This solicitation is now closed
Predictive models for improvised explosive device countermeasures
Navy SBIR 2007.1 - Topic N07-080
ONR - Mrs. Cathy Nodgaard - [email protected]
Opens: December 6, 2006 - Closes: January 10, 2007

N07-080 TITLE: Predictive models for improvised explosive device countermeasures

TECHNOLOGY AREAS: Information Systems, Sensors

ACQUISITION PROGRAM: Joint Improvised Explosives Devices Defeat Organization (JIEDDO), ACAT IV

The technology within this topic is restricted under the International Traffic in Arms Regulation (ITAR), which controls the export and import of defense-related material and services. Offerors must disclose any proposed use of foreign nationals, their country of origin, and what tasks each would accomplish in the statement of work in accordance with section 3.5.b.(7) of the solicitation.

OBJECTIVE: Development of predictive modeling and simulations tools that can be used to plan Improvised Explosives Devices (IED) countermeasures.

DESCRIPTION: IED activity, in Iraq alone, involves participation by a variety of terrorist groups such as Al-Qaeda cells, Iraqi Baath factions including Fedayeen Saddam, Sunni Islamists, and Pro-Iran Shia radicals. Globally, the number of such groups increases vastly. These terrorist groups are autonomous entities that, while united in the overarching goal of thwarting US interests, differ in their doctrinal interpretations, skills, resources, and strategies. While one faction may prefer suicide bombers, another faction might specialize in remotely triggered roadside bombs. Coordinated IED activity, involving joint operation by several of these groups, is particularly hard to predict and simulate. To devise effective countermeasures, predictive tools are needed to model and simulate the numerous potential combinations of coordinated IED attacks by these various groups. In addition to identifying the likely "coalitions" of these terrorist groups, the predictive tools should enable the planning of IED countermeasures.

One of the hurdles to the development of such predictive tools is the availability of historical data of sufficient quality and granularity. Data about past IED attacks is often scattered and not readily available in a form suitable for data mining. In addition, much of this data is sensitive and often classified. Proposed solution approaches should clearly state how this hurdle will be overcome. The sensitivity of the proposed predictive tools to data quality/availability should be addressed. Any assumptions about Government-Furnished Information (GFI) should be clearly documented and substantiated.

PHASE I: Propose and test the feasibility of the predictive approach for IED countermeasure modeling and simulation. The solution architecture including input data sources, the predictive model(s), and the output user-interface should be designed and tested.

PHASE II: The predictive tool will be implemented and demonstrated on realistic use-cases. Open-source intelligence data such as IED activity news reports can be used for Phase II demonstration. The developed software should be HLA-compliant to facilitate interaction with other relevant modeling and simulation tools.

PHASE III: Transition technology in coordination with the Navy counter-IED program and the broader Joint IED Defeat Organization. Other DoD counter-IED programs, such as the Combat Terrorism Technology Task Force (CT3F a.k.a "Team Tango") are also transition paths for the predictive modeling tool. Homeland security and law enforcement applications are additional commercialization alternatives.

PRIVATE SECTOR COMMERCIAL POTENTIAL/DUAL-USE APPLICATIONS: Private sector commercial potential lies in the creation of IED predictive tools and techniques for delivery to the military and intelligence services of the United States and its allies.

REFERENCES:
1. ONR spearheads high-priority counter IED project, STARLINK Winter 2005/2006, http://www.nstarweb.com/enews/STARLINKWinter05_06.pdf

2. ONR funds basic science in support of counter-IED efforts, ONR media release, November 2005, http://www.onr.navy.mil/media/article.asp?ID=101

3. ONR BAA 05-024 http://www.onr.navy.mil/02/baa/docs/baa_05_024.pdf

4. Adaptive Foe Thwarts Counter-IED Efforts, National Defense, January 2006, http://www.nationaldefensemagazine.org/issues/2006/jan/adaptive_foe.htm

5. DoD Taps Industry Know-How in Ongoing Counter-IED Efforts, American Forces Press Service, http://www.defenselink.mil/news/Jan2006/20060124_4000.html

KEYWORDS: counter-IED; prediction; terrorist coalitions; modeling and simulation

** TOPIC AUTHOR (TPOC) **
DoD Notice:  
Between November 6, 2006 and December 5, 2006, you may talk directly with the Topic Author(s) to ask technical questions about the topics. Their contact information is listed above. For reasons of competitive fairness, direct communication between proposers and topic authors is
not allowed starting December 6, 2006, when DoD begins accepting proposals for this solicitation.
However, proposers may still submit written questions about solicitation topics through the SBIR/STTR Interactive Topic Information System (SITIS), in which the questioner and respondent remain anonymous and all questions and answers are posted electronically for general viewing until the solicitation closes. All proposers are advised to monitor SITIS (07.1 Q&A) during the solicitation period for questions and answers, and other significant information, relevant to the SBIR 07.1 topic under which they are proposing.

If you have general questions about DoD SBIR program, please contact the DoD SBIR Help Desk at (866) 724-7457 or email weblink.