AF seeks security solutions with kill chain integration, spectrum awareness

AF seeks security solutions with kill chain integration, spectrum awareness

The Air Force is inviting industry to help it boost security through kill chain integration and full spectrum awareness of emerging threats.

In a new broad agency announcement, the Air Force is taking aim at Air Force Secretary Deborah Lee James’s “Bending the Cost Curve” initiative announced at the beginning of last year by working with industry to develop a better understanding of objectives and threshold requirements and rapidly address the need for kill chain integration solutions.

In typical military parlance, the term “kill chain” refers to the lengthy process of identifying and thwarting threats, typically from reconnaissance, until the threat is eliminated.  This term also applies to threats in cyberspace and to the spectrum – identifying and eliminating intrusions in the networks.     

The Air Force is interested in two specific areas of research.  The first seeks research in providing operationally focused intelligence, surveillance and reconnaissance (ISR) capabilities that meet requirements for combatant commanders as well as  end users.  Capabilities under this research area could include:

  • ISR modernization
  • Enhancing situational awareness
  • Mobile networking and communications equipment
  • Improvements to existing AF/DOD infrastructure
  • Air Force cryptographic operations modernization
  • Geospatial analysis of social media
  • Exploitation of enemy threat systems
  • Increasing data utility and accessibility

The Air Force also wants information on networks and IT systems with agile mechanisms that can detect, monitor, assess and isolate insider threats.  These systems must be able to restore contaminated systems to “pristine trusted states.”  The BAA included the following network capabilities:

  • Address IT system security that uses virtualization coupled with both manual and machine learning techniques.
  • Act autonomously to assess the probability of a function’s trustworthiness, allowing trusted functions on the network and disabling untrusted ones.
  • Provide solutions for automated and/or manual mechanisms capable of restoring IT systems with minimal disruption to users.
  • Counter the insider threats with morphing attack services for both client and server hosts.

About the Author

Mark Pomerleau is a former editorial fellow with GCN and Defense Systems.

Featured

  • 2020 Government Innovation Awards
    Government Innovation Awards - https://governmentinnovationawards.com

    21 Public Sector Innovation award winners

    These projects at the federal, state and local levels show just how transformative government IT can be.

  • Federal 100 Awards
    cheering federal workers

    Nominations for the 2021 Fed 100 are now being accepted

    The deadline for submissions is Dec. 31.

Stay Connected