S O L I C I T A T I O N R E S P O N S E

Small Business Innovation Research program will be accepting submissions starting June 25 for an open topic it calls “Secure and Protect Infrastructure Though Cyber-Threat Emulation” or SPICE. Deadline is July 23.

Problem

Cyber capabilities evolve rapidly. Cybersecurity professionals require new techniques and capabilities to perform offensive, defensive, and evaluation activities in support of Special Operations.

Opportunity

U.S. Strategic Operations Command has a SBIR seeking proposals addressing “techniques, technologies, or similar research areas that results in an increase to cyber-related capabilities.” The research fields of interest include cyber-related capabilities to support:

  • Next-Generation Targeting and Effects — Including the “exploitation of information systems and embedded devices.” USSOCOM is particularly interested ing capabilities that “enable remote operational control or network reconnaissance” against a given target system or network.

  • Capabilities and Payloads — That can deny, disrupt, degrade, or destroy information or embedded systems, especially “novel techniques and payloads against information systems, devices, or adjacent but cyber-related systems.

  • Alternative Access Mechanisms — To protected information systems and networks, especially “new methods of access to previously inaccessible information systems by leveraging adjacent information systems, devices, or technologies.

  • Wireless Network Sensing and Exploitation Systems — Integrated with existing commercial command and control systems.

Submissions

USSOCOM is conducting a feasibility study to assess what is in the “art of the possible.” Funds during Phase I will be for the sole purpose of conducting that study, not developing operational prototypes.

Deadline

Submission opening is June 25.

Next Steps / More Information

A downloadable overview is available.

Difficulty Level

Medium. Instructions are available, but it’s not a simple process, especially if you haven’t gone through it before. You can submit your proposal here, but you have to search for “SPICE” and be registered. It’s not simple; contact us and we can put you in touch with parties that can assist.

Questions

Contact Scott Cohen of The CET Sandbox at scott@cetsandbox.com.

Secure and Protect Infrastructure Through Cyber-Threat Emulation (“SPICE”)