Air Force trusted computing experts eye potential $950 million project for cyber enabling technologies

July 16, 2020
The ACT 3 program will emphasize enabling technologies for prototype technologies for operational environments, and ways to buy limited quantities.

ROME, N.Y. – U.S. Air Force trusted-computing experts are ready to kick off a potential $950 million program to develop enabling technologies for the U.S. military to achieve cyber superiority.

Officials of the Air Force Research Laboratory's Information Directorate in Rome, N.Y., issued a presolicitation Tuesday (FA8750-20-R-1004) for the Agile Cyber Technology 3 (ACT 3) project.

The ACT 3 program will emphasize enabling technologies for user requirements; prototype technologies for evaluation in an operational environment; and ways for the Air Force to buy limited product quantities necessary for operational introduction.

Technical requirements will encompass rapid development, design, prototyping, demonstration, scenario development, experimentation and evaluation, integration, testing, technical installation, initial operations and cyber technologies.

Related: Air Force surveys industry for trusted computing, anti-tamper enabling technologies in embedded computing

Other requirements involve support for cyber defense; cyber operations; cyber network exploitation; cyber situational awareness; cyber command and control; cyber modeling, simulation, and war gaming; cyber infrastructure; and cyber mission assurance.

A formal solicitation for ACT 3 is to be released in mid-to-late November 2020. Air Force officials they plan to award several contracts that will last for 60 months and cumulatively will be worth about $950 million.

To qualify as a responsible contractor for this cyber enabling technologies project, the offeror must have a facility clearance at the Top Secret level and safeguarding capability at the Secret level.

Prospective Offerors interested in submitting a proposal for this solicitation must register by email with Contract Specialist Jessica Houle at [email protected] to be placed on the list of registered parties.

Related: Air Force reaches out to industry for enabling technologies in trusted computing hardware and software

Thus far the list of registered potential bidders consists of Radiance Technologies Inc.; Kudu Dynamics, LLC; Global InfoTek Inc.; Assured Information Security Inc.; REDLattice Inc.; Palantir USG Inc.; Two Six Labs; ServiceNow Inc.; SIEGE Technologies; Securicon LLC; Silver Bullet Solutions Inc.; Cyber Defense Technologies LLC; BEAT LLC; Barnett Engineering & Signaling Laboratories; Invictus International Consulting LLC; Dark Wolf Solutions LLC; Raft LLC; Securboration Inc.; Centerpoint Inc.; BlackHorse Solutions; Intelligent Waves LLC; Stucan Solutions Corp.; Infinity Systems Engineering; and Occam's Razor Technologies LLC.

Email questions concerning ACT 3 terms and conditions to Jessica Houle at [email protected], or to Contracting Officer Christopher Scialdone at [email protected].

Email technical questions to ACT 3 Program Managers Thomas Parisi at [email protected], and Tanya Macrina [email protected].

More information is online at https://beta.sam.gov/opp/be9ea4b2362d43ec83e9a9b2e49e3a03/view.

About the Author

John Keller | Editor-in-Chief

John Keller is the Editor-in-Chief, Military & Aerospace Electronics Magazine--provides extensive coverage and analysis of enabling electronics and optoelectronic technologies in military, space and commercial aviation applications. John has been a member of the Military & Aerospace Electronics staff since 1989 and chief editor since 1995.

Voice your opinion!

To join the conversation, and become an exclusive member of Military Aerospace, create an account today!