Hidden
USSOCOM must be able to identify and characterize in a near-peer, contested environment, without airborne Intelligence, Surveillance and Reconnaissance (AISR) assets. Adversary capabilities in the future operating environment will limit or completely deny the use of intrusive, large-scale AISR and other collection platforms. The prevalence of commercial
technology for encryption, electromagnetic and cyber effects, communications, data mining and related tools will hinder traditional collection methodologies. Next Generation Identification and Characterization must adopt and integrate tools such as cameras, commercial data, private access to space, the Internet of Things and the vast amounts of data being collected by individuals, governments and data-oriented corporation to evolve traditional methods.
Applicable areas of interest include, but are not limited to:
Hidden
USSOCOM must be able to reduce, obscure, modify or eliminate all observable signature to avoid compromise on deployment, infiltration, and actions on the objective. The prevalence of commercial technology for encryption, electromagnetic effects, cyber, communications, data mining, and related tools will expose USSOCOM to new threats. Non-state actors will have access to very nearly the same capabilities from the commercial marketplace, creating new vulnerabilities that put USSOCOM’s ability to maintain strategic and tactical surprise at risk. Strategic and Tactical signature management will require the adoption and integration of new technical tools and Tactics, Techniques and Procedures to ensure USSOCOM maintains its ability to project decisive force across the globe, in any environment, against any adversary. Applicable areas of interest include, but are not limited to: