SOF posts C-130 cybersecurity sources sought

On June 1, the U.S. Air Force Special Operations Forces posted a sources sought notice for C-130 cybersecurity analysis and investigations. Responses are due by 4:00 p.m. Eastern on July 1.

This market survey is being conducted to identify potential sources that may possess the expertise, capabilities, and qualification to study, analyze, develop, or test advanced technology microelectronic, software, algorithm solutions to resolve obsolescence issues, add capability, improve performance, improve reliability, improve maintainability, and improve availability of the microelectronics-based Special Operations Forces C-130 Weapons systems. The purpose of this requirement is to perform analysis and investigation of electronic vulnerability for the EC-130J Commando Solo, EC-130J Super J, and the AC-130J weapons systems.

This task will also cover performance of a minimum of two (2) systems with the highest risk categories for electronic vulnerability table-top Blue and Red team analysis. Contractors/Institutions responding to this market research are placed on notice that participation in this survey may not ensure participation in future solicitations or contract awards.  The government will not reimburse participants for any expenses associated with their participation in this survey. No award will be made off of this notice.

The Government is conducting market research to identify potential sources that may possess the expertise, capabilities, and qualification to study, analyze, develop, or test advanced technology microelectronic, software, algorithm solutions to resolve obsolescence issues, add capability, improve performance, improve reliability, improve maintainability, and improve availability of the microelectronics-based Special Operations Forces C-130 Weapons systems NAICS 541330

The purpose of this requirement is to perform analysis and investigation of electronic vulnerability for the EC-130J Commando Solo, EC-130J Super J, and the AC-130J weapons systems. This task will also cover performance of a minimum of two (2) systems with the highest risk categories for electronic vulnerability table-top Blue and Red team analysis.

Full information is available here.

Source: SAM