Army seeks info on cyber electronic warfare capabilities
On March 17, the U.S. Army posted a request for information for Cyber Electronic Warfare Techniques Against Electromagnetic Communications & Computer Networks (Solicitation Number: W56KGY-17-R-0019). White paper responses to this RFI must be received no later than 2:00pm Eastern Standard Time on March 31.
The U.S. Army Contracting Command – Aberdeen Proving Ground (ACC-APG), Aberdeen Proving Ground, Maryland 21005 is conducting a Market Survey to identify potential sources for the procurement of cyber electronic warfare capabilities. This RFI is not related to any current work.
The U.S. Army intends for its subject matter expert cyber team to review submissions to gain knowledge of technology. Proprietary information should be clearly marked. The requested information is for planning and market research purposes only and will not be publically released. In accordance with FAR 15.201 (e) responses to this RFI are not offers and cannot be accepted by the Government to form a binding contract. The Government may utilize responses received as market research to in the future support an award decision for a contract action.
Background and Description:
This RFI by the Army seeks industry feedback on expertise on cyber electronic warfare capabilities. More specifically, information is sought on existing technical capabilities for, and expertise to complete research and development of, cyber electronic warfare techniques and capabilities against traditional electromagnetic communications and computer networks, non-traditional electromagnetic communication networks, and non-traditional electromagnetic non-communications networks to:
Complete reverse engineering and vulnerability analysis against systems • Surgically destroy, disrupt, deny, deceive, degrade, delay, target, neutralize or influence threat information systems, networks and their components, threat systems/nodes, and other communications and non-communications systems • Accomplish surgical radio frequency jamming • Exploit systems or networks to manipulate data, conduct electronic support functions, and/or conduct Denial of Service (DOS) attacks • Operate against systems or networks to manipulate data and/or conduct denial of service, with or without direct intrusion into the threat system or network
Full information is available here.