Just another Reality-based bubble in the foam of the multiverse.

Wednesday, March 28, 2007

Cyber Mercenaries Fightin' Terra by Controlling Your Information



Your tax dollars (damned sure not Bu$hie's Ba$e) Privately Contracting Out the War on Terra:

Opportunity Information:
Title: Information Warfare: Offensive and Defensive Counterinformation
Solicitation #: BAA-06-12-IFKA
Post Date: 2/8/2006
Response Date:
Document Type: Presolicitation Notice
NAICS Code: 541710 -- Research and Development in the Physical, Engineering, and Life Sciences

Description:
ANNOUNCEMENT TYPE: Initial announcement.
FUNDING OPPORTUNITY NUMBER: BAA 06-12-IFKA
CFDA Number: 12.800

DATES: It is recommended white papers be received by the following dates to maximize the possibility of award: FY 06 by 10 Mar 06; FY 07 by 1 May 06; FY 08 by 1 May 07 and, FY 09 by 1 May 08. White papers will be accepted until 2:00 p.m. Eastern time on 31 December 2009, but it is less likely that funding will be available in each respective fiscal year after the dates cited. FORMAL PROPOSALS ARE NOT BEING REQUESTED AT THIS TIME. See Section IV of this announcement for further details.

I. FUNDING OPPORTUNITY DESCRIPTION:

AFRL/IF is soliciting white papers to identify and develop technologies to enable a distributed information infrastructure that provides all the mechanisms and services required to allow the warfighters to craft their C4I information environments, including ability to establish distributed virtual staffs, to share a common consistent perception of the battlespace, and construct distributed task teams among sensors, shooters, movers, and command posts. These technologies will be applied across the full spectrum of cyber operations, in support of Air Force mission requirements. Specific technologies include, but are not limited to: network protocols, information adaptation, network management, routing technologies, adaptive interfaces, distributed information environments, multimedia services, adaptive security services, global resource management, architectures, computer and network risk assessment/management, vulnerability assessment, assurance techniques, detection of intrusions and misuse, network security, wireless information assurance, assessment of information damage, cyber forensics, recovery of information systems and computer networks to operational levels, and a full spectrum of active response and computer network attack techniques.

Information superiority is an integral part of air and space superiority, an Air Force doctrine. This gives the commander freedom from attack, the freedom to maneuver and the freedom to attack. Information superiority is that degree of information advantage of one force over another that permits the conduct of operations at a given time and place without prohibitive opposition. Information operations are not focused exclusively on information superiority and information operations alone is not sufficient to achieve information superiority. AFRL/IF has developed a responsive R&D technology program to help the US achieve information superiority. The technology research in this BAA will be focused in the following areas of information operations: influence operations, network warfare operations and electronic warfare operations.

Influence Operations: Focused on affecting the perceptions and behaviors of leaders, groups, or entire populations. Influence operations employ capabilities to affect behaviors, protect operations, communicate commander's intent and project accurate information to achieve desired effects across the cognitive domain. These effects should result in differing objectives. The military capabilities of influence operations are psychological operations, military deception, operations security, counterintelligence operations, counterpropoganda operations and public affairs operations.

Network Warfare Operations: The integrated planning, employment, and assessment of military capabilities to achieve desired effects across the interconnected analog and digital network portion of the battle space. Network warfare operations are conducted in the information domain through the combination of hardware, software, data and human interaction. The operational activities of network warfare operations are network attack, network defense and network warfare support...


[thanks Noah, who's the Man when it comes to this stuff]



I particularly like the idea of "Influence Operations: Focused on affecting the perceptions and behaviors of leaders, groups, or entire populations."

No comments: