Hacking 4 Defense

Please let us know which SOF Challenges interest you and submit below.

  • US Army Special Operations Recruiting Battalion must continually attract candidates to be assessed for their potential to fill the 26,000 positions in US Army Special Operations Command. Recruiters: The number of hours in a day are finite and every hour spent inefficiently increases the risk of failing to fill the most critical formations in the formation. Selection and Assessment leaders: SOF forces cannot be mass produced. Quality is prized over quantity. Having a full class is less important than having the highest quality individuals. Qualification Course instructors: After a Soldier successfully completes Assessment and Selection, there is a training and qualification course which can last up to 18 months before the Soldier is a SOF Operator. Quality is paramount in these courses. Applicable areas of interest include, but are not limited to:
  • Hidden
    USSOCOM must be able to identify and characterize in a near-peer, contested environment, without airborne Intelligence, Surveillance and Reconnaissance (AISR) assets. Adversary capabilities in the future operating environment will limit or completely deny the use of intrusive, large-scale AISR and other collection platforms. The prevalence of commercial technology for encryption, electromagnetic and cyber effects, communications, data mining and related tools will hinder traditional collection methodologies. Next Generation Identification and Characterization must adopt and integrate tools such as cameras, commercial data, private access to space, the Internet of Things and the vast amounts of data being collected by individuals, governments and data-oriented corporation to evolve traditional methods. Applicable areas of interest include, but are not limited to:
  • Hidden
    USSOCOM must be able to reduce, obscure, modify or eliminate all observable signature to avoid compromise on deployment, infiltration, and actions on the objective. The prevalence of commercial technology for encryption, electromagnetic effects, cyber, communications, data mining, and related tools will expose USSOCOM to new threats. Non-state actors will have access to very nearly the same capabilities from the commercial marketplace, creating new vulnerabilities that put USSOCOM’s ability to maintain strategic and tactical surprise at risk. Strategic and Tactical signature management will require the adoption and integration of new technical tools and Tactics, Techniques and Procedures to ensure USSOCOM maintains its ability to project decisive force across the globe, in any environment, against any adversary. Applicable areas of interest include, but are not limited to:
  • Hidden
    USSOCOM must be able to leverage emerging technology to visualize, understand and surveil complex urban and subterranean environments. Future USSOCOM operations will likely be conducted within a highly technical, very large, densely populated city environment. Applicable areas of interest include, but are not limited to:
  • Hidden
    USSOCOM must be able to anticipate how adversaries will employ autonomous systems and identify technology to defeat and exploit these systems, or mitigate their tactical advantages. The threats of adversarial use of unmanned and autonomous technology, including new ways to employ that technology, is growing. Enemy personnel utilize unmanned systems to achieve early warning, initiate and adjust direct fire engagements and trigger improvised explosive devices. USSOCOM requires the ability to fully and effectively identify and defeat unmanned and autonomous systems employed against the force. Applicable areas of interest include, but are not limited to:
  • Hidden
    USSOCOM must be able to communicate and navigate in a contested electromagnetic spectrum, without the use of United States Government (USG) satellites. The growth and proliferation of commercial and foreign space capabilities, along with the ability to deny/spoof space-based signals currently relied upon for communication and navigation, will continue to narrow the relative advantage of USSOCOM. New methods of communication and navigation are required to maintain security and enable effective operations in the future environment. Applicable areas of interest include, but are not limited to:
  • Hidden
    USSOCOM must be able to identify tasks where unmanned system performance can exceed human capabilities and seamlessly integrate visualization and control functions to expand and enhance an individual operator’s situational awareness and lethality on the battlefield. The growing utilization and dependence of technical equipment and unmanned systems by United States forces and the increasing capabilities offered significantly burdens USSOCOM personnel. Currently the focus and human input required to operate remote equipment significantly detracts from focus that can be applied elsewhere. The additional cognitive load not only limits operational effectiveness but degrades the opportunity to fully leverage developing technical capabilities on the objective. Requisite training and education on current systems burdens operators and takes valuable time from other tactical training requirements. Highly desired: