’s health [5, 6]. The objective of WEAR is to develop a secure and lightweight framework for real-time analysis of sensory data from wearables to monitor warfighter health and readiness at the edge. Importantly, WEAR will achieve this goal while consuming less than 5% of the wearable battery over 10 days, assuming an initial full battery charge. The battery consumption metric is of particular interest to WEAR as warfighters at the edge (e.g., expeditionary forces deployed to remote locations or Special Operations Forces units) may not be able to recharge wearable batteries due to mission constraints limiting access to power sources for re-charging. Equally important is the need for all processing to occur at the edge because of security concerns [8]. Existing commercial efforts require cloud and off-premises server resources to analyze sensor data.PHASE I: This topic is soliciting Direct to Phase 2 (DP2) proposals only. Phase I feasibility will be demonstrated through evidence of: a completed proof of concept/principal or basic prototype system; definition and characterization of framework properties/technology capabilities desirable for both Department of Defense (DoD)/government and civilian/commercial use; and capability/performance comparisons with existing state-of-the-art technologies/methodologies (competing approaches). Entities interested in submitting a DP2 proposal must provide documentation to substantiate that the scientific/technical merit and feasibility described above has been achieved and also describe the potential commercial applications. DP2 Phase I feasibility documentation should include: •technical reports describing results and conclusions of existing work, particularly regarding the commercial opportunity or DoD insertion opportunity, risks/mitigations, and technology assessments; •presentation materials and/or white papers; •technical papers; •test and measurement data; •prototype designs/models; •performance projections, goals, or results in different use cases; and, •documentation of related topics such as how the proposed WEAR solution can enable accurate and reliable analysis of sensory data at the edge. This collection of material will verify mastery of the required content for DP2 consideration. DP2 proposers must also demonstrate knowledge, skills, and abilities in AI/ML, data analytics, edge technologies, software development/engineering, and mobile security/privacy. For detailed information on DP2 requirements and eligibility, please refer to the DoD Broad Agency Announcement and the DARPA Instructions for this topic.PHASE II: The Personal Health Determinations (WEAR) SBIR topic seeks to develop a secure and lightweight framework that can perform real-time analysis of sensory data from wearables to monitor warfighter operational health and readiness at the edge, while consuming less than 5% of the wearable battery over 10 days, assuming an initial full battery charge (i.e., WEAR component overhead can be no more than 5% of the wearable battery over 10 days). One potential direction to achieve this goal is to leverage advances in low-power sensing at the chipset level present in modern mobile and wearable devices, including but not limited to “always-on sensing.” The primary interest is in commercial-off-the-shelf hardware paired with novel sensor drivers and algorithms developed to operate at low power. A secondary objective is to offer modular application programming interfaces (APIs) to access sensor data and edge ML models/algorithms that can fit into the resource-constrained environments of commercial wearables. The end goal is the capability to monitor and accurately assess warfighter operational health and readiness by using the sensory information on the edge devices without transporting information outside of the wearable or smartphone devices. Any custom hardware or sensors are out of scope for this solicitation. DP2 proposals should: •describe a proposed framework design/architecture to achieve the above stated goals; •present a plan for maturation of the framework to a demonstrable prototype system; and •detail a test plan, complete with proposed metrics and scope, for verification and validation of the prototype system performance. Phase II will culminate in a prototype system demonstration using one or more compelling use cases consistent with commercial opportunities and/or insertion into a DARPA program (e.g., Warfighter Analytics using Smartphones for Health (WASH [7]), which seeks to use data collected from cellphone sensors to enable novel algorithms that conduct passive, continuous, real-time assessment of the warfighter). The Phase II Option period will further mature the technology for insertion into a DoD/Intelligence Community (IC) Acquisition Program, another Federal agency; or commercialization into the private sector. The below schedule of milestones and deliverables is provided to establish expectations and desired results/end products for the Phase II and Phase II Option period efforts. Schedule/Milestones/Deliverables: Proposers will execute the research and development (R&D) plan as described in the proposal, including the below: •Month 1: Phase I Kickoff briefing (with annotated slides) to the DARPA Program Manager (PM) including: any updates to the proposed plan and technical approach, risks/mitigations, schedule (inclusive of dependencies) with planned capability milestones and deliverables, proposed metrics, and plan for prototype demonstration/validation. •Months 4, 7, 10: Quarterly technical progress reports detailing technical progress to date, tasks accomplished, risks/mitigations, a technical plan for the remainder of Phase II (while this would normally report progress against the plan detailed in the proposal or presented at the Kickoff briefing, it is understood that scientific discoveries, competition, and regulatory changes may all have impacts on the planned work and DARPA must be made aware of any revisions that result), planned activities, trip summaries, and any potential issues or problem areas that require the attention of the DARPA PM. •Month 12: Interim technical progress briefing (with annotated slides) to the DARPA PM detailing progress made (including quantitative assessment of capabilities developed to date), tasks accomplished, risks/mitigations, planned activities, technical plan for the second half of Phase II, the demonstration/verification plan for the end of Phase II, trip summaries, and any potential issues or problem areas that require the attention of the DARPA PM. •Month 15, 18, 21: Quarterly technical progress reports detailing technical progress made, tasks accomplished, risks/mitigations, a technical plan for the remainder of Phase II (with necessary updates as in the parenthetical remark for Months 4, 7, and 10), planned activities, trip summaries, and any potential issues or problem areas that require the attention of the DARPA PM. •Month 24: Final technical progress briefing (with annotated slides) to the DARPA PM. Final architecture with documented details; a demonstration of the ability to perform real-time analysis of sensory data at the edge while consuming less than 5% of the wearable battery over 10 days; documented APIs; and any other necessary documentation (including, at a minimum, user manuals and a detailed system design document; and the commercialization plan). •Month 30 (Phase II Option period): Interim report of matured prototype performance against existing state-of-the-art technologies, documenting key technical gaps towards productization. •Month 36 (Phase II Option period): Final Phase II Option period technical progress briefing (with annotated slides) to the DARPA PM including prototype performance against existing state-of-the-art technologies, including quantitative metrics for battery consumption and assessment of monitoring/assessment capabilities to support determinations of warfighter health status.PHASE III DUAL USE APPLICATIONS: Phase III Dual use applications (Commercial DoD/Military): WEAR has potential applicability across DoD and commercial entities. For DoD, WEAR is extremely well-suited for continuous, low-cost, opportunistic monitoring of warfighter health in the field, where specialized equipment and medical experts are not necessarily available. WEAR has the same applicability for the commercial sector and has the potential to provide doctors and physicians with invaluable historical patient health data that can be correlated to their activities, environment, and physiological responses. Phase III refers to work that derives from, extends, or completes an effort made under prior SBIR funding agreements, but is funded by sources other than the SBIR Program. The Phase III work will be oriented towards transition and commercialization of the developed WEAR technologies. The proposer is required to obtain funding from either the private sector, a non-SBIR Government source, or both, to develop the prototype into a viable product or non-R&D service for sale in military or private sector markets. Primary WEAR support will be to national efforts to explore the ability to collect and fuse sensor data and apply ML algorithms at the edge to that data in a manner that does not drain device battery. Results of WEAR are intended to improve healthcare monitoring and assessment at the edge, across government and industry.REFERENCES:[1] Aleksandr Ometov, Viktoriia Shubina, Lucie Klus, Justyna Skibinska, Salwa Saafi, Pavel Pascacio, Laura Flueratoru, Darwin Quezada Gaibor, Nadezhda Chukhno, Olga Chukhno, Asad Ali, Asma Channa, Ekaterina Svertoka, Waleed Bin Qaim, Raúl Casanova-Marqués, Sylvia Holcer, Joaquín Torres-Sospedra, Sven Casteleyn, Giuseppe Ruggeri, Giuseppe Araniti, Radim Burget, Jiri Hosek, Elena Simona Lohan, A Survey on Wearable Technology: History, State-of-the-Art and Current Challenges, Computer Networks, Volume 193, 2021, 108074, ISSN 1389-1286, https://doi.org/10.1016/j.comnet.2021.108074. (Available at https://www.sciencedirect.com/science/article/pii/S1389128621001651) [2] Paula Delgado-Santos, Giuseppe Stragapede, Ruben Tolosana, Richard Guest, Farzin Deravi, and Ruben Vera-Rodriguez. 2022. A Survey of Privacy Vulnerabilities of Mobile Device Sensors. ACM Comput. Surv. 54, 11s, Article 224 (January 2022), 30 pages. https://doi.org/10.1145/3510579. (Available at https://dl.acm.org/doi/pdf/10.1145/3510579) [3] Straczkiewicz, M., James, P. & Onnela, JP. A systematic review of smartphone-based human activity recognition methods for health research. npj Digit. Med. 4, 148 (2021). https://doi.org/10.1038/s41746-021-00514-4. (Available at https://www.nature.com/articles/s41746-021-00514-4) [4] E. Ramanujam, T. Perumal and S. Padmavathi, "Human Activity Recognition With Smartphone and Wearable Sensors Using Deep Learning Techniques: A Review," in IEEE Sensors Journal, vol. 21, no. 12, pp. 13029-13040, 15 June15, 2021, doi: 10.1109/JSEN.2021.3069927. (Available at https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9389739) [5] Jun-Ki Min, Afsaneh Doryab, Jason Wiese, Shahriyar Amini, John Zimmerman, and Jason I. Hong. 2014. Toss 'n' turn: smartphone as sleep and sleep quality detector. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '14). Association for Computing Machinery, New York, NY, USA, 477–486. https://doi.org/10.1145/2556288.2557220 (Available at https://dl.acm.org/doi/pdf/10.1145/2556288.2557220) [6] Sardar, A. W., Ullah, F., Bacha, J., Khan, J., Ali, F., & Lee, S. (2022). Mobile sensors based platform of Human Physical Activities Recognition for COVID-19 spread minimization. Computers in biology and medicine, 146, 105662. https://doi.org/10.1016/j.compbiomed.2022.105662. (Available at https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9137241/pdf/main.pdf) [7] Defense Advanced Research Projects Agency. (2017, May 8). Warfighter Analytics using Smartphones for Health (WASH) Broad Agency Announcement HR001117S0032. (Available at https://cpb-us-w2.wpmucdn.com/wp.wpi.edu/dist/d/274/files/2017/05/DODBAA-SMARTPHONES.pdf) [8] Fitness tracking app Strava gives away location of secret US army bases. https://www.theguardian.com/world/2018/jan/28/fitness-tracking-app-gives-away-location-of-secret-us-army-basesKEYWORDS: Wearable Technology, Health Monitoring, Health Assessment, Data Analytics, Edge Technology, Activity Recognition, Machine Learning

Exploiting Sparsity in Python (ESPy)

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Advanced Computing and SoftwareOBJECTIVE: Extend the scientific Python programming ecosystem to incorporate a rich set of matrix and tensor operations supported by a compilation system capable of automatic efficient code generation for execution on a range of run-time hardware architectures, including hardware with features that optimize or accelerate operations on sparse data.DESCRIPTION: Of the nearly 44 zettabytes of data humans have gathered to date, most of it is collected, processed and stored as multi-dimensional arrays or tensors. From the earliest computer and the first FORTRAN compiler, we have perfected how to store and compute dense tensor data. However, a large portion of the data, either obtained from nature or generated by humans, is sparse. The Python programming environment is increasingly the tool of choice for scientific processing, but it has poor support for sparsity; current practice is to ignore the sparsity and treat the data as dense, incurring unnecessary overhead, or to transform the data into unnatural dense formats, making the programs much more complicated. Capitalizing on sparsity can greatly increase the efficiency of scientific computations, but the challenge is that there are a large number of sparse data formats, each of which takes advantage of particular features of the data; the algorithms that operate on these different data formats are then specialized to exploit the advantages of the specific data formats. An additional challenge is that there are a variety of hardware accelerators for matrix and tensor computations, ranging from features in conventional CPUs and GPUs to new hardware capabilities that have been developed to accelerate computations on sparse data. Dealing with this complexity is a challenge that is not within the reach of most programmers. The objective of this effort is to make the processing of sparse data as accessible and efficient as working with dense data. Specifically, to make the Python APIs for array processing (in NumPy, SciPy, PyTorch, and scikit-learn used by 10s of millions of people) work seamlessly with sparse data. ESPy will build on the current Python scientific library approach (e.g. NumPy and SciPy), to minimize source code changes and encourage community take-up, and add sparsity awareness and the ability to target multiple hardware architectures, including at least one architecture with features aimed at accelerating computation on sparse data. A framework or domain-specific language approach can be used to encapsulate the Python application, or the Python environment can be extended with an array/tensor algebra compiler; the selected approach should require minimal source-code changes. A compilation intermediate representation should be devised or adapted that incorporates sparse semantics, such as degree of sparsity and data formatting, and that can be efficiently targeted at multiple run-time hardware architectures. Data formatting transformations should be minimized.PHASE I: This topic is soliciting Direct to Phase II (DP2) proposals only. Selected performers will have an established and documented background and experience with most or all of the following: the design and implementation of Python-based libraries, frameworks, domain-specific-languages, compilers, compilation intermediate representations, code generation and optimization, and a range of target computer architectures including CPUs, GPUs, and hardware accelerators. Performers should also be able to document familiarity with sparse and dense tensor algebra, including comprehensive coverage of the many sparse and dense data structures and formats.PHASE II: The goal of ESPy is to establish an efficient and easy-to-use sparse tensor algebra capability in the Python scientific ecosystem. The facility can be based on a library approach, or use a domain-specific language or a framework to facilitate the capability, as long as there are minimal code changes for the Python programmer. There are a multitude of sparse object data structures and formats, and ESPy should support as many of these as possible, and be capable of extension to additional sparse data formats as needed or required. ESPy should also support multiple target architectures including at least one architecture implementation with features that can be exploited to accelerate sparse vector or matrix processing. ESPy’s support of tensor algebra shall be more than just addition and multiplication by providing a rich set of operators and functions, such as convolutions and semi-rings. Expected Phase II metrics: •At least 100X faster performance on a sparse array- and tensor-processing benchmark vs generic Python processing using scientific libraries with <5% lines of code changed •Benchmark composition to be proposed and implemented by the proposer with DARPA’s agreement •Two or more target hardware architectures in Phase II (base) •Three or more target architectures, including at least one with hardware support for sparse data processing, in Phase II (option) Schedule/Milestones/Deliverables •Month 1: Kick-Off meeting; technical approach report that outlines the Python user interface (library/framework/DSL), intermediate representation, and target architecture code generation strategy; proposed tensor-processing benchmark review •Month 3: PI meeting with PowerPoint presentations of accomplishments since the previous review and plans for the next period •Month 6: PI meeting with PowerPoint presentations of accomplishments since the previous review and plans for the next period; demonstrations of work so far •Month 9: PI review, including final design review, demonstration plans, and projected metrics achievements •Month 12: Final PI review and final report, including quantitative metrics regarding performance and usability (percentage code changes need); demonstrate support for multiple sparse data formats; demonstrate support for multiple target architectures; proposal for Phase II option including additional target architecture and demonstration application (based on transition party requirements); the final report shall also document any scientific advances that have been achieved under the program (A brief statement of claims supplemented by publication material will meet this requirement); delivery of software executables, source code (if applicable), and documentation (publishing as open source is acceptable as delivery) Phase II Option Phase II option activities should include the addition of a target architecture and a real-world demonstration in collaboration with a transition partner. Schedule/Milestones/Deliverables •Month 1: Kick-Off meeting; technical approach report outlining demonstration application based on transition partner requirements and additional target architecture(s) •Month 3: PI meeting with PowerPoint presentations of accomplishments since the previous review and plans for the next period •Month 6: PI meeting with PowerPoint presentations of accomplishments since the previous review and plans for the next period; demonstrations of work so far •Month 9: PI review, including final design review, demonstration plans, and projected metrics •Month 12: Final review/report including demonstration with transition partner and demonstration of additional target architecture; delivery of software executables, source code (if applicable), and documentation (publishing as open source is acceptable as delivery)PHASE III DUAL USE APPLICATIONS: Sparse arrays are used extensively in commercial, scientific, and DoD/Military applications, such as social media, financial transactions, network traffic analysis, partial differential equations, optimizations, and Machine Learning applications. A likely pathway forward for the developers is to publish the software as open-source, thereby encouraging uptake and recruiting additional developers, and then to offer support and consulting services based on intimate understanding of the ESPy design and implementation.REFERENCES:[1] Shail Dave et al, Hardware Acceleration of Sparse and Irregular Tensor Computations of ML Models: A Survey and Insights, https://ieeexplore.ieee.org/document/9507542. [2] Jie-Fang Zhang et al, SNAP: An Efficient Sparse Neural Acceleration Processor for Unstructured Sparse Deep Neural Network Inference, https://web.eecs.umich.edu/~zhengya/papers/zhang_jssc21.pdf. [3] Shaohuai Shi, Qiang Wang, Xiaowen Chu, Efficient Sparse-Dense Matrix-Matrix Multiplication on GPUs Using the Customized Sparse Storage Format, arxiv.org. [4] Kartik Hegde et al, ExTensor: An Accelerator for Sparse Tensor Algebra, csail.mit. [5] R. Henry et al, Compilation of Sparse Array Programming Models, DSpace@MIT. [6] https://sparse.pydata.org/en/stable/ - implementation of sparse arrays of arbitrary dimension on top of numpy and scipy.sparse. [7] http://tensor-compiler.org/ - a fast and versatile compiler-based library for sparse linear and tensor algebra.KEYWORDS: Sparse; Dense; Python; Array; Matrix; Tensor

Safe Food for Everyone (SaFE) - SBIR XL

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Weapons, Information SystemsOBJECTIVE: The goal of SaFE is to develop practical; low-cost; small size, weight, and power; non-isotopic sources for food irradiation and other applications requiring pathogen sterilization, supporting ubiquitous treatment at points of production and points of distribution, particularly in austere or compromised environments (e.g., expeditionary operations, humanitarian relief, or disaster response).DESCRIPTION: This SBIR XL topic will focus on the development of compact, low-cost, high efficiency, and economically viable electron accelerator systems. The topic is composed of two linked subtopics: Subtopic 1 will develop accelerator technology, and Subtopic 2 will focus on distributed system designs and pilot demonstrations. Accelerators developed as part of the first subtopic will be capable of generating continuous, high current electron beams at 2 to 10 MeV energies using 10 kW electric sources. 10 kW generators are commonly used in deployed support operations such as those found in containerized kitchens. Specifically, this subtopic will explore recent innovations resulting in accelerator designs that can be produced for tens of thousands of dollars compared to millions of dollars for traditional high power accelerators such as Rhodotrons and S-band LINACs, while being suitable for new distributed system architectures. High-gradient direct current (DC) accelerator structures, novel voltage multiplier designs, and new innovations in dielectric materials may provide viable technical approaches. Further, new solid state amplifiers could provide a potential path for radiofrequency (RF) approaches. Such configurations could present the highest potential for compact, low-cost, high wall-plug efficiency accelerator designs. The second subtopic, system studies, will initially focus on two use cases: (1) a single 10 kW system for deployed or austere environments and (2) multiple distributed 10 kW systems for point of packaging applications. Subtopic 2 performers will conduct detailed economic analysis including capital costs and operations and maintenance costs. The analysis will define minimum viable product and systems characteristics that can be economically produced and address the maximum number of applications for wide-spread use while still achieving treatment and throughput requirements. Further, practical issues such as radiation shielding, automation, and regulatory concerns will be addressed. These analyses will be informed by strong food industry, U.S. Army Natick Soldier Center, Food and Drug Administration (FDA), and U.S. Department of Agriculture (USDA) engagements. Systems work will culminate in a proof-of-concept pilot demonstration of the specific subtopic accelerator technology. Such a demonstration aims to establish broader adoption of food irradiation and enhance food safety and security for both deployed and domestic applications. In addition, secondary applications such as sterilization and remediation will be examined.It is envisioned that between the two subtopics, technical, economic, and regulatory hurdles currently hindering food irradiation adoption will be fully addressed. This, in turn, will jumpstart commercial activity in this sector leading to viable products, new industrial development, and overall greater food safety and security.PHASE I: This topic is soliciting Direct to Phase II (DP2) proposals only. There is no Phase I; however, proposers must provide evidence of approach feasibility with results at a level commensurate with the conclusion of a Phase I effort. Examples of such evidence are included below for each subtopic. Proposers to Subtopic 1 are required to provide documentation outlining success in high efficiency accelerator component technologies. Achievements must be substantial. For example, a key component for a DC accelerator could be a co*ckroft-Walton voltage ladder. Such a ladder showing 1 MV and an efficiency of >70% into a representative load would be considered sufficient. Proposers to Subtopic 2 are required to provide documentation outlining success in prior end-to-end system design, demonstration of hands-on work with analogous technologies (including core competencies with accelerator technologies), and experience working with regulatory agencies – specifically the FDA and state regulatory bodies for machine-produced radiation sources.PHASE II: SaFE is composed of two linked subtopics over an anticipated 3-year period of performance. The period of performance is divided into a 12-month base and two 12-month option periods. Proposers may apply to one or both subtopics.Subtopic 1: Accelerator technology development. The overall goal of Subtopic 1 is to produce and demonstrate a turn-key high efficiency, low cost, reasonably compact, irradiation accelerator prototype at technology readiness level 6 with the following characteristics: ParameterThresholdObjectiveTunable electron energy range (MeV) 2-5 2-10 Max x-ray energy (MeV) 5 7.5 Wall plug efficiency (Pbeam/Pwall) > 0.3 > 0.7Unit cost ($)< $100,000 < $50,000 The accelerator must make use of 10 kW electric generator output such as 120V@100A or 208V@50A. The complete, turn-key system including controls, accelerator, RF generation (if appropriate), shielding, beam steering, and target must be compatible with a single 463L pallet. Additional suitability metrics include a removable x-ray converter (such as tantalum) to support x-ray production, continuous or near continuous operation, and targets compatible with conveyer-based operations. The 12-month base period will focus on accelerator design, modeling, and component development. The design will progress through typical processes including a system requirements review, preliminary design review, and a critical design review. Components will be developed and tested supporting the overall accelerator design. Base period (12 month) milestones: •Month 1: Kickoff materials. Slide deck summarizing technical approach to meet overall goals, risks, and risk mitigations and quantified milestone schedule •Month 3: System Requirements Review •Month 6: Preliminary Design Review •Month 12: Critical Design Review During the 12-month Option 1 period, components will be refined and integrated into a prototype system. This system will be tested to verify performance and ultimately used in Subtopic 2’s pilot system demonstration. Option 1 period (12 month) milestones: •Month 6: Complete Accelerator Prototype •Month 9: Test and Eval of Prototype •Month 10: X-ray Target Assessment •Month 12: Integrated T&E of Prototype During the 12-month Option 2 period, support will be provided to Subtopic 2’s pilot system demonstration and the accelerator will be further refined to a minimum viable product using feedback from Subtopic 2. Option 2 period (12 month) milestones: •Month 6: Accelerator Integration Report •Month 12: Final Accelerator and System Design Monthly written technical progress reports will supplement the above milestones (see template under SBIR/STTR BAA DOCUMENTS at https://www.darpa.mil/work-with-us/for-small-businesses/participate-sbir-sttr-program). Subtopic 1 performers are expected to collaborate with subtopic 2 performers in this program. Subtopic 2: Irradiation system design and proof-of-concept pilot demonstrationSubtopic 2 will complete system studies for two use cases using the accelerator technology of Subtopic 1. As mentioned above, the first use case will examine operation in deployed or austere environments. Food-based logistical support aims to feed 300 troops from mobilized trailers or 800 troops from containerized kitchens. About 32 lbs. of food supplies (including packaging) are needed per troop per week. This is about 2 kg/day at an average density of ~0.5 g/cc. Detailed modeling and analysis will be carried out on various objects and package configurations, and optimization studies will be conducted to provide effective treatment per object at maximum throughput. In addition, Monte Carlo analysis will be used to study radiation shielding. Such shielding could make use of supplied or indigenous materials or combinations of both to minimize size and weight. Handling systems will also be developed and included in the design studies. Metrics for this use case are described in the table below. ParameterThresholdObjectiveSize and weight (463L pallets)< 2< 1Throughput (kg/hr)> 50> 180Dose/item (kGy)> 0.4> 1Dose uniformity ratio< 2.5< 1.4Size and weight metrics include the full accelerator of Subtopic 1. Object and packaging details as well as feedback on aspects of practical system suitability are anticipated through discussions with performer(s) and DoD stakeholders during the base period. The second system study will examine using the accelerator of Subtopic 1 in a distributed architecture at the point of packaging. Perishable food such as lettuce or ground beef and associated packaging will be analyzed. Detailed technical analysis, economic analysis, and commercialization plans for the system will be completed with the goal of minimizing overall system costs. The specific use case will be proposed by the performer. Metrics for this use case are described in the table below.ParameterThresholdObjectiveThroughput (kg/hr)> 1,000> 3,600Dose (kGy)> 0.4> 1Dose uniformity ratio< 2.5< 1.4In addition to system studies, Subtopic 2 will develop and demonstrate a proof of concept pilot for both of the use cases described above. This includes addressing all regulatory requirements and potentially crafting petitions to regulatory bodies describing the specific needs of distributed systems. The 12-month base period will focus on separate design studies for the use cases described above and progress through typical design review elements, including a system requirements review and preliminary design review. In addition, all relevant regulations will be identified. Base period (12 month) milestones: •Month 1: Kickoff materials. Slide deck summarizing approaches to meet overall goals, risks, and risk mitigations and quantified milestone schedule •Month 3: System Requirements Review •Month 9: Preliminary Design Review •Month 12: Final base period report and design updateDuring the 12-month Option 1 period, systems will be refined through a critical design review. A minimum viable product will be defined for the accelerator system of Subtopic 1. Pilot plans will be progressed and address all regulations. Option 1 period (12 month) milestones: •Month 3: 1) Critical Design Review, including summary of minimum viable product findings for accelerator technology, and 2) Preliminary pilot plan •Month 6: Interim pilot plan •Month 12: Final pilot plan During the 12-month Option 2 period, the accelerator from Subtopic 1 will be used to complete a concept pilot demonstration. Option 2 period (12 month) milestones: Month 3: Initial pilot operation report Month 6: Interim pilot operation report Month 12: Final pilot operation report Monthly written technical progress reports will supplement the above milestones (see template under SBIR/STTR BAA DOCUMENTS at https://www.darpa.mil/work-with-us/for-small-businesses/participate-sbir-sttr-program). Subtopic 1 and 2 are linked. Monthly coordination meetings between the teams are anticipated to facilitate communication and successful completion of overall program goals.PHASE III DUAL USE APPLICATIONS: While the U.S. food supply is among the safest in the world, the FDA estimates that there are about 48 million cases of foodborne illness annually—the equivalent of sickening 1 in 6 Americans each year. And each year these illnesses result in an estimated 128,000 hospitalizations and 3,000 deaths. More significantly, the USDA estimates that food waste is between 30 and 40 percent of the U.S. food supply, with spoilage being a significant contributor. Based on estimates from USDA’s Economic Research Service of 31 percent food loss at the retail and consumer levels, this corresponded to approximately 133 billion pounds and $161 billion worth of food in 2010. Globally, about 1.4 billion tons of food is wasted every year. From a food security perspective, the U.S. imports 94% of its seafood, 55% of fruit, and 32% of vegetables, while the FDA is only able to inspect 1-2% of these foodstuffs. Lastly, there is a need to treat food for improved safety and stability during expeditionary operations or in environments where food quality may be compromised, such as in disaster response or humanitarian relief operations. Development of “in-house,” port-of-entry, or expeditionary irradiation capabilities would provide a new means to avoid or significantly improve these food safety and waste issues. For food safety applications, the availability of in-house technologies will help reduce and control costs, provide greater flexibility in managing inventory, facilitate new product formulations, protect against supply chain disruption, and decrease the impact of waste management. Being able to cold pasteurize food at points of production, import, or distribution and in austere environments could present a transformational ability to improve food safety and security and reduce the threat from natural, accidental, or intentional food contamination. Further, these sources could also be used for a range of other applications. For example, low-cost e-beam technology can be employed to remediate urgently needed capabilities to degrade per– and polyfluoroalkyl substances (PFAS) in groundwater and soils. In-situ sterilization of medical devices is a further need for such sources. Overall, advancement in improving food safety, availability, and security could have global impacts and significantly advance U.S. national security agendas. By enabling safe and secure food supplies in underdeveloped countries, there are new opportunities for the U.S. to provide additional stability in these regimes. Successful proposals for this SBIR offering must make significant arguments supporting the commercial viability of their approach. Hence, proposals to Subtopic 1 must provide initial evidence that their technical approach will allow accelerator structures that are much lower cost to produce (>10-100x) and operate (>10x) than traditional accelerator systems such as S-band LINACs and rhodotrons, while still achieving required beam powers for high throughput food treatment. Proposals for Subtopic 2 must make arguments that, should the above accelerator technology be available, it would enable highly economic treatment of foodstuffs at points of production/packaging and ports of entry. Transition and commercialization (T-C) milestones have been added as part of the option phases to aid in assuring commercial viability.REFERENCES:1.https://www.aiche.org/resources/publications/cep/2016/november/introduction-electron-beam-food-irradiation2.https://www.armytimes.com/news/your-army/2019/10/07/the-plan-to-give-soldiers-a-days-worth-of-mres-in-one-ration-seven-days-of-food-weighing-less-than-10-pounds/ 3.https://www.fda.gov/food/consumers/what-you-need-know-about-foodborne-illnesses#4.https://www.usda.gov/foodwaste/faqs# 5.https://www.rts.com/resources/guides/food-waste-america/ 6.https://www.ers.usda.gov/amber-waves/2022/february/india-and-mexico-top-sources-of-pathogen-based-u-s-food-import-refusals/7.https://doi.org/10.1016/j.radphyschem.2021.1097058.https://www.osti.gov/servlets/purl/1774110KEYWORDS: Food irradiation, cold pasteurization, medical sterilization, x-rays, linear accelerators, radiation dose

Deuce Coupe

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Integrated Sensing & Cyber, Trusted AI & AutonomyOBJECTIVE: To address supply chain shortages by providing a fast, reliable, and widely-available capability to identify, appraise, and extract valuable mechanical and electronic components from scrapped or damaged systems, for reuse in functioning systems [1-3].DESCRIPTION: Mechanical parts recycling, and electronic waste (e-waste) reuse falls into two broad categories. The first is the recovery of valuable materials such as aluminum, steel, gold, rare earths, and lithium. This is a high-volume bulk process where the high-value manufactured components are systematically reduced to raw material [4]. The second broad category is ad-hoc recovery through junkyards and scrap-picking. In this case, experts look through the scrap and select the parts needed—a labor-intensive process that does not scale. The experts have (1) the skills to understand which parts are needed [5], (2) an encyclopedic knowledge of which systems have the needed part and where it is in the system, (3) the ability to assess whether the scrapped part appears to be functional, and (4) the expertise to safely extract the needed part [6]. Today, each of these steps requires substantial knowledge of potential donor systems. Given the plethora of donor systems (cars, trucks, phones, computers, printers) now available, and the broad understanding of available components and means of extraction, the potential utility of harvesting this vast pool of high-value resources is far above what can be done today by human experts [7]. Note: please see DARPA SBIR 23.4 - Release 4 under the DoD STTR 23.4 Annual BAA at https://www.defensesbirsttr.mil/SBIR-STTR/Opportunities/ for DARPA proposal instructions, to include duration and funding information for this topic.PHASE I: This topic is soliciting Direct to Phase II (DP2) proposals only. In a Deuce Coupe environment, operators equipped with high-end cell phones would be given search lists and then cued to look for the sources of needed components. Based on information from service manuals, shop manuals, disassembly information, and related sources [8], Deuce Coupe-developed software would use image-feature extraction, natural language processing, and knowledge of physical dynamics to identify systems containing the necessary components [9]. When a candidate donor system is identified, the operator is then cued as to where to find the material within the system [10, 11]. Feasibility requirements firms must meet to be considered for a Phase II award: •Ability to create the models and structures needed to identify embedded material•Capability to capture information from sensors to feed the inventory of materialSuccess criteria for Phase I: Identification of the components needed. In Phase I, the identification will not require a pass/fail for the component [12].PHASE II: During Phase II, Deuce Coupe will use the sensors on the phone to evaluate the state of the identified components or sub-assemblies [3, 13]. A highly-skilled mechanic or technician can examine the appearance, color, and shape of parts and subsystems and then rapidly assess the part’s condition and suitability for reuse [2, 14]. Phase II Milestones (Base): •Month 4: Demonstration of an automated, functioning workflow to take an operator from parts ingestion though populating a s design system component library•Month 7: Capability to ingest and identify junked systems (e.g. car, truck) and provide sufficient metadata to be able to access the parts database systems •Month 10: Capability to provide information on the available parts from the junked systems based on sensor input and synthesis of the metadata on the system (e.g. shop manual) Phase II Milestones (Option): •Month 5: Ability to assess the utility of a part based on sensor data and evaluate its capacity for reuse •Month 6: Capability to advise on preferential reuse of parts based on assessed utility of the part and information in available metadata Success criteria for Phase II: the components are to be identified with a reliability indicator that is accurate 80% of the time for P(working) and 90% of the time for P(failure).PHASE III DUAL USE APPLICATIONS: Scale up to provide efficient and local resupply, measuring the ability to keep a greater quantity of systems in the field for longer periods of time, while simultaneously increasing confidence levels for systems’ operational capabilities. Expand the range of sourcing possibilities for parts and subsystems, thus allowing otherwise-incapacitated systems to be made available for operation.REFERENCES:1.J. Aitken and A. Murray, "Crash repair in the UK: reusing salvaged parts in car repair centres," International Journal of Logistics: Research and Applications, vol. 13, no. 5, pp. 359-372, 2010. 2.O. Akinade et al., "Design for deconstruction using a circular economy approach: Barriers and strategies for improvement," Production Planning & Control, vol. 31, no. 10, pp. 829-840, 2020. 3.A. A. Dubey and J. Adhikari, "Design and development of smart junkyard system based on machine learning," International Research Journal of Modernization in Engineering Technology and Science, vol. 4, no. 6, 2022. 4.S. S. Sawyer-Beaulieu, J. A. Stagner, and E. K. Tam, "Sustainability issues affecting the successful management and recycling of end-of-life vehicles in Canada and the United States," in Environmental issues in automotive industry: Springer, 2014, pp. 223-245. 5.A. K. Parlikad and D. McFarlane, "Quantifying the impact of AIDC technologies for vehicle component recovery," Computers & Industrial Engineering, vol. 59, no. 2, pp. 296-307, 2010. 6.P. Thongkaow, T. Prueksasit, and W. Siriwong, "Quantification and characterization of recovered materials in the cycle of the informal household electronic waste dismantling in Buriram province, Thailand: A challenge towards sustainable management and circular economy," Waste Management & Research, vol. 40, no. 12, pp. 1766-1776, 2022. 7.T. A. Kurniawan et al., "Transformation of solid waste management in China: moving towards sustainability through digitalization-based circular economy," Sustainability, vol. 14, no. 4, p. 2374, 2022. 8.D. Page, A. Koschan, and M. Abidi, "Methodologies and techniques for reverse engineering–the potential for automation with 3-d laser scanners," in Reverse Engineering: Springer, 2008, pp. 11-32. 9.M. Ghoreishi and A. Happonen, "Key enablers for deploying artificial intelligence for circular economy embracing sustainable product design: Three case studies," in AIP conference proceedings, 2020, vol. 2233, no. 1: AIP Publishing LLC, p. 050008. 10.P. Haribabu, S. R. Kassa, J. Nagaraju, R. Karthik, N. Shirisha, and M. Anila, "Implementation of an smart waste management system using IoT," in 2017 International Conference on Intelligent Sustainable Systems (ICISS), 2017: IEEE, pp. 1155-1156. 11.S. Keivanpour, D. Ait Kadi, and C. Mascle, "End-of-life aircraft treatment in the context of sustainable development, lean management, and global business," International Journal of Sustainable Transportation, vol. 11, no. 5, pp. 357-380, 2017. 12.C. A. Zimring, "The complex environmental legacy of the automobile shredder," Technology and culture, vol. 52, no. 3, pp. 523-547, 2011. 13.E. Williams et al., "Towards the development of junkyard hacks: networked robotics applications," in 31st Florida Conference on Recent Advances in Robotics, 2018. 14.F. Elghaish, S. T. Matarneh, D. J. Edwards, F. P. Rahimian, H. El-Gohary, and O. Ejohwomu, "Applications of Industry 4.0 digital technologies towards a construction circular economy: gap analysis and conceptual framework," Construction Innovation, no. ahead-of-print, 2022.KEYWORDS: Supply Chain, Sustainability, Resilience, Machine Reasoning, Automatic decomposition of system-of-systems, Automatic assessment of system wear, Part reuse, Machine vision, Mobile applications

Empirical Proving Ground for Cryptographic Engineering Challenges in Large-scale Deployments (EPiC EagLe) – SBIR XL

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Advanced Computing and Software, Integrated Network Systems-of-Systems, Quantum ScienceThe technology within this topic is restricted under the International Traffic in Arms Regulation (ITAR), 22 CFR Parts 120-130, which controls the export and import of defense-related material and services, including export of sensitive technical data, or the Export Administration Regulation (EAR), 15 CFR Parts 730-774, which controls dual use items. Offerors must disclose any proposed use of foreign nationals (FNs), their country(ies) of origin, the type of visa or work permit possessed, and the statement of work (SOW) tasks intended for accomplishment by the FN(s) in accordance with the Announcement. Offerors are advised foreign nationals proposed to perform on this topic may be restricted due to the technical data under US Export Control Laws.OBJECTIVE: The Empirical Proving Ground for Cryptographic Engineering Challenges in Large-scale Deployments (EPiC EagLe) effort will develop sound state-of-the-art experimental methodologies and operational benchmarks for evaluating distributed trust solutions such as: 1) modifications of existing Public Key Infrastructures (PKIs) and Key Management Infrastructures (KMIs) to recover from loss-of-trust events at Internet scale, 2) hybrid PKIs that add novel delegation and transient trust protocols, and 3) novel designs of PKIs and KMIs for networks with special link, bandwidth, and latency requirements and constraints, such as connected battlespaces. This effort will demonstrate the capability to evaluate such solutions, at scale, exceeding traditional methodologies’ ability to assess the Internet’s commercial PKI’s and Internet-of-Things (IoT) scales.DESCRIPTION: This effort will develop sound state-of-the-art experimental methodologies and operational benchmarks for evaluating distributed trust solutions and demonstrate the capability of evaluating such solutions, at scale, exceeding traditional methodologies’ ability to assess the Internet’s commercial PKI’s and IoT’s scales. Innovative approaches should address the experimental methodology for evaluating implementations of distributed trust schemes—or modifications of existing schemes, such as those focused on recovery—at large scales, under realistic connectivity (or intermittent connectivity) constraints, along with the required simulation framework, metrics of success, assessment methods, and integration of solutions into robust, real-time cyber defense capabilities of interest to the DoD.PHASE I: This topic is soliciting Direct to Phase II (DP2) proposals only. The Phase I feasibility study shall include the documentation of a basic distributed trust evaluation prototype consisting of the software code and hardware capabilities that are capable of experimenting with Research & Development (R&D) concepts of Tactical Certificate Authorities (CAs) that employ flexible policies, extensions, and protocols for battlefield use. Proposers interested in submitting a Direct to Phase II (DP2) proposal must provide documentation to substantiate that the scientific and technical merit and feasibility described above has been met and supports relevant military and/or commercial applications. Documentation should include all relevant information including, but not limited to: technical reports, test data, prototype designs/models, and performance goals/results. For detailed information on DP2 requirements and eligibility, please refer to Appendix B of the DARPA Instructions for DoD BAA 2023.4.PHASE II: Phase II shall produce system design, implementation, and maintenance capabilities to significantly advance the state of the art in PKI scaling challenges for IoT and IoT-like battlespace uses. In today’s Internet PKIs, simple loss-of-trust events such as an expiring PKI certificate led to massive outages of national telecom providers, major cloud computing services, and even critical transportation systems, with no effective automated means of timely recovery [1, 4-7]. Such outages, although indirect to the DoD, are likely to create major challenges for DoD operations. There currently are limited scalable capabilities for recovering from loss-of-trust events such as expiration of trusted certificates, expiry of root-of-trust certificates, or compromises of such certificates or PKI subsystems. Despite the “impending doom” of multiple Internet Root-of-Trust certificates approaching their expiry dates [2], the Internet PKI and IoT trust technologies lack well-designed technological fallbacks for recovery. When proposed, such technological fallbacks cannot be comprehensively evaluated without creating major deployments at representative scales, which are cost-prohibitive. Today, the DoD lacks the capability to experimentally test proposed distributed trust solutions at DoD-relevant scales. Although simulation technologies such as OPNET facilitate introductory training in DoD encryption protocols (e.g., [8]) and limited experimentation with proposed replacements of inefficient key management systems (e.g., [9]), these systems are limited in scale, and cannot be extended to simulate the behaviors of millions or hundreds of millions of nodes. This stymies the Government’s abilities to pose cryptographic engineering challenges and to evaluate proposed solutions. Today, our understanding of (rare) successful recovery derives from a few actual loss-of-trust events such as expiration of the trusted intermediate CA certificate of the Mozilla Firefox browser, which lead to worldwide deactivation of Firefox plugins (including critical security plugins). Mozilla recovered from this near-catastrophic event via an ad hoc manipulation of the certificates’ trust paths, made possible by a serendipitous feature of the browser’s trust chain validation implementation and ad hoc manipulation of the browser key store [1]. The two features that serendipitously enabled this recovery effort were used in ways not intended by their original design and not considered before the outage. Today, there exists no rigorous sets of metrics, models, or simulations to discuss scalability requirements of trust management solutions such as hierarchical PKIs or any hybrid schemes. There is strong anecdotal evidence from industry that PKI and key management problems at scale create non-trivial operational surprises. However, lack of a common framework for evaluating research in distributed trust solutions at scale stymies progress. In particular, the challenges of recovering from loss-of-trust events or of migrating authority on a large scale have not been formalized at all, despite their increasing practical importance. Phase II will create an experimental methodology for evaluating implementations of distributed trust schemes - or modifications of existing schemes, such as those focused on recovery - at large scales, under realistic connectivity (or intermittent connectivity) constraints. This methodology shall employ novel lightweight virtualization approaches to create simulation approaches that allow simulating relevant behaviors of up to hundreds of millions of nodes, with realistic link topologies and models. The new architectural approach to simulation shall faithfully emulate small relevant code segments of implementations under test, while aggressively aggregating non-relevant aspects of node and network behaviors. These methodologies and simulation tools will help pose and answer operational questions about distributed trust, including introduction of new features into PKIs and KMIs, and allow creation of meaningful operational benchmarks for trust engineering. For example, they will create the capability to experimentally test in simulation whether a trust scheme is likely to perform a given mix of operations on a given scale, under given connectivity constraints, and to pose challenges for cryptographic engineering in terms of such scale benchmarks. The methodology shall enable the study of principled loss-of-trust recovery methods based on distributed graph algorithms, such as trust path manipulations generalizing the ad hoc Firefox recovery example. Furthermore, the methodology will allow exploration of scenarios that involve migration of the root-of-trust, which become increasingly important with the ageing of IoT roots of trust, and threats of wide-spread compromises of trusted boot chains (cf. [3]). Finally, a principled simulation framework will enable not only stochastic simulation experiments but, with modifications, will support sound reasoning about protocol properties under probabilistic network models. EPiC EagLe will leverage formal reasoning, simulation, and modern cryptographic primitives to develop the first of its kind PKI frameworks that can recover from emergent loss of trust events. Successful offerors in their proposals will demonstrate a strong understanding of the technology area and they will articulate a compelling necessity for S&T funding to support their respective proposed technology approaches over existing capabilities. Schedule/Milestones/Deliverables Phase II fixed payable milestones for this program shall include:•Month 2: New Capabilities Report, that identifies additions and modifications that will be researched, developed, and customized for incorporation in the pilot demonstration.•Month 4: PI meeting presentation material, including demonstration of progress to date, PowerPoint presentations of accomplishments and plans. •Month 6: Demonstration Plan that identifies schedule, location, computing resources, and any other requirements for the pilot demonstration. •Month 9: Initial demonstration of stand-alone pilot application to DARPA; identification of military transition partner(s) and other interested DoD organizations •Month 12: PI meeting presentation material, including demonstration of progress to date, PowerPoint presentations of accomplishments and plans. •Month 15: Demonstration to military transition partners (s) and other DoD organizations. •Month 18: PI meeting presentation material, including demonstration of progress to date, PowerPoint presentations of accomplishments and plans. •Month 21: PI meeting presentation material, including demonstration of progress to date, PowerPoint presentations of accomplishments and plans. •Month 24: Final software and/or hardware delivery, both object and source code, for operation by DARPA or other Government personnel for additional demonstrations, with suitable documentation in a contractor proposed format. Deliver a Final Report, including quantitative metrics on decision making benefits, costs, risks, and schedule for implementation of a full prototype capability based on the pilot demonstration, along with the novel designs of PKIs and KMIs for networks with special link, bandwidth, and latency requirements and constraints. This report shall include an identification of estimated level of effort to integrate the pilot capability into an operational environment, addressing computing infrastructure and environment, decision making processes, real-time and archival data sources, maintenance and updating needs; reliability, sensitivity, and uncertainty quantification; and transferability to other military users and problems. The report shall also document any scientific advances that have been achieved under the program. (A brief statement of claims supplemented by publication material will meet this requirement.) Provide Final PI meeting presentation material. Phase II Option: The option shall address preliminary steps toward the certification, accreditation and/or verification of the resulting base effort's sound experimental methodologies and operational benchmarks for evaluating distributed trust solutions. Proposed solutions shall include a summary of how the methodologies are likely to succeed on DoD and IoT scales and under link, bandwidth, and latency constraints specific to DoD environments and missions. Schedule/Milestones/Deliverables for Phase II Option: Phase II fixed payable milestones for this program option shall include: •Month 2: Plan that identifies the schedule, location, computing resources and/or any other requirements for the experimental methodologies and operational benchmarks and infrastructure for evaluating distributed trust solutions required for transition to the DoD. •Month 4: Presentation on the detailed software and hardware plan for the technical capability. •Month 7: Interim report on progress toward certification, accreditation and/or verification of the technical capability for DoD use. •Month 10: Review and/or demonstration of the prototype capability with the documentation supporting certification, accreditation and/or verification. •Month 12: Final Phase II option report summarizing the certification, accreditation and/or verification approach, architecture and algorithms; data sets; results; performance characterization and quantification of robustness.PHASE III DUAL USE APPLICATIONS: The DoD and the commercial world have similar challenges with respect to maintaining the cyber integrity of their computing and communications infrastructure. The Phase III effort will see the developed methodology and testbed transitioned into a DoD cyber environment capable of testing large-scale software deployments (including distributed trust software) in simulations consisting of virtual machines (VMs), up to tens of thousands of emulated nodes. Government ranges and commercial systems such as national telecom providers, major cloud computing services, and critical transportation systems have similar challenges in their PKI and KMI infrastructures and face severe scaling challenges for IoT and IoT-like battlespace uses. Thus, the resulting methodology and operational benchmarks are directly transitionable to both the DoD and the commercial sectors: military and commercial air, sea, space and ground communication systems; commercial hardening of critical industrial plant (i.e. control systems, manufacturing lines, chemical processes, etc.) through PKI and KMI infrastructures; securing cloud infrastructure associated with optimization of industrial processes and condition-based maintenance of air, sea, space and ground networked communication systems.As part of Phase III, the developed capability should be transitioned into an enterprise level system that can be used to test large-scale software deployments (including distributed trust software) in simulations consisting of virtual machines (VMs), up to tens of thousands of emulated nodes. The resulting capability is directly transitionable to the Army, the Air Force, the Navy, and the National Security Agency for experimenting with Research & Development (R&D) concepts of Tactical Certificate Authorities (CAs) that employ flexible policies, extensions, and protocols for battlefield use. This is a dual-use technology that applies to both military and commercial software environments affected by cyber adversaries.REFERENCES:1.Eric Rescorla, Technical Details on the Recent Firefox Add-on Outage, https://hacks.mozilla.org/2019/05/technical-details-on-the-recent-firefox-add-on-outage/2.Scott Helme, The Impending Doom of Expiring Root CAs and Legacy Clients, https://scotthelme.co.uk/impending-doom-root-ca-expiring-legacy-clients/3.Mark Ermolov, Intel x86 Root of Trust: loss of trust, http://blog.ptsecurity.com/2020/03/intelx86-root-of-trust-loss-of-trust.html4.Corinne Reichert, Ericsson: Expired certificate caused O2 and SoftBank outages, https://www.zdnet.com/article/ericsson-expired-certificate-caused-o2-and-softbank-outages/, 20185.John Ribeiro, Microsoft's Azure service hit by expired SSL certificate, https://www.computerworld.com/article/2495453/microsoft-s-azure-service-hit-by-expired-ssl-certificate.html, 20136.Dennis Fisher, Final Report on DigiNotar Hack Shows Total Compromise of CA Servers, https://threatpost.com/final-report-diginotar-hack-shows-total-compromise-ca-servers-103112/77170/, 20127.Nihal Krishan, Internet goes down for millions, tech companies scramble as key encryption service, expires, https://www.yahoo.com/now/internet-goes-down-millions-tech-021400230.html, 20218.Tae H. Oh et al., Teaching High-Assurance Internet Protocol Encryption (HAIPE) Using OPNET Modeler Simulation Tool, SIGITE’09, https://dl.acm.org/doi/pdf/10.1145/1631728.1631771, 20099.J. Liu, X. Tong et al., A Centralized Key Management Scheme Based on McEliece PKC for Space Network, IEEE Access, vol. 8, pp. 42708-42719, 2020, doi: 10.1109/ACCESS.2020.2976753. KEYWORDS: Battlespace Environments, Information Systems Technology, Public Key Infrastructures

2D Polyglots

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Advanced computing and softwareThe technology within this topic is restricted under the International Traffic in Arms Regulation (ITAR), 22 CFR Parts 120-130, which controls the export and import of defense-related material and services, including export of sensitive technical data, or the Export Administration Regulation (EAR), 15 CFR Parts 730-774, which controls dual use items. Offerors must disclose any proposed use of foreign nationals (FNs), their country(ies) of origin, the type of visa or work permit possessed, and the statement of work (SOW) tasks intended for accomplishment by the FN(s) in accordance with the Announcement. Offerors are advised foreign nationals proposed to perform on this topic may be restricted due to the technical data under US Export Control Laws.OBJECTIVE: Develop polyglots (dual embedded formats) for existing 2-dimensional codes (e.g., QR codes) that enable high-bandwidth, secure data transfer. Assess potential security vulnerabilities in polyglot approaches.DESCRIPTION: DoD employees are interacting with physical-cyber data transfers at an ever-increasing rate; simply walking through an airport might require scanning 2-dimensional (2D) codes numerous times to receive basic goods and services, such as food menus and flight boarding passes. One of the most prevalent types of 2D codes is Quick Response (QR) code originating in 1994 from a Japanese automotive company. With the widespread adoption of mobile phones, QR codes have become a standard to store and transfer data in a physical format. The convenience that QR codes provide comes with certain limitations, such as the amount of data it can store and a balance between usability and security. 2D codes (e.g., QR codes, Data Matrix, MaxiCode, PDF417) are designed and optimized for a specific task; for example, data matrix codes used by shipping are fast to scan, however they only store 1.55kb of data as compared to 3kb for QR v4. 2D codes are often represented pictographically as part of printed media, such as a menu in a restaurant. They have low data density as a result of error correction and robustness to environmental effects (e.g., scratches). To increase the data density, preserve the inherent optimizations of each format, and ensure backwards compatibility, this study will investigate combining formats into 2D polyglots. In this context, a polyglot is a format that is valid in multiple computer programs. Polyglots are possible by combining two or more formats, each of which are able to be interpreted by multiple programs as having a valid format, for example, a file which is both a picture and a PowerPoint presentation. This study will investigate the effects that 2D polyglots have in QR codes and their potential to reduce the attack surface and increase data density. A basis of confidence that polyglots can exist in 2D codes is the known, trivial case of a 2D code imbedded in another 2D code [D14]. For more than a decade it has been widely known that current 2D codes have inherent vulnerabilities [D15, F19, K10]. Usability was heavily favored over security in the design of these codes. This imbalance led to a widely adopted standard with pervasive vulnerabilities. Attacks can take advantage of error correction algorithms and data sparsity to exploit 2D formatting assumptions and the inconsistences which software makes when interpreting a 2D code. For example, standard QR codes have orientation markers and data is only parsed in one direction; polyglot QR codes can contain multiple, non-conflicting formats that can be read independently based on approach direction.Finally, to ensure current systems and software can still be used, any enhancements to the SOTA must also be backwards compatible. Introducing new software and standards would inevitably have new and possibly unintended effects on security and efficiency.PHASE I: This topic is soliciting Direct to Phase II (DP2) proposals only. Proposers interested in submitting a DP2 proposal must provide documentation to substantiate that the scientific and technical merit and feasibility described above have been met and describe the potential commercial applications. DP2 documentation should include: •Technical reports describing results and conclusions of existing work, particularly regarding the commercial opportunity or DoD insertion opportunity, and risks/mitigations, and assessments; •Presentation materials and/or white papers; •Technical papers; •Test and measurement data; •Prototype designs/models; •Performance projections, goals, or results in different use cases; and, •Documentation of related topics such as how the proposed SUP solution can enable more realistic cyber training. This collection of material will verify mastery of the required content for DP2 consideration. DP2 proposers must also demonstrate knowledge, skills, and ability in networking, computer science, mathematics, and software engineering. For detailed information on DP2 requirements and eligibility, please refer to the DoD BAA and the DARPA Instructions for this topic.PHASE II: The goal of 2D Polyglots is to develop a QR code that can hold more data while maintaining backwards compatibility and to identify vulnerabilities present in current 2D codes.DP2 proposals should propose a research design to achieve the following goals: •Develop a protype system to demonstrate feasibility for producing 2D polyglots in a platform independent language (e.g., python 3.0, Golang);•Identify vulnerabilities and possible mitigations in 2D and 2D polyglot codes; •Detail a test plan, complete with proposed metrics and scope, for verification and validation of the system performance. Phase II will culminate in a system demonstration using one or more compelling use cases consistent with commercial opportunities and/or insertion into a DARPA program. The below schedule of milestones and deliverables is provided to establish expectations and desired results/end products for the Phase II effort. •Month 1: Phase I Kickoff briefing (with annotated slides) to the DARPA Program Manager (PM) (in person or virtual, as needed) including: any updates to the proposed plan and technical approach, risks/mitigations, schedule (inclusive of dependencies) with planned capability milestones and deliverables, proposed metrics, and plan for prototype demonstration/validation. •Months 3, 4, 5: Quarterly technical progress reports detailing technical progress made, tasks accomplished, major risks/mitigations, a technical plan for the remainder of Phase II (while this will normally report progress against the plan detailed in the proposal or presented at the Kickoff briefing, it is understood that scientific discoveries, competition, and regulatory changes may all have impacts on the planned work and DARPA must be made aware of any revisions that result), planned activities, trip summaries, and any potential issues or problem areas that require the attention of the DARPA PM. •Month 6: Interim technical progress briefing (with annotated slides) to the DARPA PM (in-person or virtual as needed) detailing progress made (include quantitative assessment of capability developed to date), tasks accomplished, major risks/mitigations, planned activities, and technical plan for the second half of Phase II, the demonstration/verification plan for the end of Phase II, trip summaries, and any potential issues or problem areas that require the attention of the DARPA PM. •Month 7, 8, 9: Quarterly technical progress reports detailing technical progress made, tasks accomplished, major risks/mitigations, a technical plan for the remainder of Phase II (with necessary updates as in the parenthetical remark for Months 4, 7, and 10), planned activities, trip summaries, and any potential issues or problem areas that require the attention of the DARPA PM. •Month 10/Final Phase II Deliverables: Final architecture with documented details, demonstrating diagnosing a malicious activity and unauthorized modification on software/hardware; documented application programming interfaces; any other necessary documentation (including, at a minimum, user manuals and a detailed system design document; and the end of phase commercialization plan).PHASE III DUAL USE APPLICATIONS: The Phase III work will be oriented towards transition and commercialization of the developed 2-D Polyglots technologies. The proposer is required to obtain funding from either the private sector, a non-SBIR Government source, or both, to develop the prototype software into a viable product or non-R&D service for sale in military or private sector markets. Phase III refers to work that derives from, extends, or completes an effort made under prior SBIR funding agreements, but is funded by sources other than the SBIR Program. Outcomes have the potential to significantly benefit the DoD and numerous commercial entities by improving knowledge of 2D codes including capabilities and vulnerabilities. Specifically, in the DoD space, 2D Polyglots technologies will be able to provide new data transfer methods utilizing 2D codes and highlight any potential vulnerabilities in current 2D codes used across the DoD enterprise. The development of polyglot technologies will have security benefits across the defense industrial base (DIB).REFERENCES:1.Dabrowski, A., Krombholz, K., Ullrich, J. and Weippl, E.R., 2014, November. QR inception: Barcode-in-barcode attacks. In Proceedings of the 4th ACM workshop on security and privacy in smartphones & mobile devices (pp. 3-10). 2.Dabrowski, A., Echizen, I. and Weippl, E.R., 2015, May. Error-correcting codes as source for decoding ambiguity. In 2015 IEEE Security and Privacy Workshops (pp. 99-105). IEEE.3.Kieseberg, P., Leithner, M., Mulazzani, M., Munroe, L., Schrittwieser, S., Sinha, M. and Weippl, E., 2010, November. QR code security. In Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia (pp. 430-435). 4.Focardi, R., Luccio, F.L. and Wahsheh, H.A., 2019. Usable security for QR code. Journal of Information Security and Applications, 48, p.102369.KEYWORDS: Information assurance, computing and software technology, electro-optical sensors, cybersecurity, authentication, confidentiality, QR codes, Data Matrix, PDF417, MaxiCode, and 2D codes.

Passive Analytics for Remote Quantification of External Resources (PARQER)

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Integrated Sensing and Cyber, Advanced computing and SoftwareOBJECTIVE: The Passive Analytics for Remote Quantification of External Resources (PARQER) SBIR topic seeks to develop and demonstrate novel techniques to passively assess the security posture of remote networks/subnetworks, without requiring any special network accesses.DESCRIPTION: The near-constant stream of news reports on the compromise of systems and networks across government and commercial sectors reveals the challenges of securing large networks of systems with complicated topologies [1] [2] [3] [4]. The inherent asymmetry of effort required to defend an asset vs. effort to gain illicit access to an asset favors attackers that can spend as much time as necessary to locate vulnerable targets (e.g., a server that administrators neglected to patch [5], or a network configured with overly permissive firewall policies [6]). In such an environment where the attacker is advantaged, network administrators and security officers practice defense in depth [7] [8] by reducing the network attack surface and deploying an array of security mechanisms and technologies such as firewalls and intrusion detection/ prevention systems. The extent of an organization’s efforts to minimize network attack surfaces and deploy defensive mechanisms can be largely unknown (e.g., due to poor documentation), even to the organization itself [9]. Often and unfortunately, details about the deployed security mechanisms (or the lack thereof) are only made available after an organization’s network is compromised, and when forensic analysts conduct a postmortem of the attack [10] [11]. For the Department of Defense (DoD) and Intelligence Community (IC), the same problem exists and is compounded by the distinction between, and respective operational responsibilities of, network owners/operators and defenders such as Cybersecurity Service Provider (CSSPs) and Cyber Protection Teams (CPTs). Within the DoD/IC, CPTs are tasked with defending critical military networks; whereas CSSPs are responsible for the continuous monitoring and vulnerability patching of networks, and conducting threat-oriented missions to defeat cyber adversaries. [12] Similar to commercial organizations, critical details of network topology, configuration [13], and security posture [14] are often poorly documented and not immediately available to external responders (such as CPTs). An additional complicating factor of having network knowledge spread among different organizations and individuals (CPTs and CSSPs) is that it makes it difficult to have an accurate holistic picture of the security posture of lower-tier networks at any given time. It is therefore of critical importance for the DoD/IC and large commercial network owners to be able to quickly and passively assess the defensive posture of a remote network/subnetwork in a way that does not require any special access to the network.PHASE I: The PARQER SBIR topic is soliciting Direct to Phase II (DP2) proposals only, which must include supporting documentation of Phase 1 feasibility. Phase I feasibility must be demonstrated through evidence of: a completed proof of concept/principal or basic prototype system; definition and characterization of system properties/technology capabilities desirable for DoD/IC/Government and civilian/commercial use; and capability/performance comparisons with existing state-of-the-art technologies/methodologies (competing approaches). Entities interested in submitting a DP2 proposal must provide documentation to substantiate that the scientific/technical merit and feasibility described above has been achieved and also describe the potential commercial applications. DP2 Phase I feasibility documentation should include, at a minimum: •technical reports describing results and conclusions of existing work, particularly regarding the commercial opportunity or DoD/IC insertion opportunity, risks/mitigations, and technology assessments; •presentation materials and/or white papers; •technical papers; •test and measurement data; •prototype designs/models; •performance projections, goals, or results in different use cases; and, •documentation of related topics such as how the proposed PARQER solution can enable passive, remote assessment of network/subnetwork security posture. The collection of Phase I feasibility material will verify mastery of the required content for DP2 consideration. DP2 proposers must also demonstrate knowledge, skills, and abilities in the technical areas of software engineering, data analytics, network security, and cybersecurity. For detailed information on DP2 requirements and eligibility, please refer to the DoD Broad Agency Announcement and the DARPA Instructions for this topic.PHASE II: The PARQER DP2 SBIR topic seeks to develop and demonstrate novel techniques to enable passive assessment of the security posture of remote networks/subnetworks, without requiring any special access to the network. Most current tools and techniques employed by security operations centers are based on active interrogation. The tools and techniques are often too noisy (e.g., high volumes of alerts and high false positive rates), do not generalize across security mechanisms (i.e., the tools are siloed), and have significant blind spots (e.g., false negatives). Ideal PARQER solutions would overcome such limitations of active techniques, as well as be resistant to intentional misdirection and evasion. PARQER solutions must have the ability to provably scale yet provide fine resolution of the analyzed network. Successful PARQER proposals should clearly describe how proposed combinations of data and analytic techniques will provide high accuracy results in a landscape of ever-evolving security products.Phase II will culminate in a prototype system demonstration using one or more compelling use cases consistent with commercial opportunities and/or insertion into a DARPA program (e.g., Signature Management using Operational Knowledge and Environments (SMOKE), which seeks to develop data-driven tools to automate the planning and execution of threat-emulated cyber infrastructure needed for network security assessments). The Phase II Option period will further mature the technology for insertion into a DoD/Intelligence Community (IC) Acquisition Program, another Federal agency; or commercialization into the private sector. The below schedule of milestones and deliverables is provided to establish expectations and desired results/end products for the Phase II and Phase II Option period efforts. Schedule/Milestones/Deliverables: Proposers will execute the research and development (R&D) plan as described in the proposal, including the below: •Month 1: Phase I Kickoff briefing (with annotated slides) to the DARPA Program Manager (PM) including: any updates to the proposed plan and technical approach, risks/mitigations, schedule (inclusive of dependencies) with planned capability milestones and deliverables, proposed metrics, and plan for prototype demonstration/validation; •Months 4, 7, 10: Quarterly technical progress reports detailing technical progress to date, tasks accomplished, risks/mitigations, a technical plan for the remainder of Phase II (while this would normally report progress against the plan detailed in the proposal or presented at the Kickoff briefing, it is understood that scientific discoveries, competition, and regulatory changes may all have impacts on the planned work and DARPA must be made aware of any revisions that result), planned activities, trip summaries, and any potential issues or problem areas that require the attention of the DARPA PM; •Month 12: Interim technical progress briefing (with annotated slides) to the DARPA PM detailing progress made (including quantitative assessment of capabilities developed to date), tasks accomplished, risks/mitigations, planned activities, technical plan for the second half of Phase II, the demonstration/verification plan for the end of Phase II, trip summaries, and any potential issues or problem areas that require the attention of the DARPA PM;•Months 15, 18, 21: Quarterly technical progress reports detailing technical progress made, tasks accomplished, risks/mitigations, a technical plan for the remainder of Phase II (with necessary updates as in the parenthetical remark for Months 4, 7, and 10), planned activities, trip summaries, and any potential issues or problem areas that require the attention of the DARPA PM; •Month 24: Final technical progress briefing (with annotated slides) to the DARPA PM. Final architecture with documented details; a demonstration of the passive assessment of the security posture of remote networks/subnetworks; documented APIs; and any other necessary documentation (including, at a minimum, user manuals and a detailed system design document; and the commercialization plan); •Month 30 (Phase II Option period): Interim report of matured prototype performance against existing state-of-the-art technologies, documenting key technical gaps towards productization; and, •Month 36 (Phase II Option period): Final Phase II Option period demonstration and technical progress briefing (with annotated slides) to the DARPA PM including prototype performance against existing state-of-the-art technologies, including quantitative metrics of system performance.PHASE III DUAL USE APPLICATIONS: Phase III Dual use applications (Commercial DoD/Military): PARQER has potential applicability across DoD/IC/Government and commercial entities. For DoD/IC/Government, PARQER is extremely well-suited to address one of the biggest issues in government information security today by providing the ability to quickly and passively assess the defensive posture of a remote network/subnetwork. PARQER has the same applicability for the commercial sector. Phase III refers to work that derives from, extends, or completes an effort made under prior SBIR funding agreements, but is funded by sources other than the SBIR Program. The Phase III work will be oriented towards transition and commercialization of the developed PARQER technologies. For Phase III, the proposer is required to obtain funding from either the private sector, a non-SBIR Government source, or both, to develop the prototype into a viable product or non-R&D service for sale in government or private sector markets. Primary PARQER support will be to national efforts to help secure government and commercial networks. Results of PARQER are intended to improve the ability of network owners across government and industry to quickly find the root causes of network compromise incidents, and rapidly mitigate the situation, ultimately improving the security posture of their networks.REFERENCES:1.PortSwigger. 2022. The Daily Swig, Cybersecurity News and Views. https://portswigger.net/daily-swig/data-breach2.SecureLink. 2022. Recent Data Breaches in the News. https://www.securelink.com/resources/data-breach-news/3.Cybersecurity Ventures. 2022. Today’s Top Cybersecurity News Stories. https://cybersecurityventures.com/cybercrime-news/4.The New York times. “How a Cyberattack Plunged a Long Island County Into the 1990s.” 2022. https://www.nytimes.com/2022/11/28/nyregion/suffolk-county-cyber-attack.html5.Robb, Drew. “Is Neglect Driving the Surge in Cybersecurity Breaches?” 2022. https://www.shrm.org/resourcesandtools/hr-topics/technology/pages/neglect-driving-surge-cybersecurity-breaches.aspx6.Fugue. “A Technical Analysis of the Capital One Cloud Misconfiguration Breach.” 2019. https://www.fugue.co/blog/a-technical-analysis-of-the-capital-one-cloud-misconfiguration-breach7.The Department of Homeland Security’s National Cybersecurity and Communications Integration Center and Industrial Control Systems Cyber Emergency Response Team. Recommended Practice: Improving Industrial Control System Cybersecurity with Defense-in-Depth Strategies. 2016. (Available at https://www.cisa.gov/uscert/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf) 8.National Security Agency. Defense in Depth: A practical strategy for achieving Information Assurance in today’s highly networked environments. 2010. (Available at https://citadel-information.com/wp-content/uploads/2010/12/nsa-defense-in-depth.pdf)9.Burton, Dave. “The Dangers of Firewall Misconfigurations and How to Avoid Them.” 2020. https://www.akamai.com/blog/security/the-dangers-of-firewall-misconfigurations-and-how-to-avoid-them10.Gartner. “Is the Cloud Secure?” 2019. https://www.gartner.com/smarterwithgartner/is-the-cloud-secure11.Whittaker, Zack. “Equifax breach was ‘entirely preventable’ had it used basic security measures, says House report.” 2018. https://techcrunch.com/2018/12/10/equifax-breach-preventable-house-oversight-report/12.Joint Publication 3-12. Cyberspace Operations. 2018. Available at https://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/jp3_12.pdf 13.Marius Musch, Robin Kirchner, Max Boll, and Martin Johns. 2022. Server-Side Browsers: Exploring the Web's Hidden Attack Surface. In Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security (ASIA CCS '22). Association for Computing Machinery, New York, NY, USA, 1168–1181. https://doi.org/10.1145/3488932.3517414. Available at https://loxo.ias.cs.tu-bs.de/papers/2022_AsiaCCS_SSBrowsers.pdf 14.Bo Lu, Xiaokuan Zhang, Ziman Ling, Yinqian Zhang, and Zhiqiang Lin. 2018. A Measurement Study of Authentication Rate-Limiting Mechanisms of Modern Websites. In Proceedings of the 34th Annual Computer Security Applications Conference (ACSAC '18). Association for Computing Machinery, New York, NY, USA, 89–100. https://doi.org/10.1145/3274694.3274714. Available at https://yinqian.org/papers/acsac18a.pdf KEYWORDS: network security, cybersecurity, defense in depth, passive network analytics

Assessing Virtual Private Network (VPN) Networthiness (AVN)

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Integrated Sensing and Cyber, Advanced computing and SoftwareOBJECTIVE: The Assessing Virtual Private Network (VPN) Networthiness (AVN) SBIR topic seeks to develop and demonstrate techniques and systems for automatically analyzing third-party commercial VPN solutions to determine the actual operational privacy profile/performance of such services.DESCRIPTION: Following the COVID-19 pandemic, and the concomitant increase in remote work, organizations and teleworkers sought solutions to keep their connections private and their workplace communications confidential. In other scenarios around the world, populations have sought private and secure solutions to circumvent restrictions on internet access placed on them by authoritarian regimes. It is therefore unsurprising that commercial VPN services have experienced substantial increases in demand over recent years [1, 2, 3]. The surge in VPN service demand has caused an increase in supply to the extent that (for example) the Google Play Store houses several hundred different apps that offer free (for examples, see [4]) and paid VPN services advertising increased privacy, high-speed bandwidth, large numbers of egress servers, access to censored websites, etc. [5] Even though users may be able to easily differentiate between fast and slow VPN services by merely using the service, unfortunately there are no outward signs they can use to quantify the privacy provided by VPN services. As such, users who employ such services to increase their privacy, may in fact be revealing their data to remote networks of less trustworthiness than their own local networks [6, 7]. It is therefore important to be able to proactively and continuously evaluate the properties and quality of protection that a commercial VPN solution offers. With rare exception [8], existing reviews of VPN services are typically conducted by technology journalists and are therefore limited to assessments of the VPN performance (e.g., speed), price, user friendliness (e.g., ease-of-use), features and supported protocols (e.g., see [9]).The AVN SBIR topic seeks to address this shortfall by developing and demonstrating techniques and systems for automatically analyzing third-party commercial VPN solutions to determine their networthiness, where networthiness considerations align with those of the Department of Defense (DoD) and Intelligence Community (IC) [10].PHASE I: The AVN SBIR topic is soliciting Direct to Phase 2 (DP2) proposals only, which must include supporting documentation of Phase I feasibility. Phase I feasibility must be demonstrated through evidence of: a completed proof of concept/principal or basic prototype system; definition and characterization of system properties/technology capabilities desirable for DoD/IC/government and civilian/commercial use; and capability/performance comparisons with existing state-of-the-art technologies/methodologies (competing approaches). Entities interested in submitting a DP2 proposal must provide documentation to substantiate that the scientific/technical merit and feasibility described above has been achieved and also describe the potential commercial applications. DP2 Phase I feasibility documentation should include, at a minimum: •technical reports describing results and conclusions of existing work, particularly regarding the commercial opportunity or DoD/IC insertion opportunity, risks/mitigations, and technology assessments; •presentation materials and/or white papers;•technical papers;•test and measurement data;•prototype designs/models;•performance projections, goals, or results in different use cases; and,•documentation of related topics such as how the proposed AVN solution can enable accurate and reliable analysis of third- party VPN solutions. The collection of Phase 1 feasibility material will verify mastery of the required content for DP2 consideration. DP2 proposers must also demonstrate knowledge, skills, and abilities in the technical areas of software engineering, network security, privacy, analytics, and machine learning. For detailed information on DP2 requirements and eligibility, please refer to the DoD Broad Agency Announcement and the DARPA Instructions for this topic.PHASE II: The AVN DP2 SBIR topic seeks to develop and demonstrate techniques and systems for automatically analyzing third-party commercial VPN solutions to determine the actual operational privacy profile/performance of such services. AVN solutions will provide an objective quantification of the privacy-related performance of third-party VPN services across platforms (e.g., Android, iPhone, PC, MAC, Ubuntu, etc.). Ideal solutions would require limited manual intervention and not rely on information elicited by the VPN service provider. AVN approaches will need to provably scale with the large number of available and future commercial VPN services. Ideally, AVN solutions would enable a user to tailor analyses to specific requirements as VPNs offer varying privacy protections that are not uniformly valuable to every user. DP2 proposals should:•describe a proposed framework design/architecture to achieve the above stated goals;•present a plan for maturation of the framework to a demonstrable prototype system; and•detail a test plan, complete with proposed quantitative metrics for privacy, and for verification and validation of the prototype system performance. Phase II will culminate in a prototype system demonstration using one or more compelling use cases consistent with commercial opportunities and/or insertion into a DARPA program, for example, the Signature Management using Operational Knowledge and Environments (SMOKE) [11] program, which seeks to develop data-driven tools to automate the planning and execution of threat-emulated cyber infrastructure needed for network security assessments.The Phase II Option period will further mature the technology for insertion into a DoD/ IC Acquisition Program, another Federal agency, or commercialization into the private sector.The below schedule of milestones and deliverables is provided to establish expectations and desired results/end products for the Phase II and Phase II Option period efforts.Schedule/Milestones/Deliverables: Proposers will execute the research and development (R&D) plan as described in the proposal, including the below:•Month 1: Phase I Kickoff briefing (with annotated slides) to the DARPA Program Manager (PM) including: any updates to the proposed plan and technical approach, risks/mitigations, schedule (inclusive of dependencies) with planned capability milestones and deliverables, proposed metrics, and plan for prototype demonstration/validation. •Months 4, 7, 10: Quarterly technical progress reports detailing technical progress to date, tasks accomplished, risks/mitigations, a technical plan for the remainder of Phase II (while this would normally report progress against the plan detailed in the proposal or presented at the Kickoff briefing, it is understood that scientific discoveries, competition, and regulatory changes may all have impacts on the planned work and DARPA must be made aware of any revisions that result), planned activities, trip summaries, and any potential issues or problem areas that require the attention of the DARPA PM.•Month 12: Interim technical progress briefing (with annotated slides) to the DARPA PM detailing progress made (including quantitative assessment of capabilities developed to date), tasks accomplished, risks/mitigations, planned activities, technical plan for the second half of Phase II, the demonstration/verification plan for the end of Phase II, trip summaries, and any potential issues or problem areas that require the attention of the DARPA PM.•Month 15, 18, 21: Quarterly technical progress reports detailing technical progress made, tasks accomplished, risks/mitigations, a technical plan for the remainder of Phase II (with necessary updates as in the parenthetical remark for Months 4, 7, and 10), planned activities, trip summaries, and any potential issues or problem areas that require the attention of the DARPA PM. •Month 24: Final technical progress briefing (with annotated slides) to the DARPA PM. Final architecture with documented details; a demonstration of the ability to automatically analyze third-party commercial VPN solutions; documented application programming interfaces; and any other necessary documentation (including, at a minimum, user manuals and a detailed system design document; and the commercialization plan). •Month 30 (Phase II Option period): Interim report of matured prototype performance against existing state-of-the-art technologies, documenting key technical gaps towards productization.•Month 36 (Phase II Option period): Final Phase II Option period technical progress briefing (with annotated slides) to the DARPA PM including prototype performance against existing state-of-the-art technologies, including quantitative metrics for assessment of privacy features/capabilities.PHASE III DUAL USE APPLICATIONS: AVN has potential applicability across DoD/IC/government and commercial entities. For DoD/IC/government, AVN is extremely well-suited for proactive and continuous assessment of privacy features/performance of various VPN services. AVN has the same applicability for the commercial sector and has the potential to provide individuals worldwide with reliable private connections and communications. Phase III refers to work that derives from, extends, or completes an effort made under prior SBIR funding agreements, but is funded by sources other than the SBIR Program. The Phase III work will be oriented towards transition and commercialization of the developed AVN technologies. For Phase III, the proposer is required to obtain funding from either the private sector, a non-SBIR Government source, or both, to develop the prototype into a viable product or non-R&D service for sale in government or private sector markets. Primary AVN support will be to national efforts to help secure government, commercial, and personal networks and devices against advanced persistent threats that target vulnerable VPN devices. Results of AVN are intended to improve understanding of the risks associated with VPNs, across government and industry.REFERENCES:1.“The Impact of COVID-19 on VPN Usage and Streaming Habits”, https://www.cartesian.com/the-impact-of-covid-19-on-vpn-usage-and-streaming-habits/ 2.“VPN Demand Surges Around the World”, https://www.top10vpn.com/research/vpn-demand-statistics/ 3.“Four Risks to Consider with Expanded VPN Deployments”, https://www.f5.com/labs/articles/cisotociso/four-risks-to-consider-with-expanded-vpn-deployments4.“Free VPN Ownership & Security Investigations Update”, https://www.top10vpn.com/research/free-vpn-investigations/ownership-risk-index-update/5.Muhammad Ikram, Narseo Vallina-Rodriguez, Suranga Seneviratne, Mohamed Ali Kaafar, and Vern Paxson. 2016. An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps. In Proceedings of the 2016 Internet Measurement Conference (IMC '16). Association for Computing Machinery, New York, NY, USA, 349–364. https://doi.org/10.1145/2987443.2987471. Available at https://www.cs.umd.edu/class/spring2017/cmsc818O/papers/vpn-app-risks.pdf6.O. Akgul, R. Roberts, M. Namara, D. Levin and M. L. Mazurek, "Investigating Influencer VPN Ads on YouTube," 2022 IEEE Symposium on Security and Privacy (SP), 2022, pp. 876-892, doi: 10.1109/SP46214.2022.9833633. Available at https://www.cs.umd.edu/~akgul/papers/vpn-ads.pdf7.Free VPNs are bad for your privacy”, https://techcrunch.com/2020/09/24/free-vpn-bad-for-privacy/8.Grauer, Yael. “Security and Privacy of VPNs Running on Windows 10.” Consumer Reports Digital Lab. 2021. Available at https://digital-lab-wp.consumerreports.org/wp-content/uploads/2021/12/VPN-White-Paper.pdf 9.https://www.top10vpn.com/reviews/10.https://www.nsa.gov/Press-Room/News-Highlights/Article/Article/2791320/nsa-cisa-release-guidance-on-selecting-and-hardening-remote-access-vpns/11.Defense Advanced Research Projects Agency, SMOKE Broad Agency Announcement HR001122S0006 (2021) (Available at https://sam.gov/opp/6ab1fdaedfd6411ba966025cd74e467c/view)KEYWORDS: custom analytics, network security, privacy, virtual private network

Electronic Control Unit Authentication in Autonomous Vehicles (ECU2A)

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): FutureG, Trusted AI and Autonomy, Advanced Computing and Software, Integrated Sensing and CyberOBJECTIVE: The objective of the Electronic Control Unit Authentication in Autonomous Vehicles (ECU2A) Direct to Phase 2 (DP2) SBIR topic is to develop prototype systems to authenticate, monitor, and detect malicious activities in Electronic Control Units (ECUs) of modern intelligent military and civilian vehicles.DESCRIPTION: ECUs are one of the most critical embedded systems that control many subsystems in a vehicle [1]. A vehicle’s distributed network of ECUs is responsible for the control/functionality of the engine and transmission system, as well as for the control/functionality of the vehicle’s comfort and entertainment systems. Due to the extensive and growing use of ECUs in modern vehicles, and the associated increased costs and complexities they bring (e.g., due to multiple manufacturers, system integration requirements) [2], many vehicle manufacturers have adapted their manufacturing models and design flows to use the intellectual property of third-party ECU manufacturers, and outsource the fabrication of ECU hardware to offshore foundries to reduce the cost and time-to-market for their vehicles. Unfortunately, outsourcing ECU fabrication raises important security concerns [3, 4] for intelligent vehicles used by the civilian sector as well as US expeditionary forces abroad.The various Internet-of-Things (IoT) networks (e.g., Cellular, Local and Personal Area Networks, Low Power Wide Area Networks, and Mesh networks [5]) and the continuing increases in the scale of networked systems offers unprecedented interconnectivity of electronic devices, to include ECUs. Because of the ubiquitous nature and large attack surfaces of IoT networks, threats such as man-in-the-middle attacks, denial of service attacks, and hijacking of services attacks [6] can be successfully executed through bypassing the authentication process of ECUs. The consequences of such attacks can increase in severity if the ECUs are tampered with during production [7, 8, 9], prior to installation in the vehicle. Therefore, it is critical to have the ability to securely authenticate vehicular ECUs and to continuously monitor them for detection of malicious activity.PHASE I: The ECU2A SBIR topic is soliciting DP2 proposals only, which must include supporting documentation of Phase I feasibility. Phase I feasibility must be demonstrated through evidence of: a completed proof of concept/principal or basic prototype system; definition and characterization of system properties/technology capabilities desirable for DoD/IC/government and civilian/commercial use; and capability/performance comparisons with existing state-of-the-art technologies/methodologies (competing approaches). Entities interested in submitting a DP2 proposal must provide documentation to substantiate that the scientific/technical merit and feasibility described above has been achieved and also describe the potential commercial applications. DP2 Phase I feasibility documentation should include, at a minimum: •technical reports describing results and conclusions of existing work, particularly regarding the commercial opportunity or DoD/IC insertion opportunity, risks/mitigations, and technology assessments; •presentation materials and/or white papers; •technical papers; •test and measurement data; •prototype designs/models;•performance projections, goals, or results in different use cases; and, •documentation of related topics such as how the proposed ECU2A solution can enable secure authentication and continuous monitoring of ECUs in modern intelligent vehicles. The collection of Phase I feasibility material will verify mastery of the required content for DP2 consideration. DP2 proposers must also demonstrate knowledge, skills, and abilities in the technical areas of software engineering, network security, cyber security, analytics, and machine learning. For detailed information on DP2 requirements and eligibility, please refer to the DoD Broad Agency Announcement and the DARPA Instructions for this topic.PHASE II: The objective of the ECU2A DP2 SBIR topic is to develop prototype systems to authenticate, monitor, and detect malicious activities in ECUs of modern intelligent military and civilian vehicles.ECU2A will develop new hardware/software/component verification methods, algorithms, and machine learning models to improve vehicular ECU security. Strong ECU2A proposals should address several technical challenges, such as:•effective tools and algorithms for one-time ECU authentication and continuous ECU monitoring schemes;•models capable of rapidly identifying compromised ECUs;.•ECU software/hardware validation techniques, prior to and after installment;•zero-overhead, non-intrusive monitoring schemes, that do not require direct ECU access, for easy and secure deployment;•techniques to rapidly minimize the connection/communication between the source of malicious activity and a targeted ECU;•capabilities to detect hardware/software trojans with no reverse-engineering techniques;•monitoring methods for devices operating on a broad range of ECU components, and which have an air-gapped nature.Phase II will culminate in a demonstration of the application and validation of ECU2A-developed technologies for detecting malicious activity against one or more concrete technological use cases of integrated software systems.Schedule/Milestones/Deliverables: Proposers will execute the research and development (R&D) plan as described in the proposal, including the below: •Month 1: Phase I Kickoff briefing (with annotated slides) to the DARPA Program Manager (PM) including: any updates to the proposed plan and technical approach, risks/mitigations, schedule (inclusive of dependencies) with planned capability milestones and deliverables, proposed metrics, and plan for prototype demonstration/validation. •Months 4, 7, 10: Quarterly technical progress reports detailing technical progress to date, tasks accomplished, risks/mitigations, a technical plan for the remainder of Phase II (while this would normally report progress against the plan detailed in the proposal or presented at the Kickoff briefing, it is understood that scientific discoveries, competition, and regulatory changes may all have impacts on the planned work and DARPA must be made aware of any revisions that result), planned activities, trip summaries, and any potential issues or problem areas that require the attention of the DARPA PM. •Month 12: Interim technical progress briefing (with annotated slides) to the DARPA PM detailing progress made (including quantitative assessment of capabilities developed to date), tasks accomplished, risks/mitigations, planned activities, technical plan for the second half of Phase II, the demonstration/verification plan for the end of Phase II, trip summaries, and any potential issues or problem areas that require the attention of the DARPA PM. •Month 15, 18, 21: Quarterly technical progress reports detailing technical progress made, tasks accomplished, risks/mitigations, a technical plan for the remainder of Phase II (with necessary updates as in the parenthetical remark for Months 4, 7, and 10), planned activities, trip summaries, and any potential issues or problem areas that require the attention of the DARPA PM. •Month 24: Final technical progress briefing (with annotated slides) to the DARPA PM. Final architecture with documented details; a demonstration of the ability to authenticate, monitor, and detect malicious activities in ECUs; documented application programming interfaces; and any other necessary documentation (including, at a minimum, user manuals and a detailed system design document; and the commercialization plan). •Month 30 (Phase II Option period): Interim report of matured prototype performance against existing state-of-the-art technologies, documenting key technical gaps towards productization. •Month 36 (Phase II Option period): Final Phase II Option period technical progress briefing (with annotated slides) to the DARPA PM including prototype performance against existing state-of-the-art technologies, including quantitative metrics for assessment of prototype features/capabilities.PHASE III DUAL USE APPLICATIONS: ECU2A has potential applicability across DoD/IC/government and commercial entities. For DoD/IC/government, ECU2A is extremely well-suited for improving the security of intelligent vehicles used by US expeditionary forces abroad. ECU2A has the same applicability for the commercial sector.Phase III refers to work that derives from, extends, or completes an effort made under prior SBIR funding agreements, but is funded by sources other than the SBIR Program. The Phase III work will be oriented towards transition and commercialization of the developed ECU2A technologies. For Phase III, the proposer is required to obtain funding from either the private sector, a non-SBIR Government source, or both, to develop the prototype into a viable product or non-R&D service for sale in government or private sector markets. Primary ECU2A support will be to national efforts to help secure military and commercial intelligent vehicle ECUs against threats that target vulnerabilities. Results of ECU2A are intended to improve understanding of the threats and vulnerabilities associated with the increasing use of intelligent vehicles, across government and industry.REFERENCES:1.Jaks, L. (2014). Security Evaluation of the Electronic Control Unit Software Update Process. Available at: http://kth.diva-portal.org/smash/get/diva2:934083/FULLTEXT01.pdf 2.Electronics Sourcing. (2022). How Many Chips are in Our Cars?https://electronics-sourcing.com/2022/05/04/how-many-chips-are-in-our-cars3.R. Kurachi et al., "Evaluation of Security Access Service in Automotive Diagnostic Communication," 2019 IEEE 89th Vehicular Technology Conference (VTC2019-Spring), 2019, pp. 1-7, doi: 10.1109/VTCSpring.2019.8746714. Available at https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8746714. 4.Spaan, R.. Secure updates in automotive systems. Nijmegen: Radboud University(2016): 1-71. Available at: https://www.ru.nl/publish/pages/769526/z_remy_spaan.pdf5.IotaComm. 2020. Four Types Of IoT Wireless Networks. https://www.iotacommunications.com/blog/types-of-iot-networks/6.Huq, N. et al. “Cybersecurity for Connected Cars: Exploring Risks in 5G, Cloud, and OtherConnected Technologies.” Trend Micro Research. 2021. Available at: https://documents.trendmicro.com/assets/white_papers/wp-cybersecurity-for-connected-cars-exploring-risks-in-5g-cloud-and-other-connected-technologies.pdf7.Cho, Kyong-Tak, and Kang G. Shin. "Fingerprinting electronic control units for vehicle intrusiondetection." 25th USENIX Security Symposium (USENIX Security 16). 2016. Available at https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_cho.pdf8.Kim, Kyounggon, et al. "Cybersecurity for autonomous vehicles: Review of attacks and defense."Computers & Security, Volume 103 (2021): 102150. ISSN 0167-4048, https://doi.org/10.1016/j.cose.2020.102150.9.Wasicek, A. and Weimerskirch, A. “Recognizing manipulated electronic control units,” . SAE Technical Paper 2015-01-0202, 2015, https://doi.org/10.4271/2015-01-0202.. Available at https://ptolemy.berkeley.edu/projects/chess/pubs/1111/autoids_v2_preprint1.pdf.KEYWORDS: Electronic Control Units, Cyber Security, Intrusion Detection, Intelligent Vehicles

Network Black Box (NBB)

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Integrated Sensing and Cyber, Advanced computing and SoftwareOBJECTIVE: The Network Black Box Direct to Phase 2 (DP2) SBIR topic seeks to develop and demonstrate a system prototype capable of automatically retaining, retrieving, and analyzing network data to support threat detection and response efforts by cyber security operations teams.DESCRIPTION: Today’s enterprise networks are challenged by a myriad of cyber threats that can jeopardize the confidentiality, integrity, and availability of a network. An organization’s enterprise security controls aim to protect the organization’s networks against threats from hackers, malicious software, and attempts to steal sensitive information [1]. Threat hunting and incident response tactics, techniques, and procedures (TTPs) employed by an organization’s cyber security operations teams help protect the networks by continuously monitoring for threats in progress that evade security controls and breach the network [2]. Despite significant investment in enterprise security controls, and the collection and use of diverse and voluminous datasets for threat hunting and incident response, many organizations lack the infrastructure capacity and resources to store key enterprise network security data in a reliable, efficient, and cost-effective way, for durations comparable to the average dwell time [3] of cyber attackers (i.e., the amount of time an attacker spends on a target network before being detected). Dwell times, which vary based on region and other factors, can average up to two months, giving attackers plenty of time to wreak havoc on the target network [4]. In addition, shortfalls in infrastructure capacity and resources adversely impacts an organization’s ability to efficiently and effectively conduct incident response forensics on the network security data, once intrusion is detected.Organizations across government and industry would benefit from a simple, yet powerful, reliable, efficient, and cost-effective mechanism to support automated retention, retrieval, and analysis of key enterprise network data for security operations teams to conduct incident response forensics, such as root cause analysis [5] and lateral movement [6] detection, ex post facto.PHASE I: The Network Black Box SBIR topic is soliciting Direct to Phase 2 (DP2) proposals only, which must include supporting documentation of Phase 1 feasibility. Phase I feasibility must be demonstrated through evidence of: a completed proof of concept/principal or basic prototype system; definition and characterization of system properties/technology capabilities desirable for DoD/IC/government and civilian/commercial use; and capability/performance comparisons with existing state-of-the-art technologies/methodologies (competing approaches). Entities interested in submitting a DP2 proposal must provide documentation to substantiate that the scientific/technical merit and feasibility described above has been achieved and also describe the potential commercial applications. DP2 Phase I feasibility documentation should include, at a minimum: •technical reports describing results and conclusions of existing work, particularly regarding the commercial opportunity or DoD/IC insertion opportunity, risks/mitigations, and technology assessments; •presentation materials and/or white papers;•technical papers;•test and measurement data;•prototype designs/models;•performance projections, goals, or results in different use cases; and,•documentation of related topics such as how the proposed Network Black Box solution can enable the retention, retrieval, and analysis of network data to support threat detection and response efforts by security operations teams. The collection of Phase 1 feasibility material will verify mastery of the required content for DP2 consideration. DP2 proposers must also demonstrate knowledge, skills, and abilities in the technical areas of cyber operations, software engineering, network security, data analytics, artificial intelligence, and machine learning. For detailed information on DP2 requirements and eligibility, please refer to the DoD Broad Agency Announcement and the DARPA Instructions for this topic.PHASE II: The Network Black Box DP2 SBIR topic seeks to develop and demonstrate a system prototype capable of automatically retaining, retrieving, and analyzing network data to support threat detection and response efforts by security operations teams. It is envisioned that Network Black Box approaches will take the form of a physical or virtual appliance with an intuitive user interface supporting at least the two use cases stated previously, namely root cause analysis and lateral movement detection. Proposed solutions should enable organizations to retain and analyze enterprise network data for at least one year for a network consisting of at least 10,000 hosts. Strong Network Black Box proposals will provide experimental evidence and a quantitative analysis on the cost, capacity, and scalability of such a capability, and present preliminary evidence on the usefulness of the retained data for root cause analysis, lateral movement detection, and any additional use cases.DP2 proposals should:•describe a proposed framework design/architecture to achieve the above stated goals;•present a plan for maturation of the framework to a demonstrable prototype system; and•detail a test plan, complete with proposed quantitative metrics for verification and validation of the prototype system performance.Phase II will culminate in a prototype system demonstration using compelling use cases consistent with commercial opportunities and/or insertion into a DARPA program (e.g., the Cyber Agents for Security Testing and Learning Environments (CASTLE) [7] program which seeks to generate data-driven, machine-readable descriptions of how attacker tools behave, how attack paths unfold, and how to label observable attack behavior; and the Signature Management using Operational Knowledge and Environments (SMOKE) [8] program which seeks to assist red teams with planning with deploying TTPs to evade network defenders in order to achieve assessment objectives (e.g., lateral movement in networks) and assess how networks perform against malicious cyber actors (MCAs)).The Phase II Option period will further mature the technology for insertion into a DoD/ IC Acquisition Program, another Federal agency, or commercialization into the private sector.The below schedule of milestones and deliverables is provided to establish expectations and desired results/end products for the Phase II and Phase II Option period efforts.Schedule/Milestones/Deliverables: Proposers will execute the research and development (R&D) plan as described in the proposal, including the below:•Month 1: Phase I Kickoff briefing (with annotated slides) to the DARPA Program Manager (PM) including: any updates to the proposed plan and technical approach, risks/mitigations, schedule (inclusive of dependencies) with planned capability milestones and deliverables, proposed metrics, and plan for prototype demonstration/validation. •Months 4, 7, 10: Quarterly technical progress reports detailing technical progress to date, tasks accomplished, risks/mitigations, a technical plan for the remainder of Phase II (while this would normally report progress against the plan detailed in the proposal or presented at the Kickoff briefing, it is understood that scientific discoveries, competition, and regulatory changes may all have impacts on the planned work and DARPA must be made aware of any revisions that result), planned activities, trip summaries, and any potential issues or problem areas that require the attention of the DARPA PM. •Month 12: Interim technical progress briefing (with annotated slides) to the DARPA PM detailing progress made (including quantitative assessment of capabilities developed to date), tasks accomplished, risks/mitigations, planned activities, technical plan for the second half of Phase II, the demonstration/verification plan for the end of Phase II, trip summaries, and any potential issues or problem areas that require the attention of the DARPA PM.•Month 15, 18, 21: Quarterly technical progress reports detailing technical progress made, tasks accomplished, risks/mitigations, a technical plan for the remainder of Phase II (with necessary updates as in the parenthetical remark for Months 4, 7, and 10), planned activities, trip summaries, and any potential issues or problem areas that require the attention of the DARPA PM. •Month 24: Final technical progress briefing (with annotated slides) to the DARPA PM. Final architecture with documented details; a demonstration of the ability to automatically retain, retrieve, and analyze network data to support threat detection and response efforts by security operations teams; documented application programming interfaces; and any other necessary documentation (including, at a minimum, user manuals and a detailed system design document; and the commercialization plan). •Month 30 (Phase II Option period): Interim report of matured prototype performance against existing state-of-the-art technologies, documenting key technical gaps towards productization.•Month 36 (Phase II Option period): Final Phase II Option period technical progress briefing (with annotated slides) to the DARPA PM including prototype performance against existing state-of-the-art technologies, including quantitative metrics for assessment of privacy features/capabilities.PHASE III DUAL USE APPLICATIONS: Network Black Box has potential applicability across DoD/IC/government and commercial entities. For DoD/IC/government, Network Black Box is extremely well-suited for forensic analysts tasked with conducting postmortems after an organization’s network is compromised. Network Black Box has the same applicability for the commercial sector. Phase III refers to work that derives from, extends, or completes an effort made under prior SBIR funding agreements, but is funded by sources other than the SBIR Program. The Phase III work will be oriented towards transition and commercialization of the developed Network Black Box technologies. For Phase III, the proposer is required to obtain funding from either the private sector, a non-SBIR Government source, or both, to develop the prototype into a viable product or non-R&D service for sale in government or private sector markets. Primary Network Black Box support will be to national efforts to help secure government and commercial networks against MCAs that target critical networks. Results of Network Black Box are intended to improve understanding of MCA threats and improve detection and response actions across government and industry.REFERENCES:1.NIST SP 800-53 Revision 5. 2020. “Security and Privacy Controls for Information Systems and Organizations.” https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r5.pdf2.Waqas, Iam. PrivacyAffairs. 2022. .https://www.privacyaffairs.com/threat-hunting-vs-incident-response/ \3.Armor Defense. 2021. “Dwell Time as a Critical Security Success Metric.” https://cdn.armor.com/app/uploads/2020/04/Ebook-DwellTime.pdf4.Nayyar, Saryu. “Why The Dwell Time Of Cyberattacks Has Not Changed.” 2021. https://www.forbes.com/sites/forbestechcouncil/2021/05/03/why-the-dwell-time-of-cyberattacks-has-not-changed/?sh=1ddedc37457d5.Gross, Natalie. CDW StateTech. 2021. “Incident Response: The Steps to a Root Cause Analysis for State Government.”6.Cybertalk.org. 2022. https://www.cybertalk.org/what-is-lateral-movement-computing/ 7.DARPA I2O. 2022. Broad Agency Announcement, Cyber Agents for Security Testing and LearningEnvironments (CASTLE) HR001123S0002. Available at https://sam.gov/opp/5fa7645fdf464f70b5c67e24585926f7/view.8.DARPA I2O. 2021. Broad Agency Announcement, Signature Management using Operational Knowledge and Environments (SMOKE) HR001122S0006. Available at https://sam.gov/opp/8832e2b8d9864169a234834eea89e5f1/viewKEYWORDS: Network Security, Cybersecurity, Incident Response, Threat Hunting, Artificial Intelligence, Machine Learning, Automation, Data Analytics

5G Test Environment (5GTE)

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Integrated Sensing and Cyber, Advanced computing and SoftwareOBJECTIVE: The objective of the 5GTE Direct to Phase 2 (DP2) SBIR topic is to develop a scalable, open-source Internet of Things (IoT) fifth generation (5G) test environment capability to support research and development of nascent 5G technologies.DESCRIPTION: 5GTE seeks to develop a 5G test environment for IoT devices to enable research, development, and experimentation with a broad range of 5G-capable devices, both static and mobile. The focus of 5GTE is to provide an open-source, realistic 5G radio access network to enable rapid prototyping of wireless protocols and applications including, but not limited to: cyber security, artificial intelligence, and edge-computing. A key requirement of 5GTE is the ability to rapidly and accurately scale as new technologies and devices are introduced/become available. 5GTE must also provide remote access and device update capabilities. To broaden the range of supported devices and to facilitate development, 5GTE should have the ability to support different wireless communication technologies (e.g., fourth generation, wireless fidelity).5GTE’s network access should support high-fidelity quality of service for experimentation with different 3rd Generation Partnership (3GPP) [1] Project Release 17 [2] use cases.While open-source 5G testbed architectures do exist [3], they do not fully support remote accessibility and management to allow for multiple experiments and tests to co-exist simultaneously.PHASE I: The 5GTE SBIR topic is soliciting DP2 proposals only, which must include supporting documentation of Phase I feasibility. Phase I feasibility must be demonstrated through evidence of: a completed proof of concept/principal or basic prototype system; definition and characterization of system properties/technology capabilities desirable for DoD/IC/government and civilian/commercial use; and capability/performance comparisons with existing state-of-the-art technologies/methodologies (competing approaches). Entities interested in submitting a DP2 proposal must provide documentation to substantiate that the scientific/technical merit and feasibility described above has been achieved and also describe the potential commercial applications. DP2 Phase I feasibility documentation should include, at a minimum: •technical reports describing results and conclusions of existing work, particularly regarding the commercial opportunity or DoD/IC insertion opportunity, risks/mitigations, and technology assessments; •presentation materials and/or white papers; •technical papers; •test and measurement data; •prototype designs/models;•performance projections, goals, or results in different use cases; and, •documentation of related topics such as how the proposed 5GTE solution can enable research and development of nascent 5G technologies. The collection of Phase I feasibility material will verify mastery of the required content for DP2 consideration. DP2 proposers must also demonstrate knowledge, skills, and abilities in the technical areas of: mobile communications, software engineering, network security, cyber security, programmable networking, and artificial intelligence. For detailed information on DP2 requirements and eligibility, please refer to the DoD Broad Agency Announcement and the DARPA Instructions for this topic.PHASE II: The objective of the 5GTE DP2 SBIR topic is to develop a scalable, open-source IoT 5G test environment capability to support research and development of nascent 5G technologies.5GTE DP2 proposals should:1.describe a proposed design/architecture to achieve the 5GTE goals, along with application programming interfaces that allow for an open IoT testbed infrastructure;2.present a plan for maturation of the architecture to a prototype testbed to demonstrate accurate and scalable experimentation capabilities; and,3.detail a test plan, complete with proposed metrics and scope (e.g., testbed structure, types/numbers of devices, etc.) for verification and validation of the testbed capabilities.5GTE should have the ability to support multiple isolated environments to enable testing in parallel with security guarantees. Each isolated environment would support full standards compliant user authentication on the 5G core side, where the end devices can use programmable subscriber identity module cards; and the core would support network slicing capabilities.Strong 5GTE proposals would include:•additional scaling capabilities enabled via emulation of various end devices; •solutions based on components with strong open-source development and community support, such as the technology projects that reside within the Linux Foundation [5]; and,•a commercialization plan for the proposed 5GTE which articulates a clear vision for the potential business opportunities as 5G capabilities and standards evolve.Phase II will culminate in a testbed demonstration using one or more compelling IoT use cases consistent with commercial opportunities and/or insertion into the DARPA/I2O Open, Programmable, Secure 5G (OPS-5G) program [4]. The below schedule of milestones and deliverables is provided to establish expectations and desired results/end product for the DP2 effort.Schedule/Milestones/Deliverables: Proposers will execute the research and development (R&D) plan as described in the proposal, including the below: •Month 1: Phase I Kickoff briefing (with annotated slides) to the DARPA Program Manager (PM) including: any updates to the proposed plan and technical approach, risks/mitigations, schedule (inclusive of dependencies) with planned capability milestones and deliverables, proposed metrics, and plan for prototype demonstration/validation. •Months 4, 7, 10: Quarterly technical progress reports detailing technical progress to date, tasks accomplished, risks/mitigations, a technical plan for the remainder of Phase II (while this would normally report progress against the plan detailed in the proposal or presented at the Kickoff briefing, it is understood that scientific discoveries, competition, and regulatory changes may all have impacts on the planned work and DARPA must be made aware of any revisions that result), planned activities, trip summaries, and any potential issues or problem areas that require the attention of the DARPA PM. •Month 12: Interim technical progress briefing (with annotated slides) to the DARPA PM detailing progress made (including quantitative assessment of capabilities developed to date), tasks accomplished, risks/mitigations, planned activities, technical plan for the second half of Phase II, the demonstration/verification plan for the end of Phase II, trip summaries, and any potential issues or problem areas that require the attention of the DARPA PM. •Month 15, 18, 21: Quarterly technical progress reports detailing technical progress made, tasks accomplished, risks/mitigations, a technical plan for the remainder of Phase II (with necessary updates as in the parenthetical remark for Months 4, 7, and 10), planned activities, trip summaries, and any potential issues or problem areas that require the attention of the DARPA PM. •Month 24: Final technical progress briefing (with annotated slides) to the DARPA PM. Final architecture with documented details; a demonstration of the ability to authenticate, monitor, and detect malicious activities in ECUs; documented application programming interfaces; and any other necessary documentation (including, at a minimum, user manuals and a detailed system design document; and the commercialization plan). •Month 30 (Phase II Option period): Interim report of matured prototype performance against existing state-of-the-art technologies, documenting key technical gaps towards productization. •Month 36 (Phase II Option period): Final Phase II Option period technical progress briefing (with annotated slides) to the DARPA PM including prototype performance against existing state-of-the-art technologies, including quantitative metrics for assessment of test environment features/capabilities.PHASE III DUAL USE APPLICATIONS: 5GTE has potential applicability across DoD/IC/government and commercial entities. For DoD/IC/government, 5GTE is extremely well-suited for supporting research to investigate 5G capability enhancements and cyber risks. 5GTE has the same applicability for the commercial sector.Phase III refers to work that derives from, extends, or completes an effort made under prior SBIR funding agreements, but is funded by sources other than the SBIR Program. The Phase III work will be oriented towards transition and commercialization of the developed 5GTE technologies. For Phase III, the proposer is required to obtain funding from either the private sector, a non-SBIR Government source, or both, to develop the prototype into a viable product or non-R&D service for sale in government or private sector markets. Primary 5GTE support will be to national efforts to advance US 5G capabilities and to promote awareness of 5G risks to national security. Results of 5GTE are intended to enable accurate test and evaluation of nascent 5G technologies at scale, across government and industry.REFERENCES:1.3GPP. 3GPP - A Global Initiative. https://www.3gpp.org/ 2.3GPP. 3GPP – The 5G Standard. https://www.3gpp.org/specifications-technologies/releases/release-17 3.Institute for the Wireless Internet of Things at Northeastern University. Testbeds to develop and experiment with open, programmable, 5G networks. https://open5g.info/testbeds/ 4.DARPA Broad Agency Announcement: Open Programmable Secure 5G (OPS-5G), HR001120S0026, January 30, 2020. Available at https://beta.sam.gov/opp/6ee795ad86a044d1a64f441ef713a476/view 5.The Linux Foundation. The Linux Foundation. https://www.linuxfoundation.org/ KEYWORDS: Fifth Generation (5G), Internet of Things (IoT), Test Environment, Scalability, Open-source, Security, Cyber Security, Artificial Intelligence, and Edge-computing

Autonomous Systems at Scale - Open Topic

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Advanced Computing and Software, Human-Machine Interfaces, Microelectronics, Trusted AI and Autonomy

OBJECTIVE: The objective of the Autonomous Systems at Scale Open SBIR topic is to develop autonomous systems that remove service members from dangerous environments and speed manual-labor tasks to enable paradigm-shifting tactics.

DESCRIPTION: The DoD’s ability to maintain a global presence currently requires intensive manpower focused on well-defined and sometimes monotonous tasks. Autonomous solutions can be powerful force multipliers, reallocating the burden of these tasks to machines and decreasing risks to personnel. For example, Explosive Ordnance Disposal (EOD) operations often involve a human technician following written instructions to execute procedures on well-understood ordnance, either by hand or by remotely operating Unmanned Systems (UxS). Removing humans from the blast radius will not only decrease risk but also allow personnel to prioritize novel first-seen threats.

Developing autonomous solutions for well-defined problems comes with a range of challenges that differ by domain. For example, ground-based systems can encounter environmental obstacles while interacting with clutter, aerial vehicle utility is often limited by power capacity, and unmanned underwater vehicles suffer from communications limitations. Additionally, fielded systems often do not have interoperable architectures.

DARPA solicits technologies to address the critical limitations of creating autonomous solutions for well-defined problems. Examples of technologies of interest include but are not limited to systems that:

1. Build or repair damaged infrastructure (e.g., repairing many blast craters in parallel and with minimal human oversight).

2. Decrease the operator-to-robot ratio in UxS response operations (e.g., allowing a single operator to quickly neutralize large numbers of explosive threats in a near-peer conflict).

3. Reduce the manpower requirements of physical burdens (e.g, unloading cargo at an expeditionary base).

Strong proposals will identify a critical limitation to scalable autonomy, then design a system and/or component that overcomes the problem. Proposers should identify metrics that compare the proposed concept with the deployed state of the art. The aim of the solicitation is to create an unclassified prototype that is ready for field testing at the end of Phase II. Submissions solely focused on software or solely focused on hardware without significant autonomy are not of interest, nor are proposed solutions in the areas of kinetic effects or intelligence, surveillance, and reconnaissance. Systems developed should be robust and maximize operational availability.

An initial white paper describing the technical approach is required and will be screened for responsiveness to the topic. The technical white paper should include an overview of the proposed concept with details to support feasibility. The overview should address the bullets below listed in order of importance:

  • Proposed system: Describe the proposed system. Outline the design and operation of the main hardware and software components that are being proposed for development and if applicable, which parts of the system are COTS.
  • Concept of Employment: Identify how the proposed system could be employed. Provide details on the problem the autonomous system is addressing and the prevalence of this problem. What metric does the proposed solution improve, and by how much?
  • Scalability: Provide a brief analysis of the feasibility of scaling the system across the DoD and industry. Are the production costs low enough to merit widespread adoption? Is the system sufficiently autonomous that large-scale deployment wouldn’t require significant training or human labor? What are the projected maintenance requirements, operational availabilities, and service lifetimes?

PHASE I: Companies will complete a feasibility study that demonstrates the firm’s competitive technical advantage relative to other commercial products (if other products exist) and develop concept plans for how the company’s technology can be applied to more efficiently scale autonomous capability. Studies should clearly detail and identify a firm’s technology at both the individual component and system levels, provide supporting literature for technical feasibility, highlight existing performance data, showcase the technology’s application opportunities to a broad base of customers outside the defense space, a market strategy for the commercial space, how the technology directly increases the prevalence of autonomous capability as well as include a technology development roadmap to demonstrate scientific and engineering viability. Proposers should recommend quarterly technical milestones that will be used to demonstrate their progress to DARPA throughout Phase I. These milestones will also be accompanied by monthly financial and technical summary reports.

At the end of Phase I, the company will be required to provide a formal proposal in writing, to include quarterly milestones, defining how their technology would be developed and implemented into relevant concepts of operation. A commercialization roadmap will also be required to demonstrate a high probability that continued design and development will result in a Phase II mature product. For example, a proposal that addresses infrastructure repair might describe how the solution(s) would be employed in expeditionary military construction operations, how it nests into a broader commercial need, and specify what performance metrics (threshold and objective) would demonstrate system viability.

PHASE II: Produce prototype solutions that enable mission essential tasks. These products will be provided to select DoD units for further evaluation by personnel. In addition, companies will provide a technology transition and commercialization plan for DOD and commercial markets.

PHASE III DUAL USE APPLICATIONS: Components and/or systems could be applied to scale autonomy in multiple industries, including but not limited to, those within the energy and construction sectors that leverage UxS in survey or infrastructure development tasks. These same technologies have DOD application in the air, ground, and underwater domains. The business will transition the solution to provide expanded mission capability for a broad range or potential Government and civilian users and alternate mission applications.

REFERENCES:

  1. B.N. Diggs et al., “Automated Construction of Expeditionary Structures (ACES)” US Army Corps of Engineers Engineer Research and Development Center/Construction Engineering Research Laboratory (ERDC/CERL TR-21-6). February 2021.
  2. K. Song and P.C. Chu. “Conceptual Design of Future Undersea Unmanned Vehicle (UUV) System for Mine Disposal.” IEEE Systems Journal, Vol 6, 2012

KEYWORDS: Unmanned Systems; Autonomy; Robotics; Logistics; Artificial Intelligence, Autonomous Logistics; Autonomous Construction; Infrastructure Survivability

Canopies for High-speed Ultra-Long Terrain Execution (CHUTE)

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Advanced Materials, Human-Machine Interfaces

OBJECTIVE: Design, develop and demonstrate a proof-of-concept ram-air parachute specifically capable of low-altitude (<1000 feet) and long-distance (>10 km) flight, in a parachute rig weighing <50 kg. Such parachute systems will need to be capable of forcing air into parachute cells to keep them inflated during flight over long distances, with ultimate range being a function of the capabilities of this forced air system. Proposers should include any testing capabilities needed to verify that the modified canopy is in an airworthy (jumpable) configuration, without significant impact to the probability of a successful opening.

DESCRIPTION: Parachute technology has evolved (Figure 1) since the creation of round canopies, which slow the rate of descent by creating drag. Ram-air canopies, developed in the 1970s, have inflatable parallel cells that fill with high-pressure air from vents that face forward on the leading edge of the airfoil. The fabric is shaped, and the parachute lines trimmed under load, such that the ballooning fabric inflates into a cambered airfoil shape. Air must flow faster over the top than the bottom, creating lift in addition to drag, and allowing steerability by controlled deflection of air. The use of airplane terminology is no accident; ram-air canopy designs share many features with airplane wings.

DoD 23.4 SBIR Annual BAA (1)

Figure 1. Evolution of parachute technology, demonstrating the steady growth toward rigid wing-like structures. CHUTE aims to redesign the canopy wing for long-distance, low-altitude flight with an airplane philosophy in mind.

In order to create a new paradigm for quiet, long-distance, low-altitude flight using parachutes, DARPA seeks to leverage recent advances in aerodynamics and materials technology to develop cost-effective ram-air parachutes that deliver a revolutionary leap in the distance that can be traversed, without significantly adding to the mass of the overall parachute rig or impacting its airworthiness (defined here as “jumpability”, the probability of a successful parachute opening).

Today’s state of the art is dynamic, maneuverable cross-braced canopies used in the competitive high-speed sport of parachute swooping. Swooping canopies can generate speeds in excess of 70 miles per hour, traverse lengths greater than a football field at one foot above ground level (AGL), change direction abruptly when flying around “gates”, and land on a specific target with accuracy. Zero porosity aerodynamic parachute material, span-wise inflatable ribs, low drag lines, a more rigid wing-like design, and high wing loading allow finer control in close proximity to the ground, sometimes simply by shifting weight in the harness. However, modern parachutes ultimately remain a prisoner to energy conservation. Swoopers generate high kinetic energy by trading for potential energy (altitude over a drop zone). When this kinetic energy is exhausted, they must land, placing physics limits on speed and distance they can traverse.

Powered paragliders are one way that sustained flight may be possible. However, three limitations place constraints on the use of these systems for military operations: noise, weight and speed. Powered paragliders can create in excess of 120 dB of sound, typically weigh >250 lbs, and have large parafoils with dozens of cells, resulting in parasitic drag that limits sustained speed to <30 mph. Powered paragliders are therefore out of scope for this effort. The Joint Precision Aerial Descent System (JPADS) has used winches, wires and pulleys located below the parachute to demonstrate lightweight, adjustable airflow control on round parachutes, but is ultimately constrained by the round canopy’s limited maneuverability. Round canopies are therefore out of scope for this effort. Concepts that rely exclusively on powered cargo and do not add propulsion to the parachute canopy (e.g. LRPADS [2]) are out of scope. For more information on this topic, see https://www.youtube.com/watch?v=7_kqMjz94B8.

PHASE I: Phase I consists of a base period of six months that will result in the development, design, and refinement of a low-mass (<50 kg) parachute system design capable of long-distance (>10 km) flight, to create continuously inflated parachute cells at altitudes of 1000-3000 ft. AGL.

Successful proposals for this SBIR offering must make significant arguments supporting the ability to rapidly iterate and execute to meet the timelines laid out in this solicitation, while addressing three key aspects of the program goals: (1) how the method of powered propulsion or forced air will be integrated into the parachute wing and/or jumper; (2) to what degree such propulsion interacts with, or relies upon, ground effect aerodynamics and canopy wing design; (3) how the parachute and powered propulsion system will be built and tested via real-world jump operations planned for Phase II. Successful proposals will also demonstrate in-depth knowledge of aerodynamic design and parachute fabrication, and should illustrate how their method might be expected to meet the envisioned metrics.

This effort is expected to primarily center around new active airflow control and/or powered motor methods, that are conformally integrated with ram-air parachutes and allow sustained flight for as long as that control or power is provided. Methods such as adjustable inlet control, battery-powered bleed air for directional control, laminar flow injection, boundary layer control to maintain lift across long traverse distances, or other innovative methods, are suitable for investigation. Recent developments have shown that designed geometric openings can create macro-control with new wing shapes, or the opening/closing of slots or voids for air flow (e.g., ram air parachutes with controllable flaps for directional control). Additional efforts to minimize drag may be required to maximize range.

Phase I fixed payable milestones for this program should include:

Phase I Base period (required): 6 months

  • Month 2: Concept Design Review (CoDR) on powered parachute design, in accordance with the metrics below.
  • Month 4: Preliminary Design Review (PDR). Initial report on “do no harm” probability.
  • Month 6: Critical Design Review (CDR). Interim report on “do no harm” probability, scalability, proposed cost and noise estimates. Present initial test and evaluation plan, hardware purchase plan, and safety plan for Phase II testing.

Performers may perform lab or bench-scale testing to increase design fidelity as desired, as long as this does not negatively impact the design review schedule. Performers will work with DARPA to identify potential transition partners for demonstrations in Phase II. Performers will present plans to manufacture prototype parachute(s) and test them in Phase II.

Phase I metrics: Present the design, at a CDR level, of a parachute system that can:

  • Deliver air to canopy cells, or use other innovative methods, to maintain sustained parachute canopy flight at an altitude of >500 ft. AGL and <3000 ft. AGL (<5000 ft. MSL),
  • Do so for a horizontal flight distance greater than 10 km from the point of engagement,
  • Do so in less than 20 seconds from a manual initiation command,
  • Do so while preserving total mass of the parachute rig (to include a reserve parachute) at <50 kg,
  • If weight is added to the body of the jumper, add no more than 50 lbs. to the weight of the jumper,
  • Be capable of being engaged while airborne, and disengaged via manual control in order to land as needed,
  • Maintain a forward speed of at least 20 mph, at an altitude of >500 ft. AGL and <3000 ft. AGL (<5000 ft. MSL),
  • Determine the probability of a successful opening of the prototype, i.e., demonstrate “do no harm” with the added mechanism(s) to existing opening probability when in a rigger-approved, properly packed configuration.
  • Present estimates of the noise generated by the system in flight, in decibels (dB),
  • Present scalability calculations for maximum projected range, with added mass,
  • Present the proposed cost of the parachute system when produced at scale, as demonstrated via techno-economic analysis of the cost of production, in dollars per parachute rig.
  • Systems may use initiation energy from a parachute dive that increases velocity (e.g., a diving swoop that trades potential energy for kinetic energy), but may not use such methods when at the flight altitude.

Proposers must begin their effort with an experienced, licensed parachute rigger team, with significant practical experience in parachute packing, repair, evaluation, and modification. Additionally, by the end of Phase I, proposers should demonstrate the following:

  • To show available expertise for Phase II fabrication of the proposed design: teaming with an existing commercial parachute manufacturer that has sold at least 5,000 airworthy canopy units;
  • To conduct jump testing in Phase II: teaming with an existing US Parachute Association (USPA) compliant drop zone [1].

PHASE II: The Phase II effort consists of a base period of 12 months, an Option 1 period of 12 months and an Option 2 period of 12 months. The Option 2 period will follow the Option 1 period. DARPA reserves the right to release a separate Direct to Phase II (DP2) SBIR solicitation in lieu of exercising either Option.

Testing in the base period will center around design, feasibility testing and proof-of-concept. Experimental assessments of ram-air generation, and interaction with parachute cells, may also be necessary to demonstrate a proof of concept. Testing in the option periods will expand the maximum range, reduce noise, and conduct a challenge-based flyoff (Figure 2).

Phase II fixed payable milestones for this program should include:

  • Base period: 12 months
    • Month 4: Bench Testing Review (BTR). First prototype ready for bench testing at parachute manufacturer facility. Deliver assessments of the degree of maneuverability and speed, and experimentally demonstrate key components that produce parachute cell inflation. Deliver interim report on trade studies, integration of hardware to canopy and canopy to rig, and system design. Present final test and evaluation plan, and safety plan for testing.
    • Month 9 (optional; dummy real-world jumps may be substituted to achieve the same end goal): Complete wind tunnel testing. Deliver interim report, describing results of wind tunnel testing, design iterations, and manufacturing results.
    • Month 12: Complete first round of dummy parachute jumps to evaluate airworthiness. Test Readiness Board (TRB) and Safety Review Board (SRB) to determine criteria for human jump testing, to include safety mitigation plans. Present readiness for live test to DARPA.
  • Option 1 (Initial test jumps): 12 months
    • Month 16: Complete dummy parachute jumps to evaluate airworthiness. Go/no-go for human jump testing, to include updated safety mitigation plans.
    • Month 22: Complete jump testing at USPA approved drop zone. Demonstrate steadily decreasing altitudes and steadily increasing ranges. Demonstrate at least 5 km. straight-line range at >500 ft. AGL and <2500 ft. AGL, in a parachute rig weighing <50 kg, and document real-world noise level (dB) in excess of the ambient.
    • Month 24: Update Phase II report documenting powered parachute system design and testing results, future specifications, manufacturing process, and evaluation of airworthiness. Evaluate cost of full-rate production using partner parachute manufacturer facilities.
  • Option 2 (Advanced test jumps): 12 months
    • Month 27: Demonstrate ability to perform ±50 feet of in-flight altitude adjustment by manual control. Demonstrate ability to interrupt/disengage the actuation system in order to land immediately. Test modifications to reduce sound level. Prepare expanded version of actuation system for long-range testing.
    • Month 30: Parachuting Challenge flyoff 1 (interim, home drop zone). Long-range (at least 8 km), low-altitude (maximum of 1500 ft. AGL) jump testing at USPA approved drop zone.
    • Month 33: Parachute Challenge flyoff 2 (final, DARPA-selected drop zone). Maximum feasible range, low-altitude (maximum of 1000 ft. AGL) jump testing. Measure sound addition to the ambient noise level; validate <50 kg. total rig weight.
    • Month 36: Final Phase II report documenting powered parachute system design and testing results, manufacturing process, and verifications of airworthiness. Demonstrate long-distance, low-altitude system for Department of Defense observers and customers. Present future commercialization plans.

Figure 2. A notional Parachute Challenge flyoff course, demonstrating long-distance legs and steadily increasing sharpness of turns / smaller turn radius. The first challenge will occur at the performer’s partner drop zone. The second challenge will occur at a drop zone of DARPA’s choosing (SOA: state of the art).

PHASE III DUAL USE APPLICATIONS: Ram-air parachute technology is currently at high technology readiness level and in full-rate production for both military and civilian uses. Multiple commercial and DoD applications are envisioned after the successful demonstration of a powered parachute prototype.

  1. DoD use by Special Operations Command. The ability to use designed systems for silent, low-altitude ingress is expected to have significant ramifications for pararescue jumpers and military special operators. The ability to separate landing zones (LZ) from targets by over 10 km will allow significant freedom to ingress route planning, and place less demand on helicopter aircraft to place themselves in harm’s way to deliver operators to their LZs.
  2. Commercial use by US Parachute Association, and other international skydiving entities. Cross-braced canopies has created the sport of parachute swooping, which today boasts national and international championships, and the creation of over 20 distinct parachute designs, each of which has sold over 5,000 units at costs of >$4,000 USD per piece. A safe, powered parachute system is expected to revolutionize modern recreational skydiving and create a significant market for parachutes that can do more than simply land where the wind, and existing kinetic energy, dictate. The products delivered in this effort will create a new sport with significant mass-market attraction, and there is a viable business model from the skydiver audience – for example, the US Parachute Association alone has over 35,000 members.

REFERENCES:

  1. [1] USPA Dropzone Locator, United States Parachute Association. https://uspa.org/DZlocator
  2. [2] Long Range Precision Aerial Delivery System (LRPADS). https://ombra.us/product/long-range-precision-aerial-delivery-system/

KEYWORDS: Systems Level, Handling, Product Design, System

Bright ELectron and Light Sources (BELLS) - SBIR XL

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): BiomedicalOBJECTIVE: The goal of BELLS is to demonstrate and commercialize practical sources of intense, tunable electrons and monochromatic hard x-rays. These sources would support transformative capabilities for applications such as non-destructive inspection, medical diagnostics, and treatments.DESCRIPTION: BELLS will develop compact sources of monoenergetic electrons and photons suitable for demonstrating a range of transformative medical and non-destructive inspection applications with the overall goal of defining a minimum viable product (MVP) for commercialization. BELLS contains two subtopics that will be executed in parallel. Subtopic 1 focuses on maturing existing laboratory scale systems to demonstrate application feasibility and further productization. Subtopic 2 seeks to mature specific component technologies to be integrated into Subtopic 1 laboratory-scale systems that provide brightness enhancements enabling additional applications and productization opportunities. Subtopic 1: Demonstration and Productization. High-quality electron and photon sources are of broad interest for a range of security, industrial, and medical applications. Recent advances in photoinjectors[1], linear accelerators[2], high power lasers[3], and a range of ancillary technologies have resulted in several prototype systems that provide novel, compact testbeds for investigating these applications. However, further maturation and demonstration of these technologies is needed to realize systems with commercialization potential. The purpose of this subtopic is to mature testbed system(s) demonstrating one or more applications and to define minimum viable commercial product(s). High-quality electrons produced from photoinjectors and linear accelerators offer utility by themselves as well as the ability to produce bright monoenergetic x-rays through laser-Compton interactions[4]. Controlling the accelerator power allows the energy of electrons and x-rays to be tuned. For x-rays, it is possible to achieve synchrotron-like performance while achieving higher energies (100s of keV to MeV energies) in highly compact form factors. Very high-energy electron beams (100s of MeV) and bright light sources enable a range of applications including, but not limited to: •Medical imaging, including phase contrast •Medical radiotherapy, including FLASH and theranostics •Nondestructive test and evaluation, including high resolution tomography and semiconductor metrology.The effort will not just explore the technical applications of these sources, but also the business cases, economic impacts, and regulatory requirements for such technologies to be broadly employed. These studies will support jump-starting medical and industrial activity in this sector, leading to commercially viable system designs.Subtopic 2: Brightness Enhancements. Application performance can often be improved with increased source brightness, i.e. intensity and purity. This subtopic seeks to enhance the testbed(s)/prototype(s) of Subtopic 1 by advancing and integrating new component technology. Examples of such technology could include improvements in laser systems, electron systems, spot size reduction strategies, Fabry-Perot cavities, pulse stacking, and pulse recirculation.PHASE I: BELLS is a direct to Phase II SBIR XL program only; there is no Phase I. Proposers must provide experimental evidence of their approach concept commensurate to a Phase I effort that achieves significant performance. Specifically, proposers must provide evidence of existing performance in the three technology areas described below: •Photoinjector oC-band or higher frequency oSupport microamp or greater average currents oSupport micropulse structures at RF frequencies at macro system repetition rates of 100 Hz or greater o> 10 pC of charge produced per incident laser pulse oSupport electron energy of 5 MeV or greater oNormalized emittance of 1 µm or better •Electron accelerator oC-band or higher frequency oAcceleration gradients 50 MV/m or greater oSupport electron energy of 50 MeV or greater oSupport 10 micron or smaller laser-Compton interaction spot sizes •Interaction laser oSupport 10 micron or smaller laser-Compton interaction spot sizes oSufficient energy to support laser-Compton applications generating > 30 keV photonsPHASE II: Subtopic 1: Demonstrations and Productization Proposers must apply to Subtopic 1 to be eligible to apply to Subtopic 2. Subtopic 2 will run concurrently with Subtopic 1. The purpose of this subtopic is to mature existing laboratory scale systems into platforms demonstrating one or more applications, and defining a minimum viable commercial product for supporting those applications. Proposers must clearly and quantitatively describe the existing laboratory system that can support laser-Compton x-ray generation. This includes key subsystems such as photoinjector, linear electron accelerator, interaction laser, and precision subsystem synchronization. Proposers must also choose at least one application (preferably more) and describe in detail how the existing laboratory scale system can be used to develop and mature a testbed enabling productization. This must include both a technical description and an economic analysis supporting commercial viability of the approach. This analysis must also include participation by one or more relevant stakeholders able to employ this product for the described application(s). In addition, the system must support the performance metrics in the table below for photon production. ParameterThresholdObjectiveIntensityIntensity (photons/s)> 10^9> 10^10Repetition Rate (Hz) > 100 > 1000EnergyMinimum (keV)> 100> 300PurityBandwidth (dE/E)< 10%< 0.1%Here, “threshold” indicates the minimum acceptable performance levels while “objective” levels are highly desired. The base period will focus on completing a BELLS testbed capable of producing relevant levels of electrons and laser-Compton photons for the chosen application(s). Performers will conduct outreach to customers, stakeholders, industrial partners, and regulators to engage in testbed use. Option period 1 will focus on testbed demonstration and characterization activities, and develop system requirements for a minimum viable product. System characterization supporting the laser-Compton performance metrics above is expected. Option period 2 continues testbed activities while further developing the minimum viable product through a critical design review. Active participation of customers, stakeholders, industrial partners, and regulators (as appropriate) is required throughout both option periods. Base period (6 months) milestones: •Month 1: Kickoff slide deck summarizing technical approach to meet overall goals, risks, and risk mitigations, and quantified milestone schedule •Month 3: Testbed build interim report •Month 6: Testbed build final report Option period 1 (6 months) milestones: •Month 1: Testbed demonstration kickoff materials, with stakeholder participation •Month 3: Testbed characterization report •Month 6: Testbed demonstration interim report, MVP system requirements review report Option period 2 (6 months) milestones: •Month 1: Testbed stakeholder engagement and transition report •Month 3: MVP preliminary design review report •Month 6: Testbed demonstration final report, MVP critical design review report Monthly written technical progress reports will supplement the above milestones (see template under SBIR/STTR BAA DOCUMENTS at https://www.darpa.mil/work-with-us/for-small-businesses/participate-sbir-sttr-program). Subtopic 2: Brightness Enhancements Proposers can propose to Subtopic 2 within their Subtopic 1 proposal.This subtopic seeks to enhance the testbed(s) of subtopic 1 by advancing and integrating component technology – specifically, laser-Compton performance to improve brightness, supporting commercially-relevant applications. Proposers must clearly describe the new component technology and anticipated testbed performance increases. Increases in performance must enable an additional application or improve the commercial prospects of the minimum viable product. Development timelines must align to integration into the testbed by the end of the option period 1. The Base period will focus on developing component technology to enhance brightness. During the option period 1, components will be refined and integrated into the testbed. During the option period 2, the enhanced testbed will be tested to verify performance, assess improvements in testbed capabilities, and enable further minimum viable product definition. Base period (6 months) milestones: •Month 1: Kickoff slide deck summarizing technical approach to meet overall goals, risks, and risk mitigations, and quantified milestone schedule •Month 3: Testbed enhancement preliminary design review report •Month 6: Testbed enhancement critical design review report Option period 1 (6 months) milestones: •Month 1: Testbed enhancement integration readiness report •Month 3: Testbed enhancement interim report •Month 6: Testbed enhancement final report Option period 2 (6 months) milestones: •Month 1: Enhanced testbed stakeholder engagement and transition report •Month 3: Enhanced testbed characterization report •Month 6: Final system performance report Monthly written technical progress reports will supplement the above milestones (see template under SBIR/STTR BAA DOCUMENTS at https://www.darpa.mil/work-with-us/for-small-businesses/participate-sbir-sttr-program).PHASE III DUAL USE APPLICATIONS: The successful development of such electron and x-ray sources supports a range of medical and non-destructive inspection applications. These include microbeam radiation diagnostic procedures, FLASH e-beam/x-ray radiotherapy, and innovations in theranostics. These sources would also be of high interest to the semiconductor industry for nanometrology and in-line inspection at semiconductor foundries, to include fraud detection. Successful proposals for this SBIR offering must make significant arguments supporting the commercial viability of their approach. Hence, proposals must provide initial evidence that their laboratory scale systems have sufficient technical maturity and performance characteristics that would support economically viable applications with development into a minimally viable product. Proposals for Subtopic 2 must make arguments that the proposed enhancement(s) could significantly advance the economics of productization of their system concepts. Transition and commercialization (T-C) milestones have been added as part of the option periods to aid in assuring commercial viabilityREFERENCES:1.Performance of a second generation X-band rf photoinjector, Marsh et al., Phys. Rev. Accel. Beams 21, 073401, 20182.Design and demonstration of a distributed-coupling linear accelerator structure, Tantawi et al., Phys. Rev. Accel. Beams 23, 092001, 20203.1 kHz repetition rate 1.1 J picosecond laser, Wang et al., Laser Congress AM2A.4, 20214.Photon flux and spectrum of ?-rays Compton sources, V. Petrillo et al., Nucl. Instrum. Methods Phys. Res A, 693, 109-116, 2012KEYWORDS: Monochromatic hard x-rays, tunable electrons.

Fast, Light, Airworthy, Repackable ParachutE (FLARE) - SBIR XL

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Advanced Materials, Human-Machine Interfaces

OBJECTIVE: Develop and demonstrate a proof-of-concept ram-air parachute specifically designed to provide automated repacking of an unpacked canopy for special operations and other applications. The prototype should include fabricated hardware integrated into a commercially available parachute rig, and should support repacking on a fast timeline (<60 seconds), with the addition of no more than 20% of the mass of the parachute rig. Proposers should include any testing capabilities needed to verify that the modified canopy is in an airworthy (jumpable) configuration, without significant impact to the probability of a successful opening.

DESCRIPTION: Parachutes are used by the Department of Defense in ejection seats (e.g., the F-16 ACES II system), for special operations ingress, and advance airdrop (Figure 1).

If ejecting behind enemy lines becomes necessary, particularly in time-critical scenarios, a large open canopy on the ground can be an indicator to the location of downed aircrew. The ability to trigger an automated repack of this parachute, without impacting its airworthiness and probability of successful opening, is desired. Special operators plan parachute ingress routes to allow sufficient distance from the target to land and manually pack the parachute. The ability to trigger a time-critical repack to minimize ground footprint could significantly change route planning and allow a landing closer to a target for maximum impact. Finally, logistics airdrops from an airborne platform are capable of delivering large amounts of mass to areas of engagement, but leave a large footprint; the ability to minimize this footprint to support special operations is also of interest to the Department of Defense.

DoD 23.4 SBIR Annual BAA (2)DoD 23.4 SBIR Annual BAA (3)DoD 23.4 SBIR Annual BAA (4)

Figure 1. Three scenarios that benefit from repackable parachutes: Downed aircrew (left), special operations ingress (center), and advance logistics airdrops (right).

For more information on this topic, see https://www.youtube.com/watch?v=YXBjhBVaxpw.

PHASE I: This is a Direct to Phase II (DP2) topic only. In order to demonstrate that Phase I feasibility has been met, proposers should demonstrate the following:

    • To show available expertise for immediate fabrication of the proposed design: teaming with an existing commercial parachute manufacturer that has sold at least 5,000 airworthy canopy units;
    • An initial design with detailed descriptions of physical mechanisms that shows the ability to retract and stow parachute lines into the container;
    • To conduct jump testing: teaming with an existing US Parachute Association (USPA) compliant drop zone [1];
    • An experienced, licensed parachute rigger team with significant practical experience in parachute packing, repair, evaluation, and modification

PHASE II: The Phase II effort consists of a DP2 base period of 12 months, an Option 1 (required) period of 6 months and an Option 2 (optional) period of 6 months. The Option 2 period will follow the Option 1 period. Testing in the base and Option 1 periods will be conducted on ram-air canopies, to preserve maximum aerodynamic flexibility. Testing in the Option 2 period will be conducted on round canopies, and evaluate the jumpability (defined here as the probability of a successful parachute opening, with the addition of the repacking mechanism) of repacked ram-air parachutes.

In this effort, proposers will design and develop a jumpable, repackable parachute prototype that will:

  • Repack an opened parachute into its container using electromagnetic, mechanical or other mechanisms, Do so in less than 60 seconds from a manual initiation command,
  • Do so while adding less than 20% mass to an existing commercially available parachute rig,
  • Determine the probability of a successful opening of the prototype before automated repacking, i.e., demonstrate that the added repacking mechanism “does no harm” to existing opening probability when in a rigger-approved, properly packed configuration,
  • Characterize the probability of a successful opening of the prototype after automated repacking, toward potential future commercialization opportunities.

It is expected that designed repackable parachutes will need to be test jumped in order to support the goals of this effort. Proposers should describe their ability to work with parachute test jumpers, at appropriate drop zones, in order to accomplish statistical significance on the probability of a successful parachute opening with added repacking mechanisms. The wide number of commercially available parachuting rigs for recreational skydiving, and the high reliability of belly-mounted and rig-mounted reserve parachutes, allow for a rapid cycle of design-test-fly-redesign that proposers should plan to leverage.

The minimum deliverable will be an airworthy, repackable proof-of-concept parachute prototype in a complete rig (i.e., with a container, main and reserve parachute, and other accompanying hardware).

Phase II fixed payable milestones for this program should include:

Base period (required): 12 months

  • Month 2: Concept Design Review (CoDR) on repackable parachute design, with hardware purchase plan and initial test and evaluation plan;
  • Month 6: Bench Testing Review (BTR). First prototype ready for bench testing at parachute manufacturer facility. Interim report on trade studies, integration of hardware to canopy and canopy to rig, and system design. Present final test and evaluation plan, and safety plan for testing.
  • Month 9 (optional; dummy real-world jumps may be substituted to achieve the same end goal): Complete wind tunnel testing. Deliver interim report, describing results of wind tunnel testing, design iterations, and manufacturing results.
  • Month 12: Complete first round of dummy parachute jumps to evaluate airworthiness. Test Readiness Board (TRB) and Safety Review Board (SRB) to determine go/no-go for human jump testing, to include safety mitigation plans. Present readiness for live test to DARPA.

Option 1 (Initial test jumps) (required): 6 months

  • Month 15: Complete initial phase of ram-air canopy jump testing at USPA approved drop zone.
  • Month 17: Complete final phase of ram-air canopy jump testing.
  • Month 18: Update Phase II report documenting repackable parachute system design and testing results, future specifications, manufacturing process, and verification of airworthiness. Demonstrate repackable system for Department of Defense observers and customers. Present scaling plans to large canopies (airdrop size) and high-impact loading canopy (ejection seats) applications. Evaluate cost of full-rate production using partner parachute manufacturer facilities.

Option 2 (Advanced test jumps) (optional): 6 months

  • Month 20: Present TRB and SRB, with results from bench testing, of large (>500 sq. ft) repackable round canopies. Present re-design for repackable and rejumpable ram-air designs.
  • Month 23: Update interim report to include results of test jumps. Large round canopy jump testing at USPA approved drop zone. Dummy parachute jump testing to evaluate airworthiness of previously repacked parachutes at USPA approved drop zone.
  • Month 24: Final Phase II report documenting repackable parachute system design and testing results, parachute manufacturing process, and verifications of airworthiness. Demonstrate round and ram-air repackable system for Department of Defense observers and customers. Present future commercialization plans.

Successful proposals for this SBIR offering must make significant arguments supporting the ability to rapidly iterate and execute to meet the timelines laid out in this solicitation.

PHASE III DUAL USE APPLICATIONS: Ram-air and round parachute technology are currently at high technology readiness level and in full-rate production for both military and civilian uses. Adding the capability for rapid, on-command repack while maintaining the reliability and performance of existing parachute systems, and enabling tactics centered around advance logistics airdrops to support special operations, would attract attention from US Special Operations Command (USSOCOM), Air Combat Command (ACC), and similar agencies within the Department of Defense.

It is fully anticipated that this technology would have simultaneous, broad applicability to the members of the US Parachute Association (USPA) and the international Fédération Aéronautique Internationale (World Air Sports Federation) that regulates and encourages the recreational skydiving community around the world. The products delivered in this effort are expected to be directly applicable to an existing sport with significant mass-market attraction, and a viable business model from the skydiver audience – for example, the US Parachute Association alone has over 35,000 members.

REFERENCES:

  1. [1] USPA Dropzone Locator, United States Parachute Association. https://uspa.org/DZlocator

KEYWORDS: Systems Level, Handling, Product Design, System

Additive Components Enhanced for Extreme Environments (ACE3)

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Advanced Materials

The technology within this topic is restricted under the International Traffic in Arms Regulation (ITAR), 22 CFR Parts 120-130, which controls the export and import of defense-related material and services, including export of sensitive technical data, or the Export Administration Regulation (EAR), 15 CFR Parts 730-774, which controls dual use items. Offerors must disclose any proposed use of foreign nationals (FNs), their country(ies) of origin, the type of visa or work permit possessed, and the statement of work (SOW) tasks intended for accomplishment by the FN(s) in accordance with the Announcement. Offerors are advised foreign nationals proposed to perform on this topic may be restricted due to the technical data under US Export Control Laws.

OBJECTIVE: The Additive Components Enhanced for Extreme Environments (ACE3) effort seeks to dramatically reduce lead times for critical components in turbine systems by enhancing the high temperature mechanical properties of additively manufactured superalloys through novel post-processing techniques. Proposals must focus on difficult to source, long lead time components that control system efficiency and lifetime; in particular, high-performance components used in the hot gas path of power and propulsion turbines. This topic is soliciting Direct to Phase II (DP2) proposals only.

DESCRIPTION: The Department of Defense (DoD) faces technical and procurement challenges with hot-section components in turbines (e.g., blades, vanes, seals, etc.) across various ground and aerospace platforms. These components operate in high temperature oxidizing environments while under extreme mechanical loads, requiring specialized materials and manufacturing techniques. Traditionally, these hot-section components are produced by casting nickel-based superalloys using a directional or single crystal solidification approach. These specialized casting techniques are costly and time-consuming, resulting in part replacement lead times averaging 18 to 36 months due to the highly specialized knowledge and equipment required to produce parts.

The objective of ACE3 is to reduce critical hot-section turbine part lead times by exploiting the supply chain advantages of additive manufacturing (AM).. Melt-based AM of nickel-based superalloys offers advantages in precision, reduced scrappage, enhanced design freedom, shorter lead times, and a potential reduction in manufacturing costs compared to conventional directional or single crystal casting operations. However, AM techniques typically impart a fine grain size (e.g., 10-100 µm), resulting in inferior high-temperature creep properties compared to those of directionally solidified or single crystal materials [1]. Therefore, while additively manufactured blades and vanes are extremely attractive for next-generation engine designs and sustainment of DoD’s existing fleet, implementation is inhibited by poor high-temperature mechanical properties. To address this issue, the ACE3 project seeks to demonstrate new post-processing technologies that dramatically enhance the high-temperature mechanical behavior of hollow core or net-shaped nickel-based superalloys fabricated with laser powder bed fusion (LPBF) by transforming the as-built components from fine (<100 µm) grain structure to coarse (>1 mm) grain structure, resulting in creep performance improvement by at least an order-of-magnitude. Electron beam additive manufacturing is specifically not of interest due to inherent issues with short filament lifetimes and de-powdering of hollow core structures.

Proposals must include: (1) an effective strategy for addressing difficult to source, long lead time components that control efficiency and lifetime in the hot gas path of turbine engines; (2) the proposer’s familiarity with turbine design including the basic functional and design requirements of hot-section components; and (3) alloy(s) of interest to be tested and a relevant component design to evaluate the proposed post-processing strategy. Proposals are not limited to current component designs – novel designs uniquely enabled through additive manufacturing are encouraged.

PHASE I: This topic is soliciting Direct to Phase II (DP2) proposals only. Previous efforts must have demonstrated a post-processing approach capable of achieving the milestones and metrics listed below supported by prior laboratory testing results:

  • Demonstrated ability to perform post-processing on a commercially relevant nickel-based superalloy additively manufactured via laser powder bed fusion (LPBF), such as Inconel 738LC (IN738LC).
  • Demonstrated at least 10x increase in grain size relative to the as-built material along the build direction following post-processing.
  • Demonstrated the ability to retain at least 20% (area fraction) <100> cube texture in the build direction following post-processing.
  • Demonstrated the ability to control grain structure as a function of position within a test article with cm-scale precision

PHASE II: The ACE3 DP2 project seeks to build on the accomplishments listed in the Phase I section above to: (1) fully characterize the high-temperature mechanical properties of additively manufactured superalloy test specimens with and without the demonstrated post-processing strategy; (2) apply the validated post-processing strategy to an exemplary component design fabricated by LPBF; and (3) confirm the structure and properties match those expected from baseline coupon-level testing while also demonstrating the ability to successfully process components at scale with a scrap rate <5%. Final components must be subject to proof testing in a relevant environment to verify functional performance (TRL 6). Performers must bring their own exemplar design and propose a component-level test strategy sufficient for TRL 6 justification. The Phase II effort will consist of a 12-month base period with a 12-month option period.

Schedule/Milestones/Deliverables: Phase II fixed milestones for this program must include:

  • Month 1: Project kickoff meeting; all supporting positions identified in the proposal are assigned to personnel and names are provided to the Government.
  • Month 3: Preliminary high-temperature mechanical test results on additively manufactured superalloy coupons in as-built and post-processed conditions using the proposed strategy. Quarterly presentation detailing results.
  • Month 6: Complete mechanical test results demonstrating statistically significant improvement in high-temperature material properties. System requirements and preliminary design for processing exemplary components. Month 6 technical report and presentation detailing results.
  • Month 9: Final design, development plan and preliminary results for exemplary component processing. Quarterly presentation detailing results.
  • Month 12: Process demonstrated for the exemplary component, including measurements meeting the target geometry and microstructure. Process automation reduced to practice to produce sufficient parts for system-level testing. Month 12 technical report and presentation detailing results.

Option Milestones/Deliverables:

  • Month 15: Quarterly presentation detailing part manufacturing progress toward system-level testing.
  • Month 18: Components manufactured, post-processed, and delivered to test facility. Technical report and presentation detailing results.
  • Month 21: Results of system-level testing in a relevant environment (TRL 6). Post mortem analysis completed on tested components and assessment of outcome. Quarterly presentation detailing results.
  • Month 24: Final Phase II report and technical presentation summarizing all results, lessons learned, and potential transition path. Technical reports must be delivered in Microsoft Word or PDF format; presentations must be delivered in Microsoft PowerPoint or PDF format.

PHASE III DUAL USE APPLICATIONS: The novel post-processing technology developed under this effort will have widespread application in both military and commercial gas turbine engines used in power generation and propulsion. Enabling additive manufacturing of hot-section components will achieve more reliable and efficient supply chains, a decrease in overall costs, and the ability to explore novel component designs for improved thermal efficiency and fuel economy.

REFERENCES:

  1. V. Kalyanasundaram, A. De Luca, R. Wróbel, J. Tang, S.R. Holdsworth, C. Leinenbach, E. Hosseini, “Tensile and creep-rupture response of additively manufactured nickel-based superalloy CM247LC”, Additive Manufacturing Letters 5 (2023) 100119. https://doi.org/10.1016/j.addlet.2022.100119.

KEYWORDS: gas turbines, power generation, jet engine propulsion, sustainment, advanced materials, additive manufacturing, high temperature mechanical properties

Prospero: Modernizing Secure Facility Design, Construction, and Accreditation

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Human-Machine Interfaces,Trusted AI and Autonomy

OBJECTIVE: Consolidations and acquisitions in the Defense Industrial Base (DIB) make it imperative for new small businesses to emerge to promote innovation and competition. However, strict requirements for classified program execution inhibits these new small businesses from immediately performing on programs. The major inhibitors are cost (monetary and time) and process (convoluted based on sponsor, location, and accreditor). Significant resources can be sunk into the Secure Area/Sensitive Compartmented Information Facility (SCIF)/Special Access Program Facility (SAPF) construction and accreditation process with no guarantees that the completed area would actually be usable. Several businesses have emerged that specialize in constructing such facilities, but offer their expertise as a significant markup that is cost prohibitive for small businesses. Existing research into Language Models (LMs) has been done to provide a means to both fill in the blanks within sentences based on context clues and automate an interactive knowledge base from a knowledge corpus. Additional research has leveraged Artificial Intelligence (AI) for monitoring construction progress, comparing completed construction to initial designs, and identifying materials from construction images.

This Defense Advanced Research Projects Agency (DARPA) topic is seeking technologies for automating, scaling, updating, and simplifying the process for applying, designing, constructing, and validating Secure Areas/SCIFs/SAPFs. Prospero performers will explore approaches and develop prototypes for automating paperwork, designing secure rooms, and overseeing construction. Prospero is interested in software tools that can be utilized by non-security personnel at all steps of the design and accreditation process that can also be offered at a minimal cost to the end-user.

DESCRIPTION: Performers will develop approaches for utilizing AI, Machine Learning (ML), and LMs to automate, update, and improve secure facility design, paperwork, oversight, and validation. Prospero prototypes should be able to demonstrate the ability to automate the paperwork processes, reduce the barrier to entry for secure facility design, and streamline the process for overseeing facility construction.

The program seeks breakthrough approaches to various technical challenges, including but not limited to:

  • Developing efficient models and techniques for automating accreditation paperwork
  • Developing efficient algorithms and techniques for monitoring secure facility construction to meet auditing requirements
  • Developing tools for non-experts to be able to fulfill accreditation reporting requirements
  • Understanding the accreditation process across multiple sponsors
  • Streamlining disparate sponsor requirements into a single knowledge base

PHASE I: This is a Direct to Phase II (DP2) solicitation. Therefore, Phase I proposals will not be accepted or reviewed. Phase I feasibility will be demonstrated through evidence of: a completed feasibility study or a basic prototype system; definition and characterization of properties desirable for both Department of Defense (DoD) and civilian use; and comparisons with alternative state-of-the-art methodologies (competing approaches). This includes determining, insofar as possible, the scientific and technical merit and feasibility of ideas appearing to have application to the core objective of automating the design, submission, and validation of secure facilities. Proposers interested in submitting a DP2 proposal must provide documentation to substantiate that the scientific and technical merit and feasibility described above have been met and describe the potential military or commercial applications. DP2 documentation should include:

  • technical reports describing results and conclusions of existing work, particularly regarding the commercial opportunity or DoD insertion opportunity, and risks/mitigations, assessments;
  • presentation materials and/or white papers;
  • technical papers;
  • prototype designs/models;

This collection of material will verify mastery of the required content for DP2 consideration. DP2 proposers must also demonstrate knowledge, skills, and ability in computer science, physical security, electrical engineering, and software engineering. For detailed information on DP2 requirements and eligibility, please refer to the DoD BAA and the DARPA Instructions for this topic.

PHASE II: The goal of Prospero is to design and evaluate tools and techniques for automating and streamlining secure facility design, construction, and accreditation. Proposals should include development, installation, integration, demonstration and/or test and evaluation of the proposed prototype system. These activities should focus specifically on:

  1. Evaluating the adapted solution against the proposed objectives
  2. Describing in detail how the installed solution differs from the non-defense commercial offering to solve DOD need(s) as well as how it can be scaled for wide adoption, i.e., modified for scale across additional sponsors.
  3. Identifying the proposed solution's clear transition path considering input from affected stakeholders, including but not limited to, end users, engineering, sustainment, security, contracting, finance, legal, and cyber.
  4. Specifying the solution's integration with other current and potential future solutions.
  5. Describing the solution's sustainability, i.e., supportability. Identifying other specific DoD or Governmental customers for the solution.

Phase II will culminate in a system demonstration using one or more compelling use cases consistent with commercial opportunities, DOD opportunities, and/or insertion into a DARPA program. The below schedule of milestones and deliverables is provided to establish expectations and desired results for the Phase II effort.

Schedule/Milestones/Deliverables:

Proposers will execute Research and Development (R&D) plan as described in their proposal. Proposers will also complete a commercialization plan that addresses relevant material costs and potential material/equipment suppliers.

  • Month 1: Phase II Kickoff briefing (with annotated slides) to the DARPA Program Manager (PM) (in person or virtual, as needed) including: any updates to the proposed plan and technical approach, risks/mitigations, schedule (inclusive of dependencies) with planned capability milestones and deliverables, proposed metrics, and plan for prototype demonstration/validation.
  • Months 2, 4: Technical progress reports detailing technical progress made, tasks accomplished, major risks/mitigations, a technical plan for the remainder of Phase II (while this will normally report progress against the plan detailed in the proposal or presented at the Kickoff briefing, it is understood that scientific discoveries, competition, and regulatory changes may all have impacts on the planned work and DARPA must be made aware of any revisions that result), planned activities, trip summaries, and any potential issues or problem areas that require the attention of the DARPA PM.
  • Month 6: Interim technical progress briefing (live system demo with annotated slides) to the DARPA PM (in-person or virtual as needed) detailing progress made (include quantitative assessment of capability developed to date), tasks accomplished, major risks/mitigations, planned activities, and technical plan for the remainder of Phase II, the demonstration/verification plan for the end of Phase II, trip summaries, and any potential issues or problem areas that require the attention of the DARPA PM.
  • Month 9, 12, 15: Quarterly technical progress reports detailing technical progress made, tasks accomplished, major risks/mitigations, a technical plan for the remainder of Phase II (with necessary updates as in the parenthetical remark for Months 2 and 4), planned activities, trip summaries, and any potential issues or problem areas that require the attention of the DARPA PM.
  • Month 18/Final Phase II Deliverables: Final demonstration with documented details, demonstrating accreditation paperwork automation; demonstrating automated SCIF/SAPF design for multiple sponsors; demonstrating construction oversight that meets auditing requirements; any other necessary documentation (including, at a minimum, user manuals and a detailed system design document; and the end of phase commercialization plan).

PHASE III DUAL USE APPLICATIONS: Phase III work will be oriented towards transition and commercialization of the developed Prospero technologies. The proposer is required to obtain funding from either the private sector, a non-SBIR Government source, or both, to develop the prototype software into a viable product or non-R&D service for sale in military or private sector markets. Phase III refers to work that derives from, extends, or completes an effort made under prior SBIR funding agreements, but is funded by sources other than the SBIR Program.

Primary Prospero support will be to national efforts for growing the DIB and improving secure facility construction processes. Such technology can be used to enable any small business to construct secure facilities while minimizing the risks associated with the current processes.

REFERENCES:

  1. Donahue, Chris, Mina Lee, and Percy Liang. "Enabling language models to fill in the blanks." arXiv preprint arXiv:2005.05339 (2020).
  2. Gil, Daeyoung, Ghang Lee, and Kahyun Jeon. "Classification of images from construction sites using a deep-learning algorithm." ISARC. Proceedings of the International Symposium on Automation and Robotics in Construction. Vol. 35. IAARC Publications, 2018.
  3. Mahami, Hadi, et al. "Material recognition for automated progress monitoring using deep learning methods." arXiv preprint arXiv:2006.16344 (2020).
  4. Petroni, Fabio, et al. "Language models as knowledge bases?." arXiv preprint arXiv:1909.01066 (2019).

KEYWORDS: physical security, construction monitoring, language models, knowledge base, accreditation

Artificial Intelligence Cyber Challenge (AIxCC)

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Advanced Computing and Software, Integrated Sensing and Cyber, Trusted AI and Autonomy

OBJECTIVE: The objective of the Artificial Intelligence Cyber Challenge (AIxCC) SBIR topic is to develop innovative systems guided by Artificial Intelligence (AI) and Machine Learning (ML) to semi-automatically find and fix software vulnerabilities.

DESCRIPTION: In an increasingly interconnected world, software undergirds everything from modern financial systems to public utilities, and older software is unable to be secured manually at scale [1] [2]. Critical infrastructure is among the worst affected; most vulnerabilities within these systems go unidentified, and a majority of the identified vulnerabilities have no patch or mitigation [3]. This state of affairs presents a serious threat to U.S. national security.

Today, manual vulnerability discovery and remediation requires subject matter experts (SME) who can identify and investigate vulnerabilities within software and develop fixes for them. Beginning with the invention of fuzz testing in 1988 [4], the development of tools and techniques for automatic vulnerability discovery and remediation (AVD&R) has continued to move forward toward systems that implement logical reasoning and program analysis approaches to identify and characterize software vulnerabilities.

Recent advancements in AI and ML, such as Large Language Models (LLMs), have potential to push AVD&R beyond the inherent barriers of today’s logical reasoning systems. By leveraging their symbolic abstractions, neural networks and deep learning techniques can be harnessed to reduce false positives and produce more precise tooling, significantly reducing human intervention. A neuro-symbolic approach could learn novel vulnerability patterns, moving far beyond the capabilities of current tools. Further, by leveraging ML to generate code, patches can be generated automatically at scale. LLMs, have shown enormous potential for reasoning over software, and provide a strong foundation for innovation in AVD&R. Automatic code generation tools, such as CodePilot [5], have been able to write parts of software with little human-intervention. Further, ChatGPT [6] [7] has been shown to be able to accurately find, characterize, and fix certain vulnerabilities. LLMs will also enable new approaches to computer-human teaming for AVD&R, ameliorating the friction found in current tools that prevents their widespread use. [7]

The objective of AIxCC is to facilitate innovation at the intersection of AVD&R and AI to secure widely used code that underpins critical infrastructure.

PHASE I: This is a Direct to Phase II (DP2) solicitation. Therefore, Phase I proposals will not be accepted or reviewed. Phase I feasibility will be demonstrated through evidence of: a completed feasibility study or a basic prototype system; definition and characterization of properties desirable for both Department of Defense (DoD) and civilian use; and comparisons with alternative state-of-the-art methodologies (competing approaches). This includes determining, insofar as possible, the scientific and technical merit and feasibility of ideas appearing to have application to the core objective of developing a framework for scalable and automated discovery of vulnerabilities in arbitrary complex systems. Proposers interested in submitting a DP2 proposal must provide documentation to substantiate that the scientific and technical merit and feasibility described above have been met and describe the potential military or commercial applications. DP2 documentation should include:

• technical reports describing results and conclusions of existing work, particularly regarding the commercial opportunity or DoD insertion opportunity, and risks/mitigations, assessments;

• presentation materials and/or white papers;

• technical papers;

• test and measurement data;

• prototype designs/models;

• performance projections, goals, or results in different use cases.

This collection of material will verify mastery of the required content for DP2 consideration. DP2 proposers must also demonstrate knowledge, skills, and ability in computer science, mathematics, physics, electrical engineering, and/or software engineering or related disciplines. For detailed information on DP2 requirements and eligibility, please refer to the DoD BAA and the DARPA Instructions for this topic.

PHASE II: The goal of AIxCC is to leverage advancements in AI and ML, such as LLMs, create open-source solutions for semi-automatically discovering and remediating software vulnerabilities at speed and at scale to secure widely used critical code. These open-source systems should be well documented and tested against a suit of tests to determine efficacy.

DP2 proposals should:

  • describe a proposed system to achieve the aforementioned goals and
  • present a technical plan and approach, with notable risks/mitigations.
  • provide an proposed plan to open-source the system under an Open Source Inititative (OSI) approved license.

Phase II will include a test and evaluation event where the system must demonstrate its efficacy against a set of AVD&R challenges.

A Phase II Option period will further mature AIxCC systems to expand applications to additional technology transition and prototype activities for the DoD, another Federal agency, or the private sector. The Phase II Option will be contingent on results from a test and evaluation of the final Phase II prototype system. All Phase II Option matured prototypes must be open-sourced with appropriate licensing.

The below schedule of milestones and deliverables is provided to establish expectations and desired results/end products for the Phase II and Phase II Option period efforts.

Schedule/Milestones/Deliverables:

Proposers will execute a Research and Development (R&D) plan as described in their proposal including the following fixed payable milestones for this program:

• Month 1: Phase II Kickoff briefing (with annotated slides) to the DARPA Program Manager (PM) including: any updates to the proposed plan and technical approach, risks/mitigations, schedule (inclusive of dependencies) with planned capability milestones and deliverables, and plan for prototype.

• Month 3: Technical progress report detailing technical progress to date, tasks accomplished, risks/mitigations, a technical plan for the remainder of Phase II (while this would normally report progress against the plan detailed in the proposal or presented at the Kickoff briefing, it is understood that scientific discoveries, competition, and regulatory changes may all have impacts on the planned work and DARPA must be made aware of any revisions that result), planned activities, trip summaries, and any potential issues or problem areas that require the attention of the DARPA PM.

• Month 6: Test and evaluation of final prototype via participation in an AIxCC competition event.

• Month 9: Final technical progress briefing (with annotated slides) to the DARPA PM. Final architecture with documented details and any other necessary documentation (including, at a minimum, user manuals and a detailed system design document; the commercialization plan; and a proposed license and plan for open-sourcing the system).

Phase II Option Period

• Months 12 and 15 (Phase II Option period): Technical progress reports detailing technical progress to date, tasks accomplished, risks/mitigations, a technical plan for the remainder of the Phase II Option period (while this would normally report progress against the plan detailed in the proposal or presented at the Kickoff briefing, it is understood that scientific discoveries, competition, and regulatory changes may all have impacts on the planned work and DARPA must be made aware of any revisions that result), planned activities, trip summaries, and any potential issues or problem areas that require the attention of the DARPA PM.

• Month 18 (Phase II Option period): Test and evaluation of matured prototype via participation in an AIxCC competition event.

• Month 22 (Phase II Option Period): Final Phase II Option period technical progress (with annotated slides) to the DARPA PM. Final architecture with documented details and any other necessary documentation (including, at a minimum, user manuals and a detailed system design document, the commercialization plan; and a link to a open-source licensed source code repository for the matured prototype used in Month 18 test and evaluation).

PHASE III DUAL USE APPLICATIONS: AIxCC has potential applicability across DoD and commercial entities. For USG, AIxCC is well-suited for scaled cybersecurity analysis of real-world systems. AIxCC has the same applicability as the USG for the commercial sector.

Phase III refers to work that derives from, extends, or completes an effort made under prior SBIR funding agreements, but is funded by sources other than the SBIR Program. The Phase III work will be oriented towards transition and commercialization of the developed AIxCC frameworks. The proposer is required to obtain funding from either the private sector, a non-SBIR Government source, or both, to develop the prototype into a viable product or non-R&D service for sale in military or private sector markets. Primary AIxCC support will be to national efforts to explore the ability develop automated cybersecurity tools applicable to real-world systems. Results from AIxCC are intended to improve cybersecurity posture and assessment across government and industry.

REFERENCES:

  1. Carnegie, "Timeline of Cyber Incidents Involving Financial Institutions," 2022. [Online]. Available: https://carnegieendowment.org/specialprojects/protectingfinancialstability/timeline.
  2. A. Haines, "DNI HAINES OPENING STATEMENT ON THE 2023 ANNUAL THREAT ASSESSMENT OF THE U.S. INTELLIGENCE COMMUNITY," DNI, 2023.
  3. Dragos, "ICS/OT CYBERSECURITY YEAR IN REVIEW 2022," Dragos, 2022.
  4. B. Miller, CS 736 Fall 1988, 1988.
  5. OpenAI, "Evaluating Large Language Models Trained on Code," 2021.
  6. D. Sobania, M. Briesch, C. Hanna and J. Petke, "An Analysis of the Automatic Bug Fixing Performance of ChatGPT," in arXiv:2301.08653, 2023.
  7. E. Dreibelbis, "Watch Out, Software Engineers: ChatGPT Is Now Finding, Fixing Bugs in Code," PCMag, 27 January 2023. [Online]. Available: https://www.pcmag.com/news/watch-out-software-engineers-chatgpt-is-now-finding-fixing-bugs-in-code.

KEYWORDS: Cybersecurity, Vulnerability Research, Static Analysis, Symbolic Execution, Dynamic Analysis, Computer Network Security

Project CAPTURE: Capturing Aerial Payloads To Unleash Reliable Exploitation – SBIR XL

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Human-Machine Interfaces

OBJECTIVE: Develop and demonstrate a prototype system to capture and recover exploitable payloads from slow speed high-altitude aerial systems of interest within or approaching U.S. sovereign airspace.

DESCRIPTION: Recent incursions of U.S. airspace demonstrated limitations of the ability to recover sensitive payloads from slow-speed high-altitude objects in a manner that is both effective for follow on exploitation and scalable to employment over diverse geographic areas. The military’s current ability to respond to slow-moving, high-altitude objects is constrained by physics and the capabilities of current weapons systems. For example, the F-22 is one of few aircraft able to operate at an altitude above 50,000 feet. Additionally, these aircraft travel at hundreds of miles per hour while attempting to identify and target slow-moving or stationary objects. Aerial systems of interest are typically downed in areas of lower risk to humans. These constraints, coupled with current technical capabilities, result in limited engagement opportunities and difficult recovery operations.

The DARPA CAPTURE effort seeks to rapidly develop and demonstrate an integrated prototype system to capture and retrieve aerial systems of interest flying slowly at high altitudes under positive control in a manner safe to the surrounding area while maximizing exploitation of the captured system. Solutions should address the following unique challenges:

• Aerial systems of interest may range from 500 pounds (threshold) to 1,500 pounds (objective)

• Aerial systems of interest may constitute varying sizes or shapes

• Aerial systems of interest may operate up to 60,000 feet (threshold) to 75,000 feet (objective)

• Captured systems should include the aerial system’s payloads (threshold) or the entirety of the aerial system of interest (objective)

• Capture of aerial systems of interest should be in a manner allowing for controlled descent for recovery near inhabited or otherwise currently avoided recovery areas

• Captured aerial systems of interest should be in a condition maximizing the ability for technical exploitation upon recoverySolution response time to aerial systems of interest approaching or within any U.S. sovereign airspace should scale to an order of hours after an engagement decision.

Solutions should take advantage of existing military and commercial logistics infrastructure where possible. Solutions should clearly identify what existing technologies or systems would be used as part of the approach. Examples may include, but are not limited to, involvement of specific slow-moving aircraft or use of surface-based systems. Solutions requiring additional government furnished information, dependencies, or equipment to be potentially provided as part of the solution should be clearly and plainly described for consideration of the proposed approach.

PHASE I: This topic is Direct to Phase II only. The desired system may leverage existing technologies and systems to rapidly integrate into a prototype system in order to demonstrate the desired objective capability. The proposal documentation should address the following areas to demonstrate system readiness to proceed straight to Phase II:

• Design, fabrication, and flight test experience of high-altitude systems that operate above 50,000 ft.

• Pedigree of the proposed concept to include any relevant prior test and analysis activities.

PHASE II: The base period should produce a fieldable prototype final design review that satisfies project objectives in no more than six months after contract award. A follow-on option phase should include a final demonstration no more than 9 to 12 months after contract award. This timeline emphasizes the desire for innovative yet simple development of readily available capabilities. The prototype system may use or modify existing technologies and operational systems (military or commercial) to rapidly achieve program objectives.

The performer will be expected to provide a Statement of Work (SOW) listing tasks and associated subtasks required to meet the following deliverables commensurate within the stated timeline for this effort:

• Description and analysis of the concept of employment

• Description and analysis of the concept of operations

• System concept and designs to include any modification of existing designs

• Technical, cost, and schedule risk analysis of the proposed approach

• Anticipated risk reduction testing plan and schedule

• Final prototype system hardware, software, and technical data packages

• Field test demonstration

The performer must identify what government information and assets must be made available as part of the development process and system testing (GFI and GFE). It is anticipated that multiple existing military systems may be required for completing the concept of operations. Engagement of these systems and organization functions is also expected to promote the rapid transition of the prototype system. Follow-on options to the base effort are expected to include the rapid incorporation into the operational systems and organizations.

PHASE III DUAL USE APPLICATIONS: Transition partners will be integral to the execution during the Phase II effort due to the rapid and inherent utilization of operational assets requirements.

REFERENCES:

  1. https://www.whitehouse.gov/briefing-room/speeches-remarks/2023/02/16/remarks-by-president-biden-on-the-united-states-response-to-recent-aerial-objects/
  2. https://www.defense.gov/News/News-Stories/Article/Article/3297104/chinese-surveillance-balloons-global-in-scope-says-official/

KEYWORDS: Manned/unmanned air vehicles; missiles; air capture/retrieval systems

Anti-Shock Drug, Pre-Hospital (ASD-PH)

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Combat Casualty CareOBJECTIVE: Develop a drug that would be useful in a pre-hospital setting for treatment of hemorrhagic shock in humans.DESCRIPTION: Severe blood loss, such as may be experienced in combat or other settings, if left untreated, will result in a deficiency of oxygen that will lead to the death of cells, tissues, and organs, and ultimately death. A pharmaceutical solution is required to address, in a pre-hospital setting, this life-threatening situation. The desired benefits of the drug are that its administration would increase the probability of survival, reduce the need for other treatment products, and reduce the need for prompt medical evacuation. The following characteristics are considered desirable: (1) The drug would most likely be administered promptly after injury, before blood or blood components are administered; however, a drug that would be administered as a pre-treatment, prior to injury, would also be of interest. (2) The drug would be administered in a low volume, perhaps 5 to 20 milliliters, to minimize the burden of transporting it and administering it. (3) The drug would be stable (retain its effectiveness) for at least one year over a broad temperature range such as 2 to 40 degrees Celsius. (4) The drug would be amenable to administration by several routes, such as oral, intravenous, intraosseous, inhalation, and intramuscular.PHASE I: DoD seeks the identification of an active pharmaceutical ingredient (API), administration of which will provide effective treatment of shock in a pre-hospital setting. The performer will determine the scientific, technical, and commercial merit and feasibility of such an API. Upon conclusion of Phase I, the performer will have: •Identified a concept for the mechanism of action for the API.•Ascertained key elements (chemical moieties) of the API.•Produced a candidate formulation, for one or more routes of administration, for the API.•Performed a detailed analysis of predicted performance (safety and efficacy) of the API as formulated for administration.•Defined key technological milestones for development of the API into a drug approvable bythe Food and Drug Administration (FDA) for human use.•Demonstrated the feasibility of analyzing the safety and efficacy of the API when formulatedfor administration and outlined the criteria for success. This topic is accepting Direct to Phase II (DPII) proposals ONLY. Proposers submitting a DPII proposal must provide documentation to substantiate that the scientific and technical merit and feasibility described above has been met and describes the potential commercial applications.Documentation should include all relevant information including, but not limited to, technical reports, test data, and performance goals/results.PHASE II: The expectations and required deliverables for Phase II work are: •Using results from Phase I, produce a batch of candidate ASD-PH formulated foradministration to one or more vertebrate species as part of pre-clinical testing.•Test a candidate ASD-PH for efficacy in a suitable animal model. The animal model mustinvolve blood loss that, untreated, would reproducibly lead to death of most test subjectsfrom shock within approximately 60 minutes after blood loss.•Prepare a Product Development Plan and seek comments from the FDA on its acceptability.•Manufacture a batch of candidate ASD-PH suitable for pre-clinical testing of safety under Good Laboratory Practices (GLPs).•Perform Investigational New Drug (IND)-enabling studies.•Update/revise the Product Development Plan to take into account the results of pre-clinicaltesting and FDA advice.•Deliver a Technical Data Package containing submissions to the FDA, communications fromthe FDA, and the Product Development Plan.•Upon request by the Government sponsor, deliver a sample of candidate ASD-PH to the Government for retention and/or analyses at no cost to the performer. The quantity of sample delivered to the Government will not be so great as to interfere with the performer’s plans for development.PHASE III DUAL USE APPLICATIONS: Phase III will culminate in an FDA-approved treatment for shock suitable for use in role 1 of military health care and in similar non-military austere settings such remote areas where paramedics and other personnel provide emergency medical treatment. It will be the logical conclusion of product development conducted in phases I and II. Phase III work will include the engagement of relevant stakeholders within DoD to ensure that product labeling and packaging are accomplished with due consideration of military operational requirements and logistical support.REFERENCES:1.Campion EM, Pritts TA, Dorlac WC, Nguyen AQ, Fraley SM, Hanseman D, Robinson BR.Implementation of a military-derived damage-control resuscitation strategy in a civiliantrauma center decreases acute hypoxia in massively transfused patients. J Trauma Acute CareSurg. 2013 Aug;75(2 Suppl 2):S221-7. doi: 10.1097/TA.0b013e318299d59b. PMID:23883912; PMCID: PMC4245019. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4245019/2.Huang Q, Gao S, Yao Y, Wang Y, Li J, Chen J, Guo C, Zhao D, Li X. Innate immunity andimmunotherapy for hemorrhagic shock. Front Immunol. 2022 Aug 25;13:918380. doi:10.3389/fimmu.2022.918380. PMID: 36091025; PMCID: PMC9453212. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9453212/KEYWORDS: Trauma; energy metabolism; hemorrhagic shock; hypoxia

Open Topic for Temporary Stabilization of Corneal and Corneoscleral Injuries

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Combat Casualty CareOBJECTIVE: The objective of this topic is the development of a non-surgical prototype technology capable of obtaining approval/clearance by the Food and Drug Administration (FDA) that is simple enough for medical personnel to administer in a theater of operations (TO) with minimal additional training that will temporarily stabilize suspected full thickness corneal and corneoscleral injuries during transport to a higher echelon of care where surgical intervention is available. This award will seek offerors to engage the FDA, conduct Good Laboratory Practice (GLP) animal studies, and deliver prototype devices to the government.DESCRIPTION: Ocular injuries are common occurrences among warfighters, occurring disproportionately compared to injuries affecting more protected areas of the body. The cornea is the first tissue of the ocular structure and often impacted first in trauma. Combat corneal injuries often have a significant impact on vision and there can be significant delays in receiving specialty care for combat ocular trauma. In recent combat operations corneal puncture injuries resulted in poor visual outcomes often resulting in blindness. This is predominantly due to inadequate battlefield interventions to close the open ocular wounds and restore intraocular pressure. A study published in 2020 describes the cause and type of ocular injuries in modern warfare and analyzed all patients with eye injuries from the Iraq and Afghanistan conflicts who were treated at Military Treatment Facilities (MTF). They reported 67,586 persons were admitted to either a United States or United Kingdom MTF for treatment of injuries. 8-10% of wounded soldiers had ocular injuries. 82% of those injuries occurred in battle and 71% were from explosions, and 56% had open globe injuries. [1]If an open globe (OG) injury is suspected on the battlefield, a rigid eye shield is applied to protect the eye, and the injured warfighter is evacuated to an ophthalmic specialist. Then, OG injuries are closed with sutures to create a watertight seal. This may occur up to 24 hr post-injury currently and is expected to increase up to 72 hr in future combat operations where air evacuation may not be guaranteed. [2-4] However, 53% of OG injured eyes retain intraocular foreign body upon injury and require evacuation to an ophthalmic specialist for surgical intervention. [5] In order to address corneal and corneoscleral injuries earlier and in a way that is relevant to thethe austerity encountered in a TO, a product that allows for temporary stabilization of corneal and corneoscleral injuries is needed. The temporary cornea repair (TCR) will serve as a bridge management strategy that will remain in place until more definitive care is available. The TCR capability will be in support of MTFs associated with the Military Healthcare System at Role of Care (RoC) 2 (Forward Resuscitative Surgical Team) and RoC 3 (Combat Support Hospital). For a description of RoC please see the reference section.PHASE I: This topic is intended for technology proven ready to move directly into Phase II. Therefore, the offeror shall provide detail and documentation which demonstrates the accomplishment of a "Phase I-like" effort, including a feasibility study. This includes, insofar as possible, the scientific and technical merit of a non-surgical prototype that will temporarily stabilize suspected full thickness corneal and corneoscleral injuries. Feasibility documentation of particular interest is prior evidence leading to: •Preliminary data to support the safety and efficacy of the prototype. •Design specifications for the prototype.•GLP-biocompatibility (in vitro and in vivo) safety validation data if available.•Statistically significant performance data if available.PHASE II: This phase will focus on refinement and optimization of a non-surgical prototype that will temporarily stabilize suspected full thickness corneal and corneoscleral injuries and can be tested in a military relevant environment.Offerors should propose technology solutions ranging from initial testing of design concepts and evaluation of candidate(s) where study endpoints are defined, and animal models are proposed. ((Technology Readiness level (TRL) 3)) to component validation in a non-GLP laboratory environment to refine hypothesis and identify relevant statistical data required for further technological assessment (TRL 4). Further information regarding DOD Biomedical TRLs can be found in the reference section.The work may include, but is not necessarily limited to, the following: •Prototype refinement/maturation progressing towards clinical product•Preclinical studies (as needed) to support an Investigational Device Exemption (IDE) (or•other appropriate FDA) submission•Preclinical studies under GLP (as needed) to support IDE (or other appropriate FDA) submission•IDE (or other appropriate FDA) submission•Stability and shelf-life studies if performed•Establishment of Good Manufacturing Practice (GMP) planning for clinical trials and for market release•The performer is expected deliver up to 4 prototypes for military relevant testing. The desired prototype should be simple enough for medical personnel to administer in a TO with minimal additional training, safe enough to use on any suspected corneal or corneoscleral injuries, capable of maintaining a tight seal for an extended period during transport, and effective at stabilizing the eye such that it preserves eyesight.PHASE III DUAL USE APPLICATIONS: The goal for this Phase is to further development and testing of the prototype through commercialization and FDA approval for its intended use as a temporary stabilization of corneal and corneoscleral injuries. The temporary cornea repair would need to serve as a bridge management strategy that will remain in place until more definitive care is available. Military uses of this technology would support RoC 2 and 3, as well as a mass casualty event where casualties greatly overwhelm first responders and patients need to be triaged to preserve life, limb, and sight.REFERENCES:1.[1] Breeze J, Blanch RJ, Mazzoli R, DuBose J, Bowley DM, Powers DB. Comparing the Management of Eye Injuries by Coalition Military Surgeons during the Iraq and Afghanistan Conflicts. Ophthalmology. 2020 Apr;127(4):458-466.1.[2] Linde, A. S., Mcginnis, L. J. & Thompson, D. M. Multi-battle domain-perspective in military medical simulation trauma training. J Trauma Treat https:// doi. org/ 10. 4172/ 2167- 1222. 10003 91 (2017).2.[3] Riesberg, J., Powell, D. & Loos, P. The loss of the golden hour. Special Warfare Mag. 30(1), 49–51 (2017).3.[4] Army, U. S. The US army in multi-domain operations 2028. TRADOC Pamphlet 525, 3–1 (2018).4.[5] Vlasov, A. et al. Corneal and Corneoscleral Injury in Combat Ocular Trauma from Operations Iraqi Freedom and Enduring Freedom. Mil. Med. 182, 114–119, https://doi.org/10.7205/MILMED-D-16-00041 (2017).5.Roles of Care doctrine: https://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/jp4_02ch1.pdf6.Combat Ocular Trauma: Open-globe wounds in operation Iraqi Freedom and Operation Enduring Freedom: risk factors for poor visual outcomes and enucleation; Harris JP, Justin GA, Brooks DI, Woreta FA, Agrawal RV, Ryan DS, Weichel ED, Colyer MH.; Acta Ophthalmol. 2021 Dec.7.Military Relevant Testing: Development and Characterization of a Benchtop Corneal Puncture Injury Model; Eric J. Snider, Lauren E. Cornell, Jorge M. Acevedo, Brandon Gross, Peter R. Edsall, Brian J. Lund, and David O. Zamora; Sci Rep. 2020; 10: 4218.KEYWORDS: Cornea injuries, corneoscleral injuries, corneal repair, combat ocular trauma, open globe injuries, roles of care

High Performance Clock Oscillator

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Microelectronics; Space Technology

OBJECTIVE: The Department of Defense(DoD) is seeking the development of a high performance, full in-system programmable, industrial temperature rated (storage -55C to 125 C; operational -40 C to 105 C), US Sources, high G (30kG) operational shock, performance better than 0.001 ppb/g, 100kG survival shock, lower power (<30mW @ 1.8V), supply range 1.8 – 3.3V, microelectromechanical systems (MEMS) oscillator smaller than 9mm in area packaged and He proof, while capable of operations from 1 to 105 MHz with frequency stability of 0.5ppm in operational temperature range, the Allan deviation (ADEV ) better than 1E-11 in 1 to 9 Sec. The device shall be printed circuit board (PCB ) surface mountable with a large central electrically conductive pad for mechanical stability and seek to minimize the overall footprint and volume to the maximum extent possible.

DESCRIPTION: There are many applications for the DoD which require high precision, low Size, Weight, Area and power (SWAP) clock sources. For example, satellite communications (SATCOM ), global navigation satellite system (GNSS) receivers require reference clocks that have high frequency stability, low phase noise and low power operations. Additional applications related to fuzing and other high acceleration applications require the clock generators for microelectronics to be survivable and operational under high G environments. Harshness of military environments and application of microelectromechanical systems (MEMS) oscillators is well documented [1]. Clock oscillators that can deliver high performance (50-100ppb frequency stability over operating temperatures, 1E-11 ADEV), low power, in system programming capability in the range of 1-105MHz are required. The oscillators should be operable under 30kG and survivable under 100kG shocks. Research on quartz crystals has demonstrated g-sensitivity of 2E-69/g [2] and MEMS oscillators have shown even lower sensitivity [3, 4].

PHASE I: Conduct a feasibility study and design of a MEMS oscillator with high performance and survivability under high-G conditions, 30kG and 100kG respectively. The consideration for the MEMS design shall be described. Architecture, design and methods of fabrication shall be defended regarding the following application-based specifications:

  1. Frequency stability of 100ppb or better in the range of 1-105MHz.
  2. ADEV of 1E-11 in 1 to 9 Sec.
  3. Full in-system programmable for entire range.
  4. The oscillator shall operate over the temperature range (-55 to 105C).
  5. Power consumption <30mW@1.8V
  6. Operation from 1.8V to 3.3V.
  7. Operational under 30kG environment with low G-sensitivity of 0.001ppb/g.
  8. Survivable under 100kG shock.

The feasibility study shall detail the process and techniques used along with associated costs. If there are bulk quantity discounts factored in, the report shall disclose quantity price break points and which steps were discounted wherever relevant. It must include:

  1. Proposed manufacturing processes flow and techniques used including dicing and etching methodologies, along with figures and diagrams describing the process.
  2. Bulk material and specification (i.e., crystal orientation, dopant species, resistivity, epi thickness, if any, etc.).
  3. Cost break down for manufacturing compared to existing (both commercial and research) and comparative theoretical options.
  4. Methodologies and analysis techniques used for characterizing the proposed device.

The delivered report shall fully describe the proposed techniques and characterization methodologies, including a notional list of fabrication tools, facility requirements, and a program plan for follow-on phase development. If any of the above items cannot be fully addressed, the report must include relevant research and rationale that demonstrates their inapplicability to the proposed technique. If adhering to the above items is possible, but not financially feasible, the report must include relevant justification. Finally, the challenges and special considerations for testing of accelerometers under high-g stress environments shall be addressed.

FEASIBILITY DOCUMENTATION: Offerors interested in participating in Direct to Phase II must include in their response to this topic Phase I feasibility documentation that substantiates the scientific and technical merit and Phase I feasibility described in Phase I above has been met (i.e., the small business must have performed Phase I-type research and development related to the topic, but from non-SBIR funding sources) and describes the potential commercialization applications. The documentation provided must validate that the proposer has completed development of technology as stated in Phase I above. Documentation shall include all relevant information including, but not limited to: technical reports, test data, prototype designs/models, and performance goals/results. Work submitted within the feasibility documentation must have been substantially performed by the offeror and/or the principal investigator (PI).

PHASE II: Build, test and deliver a fully functional MEMS oscillator based on the design developed in Phase I. Demonstrate the capability of performance while adhering to the specifications outlined in Phase I. Production yields should be considered to keep costs with commercialization a viable option. The final report shall address manufacturing yield and reflect that the tested prototypes were selected from across multiple lots to demonstrate repeatability and quality with low variation within wafer, wafer to wafer, and lot to lot. If a non-random selection was required to optimize performance, the final report must detail reasoning for using non-random selection and the selection criteria used.

Deliver a detailed final report that documents the cost breakdown per device, manufacturing processes utilized, fabrication toolset required to perform the proposed techniques, all facility requirements, all electrical characterization, and all device design data (Technology Computer Aided Design (TCAD) files, modeling/simulation results, etc.). If there are bulk quantity discounts factored in any of the cost breakdowns, the final report shall disclose quantity price break points and which steps were discounted wherever relevant. The final report shall contain sufficient technical detail such that an entity skilled in semiconductor fabrication can repeat the presented results.

PHASE III DUAL USE APPLICATIONS: This technology could be utilized for other DoD and commercial applications where high performance and/or repeated shock events may occur, such as precision SATCOM, GNSS microcircuits, fuzing and munition electronics, flight termination systems, or crash test instrumentation.

REFERENCES:

  1. T. G. Brown, “Harsh military environments and microelectromechanical (MEMS) device”, Proceedings of IEEE Sensors, vol 2, 2003
  2. M Bloch et al, “Acceleration ‘G’ Compensated Quartz Crystal Oscillators”, 2009 IEEE International Frequency Control Symposium Joint with the 22nd European Frequency and Time forum, 2009
  3. Bongsang Kim et al, “MEMS Resonators with extremely low vibration and shock sensitivity”, IEEE Sensors, 2011
  4. Beheshteh Najafabadi, “Study of Acceleration Sensitivity and Nonlinear Behavior in Silicon-based MEMS Resonators”, Doctoral Dissertation, University of Central Florida, 2019

KEYWORDS: MEMS, Temperature compensated Crystal Oscillator (TCXO ), Oscillators

Portable Automated Solution for the Library Preparation for Sequencing

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Biotechnology

The technology within this topic is restricted under the International Traffic in Arms Regulation (ITAR), 22 CFR Parts 120-130, which controls the export and import of defense-related material and services, including export of sensitive technical data, or the Export Administration Regulation (EAR), 15 CFR Parts 730-774, which controls dual use items. Offerors must disclose any proposed use of foreign nationals (FNs), their country(ies) of origin, the type of visa or work permit possessed, and the statement of work (SOW) tasks intended for accomplishment by the FN(s) in accordance with the Announcement. Offerors are advised foreign nationals proposed to perform on this topic may be restricted due to the technical data under US Export Control Laws.

OBJECTIVE: DTRA seeks to develop a portable tool capable of preparing DNA and RNA libraries for sequencing utilizing a minION in a tactical environment. Further automatization is envisioned to extract, purify, and isolate the genomic library for use in sequencing using the minION. Successful development of this tool will provide benefits to both government and commercial users of the minION sequencing capability by decreasing both the operator load and potential error in the preparation of biological samples.

DESCRIPTION: Biological Warfare Agent (BWA) detection and identification options for tactical users are limited in both the available technologies and scope of the ID capability. Lab-based theater confirmatory DNA and RNA sequencing are possible, but are not technically or tactically feasible for operators at the current time. Additionally, the methods employed by operators, Hand Held Assay (HHA) and Polymerase Chain Reaction-based (PCR) tools, are definitively limited to known and specifically targeted BWAs. Sequencing, however, is capable of having a BWA library that is only limited by available processing power and available genomic data. The specific need for these users is a tool that can streamline the library preparation of low complexity, high biomass BWA samples for use in a minION in a time-constrained tactical environment. BWA library preparation includes the extraction and purification of the genomic sequence along with the fragmentation of the DNA and attachment of the adaptor protein. When combined with the Oxford Nanopores minION, on-target sequencing results will be viewable in real-time by CONUS/OCONUS laboratories, and decision-makers at the Joint Operations Center (JOC). Applying automated library preparation will prevent potential errors by employed operators, while minimizing the overall time commitment.

Requirements for this development are as follows:

• Tool Capabilities :

o Isolate DNA/RNA from low complexity, high biomass BWA sample

o Isolation of DNA/RNA must work on all types (i.e. bacteria, viruses, etc.) of BWA samples

o All steps must be automated, with the exception of the insertion of the raw sample.

o Production of DNA/RNA library must be compatible with Oxford Nanopores minION

• Tool Design

o Approximate Run Time (from insertion of raw sample): <= 10 minutes

o Approximate Overall Dimensions: 6” x 6” x 3”

o Weight = <5.0 lbs.

o Capable of running isolated or using a windows laptop with GUI software

PHASE I: Begin with a market research study of potential COTS hardware solutions that meet tool requirements. Demonstrate the feasibility of automated DNA/RNA library preparations and confirm the compatibility of the prepared library with the Nanopore Technologies (NPT) minION. Conduct successful benchtop functionality testing consisting of library preparation for a pre-determined raw sample followed by accurate identification utilizing the minION and related software. Culminate Phase I with a conceptual flow chart and system design to demonstrate that for Phase II an initial development path from start to finish has been given adequate consideration, risk and their mitigation have been investigated, and a development plan that provides confidence in the outcome has been established.

PHASE II: Focus on building, testing, and refining with an integrated initial prototype. After full functionality is achieved with the prototype, conduct successful benchtop functionality testing consisting of library preparation for multiple pre-determined raw samples followed by accurate identification using the minION and related software. Pending a successful functionality test, a minimum of two fully functional units will be fabricated with packaging that meets all of the final tool’s requirements. Discussion will occur with the DTRA program team about future integration into a fully equipped sequencing kit. DTRA seeks an end state that results in a single device that can prepare the library from a variety of biological raw samples while being run on the minION.

PHASE III DUAL USE APPLICATIONS: This phase will further develop the capability developed in Phase II by improving robustness and user application. Although additional funding may be provided through DoD sources, the awardee should look to other public or private sector funding sources for assistance with transition and commercialization.

REFERENCES:

  1. Nanopore Technologies, MinION -https://nanoporetech.com/products/minionHandheld Genomic Sequencer Shows Promise in Field Demo
  2. https://www.army.mil/article/209780/handheld_genomic_sequencer_shows_promise_in_field_demoSequencer for soldiers: battlefield genomics
  3. https://nanoporetech.com/resource-centre/sequencers-soldiers-battlefield-genomics-0Arnhouse Digital Devices Corporation, BioDigital PC12X
  4. https://addc.com/product/biodigitalpc-12x/

KEYWORDS: Biosequencing; Portable Genomic Sequencing; Sample Preparation

Capability to Determine the Effect of Dust and Debris on the Chemistry Environment post CWMD Weapons Strike

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Advanced Computing and Software

The technology within this topic is restricted under the International Traffic in Arms Regulation (ITAR), 22 CFR Parts 120-130, which controls the export and import of defense-related material and services, including export of sensitive technical data, or the Export Administration Regulation (EAR), 15 CFR Parts 730-774, which controls dual use items. Offerors must disclose any proposed use of foreign nationals (FNs), their country(ies) of origin, the type of visa or work permit possessed, and the statement of work (SOW) tasks intended for accomplishment by the FN(s) in accordance with the Announcement. Offerors are advised foreign nationals proposed to perform on this topic may be restricted due to the technical data under US Export Control Laws.

OBJECTIVE: Develop the diagnostics, experimentation processes, and the modeling and simulation (M&S) needed to determine the effects of dust and debris on agents after weapons detonating in structures.

DESCRIPTION: Real world CWMD strike kinetic weapons often encounter responding structures. Weapon strikes on targets generate significant dust and debris, e.g. fragment striking of walls and floors, building collapse, ground based debris.

Particulates in the environment have been shown to affect the late time chemical combustion of non-ideal explosives such as the metals found in many weapon systems and the late time combustion of biological and chemical agents. This reduces weapon effectiveness. Currently, we lack the ability to measure and model the effect of dust and debris on agent defeat.

Development of well-characterized experiments and accompanying M&S are needed for this critical effort. These experiments and M&S can be utilized outside of the DoD to understand the effects on environments from industrial pollution, forest fires, and other particulates in the air that would change natural and industrial occurring chemistry within buildings or in open air.

This SBIR looks at for a well entwined the experimental and M&S effort. This should include develop diagnostics, experimentation processes, and the M&S needed to determine the effects of dust and debris on agents and in general late-time chemistry. This effort pairs with other efforts at DTRA and elsewhere aimed at understanding the amount of dust and debris generated from weapons detonating in structures. It also ties into a separate ongoing DTRA effort aimed at generating a well-characterized amount of dust and debris in laboratory and field settings.

This SBIR has as an end goal of taking dust and debris generated as a function of time to determine effects on the chemistry throughout the process (not just end states). Effects to explore include mixing, pressure, and temperature, size of fireball and late-time combustion of agent, metals and other species. The work from this effort can incorporated into mission planning software for DoD/DOE programs and be utilized commercially in the modeling of environmental effects from pollutions and forest fires.

PHASE I: Phase I: Initial experimentation and modeling of effect of dust and debris

• Develop M&S, diagnostics, and testing for effects at the laboratory scale

• M&S code should be able to accept outside data on dust generation efforts

PHASE II: Phase 2: Prototype M&S and experimental techniques

• Develop M&S capability to determine effect of dust and debris on chemistry towards use in full scale application

• Perform experiments to examine scale-up effects of dust and late-time chemistry

• Utilize data, obtained through this SBIR, past efforts, and from concurrent DTRA projects to refine theory & models

• Develop experimental hardware/techniques for full scale applications towards model validation

PHASE III DUAL USE APPLICATIONS: Phase 3: Full-weapon and target efforts

• Model and participate in testing of full-scale weapons

• Refine techniques based on full-scale results

• Tie in with Agent Defeat mission planning codes such as IMEA

• Market capabilities to larger DoD/DOE and industrial/environmental community

REFERENCES:

  1. "The simulation of dust effects from fragmenting charges" Orlando A. Soto et al. International Journal of Numerical Methods for Heat & Fluid Flow Vol. 26 No. 3/4, 2016pp. 999-1026
  2. "A multiphase shock tube for shock wave interactions with dense particle fields" Justin L. Wagner et al. Exp Fluids
  3. "On the passage of a shock wave through a dusty-gas layer" Miura H, Glass II Proc R Soc 385:85-105
  4. "Dust Deflagration Extinction" Kris Chatrathi and John Going Process Safety Progress (Vo1.19, No.3)

KEYWORDS: CWMD; Kinetic; Chemistry; Dust; Debris; Effects; Weapons; Temperature; Pressure; Planning

Deep Learning and Extraction of Chemical Synthesis or Biosynthetic Pathways from Scientific Literature

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Advanced Computing and Software; Biotechnology

OBJECTIVE: Conduct proof-of-concept studies to enable automated knowledge extraction and Natural Language Processing (NLP) approaches in machine learning (ML) for chemical synthesis or biosynthetic pathways of publicly available scientific publications that may pose dual-use research of concern (DURC). This topic seeks development of (1) computational methods for employing large language models (LLMs) for automated production of knowledge ontologies from scientific literature and (2) a scalable system with automated annotation capability.

DESCRIPTION: Scientific research of dual use concern includes research that, based on current understanding, can be reasonably anticipated to provide knowledge, information, products, or technologies that could be directly misapplied to pose a significant threat with broad potential consequences to public health and safety, materiel, national security, among other sectors. Automated, large-scale extraction of procedures for chemical synthesis or biosynthesis will increase the efficiency and effectiveness of analysts seeking to provide timely courses of action (COA) for relevant decision makers concerning biological or chemical synthesis information of interest to the Defense Threat Reduction Agency (DTRA) and end users. An ideal system shall require minimal human-in-the-loop, enabling a subject matter expert (SME) to supplement the model with ad hoc data.

The development of open-source semantic systems have expanded beyond manually curated, commercial databases such as Reaxys (Reference 1). One recent effort, SynKB, has applied methods to automatically extract data from organic chemistry reactions described in United States (U.S.) and European commercial patents (Reference 2). The SynKB system enables chemists to perform structured queries over large corpora of synthesis procedures. Other research groups have applied language models for molecular design, whereby the model implicitly learns the “vocabulary” and composition of valid molecules and provides the ability to survey optimized molecular properties (Reference 3). Text-like representations of chemical reactions (SMILES) and Natural Language Processing (NLP) neural network Transformer architectures have been applied to retrosynthesis prediction problems (Reference 4). Another research team has developed the AiZynthTrain package for training synthesis models on USPTO patent data with the intent to integrate into retrosynthesis software (Reference 5). This topic seeks to build upon these and similar NLP-based approaches for knowledge extraction that may be broadly applied to chemical or biological scientific domains, improve system scalability, and automate data annotation capabilities.

DTRA’s areas of interest include, but are not limited to: (1) understanding viable synthesis routes to a chemical compound from precursor molecules or substrates, and other starting materials, and (2) retrosynthesis prediction, which may be used to identify possible routes of synthesis and determine the most effective route for the synthesis process.

PHASE I: Leverage an LLM-based ontology system that uses textual knowledge of ontologies to extract information about biosynthetic or chemical synthetic procedure details from open source literature. The proof-of-concept system shall provide information about viable routes to a chemical compound and possible retrosynthesis analysis. Performers shall utilize visual analytical methods that enable users to browse and search for chemical-related data. Performers are encouraged to represent findings to a user with chemical-pathway association graphs, knowledge graphs, or by other means. The architecture shall be scalable, and shall leverage automated annotation capabilities in lieu of human annotation.

The devised solution shall capture relationships between concepts that indicate possible DURC. The performers will develop quantitative metrics to evaluate the LLM neural network classification performance by way of statistical approaches.

Phase I deliverables will include (1) a final report and (2) demonstration of the preliminary architecture. The report should provide results on architecture performance using unambiguous statistical methods, describe training and development, and identify advantages, limitations, and weaknesses. The architecture shall be described, including operating system, other software requirements (if applicable), and data sources.

PHASE II: Phase II efforts will focus on refinement of the approach developed during Phase I and prototype demonstration. The Phase II deliverables will be a prototype demonstration of the LLM neural network architecture and a report detailing: (1) a description of the approach, optimization techniques, and performance outcomes; (2) training, testing and validation methods; (3) a real world evaluation of the approach with a use case of mutual interest with DTRA; and (4) advantages, disadvantages, and limitations of the approach. The performer will identify weaknesses of the approach, and identify methods that may improve performance in the classifier and aspects of the overall architecture. The performer will provide details about user interfaces (if applicable) and any associated executables.

PHASE III DUAL USE APPLICATIONS: The performer will identify and employ features that have the potential for use in commercial applications.

REFERENCES:

  1. “Reaxys: An Expert-curated Chemistry Database,”https://www.elsevier.com/solutions/reaxys
  2. F. Bai, et al., “SynKB: Semantic Search for Synthetic Procedures” in arXiv, 2022.
  3. J. Owoyemi, et al., “SmilesFormer: Language Model for Molecular Design” in ChemRxiv, 2023 (preprint publication)
  4. I. V. Tetko, et al. “State-of-the Art Augmented NLP Transformer Models for Direct and Single-Step Retrosynthesis,” in Nature Communications, vol. 11, p. 1-11, 2020.
  5. S. Genheden, et al. “AiZynth Train: Robust, Reproducible, and Extensible Pipelines for Training Synthesis Prediction Models” in ACS Journal of Chemical Information and Modeling, vol. 63, p. 1841 – 1846, 2023.

KEYWORDS: Biosynthetic Pathways, Chemical Synthesis, Deep Learning, Extraction

Remote Through-Container Identification of CBRNE materials

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Advanced Computing and Software

OBJECTIVE: Conduct a proof of concept study to develop a rapid, remote, handheld, ruggedized, all-weather, self-powered, user-friendly device to be used by first responders to quickly and accurately identify the contents within opaque, sealed containers at a stand-off distance.

DESCRIPTION: The aim of this effort is to conduct a proof of concept study to develop a remote, light-weight handheld, ruggedized, self-powered, device to identify the contents of opaque sealed containers at various stand-off distances The solution should provide a user friendly interface and be accessible while wearing protective clothing for chemical or biological hazards. Additionally, the device should also have the capability to interpret and learn new materials as they are encountered. A similar topic was released was in 2012 under DTRA122-012 which ran through a Phase I effort. However, the emphasis here is placed on designing a handheld solution rather than man-portable, ensuring it can be operated with the latest issue of CBRNE protective clothing, ensuring rapid results, and taking advantage of the latest machine learning algorithms to improve the identification of unknown materials encountered in the field. Currently available sensors fall short of meeting all of these requirements. The outcome of this effort shall improve upon current methods of identifying and characterizing CWAs in a tactical setting while streamlining and simplifying testing process for end users.

PHASE I: The performer must demonstrate in a laboratory environment the capability of sensing through opaque containers of varying thickness to detect and identify CBRNE contents such as chemical, biological, radiological materials with a high degree of confidence while minimizing physical contact with CWAs inside chemical munitions or improvised devices. The performer shall explore the tradeoff space related to the performance objectives and metrics. Additionally, the performer shall provide a design concept for a prototype related to form factors to include the device being handheld, ruggedized, providing rapid results, accessible while wearing CBRNE protective clothing, and providing a mechanism to discover new previously unknown materials in the field.

PHASE II: Phase II must develop a prototype device to meet the form factor requirements to include being lightweight, handheld, battery operated, and accessible while wearing protective clothing. The prototype must have a field upgradable library to learn new materials as they are encountered. The Phase II final report should include a development plan for follow-on production and a Phase III roadmap. Phase II demonstrations should be provided for the DoD community and clearly demonstrate successful and accurate detection and identification of unknown substances in sealed containers.

PHASE III DUAL USE APPLICATIONS: Phase III must include identification of support for commercialization of the device to include other government and commercial entities. Although additional funding may be provided through DoD sources, the awardee should look to other public or private sector funding sources for assistance with transition and commercialization.

REFERENCES:

  1. https://www.sbir.gov/sbirsearch/detail/372784
  2. Sinha, D.N., Anthony, B.W., and Lizon, D.C.. Swept frequency acoustic interferometry technique for chemical weapons verification and monitoring. United States: N. p., 1995. Web.
  3. Phillip G. Wilcox, Phillip G. Wilcox, Jason A. Guicheteau, Jason A. Guicheteau, "Comparison of handheld Raman sensors through opaque containers", Proc. SPIE 10629, Chemical, Biological, Radiological, Nuclear, and Explosives (CBRNE) Sensing XIX, 106290M (16 May 2018); doi: 10.1117/12.2303968
  4. W. E. Parker1, W. M. Buckley1, S. A. Kreek1, A. J. Caffrey2, G. J. Mauger1, A. D. Lavietes1, and A. D. Dougan1, “A portable system for nuclear, chemical agent, and explosives identification.” AIP Conference Proceedings 576, 1073 (2001);https://doi.org/10.1063/1.1395491

KEYWORDS: stand-off, opaque, remote identification

Signature Detection and Training via Application of Digital Product-Insertion Technologies

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Trusted AI and Autonomy

OBJECTIVE: To investigate and demonstrate a proof-of-concept to explore the applicability of emerging digital product-insertion technologies to the detection of and changes in signatures of interest and to the 3-D rendering of real-world objects and settings in synthetic VR/AR/XR training environments for operators and inspectors.

DESCRIPTION: Advances in commercial technologies and AI have led to the development of unique capabilities that can have direct application to DoD and national security requirements. For example, digital product insertion and related AI capabilities for seamlessly emplacing 2-D and 3-D products in media have demonstrated significant advancements that have direct application to technologies relevant to national security. These advances in AI can support requirements such as rendering 3-D environments in near-real-time and the development of models and signature identification capabilities that require limited or no training data. Areas of interest for Over-the-Horizon Arms Control and potential applications include:

• Identification of novel signatures of interest within the nuclear pathway

• Rapid generation of AR/VR/XR-enabled synthetic training environments from images, videos, CAD/CAM drawings

• Detecting evidence of alterations, including image and video authentication and DeepFake detection

• Enhancing capabilities of DTRA inspection teams and counterproliferation practitioners via VR/AR/XR technologies, including the real-time insertion of threat objects.

PHASE I: Design and execute a technical feasibility study to examine the application of novel artificial intelligence digital product-insertion capabilities in three priority areas:

Priority Area 1: Detection

1. Identification of abnormal seismic signatures in video footage.

2. Identification of other insights from video footage such as power fluctuations, equipment operating status, etc.

Priority Area 2: Training

  1. 3-D rendering of objects and settings into synthetic VR/AR/XR training environments.

Priority Area 3: Image/Video Interpretation

1. Detection of indicators of alterations in images and video.

2. Identification of environmental change (e.g., equipment layout) in images and security camera footage.

3. Detection of image or video alteration.

4. Identification, extraction, and 3-D rendering of unfamiliar objects.

5. 2-D to 3-D rendering into CAD or comparable/relevant formats

6. Reduction or elimination for the need of training data to classify images/video or classify objects within images/video.

PHASE II: Design and execute a test plan to validate application of novel artificial intelligence digital product placement capabilities against one (threshold) or two (objective) priority areas determined to be feasible by the Phase I feasibility study. Tests will be conducted in laboratory (threshold) or field (objective) environments and place an emphasis on potential applications to nuclear pathway signature detection and the nuclear treaty verification space, such as remote monitoring, exercises, and training. Test plans will include documentation on methodology to be employed and adhere to best experimental design practices.

The Phase II efforts will address research questions to include:

• The potential to transform a single 2-D image of an object into a 3-D object and place it into an interactive VR/AR/XR scenario

• The potential for a non-expert user with minimal knowledge of video editing or VR/AR/XR to insert objects into scenes after a short training course.

• An assessment of the additional value that can be extracted from still and motion video with limited to no training data and/or model iteration required

• The potential to integrate digital product placement and similar capabilities be integrated with Unreal Engine, Unity, or comparable capabilities

PHASE III DUAL USE APPLICATIONS: Phase III will consist of a demonstration of a fully capable and packaged artificial intelligence capabilities that address specific end-user requirements associated with Priority Areas 1-3.

Phase III for feasible Priority Area 1 use-cases will demonstrate a repeatable and accurate means of extracting established signatures from motion video (e.g., security camera footage). Data ingest and processing pipelines will be automated to the greatest extent feasible and leverage low-code, no-code interfaces where possible to allow for utility by users with varying ranges of technical expertise.

Phase III for feasible Priority Area 2 use-cases will demonstrate effective integration of VR/AR/XR and digital product insertion technologies. These integrations will validate enhancements to user experience and training quality. Technology integrations should also demonstrate a reduction in time associated with setting and scenario development associated with use for training, planning, and operational execution.

Phase III for feasible Priority Area 3 use-cases will demonstrate an ability to detect previously imperceptible signatures in still images and/or motion images. Phase II experiments should also demonstrate where savings were achieved (e.g., required volume of training data) in the development of models.

REFERENCES:

  1. G. Varol, R. S. Kuzu and Y. S. Akgiil, "Product placement detection based on image processing," 2014 22nd Signal Processing and Communications Applications Conference (SIU), Trabzon, Turkey, 2014, pp. 1031-1034, doi: 10.1109/SIU.2014.6830408.
  2. Using Machine Learning for Programmatic Product Placement in TV Advertising by Christopher Kuthan, Akhil Aendapally, and Anita Snyder, 27 JAN 2021, in *Post Types, Amazon Rekognition, Amazon Rekognition Video, Amazon SageMaker, Amazon Simple Queue Service (SQS), AWS Elemental MediaTailor, AWS Lambda, Case Study, Customer Solutions, Industries, Marketing & Advertising, <https://aws.amazon.com/blogs/industries/using-machine-learning-for-programmatic-product-placement-in-tv-advertising/>

KEYWORDS: 2-D to 3-D rendering; image and video exploitation; object detection; image and video authentication, synthetic training environments; virtual, augmented, and mixed reality; deep-fake detection

Acoustic Agglomeration to aid fine aerosol particulate collection

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Integrated Sensing and Cyber

OBJECTIVE: Organically develop or modify commercially available electroacoustic agglomerator for air pretreatment in an aerosol collection system similar to the

Radionuclide Airborne Particulate Sampler Analyzer (RASA).

DESCRIPTION: DTRA supports the Comprehensive Nuclear Test Ban Treaty (CTBT) via the Nuclear Arms Control Technologies Program (NACT). The CTBT is strategically important to the United States (US) by banning nuclear testing for participating countries and allowing US access to 337 stations and laboratories worldwide. The NACT supports the US contribution to the CTBT with 37 stations and laboratories. Part of the CTBT monitoring regimen is radionuclide aerosol (RN) monitoring. The US accomplishes its CTBT RN monitoring via a system called the RASA. The required collection efficiency and Minimum Detectable Concentration (MDC) for RN collection as specified in the CTBT operational manuals are:

For filter: ≥ 80% at Ø = 0.2 μm

Globalᵈ: ≥ 60% at Ø = 10 μm

MDC ≤ 10 to 30 Bq/m3 for Ba-140

The current RASA system minimally meets these requirements.

The efficiency of particle capture on a filter is related to the intake air velocity, particle size, filter pore size and other variables such as humidity, wind speed, duct shape, etc.. A filter’s efficiency is rated as a Minimum Efficiency Reporting Value (MERV), which measures a filter's ability to capture particles between 0.3 and 10 microns (µm). Most Penetrating Particle Size (MPPS) refers to the size of the particles that most easily pass through a filter. A high-efficiency particulate air (HEPA) filter can remove 99.97% of particles down to 0.3 Micron. An MPPS of 0.2 to 0.3 microns is difficult; many filters are effective at capturing particles smaller or larger than this, but 0.2 to 0.3 micron particles regularly gets by basic filtration. Using 0.3 microns as the MPPS measures the worst-case efficacy of the filter.

The fact that collection efficiency of 0.2 to 0.3 microns particles is worse than for smaller particles might seem counterintuitive, however the combined effect of the various filter collection mechanisms (interception, intertial effect, diffusion effect, gravitational effect, and electrostatic effect) as they relate to particles size causes a dip in the collection efficiency in the 0.2 to 0.3 micron

Ultrasonic sound can cause submicron particles to agglomerate and larger particles to disassociate. Literature varies with respect to the effectiveness; one study showed that mean particle size increased from sub-micron to five micron, and another study reduced the number concentration of micron &

sub-micron by seventy and thirty percent respectively. Ultrasonic agglomeration studies, might not be comparable as the number and positioning of sound transducers, sound energy and frequency, shape and turbulence of the collection piping and chamber, humidity, etc./, varied from study to study. These

variables have an effect on agglomeration effectiveness, however, in every study ultrasonic agglomeration increases particle size distribution from sub-micron to micron or greater. Collection efficiency greatly increases when particle size becomes 3 micron or greater. Furthermore, when

combined with other collection mechanisms such as electrostatic charging or the addition of humidity or water droplets the collection efficiency may be substantially increased from any mechanisms acting alone. Successful application of this technology to the future RASA 2.0 system would allow for greater collection efficiency, reducing the Minimum Detectable Concentration (MDC) of targeted Radionuclides and improving the detection likelihood of a clandestine nuclear test.

PHASE I: Conduct extensive document research to determine state of the art with respect to aerosol collection via acoustic agglomeration aided with electrostatic charging and agglomerates such as water droplets. Design and model a system that could interface with the RASA 2.0 intake system for particle collection. Conduct trade-off studies for the system.

PHASE II: Based on the knowledge and determination of feasibility obtained in Phase I, construct a working prototype of the system designed in Phase I.

PHASE III DUAL USE APPLICATIONS: Provision of an aerosol agglomeration system that could interface with other aerosol collection or air purification systems such as the Senya Snow White.

REFERENCES:

  1. de Sarabia E, Gallego-JuaÂrez JA. Ultrasonic agglomeration of micron aerosols understanding wave conditions. J Sound Vib. 1986; 110: 413±427. https://doi.org/10.1016/S0022-460X(86)80144-4
  2. 99/02815 Pilot scale acoustic preconditioning of coal combustion fumes to enhance electrostatic precipitator performance. Fuel and Energy Abstracts (1999, July). , 40(4), 293.https://doi.org/10.1016/S0140-6701(99)98584-3
  3. Ng BF, Xiong JW, Wan MP (2017) Application of acoustic agglomeration to enhance air filtration efficiency in air-conditioning and mechanical ventilation (ACMV) systems. Table 2 Summary of relevant experimental works in acoustic agglomeration with reported performances.https://journals.plos.org/plosone/article/figure?id=10.1371/journal.pone.0178851.t002
  4. Daolai CHENG, Meng CAI, Fang ZHAO, Huimin Hu, Junfeng YAO (2015), The Study on the Removal of Ultrafine Particles, International Conference on Advances in Energy and Environmental Science (ICAEES 2015).https://doi.org/10.2991/icaees-15.2015.120
  5. Zhongyang Luo, Hao Chen, Tao Wang, Dong Zhou, Mengshi Lu, Mingchun He, Mengxiang Fang, Kefa Cen, Agglomeration and capture of fine particles in the coupling effect of pulsed corona discharge and acoustic wave enhanced by spray droplets, Powder Technology,Volume 312, 2017, Pages 21-28, ISSN 0032-5910,https://doi.org/10.1016/j.powtec.2017.02.025
  6. Li, F.; Cao, H.; Jia, Y.; Guo,Y.; Qiu, J. Interaction between Strong SoundWaves and Aerosol Droplets: Numerical Simulation. Water 2022,14, 1661.https://doi.org/10.3390/w14101661

KEYWORDS: particulate, aerosol, radionuclide, agglomeration

5G Radio Frequency (RF) Coverage in Challenging Interior Spaces Open Topic

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): FutureG; Sustainment & Logistics

OBJECTIVE: Identify, assess, develop, and demonstrate 5G RF (Radio Frequency) coverage solutions to provide an RF based communications for interior structures. The primary use case is in support of real-time logistic operations. Solutions should support data, voice, video, IoT (Internet of Things) and machine to machine-based applications.

DESCRIPTION: The Office of the Under Secretary of Defense (OUSD) for Research and Engineering (R&E) FutureG initiative seeks RF coverage solutions for challenging dynamic interior spaces such as warehouses, supply vessels, and hanger bays. Common characteristics of these spaces include dense interiors with metal dividers and barriers. Further, these spaces may be frequently reconfigured, creating new RF environments and new propagation challenges. For example, a previously empty of area of a warehouse, ship hold, or hanger may be loaded with pallets of dense material. Later those pallets are distributed, returning that to an empty space. Providing coverage in these types of spaces will require unique solutions to ensure that the RF propagation supports performance requirements such as throughput, latency, and reliability.

Successful deployment solutions should provide high network capacity in small areas while minimizing compromises in latency, reliability, and overall performance. This topic does not seek a specific fixed network capacity, but instead seeks a solution that anticipates demands for network capacity in these areas will vary over time. Building on the example above, an empty region will typically include few (if any) devices, change from empty to hundreds of devices as pallets of dense materials are moved to the area, and then decrease down to tens of devices as those pallets are distributed.

Successful solutions will be assessed by focusing on four (4) metrics. Metric One (1) is the ability to support dynamic changes in network density, as measured by number of active devices that can be supported in a small region of the interior space. Preferred solutions will allow large changes in network density. Metric two (2) is ability to minimize changes in overall performance (such as latency and reliability) as the network density changes. Preferred solutions will have minimal changes in overall performance as density increases. Metric three (3) measures the overall cost of deployment, including both installation/capital expense (CAPEX) costs and operating expense (OPEX) costs. Metric four (4) measures the complexity of initial configuration and ongoing operations. An example of a complexity metric would be how many manual tasks are reduced or eliminated by automation or potential numbers of tasks that are handled by AI (Artificial Intelligence). Metrics are a key/critical tool in evaluating the overall effectiveness of a proposal's implementation. Low metrics with a solid get-well plan are as good as high metrics. No solution is ever perfect. The general metrics described here should be expanded into more granular metrics during the development of the proposal.

This topic does not require a specific technical approach. However, two approaches are discussed for illustrative purposes. One approach could be to deploy and/or reconfigure Distributed Antenna Systems (DAS) in response to high network capacity demands. However, accomplishing this in a dynamic environment requires substantial reconfiguration and/or extensions of an existing network. Another approach could deploy and/or reconfigure small cells to address the challenge of high density in small areas. However, deploying large numbers of small cells requires a corresponding large number of equipment (and hence cost). More importantly, in a dynamic environment this can compromise latency, reliability and overall performance due to a high number of hand-offs between cells. Neither DAS nor small cells are required. These approaches are intended only to illustrate the trade-offs between supporting high capacity while minimizing compromises in latency, reliability, and overall performance.

PHASE I: Develop an initial concept design and plan for practical deployment of 5G RF coverage solutions. Phase I will be a 6-month Period of Performance (PoP). During this period there will be a kickoff, Technical Interchange Meeting (TIM), and a Preliminary Design Review (PDR). Prior to the end of Phase I, the performer will develop and present a proposed, detailed plan related to how they expect to address Phase II prototype production, test, and evaluation efforts.

PHASE II: During Phase II, the performer will begin the prototype production and test and evaluation process for transition. Phase II will be a 12-month PoP with a Critical Design Review at month six (6) and prototype demonstration at month nine (9) which is 3 months before contract end at month twelve (12).

Prototype demonstration will be conducted at a DoD selected location, during which the prototype’s capabilities must be successfully demonstrated. For budget and planning purposes, proposals should assume the test facility will be a DoD provided environment which will be a surface vessel or an environment which is identical in physical properties to a surface vessel. Test facilities may vary and will be determined as part of an award. A partial solution may be determined to be successful if the DoD determined it to be effective in a limited role. A Final Technical Report of the prototype capabilities as demonstrated at the Final Demonstration will also be required. Extended user evaluations or additional prototypes may be pursued to determine military utility.

PHASE III DUAL USE APPLICATIONS: The solution described in this topic has potential direct application to commercial applications such as container ships and cruise ships. These commercial environments have logistic tracking requirements that require RF solutions that deliver connectivity in very complex RF propagation environments. Additional military applications include multi-level underground and undersea mobile and fixed environments. Adaptability and flexibility in design and engineering of the solution is an additional benefit as these aspects will create more opportunities to solve similar coverage issues that were not initially identified.

REFERENCES:

  1. U.S. Patent US009766321B2 “INDOOR POSITIONING WITH RADIO FREQUENCY CHIRP SIGNAL PROPAGATION DELAY MEASUREMENT” is an example of a potential technical consideration that a small business might utilize in their solution for this topic. The topic author is not endorsing this reference solution but is provided merely for reference purposes. https://patents.google.com/patent/US9766321

KEYWORDS: 5G, RF coverage, Interior, Structure, Network.

OPEN TOPIC: Replacing User Name/Password Defaults - Alternative User Authentication Methods

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Human-Machine Interfaces

OBJECTIVE: DTRA seeks technologies to replace the user name/password default for authenticating users in various applications and services. The alternative proposed should be compatible with existing and emerging cloud/cloud-capable architectures, reduce the operational overhead for support, increase security over username/password defaults, and be ‘user-friendly’ to employ at the user interface application.

DESCRIPTION: While the principal user authentication used is the Public Key Encryption (PKI) used in tokens (Common Access Cards (CACs), Personal Identity Verification (PIV) cards, etc.), the continued support of username/password authentication in some use cases poses an unwelcome burden to the services provided. Current password implementations require (increasingly longer) passwords containing mixes of upper case, lower case, numerical and special characters, which must be changed every 60 – 90 days without repeating passwords maintained on lists for the previous 10-24 valid passwords. Brute force password cracking approaches have improved success rates employing parallelization of GPU and specialized hardware such as floating-point gate arrays (FPGAs) over the previous attempts using high-powered CPUs. A class of cryptologic techniques called ‘memory hard’ make these approaches ineffective, and form one of the key specific objectives for evaluation in this proposal. While commercial tokens (e.g. RSA and ORC PKI) are available to the public, they are not suitable for the first responders and foreign partners this topic supports due to various reasons (cost, availability, operational support and management, etc.) While token-based approaches are allowed for consideration, token-less approaches are preferred given the previously stated concerns. The World Wide Web Consortium (W3C) and the Fast IDentity Online (FIDO) Alliance are the principal bodies establishing standards, which various government agencies accept as governing standards. However, the new password-less standard known as FIDO2, endorsed formally by Apple, Google, and Microsoft, suffer from two issues in this initial implementation: The three major companies adopting this standard are deploying three incompatible proprietary systems, subjecting users to maintaining multiple credentials per supported website to accommodate devices in each ecosystem. That imposes a burden on users for not only certificate maintenance per site and device, but also for transporting and maintaining that certificate cache securely across their individual devices and platforms. That limitation is not as important a concern for this topic and our use cases, but is critical for future commercial interests. The second current FIDO2 implementation problem is that each user’s PKI certificate for each website must be stored in the cache (again multiplied per vendor). Caching of the certificate is a departure from the FIDO token PKI implementation that supports existing CAC/PIV architectures used by government agencies and is a principal requirement for this proposal topic. In summary, the attributes desired for any proposed solutions for this topic are:

• Solution must be a dramatic improvement in security, operation support and/or user experience for authenticating and managing disadvantaged users to replace username/password baseline

• Encryption method must be a proven ‘memory hard’ approach and implementation to counter parallelized GPU/FPGA brute force or intelligent guessing to spoof authentication communications

• System must be immune (or highly resistant) to common security compromise strategies; for example, such as ‘man in the middle’ or intercepted data replay attacks.

• System must be standards compliant or compatible, e.g. compliant with or compatible to FIDO2 guidelines

• System must be a vendor independent solution; e.g. must not be constrained to a single vendor’s ecosystem or platform, and not impose large overhead in storing or transferring user credentials across supported systems. This dramatically reduces any migration issues across domains.

PHASE I: Analyze alternative approaches, providing at least two options to include summaries of technical feasibility of implementation and integration with existing systems, operations and maintenance for principal alternatives. Demonstrate depth of understanding through a detailed technical report for preferred option illustrating deployment into “as is” authentication systems with PKI as principal authentication method, but using username/PW as the default targeted for replacement by this investigation. The report should include a proposal for Phase II prototype development. The prototype should be developed not only to merge into existing DoD or other government agencies’ systems, but should also be flexible enough for commercial deployment, such as small and medium businesses, local first responders, hospitals and clinics, etc.

PHASE II: Implement a fully functional prototype of the proposed solution, to include server-side added functionality to support the concept to the user side authentication application. The prototype should be amenable to functional and security testing. The prototype should be capable of being implemented in either traditional application-centric or cloud services environments. Documentation should include user, operational and testing information.

PHASE III DUAL USE APPLICATIONS: Implement further improvements that would enhance use of the developed product by the sponsoring office, identify and exploit features that would be attractive for commercial or other applications. Expand upon the documentation developed in Phase II to include improvements implemented in Phase III. Investigate commercialization avenues that could include other government agencies, national labs, research institutes, and defense contractors. Develop a plan to enable successful technology transition at the end of this phase.

REFERENCES:

  1. Open Web Application Security Project (OWASP) Top Ten, https://owasp.org/www-project-top-ten/
  2. FIDO Alliance – Authentication Specifications Overview, https://fidoalliance.org/specifications/
  3. Memory-Hard Functions from Cryptographic Primitives, https://par.nsf.gov/servlets/purl/10121369
  4. Tradeoff Cryptanalysis of Memory-Hard Functions https://eprint.iacr.org/2015/227.pdf

KEYWORDS: Secure authentication, PKI, Hard memory implementation, Simplified Migration

Strategic Capabilities Office SBIR Open Topic Call

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S):

  • Trusted AI and Autonomy
  • Integrated Sensing and Cyber
  • Human-Machine Interfaces
  • Space Technology

OBJECTIVE: Develop solutions for high priority operational and strategic challenges in the areas of Autonomous Systems, Machine Learning, Cyber, Cross-Domain Kill Chains, Enhanced surveillance and reconnaissance and Non-traditional Defense Technologies.

DESCRIPTION:

The Strategic Capabilities Office (SCO) is a rapid prototyping organization focused on delivering capabilities in 3-5 years to address high priority operational and strategic challenges for the Department of Defense (DoD). SCO is seeking innovative approaches that enable revolutionary advances in the following technology areas:

1. Autonomous Systems: The use of autonomous systems in military operations provides several advantages, including allowing soldiers to avoid performing overly tedious or hazardous tasks and improved decision making for time-critical operations. The SCO is interested in technologies that can help accelerate and expand the Department of Defense’s (DOD’s) use of autonomous systems as well as concepts for deterring or defeating an adversary’s attempts to do the same. Recognizing the rapid advance of commercial autonomy applications, SCO particularly encourages concepts that leverage commercial investments in autonomy technologies. Sub-categories of interest under Autonomous Systems include, but are not limited to, the following:

• Improved Human/Autonomous System Interaction and Collaboration (HASIC) solutions for ground, sea, and air vehicles

• Manned/unmanned Army ground vehicle collaboration that reduces risk to mission or risk to force

• Manned/unmanned tactical aircraft collaboration that improves targeting or weapon magazine depth for 5th generation aircraft

• Low cost/medium range (200nm)/medium endurance organic tactical ISR for Army fire and maneuver elements to include artillery units and MLRS forces.

• Communication systems, robotics, and algorithms for swarming, cooperative object interception, high speed and high precision optical navigation, and obstacle avoidance

• Low-cost robotic systems, sensors, and compute

2. Machine Learning (ML): The ability to analyze large datasets quickly using deep learning algorithms could potentially provide significant military capabilities in the areas of indications and warnings (I&W) and automatic target recognition (ATR). Recent advances in computer vision, natural language processing, and neural networks, as well as the availability of massive amounts of computational power have made the prospect of fielding military systems that leverage deep learning in the near term a real possibility. Additionally advances in reinforcement learning (RL) and generative AI also hold to promise of changing the way tactics, techniques, and procedures (TTPs) are developed, data is summarized and acted upon, and the way control systems, cooperative effects delivery, and the ways software and physical systems are designed. SCO is interested in innovative concepts that benefit the warfighter by leveraging machine learning approaches. Sub-categories of interest under Machine Learning include, but are not limited to, the following:

• Deep learning enabled by graphics processing unit (GPU) computing

• Approaches that use synthetic data to train neural networks

• Semantic processing

• ML applications for advanced modelling and simulation of militarily relevant problems

• RL/GAN generated physical systems, software, and control systems

• RL/GAN developed TTPs for swarming systems, concepts of operation (CONOPS), and software defined radios (SDRs)

• Large Language Model (LLM) applications

3. Cyber: As U.S. adversaries have invested heavily in developing offensive cyber capabilities, the Department of Defense (DoD) has implemented a cyber-defense strategy designed to deter adversaries by ensuring that the military can detect, respond and remain resilient under cyber-attack. SCO is interested in leveraging advanced cyber related technologies that will enable the U.S. military to stay ahead of the evolving cyber threat. Sub-categories of interest under Cyber include, but are not limited to, the following:

• Network protection tools that provide ways to identify network vulnerabilities and provide automated operational security capabilities

• Novel cyber-defensive techniques that leverage commercial advances in anomaly-based detection, data analytics and/or encryption methods

4. Cross-Domain Kill Chains: Finding new ways to connect sensors with weapons to complete kill chains across the air, surface, and undersea domains is critical to countering near peer adversaries. The ability to link any capable sensor with any weapon transforms the concept of a “kill chain”, where any individual link is a single point of failure, to that of a “kill web”, where it will be difficult for an adversary to prevent a successful engagement. SCO is interested in exploring alternative combinations of existing or near-term sensors, communications, and weapons. Sub-categories of interest under Cross-Domain Kill Chains include, but are not limited to, the following:

• Cross-domain fires/distributed lethality concepts

• Providing existing weapons with new capabilities (e.g., giving defensive weapons offensive capabilities, and vice versa)

• Low probability of intercept, low probability of detection (LPI/LPD) communication waveforms and architectures for air, land, or sea platforms

• Machine-to-machine network tools that allow for seamless translation across multiple data formats and waveforms

5. Enhanced Surveillance and Reconnaissance: Discover novel ways to detect, identify, locate, and characterize a range of signatures-of-interest to the DoD using novel and unconventional platforms. New platforms, and enhancements to existing platforms, are desired in all domains: subsea, surface, terrestrial, air, space, and cyber. Compute “at the edge”, when possible, is preferred as it reduces “back-end” communication demands and may enable expeditionary employment. Leveraging existing or emerging commercial technology, applied to this mission area, often accelerates prototyping through shortcutting traditional R&D timelines. Sub-categories of interest under Enhanced Surveillance and Reconnaissance include, but are not limited to, the following:

  • Collection of radio frequency signals of interest
  • Leverage the “Internet of Things” (IoT) to network dispersed, heterogenous sensors, and also detect targeted signatures via existing IoT appliances and devices.
  • Adaptability and tailor-ability in form factor enables deployment diversity

6. Non-traditional defense technologies: This category is intended to allow proposers to submit technology concepts that, while not originally developed for defense/military purposes, might be repurposed to create or enhance military capabilities. The development for many non-traditional DoD technologies is largely driven by a fast-paced and rapidly evolving commercial market. Therefore, leveraging commercial innovation is a key element of DoD’s strategy for ensuring emerging needs for technology innovation are met. Proposers wishing to submit a concept under this primary category are encouraged to consider a wide range of enhanced or new DoD relevant capabilities enabled by repurposing technologies that are not primarily used in defense applications. Examples of concepts that would be appropriate under this category include, but are not limited to, the following:

  • Using high speed computing enabled by graphics processing units (GPUs) to increase the capabilities of DoD sensor systems
  • Leveraging advances in driverless vehicle technology to enable DoD unmanned ground vehicles
  • Applying big data analytics developed for business intelligence to DoD decision making tools
  • Repurposing cybersecurity tools built to protect the Internet of Things (IoT) to defend DoD networks

Proposed research should investigate innovative approaches that enable revolutionary advances in science, devices, or systems. Specifically excluded is research that primarily results in evolutionary improvements to the existing state of practice.

PHASE I: Phase I feasibility will describe the existing proposed technology, existing DoD system(s) to improve, modifications required, anticipated improvements to existing capabilities, impacts to current logistics if any (i.e., transportation, storage, maintenance, safety, etc.) and transition approach. Results of Phase I will be detailed in a final technical report (Final Report). Phase I deliverables include: - Kick-Off Briefing, due 15 days from start of Base award - Final Report, due 120 days from start of Base award - Initial Phase II Proposal, due 120 days from start of Base award.

PHASE II: The scope of the Phase II effort will be specific to each project but is generally expected to develop a functional prototype to demonstrate the capability, develop transition plan including production and fielding approach (including updated logistics and safety consideration) and further commercialization.

PHASE III DUAL USE APPLICATIONS: The technologies developed could be used in a broad range of military and commercial applications.

REFERENCES:

KEYWORDS: Cybersecurity; Cross-Domain Kill Chains; machine learning; AI; Autonomous Systems; Intelligence, Surveillance, and Reconnaissance (ISR) systems (including manned and unmanned airborne, space-borne, maritime, and terrestrial systems)

Rapid development of effective behaviorally aligned training simulations for human relations practitioners (Open Topic)

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Trusted AI and Autonomy, Human Machine Interfaces

OBJECTIVE: The goal is to use Artificial Intelligence (AI) and Modeling & Simulations (M&S) for rapid development of training scenarios with a scalable level of difficulty, sufficiently matched fidelity, and that elicits appropriate behavioral interactions and cues sufficient for effective learning and transfer of interpersonal skills. For use in sensitive topics of human relations and interaction.

DESCRIPTION: A true assessment still needs to be completed to test the effectiveness and adequacy of legacy and novel technological approaches to education and training (E&T) for Equal Opportunity (EO) practitioners. There is a need to develop and integrate adaptive learning approaches that tailor EO trainings that respond and adapt to the learner’s capabilities. Therefore, the purpose of this topic is to develop technological and methodological approaches that will utilize realistic synthetic representations of human relation training scenarios that are adaptive and scalable on the level of difficulty, sufficiently matched fidelity, and elicit the appropriate behavioral interactions and cues to sufficiently elicit learning and transferability of interpersonal skills for use in training EO practitioners such as interpersonal relationships, team development, and resiliency. The need for this approach will potentially overcome the limitations of current educational modalities (e.g., didactic lectures, case studies, observations), which do not provide the complexity to replicate the nuances of real-life situations accurately and may result in the underdevelopment of the necessary abilities to embrace the complex and varied roles an EO practitioner fully.

Modernization of E&T is necessary to ensure that future EO practitioners are fully equipped with the necessary tools and skills to address and prevent complex human relations issues. Simulation learning (SL) will fill the gap in current E&T approaches by providing a tailored, interactive, and scalable learning environment that ensure acquisition of the necessary knowledge, skills, and abilities (KSAs) with fidelity. SL is an appropriate approach to EO education and training because it has demonstrated evidence to increase knowledge structuring, which is particularly important skill set for EO practitioners. SL also provides a tailored and adaptive approach to problem-solving skill development. Wherein the learner can progress at a pace that encourages mastery over completion - this is accomplished using realistic synthetic representations of adverse human relations events, which promote creativity in the learner to develop new solutions, critical thinking (i.e., reflection), formulate one or more solutions, establish, or recall strategies to implement the solution(s), discover new possible solutions, and explain the problem (i.e., understanding) and provide a realistic and actionable solution (i.e., evaluation).

Previous research indicates an increased proficiency in tasks and skill development when simulation training is included, as opposed to traditional classroom training alone. Specifically, SL is more effective than traditional learning approaches at increasing knowledge structuring for human relation topics. SL also provides a tailored and adaptive approach to problem-solving skill development.

The advantage of SL over traditional educational modalities is that it provides an environment that encourages transformative learning for the EO practitioner. SL is an immersive experience to addressing complex human relation scenarios wherein the learner is allowed to remain fully emerged, creating a higher sense of presence over face-to-face learning modules, which increases human relation skillsets, such as establishing contact with the victim, sharing emotions or ideas, and developing cooperation skills, such as awareness of others' ideas, tolerance toward others, and empathy.

SL also provides instructors with real-time objective data to assess the learners' mastery of job tasks or acquisition of new skills. SL objective data reduces threats to internal validity typically associated with human relations assessments because it removes the instructors' subjective self-observations. SL gives the DoD the ability to train and educate a broader audience in a variety of locations, with potentially fewer human resources, leveraging already funded technologies in development by other research organizations, thus saving millions of dollars, advancing the methods currently utilized in training and education (E&T) in human relations domain, and provide readily accessible and realistic refresher training for EO practitioners.

The Defense Equal Opportunity Management Institute (DEOMI) seeks solutions leveraging AI and SL to support the training of equal opportunity, equal employment, and diversity and inclusion practitioners to respond to challenging social issues happening in our military and other government agencies. These technologies should aid with the rapid development of very immersive and realistic scenarios portraying today’s social challenges like racism, extremism, discrimination, harassment, etc. This training tool should be able to address the development of interpersonal skills, trigger a change in behavior, and deliver the knowledge-based training effectively.

GLOSSARY:

  • Complexity – When multiple topics converge causing the lines of distinction to become unclear.
  • Fidelity – the emersion or level of simulation that re-creates (simulates) a complex phenomenon, environment, or experience.
  • Internal Validity – ability to accurately infer the causal relationship between two or more concepts.
  • Presence – the self-reported feeling of emersion experience of the user in the virtual or simulated environment.
  • Realistic Synthetic Representations - recreations of realistic equipment or people to represent real-world concepts or scenarios.
  • Sensitivity - The underlying accepts of the human relation topic that is too difficult, complex, challenge to express without causing emotional distress to other members.
  • Serious Game – highly interactive computer-based games or simulations that creates a sense of full emersion and engagement for the user.

PHASE I: Develop a concept for creating realistic synthetic representations of adverse human relations issues suitable for use in training and education for EO practitioners. Demonstrate the feasibility of the concept to meet all the requirements as stated in the Description. Establish feasibility through modeling and analysis of the design to include the initial design specifications and capabilities description to build a prototype solution in Phase II.

During Phase 1, the following questions will be answered:

1) How can we leverage simulation technology to enhance the learning experience?

2) What is the correct stimulation level for a given learning objective or outcome?

3) How does the fidelity of SL add or detract from the learning experience and E&T's effectiveness?

4) At what point does the sensitivity or complexity of the human relation topic(s) under review render them unfit for SL?

5) Will the learner perform accurate word tasks better after SL exposure?

6) When can SL become independent from the instructor, mediator, or facilitator?

7) What is the appropriate level of physical fidelity to accurately represent the necessary KSAs for EO practitioners?

8) Can SL in human relations present an opportunity to construct an adaptive learning environment that presents the learner with a personalized and adaptive curriculum and test based on ability?

PHASE II: Develop and demonstrate prototypes M&S tool in a realistic environment. Conduct testing to prove feasibility over extended operating conditions. Develop a rapid scenario development methodology and traditional training conversion to M&S at the applicable and appropriate level of fidelity and complexity, in addition to a methodology on how to properly evaluate the outcomes and performance of the students during training engagements.

PHASE III DUAL-USE APPLICATIONS: Supports the transition of EO modular simulation learning components to military training programs and the commercial market. The technology developed under this topic could create a dynamic training approach for industry and DoD programs. The innovation sought with this effort will reduce reliance on instructor capabilities, thus increasing T&E fidelity.

This simulation technology is applicable in a broad range of military and civilian E&T applications where the nature of topics is sensitive, and an expert instructor or SME is not easily accessible.

REFERENCES:

1. “National Defense Strategy”. 2022. Online at file:///C:/Users/1471179457A/Desktop/SBIR-%20Simulations/2022-NATIONAL-DEFENSE-STRATEGY-NPR-MDR.PDF

2. Defense Modeling and Simulation Coordination Office, “Defense Modeling and Simulation Reference Architecture”. 10 February 2020. Online at https://www.msco.mil/MSReferences/PolicyGuidance.aspx

3. Cook, D. A., Hamstra, S. J., Brydges, R., Zendejas, B., Szostek, J. H., Wang, A. T., Erwin, P. T. Hatala, R. (2013). Comparative effectiveness of instructional design features in simulation-based education: Systematic review and meta-analysis,Medical Teacher,35:1,e867 e898,DOI:10.3109/0142159X.2012.714886

4. Kara, N. A systematic review of the use of serious games in science education. (2021). Contemporary Education Technology, 13(2). doi.org/10.30935/cedtech/9608

5. Sauve, L., Kaufman, D., & Renaud, L. (2007). A systematic review of the impact of games and simulations on learning. EdMedia, 4149-4157.

6. de Smale, S., Overmans, T., Jeuring, J., & van de Grint, L. (2016). The effects of simulations and games on learning objectives in tertiary education: A systematic review. A. De Gloria and R. Veltkamp (Eds.): GALA 2015, LNCS 9599, pp. 506–516, 2016. DOI: 10.1007/978-3-319-40216-1_55

7. Balint, B-N & Stevens, B. (2022). Transforming team training: The influence of virtual environment features. Interservice/Industry Training, Simulation, and Education Conference (I/ITSEC), Orlando, FL.

8. Garcia, A. & Winer, E. (2022). Blending AR and VR to increase situational awareness during training. Interservice/Industry Training, Simulation, and Education Conference (I/ITSEC), Orlando, FL.

KEYWORDS: Education and Training (E&T), Equal Opportunity (EO), Modeling and Simulations (M&S), Simulation Learning (SL), and Transformative Learning, Human machine interface, Trusted AI, Adaptive learning

Analyzing Narrative Evolution Across Social Networks

The technology within this topic is restricted under the International Traffic in Arms Regulation (ITAR), which controls the export and import of defense-related material and services. Offerors must disclose any proposed use of foreign nationals, their country of origin, and what tasks each would accomplish in the statement of work in accordance with section 5.4.c.(8) of the solicitation. Additionally, Offerors will describe compliance mechanisms offerors have in place or will put in place to address any ITAR issues that arise during the course of agreement administration.OBJECTIVE: The objective of this topic is to develop applied research toward an innovative capability to automatically detect, track, and differentiate the evolution of narratives over time in the information environment. This study should explore the use of Artificial Intelligence (AI), such as natural language processing, to project long-term narratives among social networks and track changes associated with micro-changes in narratives based on responses, tracked online, to events shared by a social network. IMPORTANT: For SOCOM instructions: please visit: https://www.defensesbirsttr.mil/SBIR-STTR/Opportunities/. Go to the bottom of the page and click “DoD SBIR 23.4 Annual”. Once there, go to the SOCOM SBIR 23.4 Release 1DESCRIPTION: As a part of this feasibility study, the proposers shall address all viable overall system design options with respective specifications for detection and tracking the evolution of narratives across time and social networks. Current research captures proto-narratives at a snapshot in time and can track the engagement of audiences with a particular proto-narrative over a time period. However, narratives are not static; they evolve in the course of engagement by audiences. The main features of technology development should focus on constructing a quantitative model for tracking the evolution of narratives over time, including the transformation of one narrative into another, the dissolution of existing narratives, and the merging and splitting of strategic narratives from / into sub-narratives.PHASE I: Conduct a feasibility study to assess what is in the art of the possible that satisfies the requirements specified in the above paragraphs entitled “Objective” and “Description.” The objective of this USSOCOM Phase I SBIR effort is to conduct and document the results of a thorough feasibility study (“Technology Readiness Level 3”) to investigate what is in the art of the possible within the given trade space that will satisfy a needed technology. The feasibility study should investigate all options that meet or exceed the minimum performance parameters specified in this write up. It should also address the risks and potential payoffs of the innovative technology options that are investigated and recommend the option that best achieves the objective of this technology pursuit. The funds obligated on the resulting Phase I SBIR contracts are to be used for the sole purpose of conducting a thorough feasibility study using scientific experiments and laboratory studies as necessary. Operational prototypes will not be developed with USSOCOM SBIR funds during Phase I feasibility studies. Operational prototypes developed with other than SBIR funds that are provided at the end of Phase I feasibility studies will not be considered in deciding what firm(s) will be selected for Phase II.PHASE II: Develop, install, and demonstrate a prototype system determined to be the most feasible solution during the Phase I feasibility study on an advanced analytic capability to detect, track, manage, and differentiate the evolution of narratives across social networks in the information environment. PHASE III DUAL USE APPLICATIONS: This system has applicability in a broad range of other broader DoD, USG, or private company applications where planners, operators, and assessors must determine the most appropriate target audience for engagement to create effects in the information and cognitive domain, leading to physical behavior change. Advanced narrative detection would allow for better predictive analysis and create flexibility and more rapid responsiveness to changes in the information environment. This responsiveness is paramount for DoD strategic communications, intelligence agencies, and can benefit private companies needing to track shifts in conversation regarding social trends related to their products. Importantly, advanced narrative detection presents opportunity to track, measure, and assess changes over time, and to better assess effectiveness by correlating changes to events in the information environment.REFERENCES: 1.Bail, C. A. (2016). Combining natural language processing and network analysis to examine how advocacy organizations stimulate conversation on social media. Proceedings of the National Academy of Sciences, 113(42), 11823–11828. doi: 10.1073/pnas.1607151113a.Link – https://www.pnas.org/doi/10.1073/pnas.16071511132.Davis, J. T., Perra, N., Zhang, Q., Moreno, Y., & Vespignani, A. (2020). Phase transitions in information spreading on structured populations. Nature Physics, 16(5), 590– 596. doi: 10.1038/s41567-020-0810-3 a.Link – https://www.nature.com/articles/s41567-020-0810-33.Measuring coordinated vs. spontaneous activity in online social movements. SocArXiv. doi: 10.1177/14614448211041176a.Link – https://www.researchgate.net/publication/354281278_Measuring_coordinated_versus_spontaneous_activity_in_online_social_movementsKEYWORDS: Artificial intelligence (AI); Machine Learning (ML); social network analysis; narrative detection; narrative modeling; narrative evolution; narrative transformation; coordinate activity; cultural convergence; misinformation; disinformation; quantitative; qualitative; target audience; natural language processing; network analysis; social media

Open Topic for Family of Special Operations Vehicles

The technologies within these topics that are restricted under the International Traffic in Arms Regulation (ITAR), which controls the export and import of defense-related material and services, require Offerors to disclose any proposed use of foreign nationals, their country of origin, and what tasks each would accomplish in the statement of work in accordance with the solicitation. Additionally, Offerors will describe compliance mechanisms, offerors have in place or will put in place, to address any ITAR issues that arise during the course of agreement administration.OBJECTIVE: The objective of this SBIR Open Topic is to develop applied research toward an innovative capability within USSOCOM Program Offices. The following are the Program Offices and their areas of interest.DESCRIPTION: The objective of this SBIR Open Topic is to develop applied research toward an innovative capability within USSOCOM Family of Special Operations Vehicles (FOSOV) Program Offices. Computer dependency is becoming a foundation of vehicle development. In 2015, Digital Trends Magazine posted an article stating that the Ford GT has close to 3 million more lines of code than a Boeing 787 Airliner. These additional lines of code translate to additional overhead in physical space, programming, sustainment, safety and security. With vehicle trends moving more towards electric vehicles, to include military vehicles, industry is introducing new attack vectors for highly motivated and resourced enemies. This increases the demand for military vehicles to address the growing cyber threat within all environments. The technology areas of interest aim at addressing these attack vectors and exploring options to seamlessly integrate applicable technologies into Team Awareness Kit.PROGRAM OFFICE: Family of Special Operations Vehicles (FOSOV)The technology areas of interests are:1.Navigation and Team Awareness Kit Integration: Inertial navigation systems within vehicles, vehicle positioning based on vehicle speed, steering and internal CANbus data, processing data from the Onboard Diagnostics II port, Global Positioning System integration, Artificial Intelligence/Machine Learning (AI/ML), Team Awareness Kit, telematics and cybersecurity.2.Force Protection: Onboard Diagnostics II port, CANbus, Global Positioning System, Wi-Fi, on-board entertainment (infotainment) and information, facial recognition prevention, license place obfuscation, smart city data protection, residual and stored data from previous users, Command, Control, Computers, Communications, Cyber, Intelligence, Surveillance and Reconnaissance (C5ISR), Fly Away Kits, Special Operation Forces (SOF) peculiar devices and cybersecurity. Platforms may include indigenous operating vehicles (IOVs) of Special Operations modified Commercial Vehicles (Non-Standard Commercial Vehicles or NSCV).3.Open Architecture Electronic Control Unit: The technology areas of interest are original equipment manufacturer (OEM) electronic control unit (ECU), Government owned ECU, onboard vehicle systems. (Traction control, GPS transmission, onboard telematics, prognostics, vehicle skid control, antilock brakes, airbag operation, fuel shutoff, limp home mode, exterior light output). vehicle type, make and model independence and cybersecurity.i)Navigation and Team Awareness Kit Integration: Internal navigation system to navigate in Compromised, unreliable, and denied environment, deciphering vehicle position such as based on input of a known location, calculating movement and positioning based on vehicle speed, steering and direction, AI/ML to identify patterns of errors in vehicle data and correct errors to increase accuracy of location; detect and alert the user in real time of Global Positioning System jamming and/or interference. Navigation system data will be formatted and passed to integrate seamlessly with the on-board vehicle Team Awareness Kit to provide feedback for all occupants. The innovative research should focus beyond analyzing Global Positioning System -like data to discover other capabilities and opportunities to utilize onboard vehicle data for future capabilities and includes all viable system design options with respective specifications provided. ii)Force Protection: The sensor should plug into the Onboard Diagnostics II port, read data on the CANbus, ensure data and mission integrity, and communicate cyber risk to the operator while allowing them to manually disable telematics, such as Global Positioning System, Wi-Fi, on-board information and entertainment (“infotainment” systems”) on the fly. The sensor should include options to prevent facial recognition through the windshield, prevent recording data from the license plate and provide protections in an urban operating environment to include smart cities. The result of this topic should describe mechanisms disallowing a vehicle operator the ability to pull a previous operator’s data that has been recorded and stored onboard the vehicle. the Phase I report must present the integration of carry-on and carry-off Command, Control, Computers, Communications, Cyber, Intelligence, Surveillance and Reconnaissance (C5ISR) equipment to include radios, and amplifiers with vehicle systems.iii)Open Architecture Electronic Control Unit: Implement SOCOM’s unique requirements to selectively enable and/or disable standard vehicle features (traction control, GPS transmission, onboard telematics, prognostics, vehicle skid control, antilock brakes, airbag operation, fuel shutoff, limp home mode, exterior light output). Develop open architecture ECU that replaces the restrictive OEM ECUs. This will replace the process of “hacking” OEM ECUs in order to meet Non-Standard Commercial Vehicle requirements. This topic includes all viable system design options with respective specifications provided.Note: Please make sure to read the USSOCOM Instructions in full detail at https://www.defensesbirsttr.mil/SBIR-STTR/Opportunities/ at the bottom of the page under the tab titled “DoD SBIR 23.4 Annual”PHASE I: Conduct a feasibility study to assess what is in the art of the possible that satisfies the requirements specified in the above paragraphs entitled “Objective” and “Description.” The objective of this USSOCOM Phase I SBIR effort is to conduct and document the results of a thorough feasibility study (“Technology Readiness Level 3”) to investigate what is in the art of the possible within the given trade space that will satisfy a needed technology. The feasibility study should investigate all options that meet or exceed the minimum performance parameters specified in this write up. It should address the risks and potential payoffs of the innovative technology options that are investigated and recommend the option that best achieves the objective of this technology pursuit. The funds obligated on the resulting Phase I SBIR contracts are to be used for the sole purpose of conducting a thorough feasibility study using scientific experiments and laboratory studies as necessary. Operational prototypes will not be developed with USSOCOM SBIR funds during Phase I feasibility studies. Operational prototypes developed with other than SBIR funds that are provided at the end of Phase I feasibility studies will not be considered in deciding what firm(s) will be selected for Phase II.A Phase II proposal is expected at the conclusion of the Phase I effort. PHASE II: Develop, install, and demonstrate a prototype system determined to be the most feasible solution during the Phase I feasibility study. PHASE III DUAL USE APPLICATIONS: This system could be used in a broad range of military and commercial applications. REFERENCES:1.Modernization Strategy: Investing in the Future from https://www.army.mil/e2/downloads/rv7/2019_army_modernization_strategy_final.pdf (Army, 2019) 2.Department of Defense National Defense Strategy of 2022 found at https://media.defense.gov/2022/Oct/27/2003103845/-1/-1/1/2022-NATIONAL-DEFENSE-STRATEGY-NPR-MDR.PDF (Department of Defense, 2022)3.National Cybersecurity Strategy from https://www.whitehouse.gov/wp-content/uploads/2023/03/National-Cybersecurity-Strategy-2023.pdf (White House, 2023)KEYWORDS: Ground Combat Vehicles (GCV), Non Standard Commercial Vehicles (NSCV), electronics, On Board Diagnostics II, Global Positioning System, vehicle data, telematics, maintenance predictions, cybersecurity, Team Awareness Kit, Fly-Away Kits, Wi-Fi, infotainment, smart city, urban mission profile, Indigenous operating vehicle, Electronic Control Unit (ECU)

Visual Augmentation Systems (VAS) Range Finder

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Trusted AI and Autonomy; Advanced Computing and Software; Integrated Sensing and Cyber; Microelectronics; Human-Machine Interfaces

The technologies within these topics that are restricted under the International Traffic in Arms Regulation (ITAR), which controls the export and import of defense-related material and services, require Offerors to disclose any proposed use of foreign nationals, their country of origin, and what tasks each would accomplish in the statement of work in accordance with the solicitation. Additionally, Offerors will describe compliance mechanisms that they have in place or will put in place, to address any ITAR issues that arise during the course of agreement administration.

OBJECTIVE:

SOF ground forces require an improved capability for situational awareness allowing reliable and effective day/night observation and range measurement in a small, low-cost, easy to use device in primarily urban or near-urban environments with ambient light sources.

Current observation and range measurement solutions possess the following requirements:

  • requires digital integration
  • requires low-light or night capability
  • Too large
  • Cost prohibitive
  • Require active emission of laser energy
  • Lack user-assistance, limiting the effective range
  • Lack feedback mechanisms that allow the user to be sure of their measurement

IMPORTANT: For SOCOM instructions: please visit: https://www.defensesbirsttr.mil/SBIR-STTR/Opportunities/. Go to the bottom of the page and click “DoD SBIR 23.4 Annual”. Once there, go to the SOCOM SBIR 23.4 Release 3.

DESCRIPTION:

Potential solutions should hyper enable the SOF operator by interrogating a potential target with its integrated sensors, organizing that gathered information in a useful manor, and reliably disseminating it via Tactical Assault Kit (TAK) interface to the End User Device (EUD).

Potential solutions include integrated sensing solutions capable of aiding the user in detecting human sized targets at the maximum possible distance for both day and night urban environments. Solutions must enable the user to gather range measurements to target types that include, but are not limited to humans, vehicles and buildings. Solutions utilizing a laser transmitter for range measurement must maintain user safety by using a laser with wavelength greater than 1400 nanometers and also by not exceeding the American National Standards Institute (ANSI) Class 1 laser hazard classification.

Potential solutions shall be capable of surviving all environments that SOF encounters, including immersion, transportation vibration, high and low temperatures, high humidity, high altitude, drops and shocks, rain, ice, sand and dust, salt fog, and electromagnetic radiation. Participants are encouraged to outline the design trades associated with surviving immersion at 1 meter for 30 minutes.

The innovative research should focus on solutions that can be adapted to meet the size, weight, and power (SWaP) constraints listed below.

  • Less than 18 oz. (1.125lbs) with power source(s) installed.
  • Less than 64 cubic inches in volume, and not exceed 6 inches in either length, width, or height.
  • Potential solutions must provide the operator with the following runtime profile before requiring a change of power source.
    • Daytime: 30 minutes of observation including 75 range measurements; and
    • Nighttime: 30 minutes of observation including 75 range measurements; and
    • 20 Rapid Ranging Events: A Rapid Ranging Event can be described as follows. User detects an object of interest while not using the device. User then picks up the device and utilizes its range measurement capability until user is confident, they have an accurate range measurement to the object of interest.

Clarifying Information: The purpose of this effort is not to generate precise target coordinates. For any target coordinates that the integrated sensing solution can generate, it should be able to communicate those digitally into TAK with all associated errors.

PHASE I: Conduct a feasibility study to assess what is in the art of the possible that satisfies the requirements specified in the above paragraphs entitled “Objective” and “Description.”

The objective of this USSOCOM Phase I SBIR effort is to conduct and document the results of a thorough feasibility study (“Technology Readiness Level 3”) to investigate what is in the art of the possible within the given trade space that will satisfy a needed technology. The feasibility study should investigate all options that meet or exceed the minimum performance parameters specified in this write up. It should address the risks and potential payoffs (including consequences to size, weight, power, and cost) of the innovative technology options that are investigated and recommend the option that best achieves the objective of this technology pursuit. The funds obligated on the resulting Phase I SBIR contracts are to be used for the sole purpose of conducting a thorough feasibility study using scientific experiments and laboratory studies as necessary. Operational prototypes will not be developed with USSOCOM SBIR funds during Phase I feasibility studies. Operational prototypes developed with other than SBIR funds that are provided at the end of Phase I feasibility studies will not be considered in deciding what firm(s) will be selected for Phase II.

A phase II proposal is expected at the conclusion of the Phase I effort.

PHASE II: Develop, install, and demonstrate a prototype system determined to be the most feasible solution during the Phase I feasibility study.

PHASE III DUAL USE APPLICATIONS: This system could be used in a broad range of military and commercial applications.

REFERENCES:

  1. Tactical Assault Kit Website: https://tak.gov/
  2. Butler, Michael. “The Developer's Guide to Cursor on Target.” 2005, https://apps.dtic.mil/sti/pdfs/ADA637348.pdf.
  3. Kristan, Michael J, et al. “Cursor on Target Message Router's Guide.” Nov. 2009, https://www.mitre.org/sites/default/files/pdf/09_4937.pdf.

KEYWORDS: Range Finder, Range Measurement, Optics, Optical, Imaging, Imager, Camera, Night Vision, Visual Augmentation, Hyper Enabled Operator, Infrared, Low Light Level (LLL), Color Day, Urban Night, TAK, CMOS, Thermal, AI.

Out-of-Band GNSS Tracker

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Advanced Computing and Software; Microelectronics; Human-Machine Interfaces

OBJECTIVE: The objective of this topic is to develop applied research toward an innovative capability to conduct the research, development, and assessment of a Global Navigation Satellite System (GNSS) based tracking system that consists of a transmitter attached to a target that broadcasts its location to a ground-based receiver. Even though this technology currently exists and is available commercially there is a need to develop a government specific version that transmits on currently unsupported frequencies.

IMPORTANT: For SOCOM instructions: please visit: https://www.defensesbirsttr.mil/SBIR-STTR/Opportunities/. Go to the bottom of the page and click the tab for “DoD SBIR 23.4 Annual”. Once there, go to “SOCOM SBIR 23.4 – Release 4”.

DESCRIPTION: The primary use case is to mount the transmitter on a small Unmanned Aerial System (UAS) (group 1-3) to provide time, space, position information (TSPI) truth data, real time, to a ground-based receiver. An important feature of the requested system, that sets it apart from commercially available systems, is the ability to transmit on currently unsupported frequencies or the ability to adjust the transmitter frequency. Other important design considerations include size, weight, power, and cost (SWaP-C), transmitter battery life, and transmitter range. As a part of this feasibility study, the proposers shall propose system designs based on the following minimum key system attributes:

  • Transmitter to broadcast GNSS based location messages to a ground based receiver.
  • Weight:
    • Transmitter less than 200 grams inclusive of antenna.
    • Receiver less than 5 pounds.
  • Obtain location data using any combination of GNSS L1 constellations (i.e. Global Positioning System (GPS), Globalnaya Navigazionnaya Sputnikovaya Sistema (GLONASS), BeiDou, and Galileo).
  • Range of more than 20kilometers
  • Transmitter to operate in Ultra High Frequency band.
  • The receiver shall output location data to another device in real time via a wired or wireless connection using non-proprietary connectors/cables or protocols.
  • Present output location via cable with latitude/longitude Decimal Degrees format.

PHASE I: Conduct a feasibility study to assess what is in the art of the possible that satisfies the requirements specified in the above paragraphs entitled “Objective” and “Description.”

The objective of this USSOCOM Phase I Small Business Innovation Research (SBIR) effort is to conduct and document the results of a thorough feasibility study (“Technology Readiness Level 3”) to investigate what is in the art of the possible within the given trade space that will satisfy a needed technology. The feasibility study should investigate all options that meet or exceed the minimum performance parameters specified in this write up. It should also address the risks and potential payoffs of the innovative technology options that are investigated and recommend the option that best achieves the objective of this technology pursuit. The funds obligated on the resulting Phase I SBIR contracts are to be used for the sole purpose of conducting a thorough feasibility study using scientific experiments and laboratory studies as necessary. Operational prototypes will not be developed with USSOCOM SBIR funds during Phase I feasibility studies. Operational prototypes developed with other than SBIR funds that are provided at the end of Phase I feasibility studies will not be considered in deciding what firm(s) will be selected for Phase II.

PHASE II: Develop, install, and demonstrate a prototype system determined to be the most feasible solution during the Phase I feasibility study on an Out-of-Band GNSS Tracker.

PHASE III DUAL USE APPLICATIONS: This system could be used in a broad range of military applications where real time tracking is required and any other application that can benefit from real time tracking outside of typical frequencies and potential interferers.

REFERENCES:

“A GNSS-GSM Integrated Location Tracking System”, Research Gate – Feb 2014

https://www.researchgate.net/profile/Anindya-Bose-4/publication/260157882_A_GNSS-GSM_Integrated_Location_Tracking_System/links/0f31752fcb649a5c5f000000/A-GNSS-GSM-Integrated-Location-Tracking-System.pdf

KEYWORDS: counter unmanned aerial system; counter unmanned aircraft system; counter uncrewed aerial system; counter uncrewed aircraft system; unmanned aerial system; unmanned aircraft system; uncrewed aerial system; uncrewed aircraft system; unmanned air vehicles; uncrewed air vehicle; GNSS; track; tracker; tracking; real time; geolocation; drones; situational awareness; aerial systems; aerial vehicles; autonomous vehicles

Slim Form Cargo Loader/Unloader

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Trusted AI and Autonomy

OBJECTIVE: The objective of this topic is to develop applied research toward an innovative capability to lift, load, unload, and transport full-sized, fully loaded 463L pallets and containers from Air Force cargo planes in varying environments, with various terrain. Additionally, the system should only occupy one full pallet position on an aircraft.

IMPORTANT: For SOCOM instructions: please visit: https://www.defensesbirsttr.mil/SBIR-STTR/Opportunities/. Go to the bottom of the page and click the tab for “DoD SBIR 23.4 Annual”. Once there, go to “SOCOM SBIR 23.4 – Release 4”.

DESCRIPTION: As a part of this feasibility study, the proposers shall address all viable overall system design options with respect to the system being able to conduct all necessary cargo loading and unloading activities. Semi-autonomous interface and interaction is desired. This includes, but is not limited to:

  • Lifting a fully loaded 463L pallet from the ground, moving it a distance of approximately 450 - 500m,
  • Loading 463L pallet into the back of a C-130
  • Unloading a fully loaded 463L pallet
  • Moving it a distance of approximately 450 - 500m, and
  • Setting the pallet down on the ground.

Additionally, maximum specifications of the system need to be identified including, but not limited to, length, width, gross vehicle weight, tare weight, and lift capacity.

PHASE I: Conduct a feasibility study to assess what is in the art of the possible that satisfies the requirements specified in the above paragraphs entitled “Objective” and “Description.”

The objective of this USSOCOM Phase I SBIR effort is to conduct and document the results of a thorough feasibility study (“Technology Readiness Level 3”) to investigate what is in the art of the possible within the given trade space that will satisfy a needed technology. The feasibility study should investigate all options that meet or exceed the minimum performance parameters specified in this write up. It should also address the risks and potential payoffs of the innovative technology options that are investigated and recommend the option that best achieves the objective of this technology pursuit. The funds obligated on the resulting Phase I SBIR contracts are to be used for the sole purpose of conducting a thorough feasibility study using scientific experiments and laboratory studies as necessary. Operational prototypes will not be developed with USSOCOM SBIR funds during Phase I feasibility studies. Operational prototypes developed with other than SBIR funds that are provided at the end of Phase I feasibility studies will not be considered in deciding what firm(s) will be selected for Phase II.

PHASE II: Develop, install, and demonstrate a prototype system determined to be the most feasible solution during the Phase I feasibility study on a real-world exercise that demonstrates the full capabilities of the system to lift, move, load, and unload a full-sized 463L on and off a C-130 aircraft.

PHASE III DUAL USE APPLICATIONS: This system could be used in a broad range of military and commercial applications where movement of loads from home base operations to an austere environment is required. The loader would be able to move full sized pallets across various terrains, including traditional hard surfaces. These applications apply to the civilian sector, as well since similar pallets are utilized in the civil cargo transportation industry.

REFERENCES:

  1. US Air Force fact sheet on the C-130: https://www.af.mil/About-Us/Fact-Sheets/Display/Article/1555054/c-130-hercules/
  2. Airmen loading cargo onto C-130 from the back of a truck: https://www.defense.gov/Multimedia/Photos/igphoto/2001458195/
  3. US TRANSCOM load planning and documentation: https://www.ustranscom.mil/dtr/part-iii/dtr_part_iii_app_v.pdf
  4. Personnel loading a HMMWV into a C-130: https://www.youtube.com/watch?v=6AzWvidtAtQ
  5. Air Force Air Transportation Operations policy (references to 463L pallet will yield dimensions, weight, and restrictions): https://static.e-publishing.af.mil/production/1/af_a4/publication/afi24-605v2/afi24-605v2.pdf

KEYWORDS: cargo; loader; unloader; transport; 463L; pallet

DoD 23.4 SBIR Annual BAA (2024)
Top Articles
Manhungay
Coney Island Hospital Mychart
Funny Roblox Id Codes 2023
Golden Abyss - Chapter 5 - Lunar_Angel
Www.paystubportal.com/7-11 Login
Joi Databas
DPhil Research - List of thesis titles
Shs Games 1V1 Lol
Evil Dead Rise Showtimes Near Massena Movieplex
Steamy Afternoon With Handsome Fernando
Which aspects are important in sales |#1 Prospection
Detroit Lions 50 50
18443168434
Newgate Honda
Zürich Stadion Letzigrund detailed interactive seating plan with seat & row numbers | Sitzplan Saalplan with Sitzplatz & Reihen Nummerierung
Grace Caroline Deepfake
978-0137606801
Nwi Arrests Lake County
Justified Official Series Trailer
London Ups Store
Committees Of Correspondence | Encyclopedia.com
Pizza Hut In Dinuba
Jinx Chapter 24: Release Date, Spoilers & Where To Read - OtakuKart
How Much You Should Be Tipping For Beauty Services - American Beauty Institute
Free Online Games on CrazyGames | Play Now!
Sizewise Stat Login
VERHUURD: Barentszstraat 12 in 'S-Gravenhage 2518 XG: Woonhuis.
Jet Ski Rental Conneaut Lake Pa
Unforeseen Drama: The Tower of Terror’s Mysterious Closure at Walt Disney World
Ups Print Store Near Me
C&T Wok Menu - Morrisville, NC Restaurant
How Taraswrld Leaks Exposed the Dark Side of TikTok Fame
University Of Michigan Paging System
Dashboard Unt
Access a Shared Resource | Computing for Arts + Sciences
Black Lion Backpack And Glider Voucher
Gopher Carts Pensacola Beach
Duke University Transcript Request
Lincoln Financial Field, section 110, row 4, home of Philadelphia Eagles, Temple Owls, page 1
Jambus - Definition, Beispiele, Merkmale, Wirkung
Ark Unlock All Skins Command
Craigslist Red Wing Mn
D3 Boards
Jail View Sumter
Nancy Pazelt Obituary
Birmingham City Schools Clever Login
Thotsbook Com
Funkin' on the Heights
Vci Classified Paducah
Www Pig11 Net
Ty Glass Sentenced
Latest Posts
Article information

Author: Delena Feil

Last Updated:

Views: 5929

Rating: 4.4 / 5 (65 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Delena Feil

Birthday: 1998-08-29

Address: 747 Lubowitz Run, Sidmouth, HI 90646-5543

Phone: +99513241752844

Job: Design Supervisor

Hobby: Digital arts, Lacemaking, Air sports, Running, Scouting, Shooting, Puzzles

Introduction: My name is Delena Feil, I am a clean, splendid, calm, fancy, jolly, bright, faithful person who loves writing and wants to share my knowledge and understanding with you.