Submission of proposals



Download 1.78 Mb.
Page25/48
Date14.11.2017
Size1.78 Mb.
#34018
1   ...   21   22   23   24   25   26   27   28   ...   48

A02-125 TITLE: Forward Area Portable Forensics System
TECHNOLOGY AREAS: Information Systems
OBJECTIVE: Research, design and build a rugged, inexpensive, and portable system to enable forward deployed conventional or special forces to rapidly extract data from Personal Digital Assistants (PDAs), magnetic media (computer hard drives), and FLASH memory cards.
DESCRIPTION: Computers have become the backbone of both conventional and unconventional forces. These computers contain data on everything from operations, to logistics, from finances to underground cells. Currently the information contained on a captured computer can only be extracted in a computer forensics laboratory that is remote from the tactical world. This information becomes intelligence only after a human analyzes it. While this meets strategic intelligence requirements it does not, however, provide timely and useful information to the tactical force. Providing a rugged, portable forensics system to forward deployed forces will enable them to assess if a captured computer contains information critical to the success of their operation and act on it in near real time. The system must aid the tactical user in searching the data to assess its relevance to current or future operations. It also provides a "triage" tool to enable them to prioritize which computers must be retrograded immediately for detailed analysis in a full-fledged forensics laboratory and strategic analysis center. The system will attempt to use the latest in commercial off the shelf (COTS) equipment and software. A modular approach should be used to allow the system to be tailored to support a wide range of tactical operations against a variety of files systems and storage media.
PHASE I: Research and propose a modular system design that will meet the above requirements and objectives, emphasizing the small size, low power, diverse media and file systems aspects of COT equipment. Efforts should focus on using technology to minimize user interaction. Target user is a tactical soldier.
PHASE II: Significant interaction with Army tactical users will be required to ensure that the system being designed will meet the needs of both conventional and special forces. Develop system prototypes along with the application software to efficiently search and flag information found on the media and demonstrate the system against hard drive technologies, removable media technologies, and PDA/FLASH devices, using a minimum of two different file system organizations.
PHASE III: This system is designed primarily for tactical operations, and to support Military Intelligence, Special Forces Units, and U.S. Customs by allowing the user to quickly extract and assess data in instances where time is critical to the operation and waiting on a laboratory forensics report would adversely affect the mission. It will also have application to law enforcement agencies engaged in counter-terrorism activities and the “War on Drugs” by providing the means to quickly extract information off of confiscated computers which may lead to prompt arrests leaving criminals less time to react and move. If data on a confiscated PDA indicates the whereabouts of other criminals in a cell, by the time the data is retrieved using current means, the cell could disperse. A tactical device that can extract this data quickly could allow law enforcement to apprehend such a cell before the cell has the time to move.
KEYWORDS: Tactical Computer Forensics, PDSs, Flash Cards, Magnetic Media, File System


A02-126 TITLE: Novel Computer Network Scanning Techniques
TECHNOLOGY AREAS: Information Systems
OBJECTIVE: Develop a Java based platform for retrieving and integrating IP content across a network or the Internet. The concept is based on the development of stealthly and/or innovative scanning techniques to acquire, integrate and display computer network topology.
DESCRIPTION: When vulnerability assessments are conducted on computer networks it is of primary importance to determine the layout or topology of the network and to ascertain key information about potential target computers on the network. Scanning the network with current COTS scanners provides information about network computers, however the scans performed to obtain such information are not stealthy and are easily detectible. Also, there is no known tool available that takes this information and presents it to the user as a graphical depiction of the networks topology. Tools and techniques are being sought to enable a user to acquire network information in a stealthy fashion, which will then be presented to the user in a topological format.
By the development of stealthy scanning technology that avoids alerting network intrusion devices and/or firewalls, the platform should automatically capture all network addresses, making it possible to remotely and anonymously obtain network infrastructure information. Additionally, the platform should display the services associated with every IP address, that is, WWW, SQL, telnet, FTP, LPD/LPR, NFS, and user configurable ports. Because many security holes are operating system dependent, identifying which system runs on every machine is also of major importance. For a low probability of detection, it is anticipated that these scanning techniques would utilize a minimum of network bandwidth to deliver pertinent information. The content should then be compiled into a graphically based, custom designed Java platform that can display network topology and other pertinent information.
PHASE I: The initial phase involves the investigation of various scanning technologies and techniques in current tools which can be implemented in a stealthy fashion and used to develop the subject software to produce the network topology. The software architecture of the Java display platform to integrate these scanning techniques will be developed.
PHASE II: The central core of a follow-on phase involves the software development and implementation of various stealthy scanning techniques into a custom designed Java platform. This platform will integrate these stealthy techniques into a graphically based tool that will produce the network’s topology.
PHASE III: If successful, the contractor will have acquired a product marketable to law enforcement, industry, and other government agencies. The graphically based tool will assist government, as well as corporate network security administrators and law enforcement agencies, in providing better security to our nation’s digital infrastructure against hackers and terrorists.
KEYWORDS: Network Topology, Computer Scanning, Computer Security


A02-127 TITLE: Digital Direction Finding
TECHNOLOGY AREAS: Sensors
ACQUISITION PROGRAM: Project Manager, Signals Warfare
OBJECTIVE: Design and demonstrate a digital Direction Finding (DF) system for tactical Electronic Support (ES) and Signals Intelligence (SIGINT). The digital direction finding system will integrate a digital receiver directly with each antenna element, and provide high throughput digital DF processing of all in-band signals.
DESCRIPTION: Current DF systems typically measure the phase and/or amplitude at multiple antenna elements using primarily analog Radio Frequency (RF) electronics. Such systems are challenged to maintain phase and amplitude balance over several RF channels when used in the harsh military operational environment. In many cases, digital RF electronics provide superior system characteristics as compared to their analog RF counterparts. Such can be anticipated with respect to DF systems, and particularly so, depending on how far forward the point of Analog-to-Digital (A/D) conversion can be pushed. What is desired is a digital DF system that integrates a digital receiver directly with each antenna element, thereby minimizing the phase and amplitude errors associated with the analog portion of the RF electronics. For such a system, precise knowledge of the element locations and synchronization of the individual digital receivers are prime concerns. For the purposes of this topic, the element locations are presumed known. The challenge moves from that of maintaining phase and amplitude balance in an analog RF distribution system to one of maintaining clock synchronization across multiple A/D converters. Further, it becomes possible to use selective clock delays to offset differences in the electrical lengths of the antenna elements and other RF components prior to the A/D conversion stage. For the digital bit stream, one can anticipate the use of a digital Butler matrix to provide the requisite signals for broadband instantaneous DF processing.
PHASE I: Provide a detailed design of a digital direction finding system including a digital Butler matrix or other DF processing element. Include a discussion (with mathematical detail) of how the various time delays will be measured and how the overall system will be calibrated. Provide a detailed trade study report comparing all considered candidate technologies and detailed reasoning for technology selection. Provide a MATLAB(TM), SPICE(TM) or other engineering simulation of the proposed design.
PHASE II: Fabricate and deliver a digital direction finding system including a digital Butler matrix or other DF processing element. The deliverable will be tested and proper operation will be validated prior to delivery to the Government. The range of frequencies covered by the system, instantaneous bandwidth, number of channels, and other specifications should be considered using best commercial practices. The preferred system would cover the VHF band with 10 MHz or wider instantaneous bandwidth. Testing will include system calibration and characterization of random and systematic DF errors across the range of frequencies covered. The deliverables will include detailed functional design of the integrated DF hardware (complete RF, DC, and control circuitry layouts).
PHASE III: This hardware has direct application to emergency search and rescue missions particularly as undertaken by the U.S. Coast Guard. It will have a limited commercial market for the "ham" radio hobbyist.
KEYWORDS: Direction Finding, Electronic Support, Signals Intelligent


A02-128 TITLE: Beyond Line-of-Sight Combat Identification System
TECHNOLOGY AREAS: Sensors
ACQUISITION PROGRAM: PM, Combat Identification
OBJECTIVE: The objective of this task is to design, develop, implement and demonstrate a small sized, lightweight, UAV based, beyond-line-of-sight (BLOS), situational awareness (SA)/combat identification (CID) system for rapid deployment and fluid battlefields, thus increasing the survivability of friendly and coalition forces.
DESCRIPTION: The increasing use of weapons capable of engaging targets at ranges beyond aided and unaided visual capabilities as well as the advent of the non linear battlefield has heighten the need for improved beyond line of sight situational awareness and combat identification. Design and development of a beyond line of sight capability to extend the ranges of combat identification to the objective range of weapon systems is necessary to increase combat effectiveness and decrease fratricide. Current and anticipated future military operations involve highly mobile United States, Allied and Coalition forces. These rapid deployments of diverse coalition partners require Combat Identification beyond the visual range. The Combat ID must be effective, flexible, mobile and reconfigurable. The BLOS CID will be comprised of an airborne suite, a ground transponder, a communications link and a ground display/controller. The airborne suite will consist of a "Question and Answer Friend" (IFF) identification system, and an innovative, light weight, suite of sensors to provide accurate and timely information to ground units regarding hostile forces. The ground IFF transponder portion of the system must be small, light weight and be able to be strapped on to coalition partners. The communications segment shall provide robust communications to the ground station segment, which shall provide, as a minimum, control of the UAV and data analysis to the operator. This UAV based BLOS SA/CID system can provide a cost effective and flexible means of location and identifying widely dispersed tactical units.
PHASE I: The contractor shall develop an innovative concept for the Beyond Line of Sight Combat ID system. The contractor shall perform a feasibility analysis of the design and demonstrate its veracity through analysis, simulation, or other means. This analysis shall include, but not be limited to: size, weight, power, sensors, waveforms and operational issues.
PHASE II: The contractor will develop, prototype and demonstrate their BLOS concept. The contractor shall demonstrate the system using a contractor provided UAV surrogate and compare the measured sensor performance against expected sensor performance values resulting from the phase I modeling efforts.
PHASE III: Technologies to extend the range of systems have a wide variety of application to a broad range of military systems as well as commercial applications. This technology could be used to extend the range of sensor systems, as well as communications systems. The system could also have application to law enforcement, homeland security, anti terrorism and border patrols. This system could provide a civilian authority the
KEYWORDS: Beyond line of sight, fratricide, combat identification, data relay, sensors, IFF, situational awareness, extended range and unmanned aerial vehicle


A02-129 TITLE: Tactical Human Intelligence Interview Device
TECHNOLOGY AREAS: Information Systems
OBJECTIVE: Develop an intelligence gathering system organic to the individual soldier's kit for real time interrogation of captured combatants.
DESCRIPTION: The gathering of tactical Human Intelligence (HUMINT) must necessarily be accomplished locally and immediately to be of greatest value. This usually entails knowledge of the local language, dialects and idioms by the interviewer. Deployment and availability of native speakers in a rapid deployment and wide-spread tactical scenario is difficult to support and may incur large time lags using centralized interpreters. What is needed is a natural language speech translation device that can support real-time translation and dialogue conversation without server network access.
The technical challenge is to extend the notional functional technologies embodied in current computational linguistic research, which address the basis for natural language understanding. These emerging technologies include but are not limited to syntax parsing, semantic parsing, grammar word classification, and dialogue turn taking. The research shall overcome these technical risks and devise a conceptual approach which converts these functional notions into a working prototype. This concept formulation shall address the desired ability to interpret a wide range of conversational dialogue, which is well beyond the current computational capability that is comprised of just a few predefined phrases.
The capability of natural language speech recognition, language translation and dialogue understanding technology has progressed sufficiently to make such a device possible. The goal of this research is to design and demonstrate a total standalone solution, which can be implemented in a low power lightweight device. A most desirable solution would incorporate the described HUMINT function in the form of speech recognition and translation modules as reconfigurable software that is operational in a tactical radio.
Algorithms for natural language speech recognition must be robust for operation in high noise tactical environments. Language understanding and translation algorithms should be designed as intelligent agents to accommodate multiple language dialects and idioms. The device will recognize, interpret and translate running conversations, between the interviewer and the subject, using speech recognition audio input and Text-to-Speech (TTS) synthesized audio output. Algorithms shall be speaker independent and not require training prior to use in the field.
PHASE I: Formulate and refine the notional functionality of computational linguistic methods and algorithms into a feasible conceptual approach for the gathering of verbal communicated intelligence. Develop a feasible design and demonstrate the maturity of key computational linguistic technologies to solve the high noise recognition, translation, interpretation, dialogue conversation management and TTS synthesis formulation of intelligent agents in several languages. Demonstrate that the reusable intelligent agent modules work seamlessly and in real-time in a processing efficient and low power, portable lightweight environment.
PHASE II: Develop and test several prototypes of the HUMINT tactical interview facilitator in a noisy tactical field environment. American English and two other languages shall be used to demonstrate how the enhanced language translation support improves the tactical awareness and decision making ability of an individual soldier.
PHASE III: The intelligent agent software modules shall be refined for commercial applications. A portable cost effective device will be designed for travelers, businessmen, international communications, entertainment and law enforcement officials.
REFERENCES:

1) US Army Training and Doctrine Command Pamphlet 525-66.

2) Foundations of Computational Linguistics, Man-Machine Communication in Natural Language, Hausser, Roland R., Springer-Verlag Berline and Heidelberg GM, 1999.

3) Presumptive Meanings: The Theory of Generalized Conversational Implications, Levinson, Stephen 2000.


KEYWORDS: HUMINT computational linguistics, speech processing, low power, natural language speech, language translation, intelligent software agents, tactical environment


A02-130 TITLE: Real-Time Multi-Sensors Architecture of Blind Detection for Asynchronous Code Division Multiple Access (CDMA) System.
TECHNOLOGY AREAS: Information Systems
OBJECTIVE: Research and develop a novel, real-time, multi-sensor, multi-user receiver architecture model for adaptive, blind, detection of asynchronous, Code Division Multiple Access (CDMA) communication signals that can be efficiently implemented within Field Programmable Gate Array (FPGA) computational capacities.
DESCRIPTION: Receiver systems on the battlefield are required to process signals from multiple sources. In most asynchronous CDMA systems, incoming signal characteristics, such as message duration, transmission delay, and power, are unknown to the intended receiver. In addition, the receiver also needs to estimate unknown channel effects, such as multipath, for channel identification and equalization. Existing approaches to blind, multi-user signal detection require prior knowledge of signature waveforms and involve computationally intensive tasks, such as multi-dimensional spectral factorization and spectrum matrix inversion. This project will research signature waveform mismatch and develop a theoretical approach to solving adaptive, blind detection, as well as channel identification and equalization for these types of signals. A multi-user, multi-sensor architecture model shall be developed which will be used to compare receiver performance using this theoretical scheme with receiver performance using the existing "prior knowledge" approach.
PHASE I: Research current literature and identify promising algorithms. Conduct research on signature waveform mismatch and develop new design approaches for receiver architecture. Compare to existing baseline approaches from the research literature.
PHASE II: Compare and contrast the developed algorithms with existing algorithms. Perform detailed analysis of approaches, algorithms, and circuits that will improve the methodology of adaptive blind user detection and identification. Translate this methodology into an efficient architecture that proves the feasibility of a System-on-Chip (SOC) implementation based on FPGA chip technology. Incorporate this SOC architecture into a software receiver and demonstrate it in a CDMA environment.
PHASE III: The results of this multiple-antenna receiver architecture study can potentially increase the channel capacity of the commercial CDMA communication systems, and the study on the signature waveform mismatch will improve the robustness of receiving the transmissions against channel distortions.
REFERENCES:

1) Xu, C. and K. S. Kwak, "A Modified Constrained Constant Modulus Approach to Blind Adaptive Multi-user Detection," IEEE Transactions on Communications, VOL. 49, NO. 9, September 2001, pp. 1642-1648.

2) Li, X., and H.H. Fan, "Blind Channel Identification: Subspace Tracking Method without Rank Estimation" IEEE Transactions on Communications, VOL. 49, NO. 9, September 2001, pp.2372-2382.

3) Tugnait, J. K., and T. Li, "Blind Detection of Asynchronous CDMA Signals in Multi-path Channels Using Code-Constrained Inverse Filter Criterion," IEEE Transactions on Communications, VOL. 49, NO. 9, September 2001, pp.2372-2382.

4) Li, H., J. Li, and S.L. Miller, "Decoupled Multi-user Code-Timing Estimation for CDMA Communication Systems," IEEE Transactions on Communications, VOL. 49, NO. 8, August 2001, pp. 1425-1435.

5) Zhang, R., and M. K. Tsatsanis, "Blind Startup of MMSE Receivers for CDMA Systems," IEEE Transactions on Signal Processing, VOL. 49, NO. 7, July 2001, pp. 1492-1500.

6) Perros-Meilhac, L., E. Moulines, K. Abed-Meraim, P. Chevalier, and P. Duhamel, "Blind Identification of Multi-path Channels: A Parametric Subspace Approach," IEEE Transactions on Signal Processing, VOL. 49, NO. 7, July 2001, pp. 1468-1480.

7) Verdu, Sergio, MultiUser Detection, Cambridge University Press, 1998.

8) Subramanian, V. and Madhow, U., "Blind Demodulation of Direct-Sequence CDMA Signals using an antenna array." Proc. 1996 Conc. on Information Sciences and Systems, pp. 74-80, March 1996.

KEYWORDS: Constant Modulus Approach (CMA), Code Division Multiple Access (CDMA), multi-path, blind channel identification, blind equalization, blind startup receiver




A02-131 TITLE: Automated Extraction of Counter-Terrorism Intelligence
TECHNOLOGY AREAS: Weapons
ACQUISITION PROGRAM: PM Information Warfare
OBJECTIVE: Develop an automated method to extract terrorist situation, status and movements from the communications signal spectrum.
DESCRIPTION: The intelligence community is very interested in performing information gathering that relates to deployment, movement and situational awareness of terrorist activities. Information of interest can be gleaned from the processing and interpretation of radio traffic signal emanations based upon location and embedded voice and communications channel characteristic features. However, the features of interest are buried in the total radiated spectrum usually of very low (negative) Signal to Noise Ratio (SNR), making extraction difficult.
The goal of this research is to investigate and develop novel techniques for the deconvolution of specific emanations from the total spectrum based upon learned terrorist characteristic feature content. Maximum likelihood, neural network and signal separation technologies have progressed sufficiently to support the development of algorithms for the extraction of these signals of interest. Government provided corpora containing urban and battlefield spectrum signals will be provided, during Phase I to demonstrate the enhanced intelligence extraction capability of these developed algorithms.
As an objective, the set of enhanced algorithms for information gathering shall be designed for operation in both commercial cell-phone and standard Army digital combat tactical net radios. Knowledge of low power and lightweight constraints imposed by the dynamic and rapidly changing communication infrastructure is paramount to effective achievement of these goals and eventual deployment. Both standalone and cooperative activities must be anticipated in the final solution.
PHASE I: Develop identity, location and movement feature extraction algorithms that can be used to track and provide situational awareness for terrorist target cells and activities. Use the Government provided signal database to demonstrate the improved terrorist intelligence gathering ability of the new algorithms. Deliver the algorithms, software models and demonstration data to the Government. Propose a prototype design for use in both forward tactical and rear strategic areas.
PHASE II: Develop a prototype system embedded in a digital tactical radio suitable for testing in a field environment. Conduct the intelligence gathering functions, using typical scenarios, to deduce terrorist identity, asset movements and command center activity. Provide software algorithms, suitable for execution in future Army tactical and strategic based wireless communication assets, which perform the intelligence gathering functions upon command. Software modules must be portable and reusable as well as compatible with the future tactical and commercial wireless architectures.
PHASE III: This technology has commercial application to law enforcement investigations in which the exploitation of cell phone and other wireless transmissions become necessary, as in cases where threatening phone calls are being made or in surveillance missions.
REFERENCES:

1) US Army Training and Doctrine Command Pamphlet 525-66.

2) "Proceedings of the Conference and Workshops 38th Annual Meeting of Computational Linguistics", Published ALC 2000.

3) "Fast Transforms: Algorithms, Analysis and Applications", Elliot, Douglas and Ramamohan K. Rao Academic Press 1982.


KEYWORDS: Counter-terrorist, intelligence extraction, commercial wireless communications, defense wireless communications, situation awareness, HUMINT, ELINT, SIGINT


Directory: osbp -> SBIR -> solicitations
solicitations -> Army sbir 09. 1 Proposal submission instructions dod small Business Innovation (sbir) Program
solicitations -> Navy sbir fy09. 1 Proposal submission instructions
solicitations -> Army 16. 3 Small Business Innovation Research (sbir) Proposal Submission Instructions
solicitations -> Air force 12. 1 Small Business Innovation Research (sbir) Proposal Submission Instructions
solicitations -> Army 14. 1 Small Business Innovation Research (sbir) Proposal Submission Instructions
solicitations -> Navy small business innovation research program submitting Proposals on Navy Topics
solicitations -> Navy small business innovation research program
solicitations -> Armament research, development and engineering center
solicitations -> Army 17. 1 Small Business Innovation Research (sbir) Proposal Submission Instructions
solicitations -> Navy 11. 3 Small Business Innovation Research (sbir) Proposal Submission Instructions

Download 1.78 Mb.

Share with your friends:
1   ...   21   22   23   24   25   26   27   28   ...   48




The database is protected by copyright ©ininet.org 2024
send message

    Main page