The following HTML text is provided to enhance online
readability. Many aspects of typography translate only awkwardly to HTML.
Please use the page image
as the authoritative form to ensure accuracy.
Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities
Illustrative U.S. Air ForceTechnology Needs for Cyberattack
A broad agency announcement from the U.S. Air Force calls for proposals to develop the following technologies for network attack, network defense, and network warfare support.1 Some of the technologies sought include:
Mapping of networks (both data and voice);
Access to networks;
Denial of service on current and future operating systems and network devices;
Technologies/concepts for developing capabilities for IO modeling and simulation;
Situational awareness that gives the operator near real-time effectiveness feedback in a form that is readily observed by the operator;
Technologies/concepts for developing capabilities to assess and visualize non-kinetic effects;
Technologies/capabilities/concepts for generating and distributing dynamic electronic target folders to include non-kinetic courses of action (COAs);
Processing of multi-level security information; and
Technologies/concepts for developing capabilities to support rapid implementation of effects-based capabilities.