Skip to main content

Phase I - Cyber Compliant Communications in Expeditionary Environments

Isidore Quantum Drop-in PQC to meet Expeditionary Communication Requirements including Air Force ACE deployments

E
Written by Eric Adolphe
Updated today

January 01, 2024

Recommended:

Adversarial technological advances in all-domain long-range fires have placed air bases at significantly increased risk. Fiscal and political constraints limit the establishment of new permanent bases. To address these challenges, the Air Force introduced Agile Combat Employment (ACE), a proactive operational scheme of maneuver executed within threat timelines to increase survivability while generating combat power. ACE requires communications that are mobile, survivable, secure, and sustainable across the electromagnetic spectrum to provide access to DOD networks and voice services alongside foreign infrastructure in Contested, Degraded, and Operationally Limited (CDO-L) environments.

Forward Edge‑AI’s Phase I initiative, “Cyber‑Compliant Communications in Expeditionary Environments,” tells the story of securing modern, mobile warfare communications. In response to threats posed by adversaries' long‑range fires and the constraints of fiscal and political realities, the Air Force’s Agile Combat Employment (ACE) concept demands secure, adaptable comms capabilities across contested and degraded environments. Within this challenge space, Forward Edge‑AI integrated Isidore Quantum—a quantum‑resistant encryption platform—with Privoro SafeCase®, a device that fortifies smartphones against illicit camera and microphone exploitation, offering combat personnel a hardened, secure communications node in austere settings.

Evolving beyond endpoint security, Forward Edge‑AI layered Isidore onto the Cubic/DTEC M3X Compute Platform, leveraging the rugged computational backbone to support low‑probability-of-detection operations in environments relying on foreign or commercial infrastructure—including 5G networks. This strategic fusion of Cubic’s field‑grade compute hardware with Isidore’s protocol‑agnostic, quantum‑resistant encryption created a robust, adaptive shield for data in transit, even across increasingly vulnerable Beyond Line of Site (BLoS) and contested operating areas.

Complementing these integrations, Forward Edge‑AI partnered with REBEL Systems, incorporating their ultra‑rugged TUCK‑19 with Embedded Compute. Designed as a true mobile tactical networking platform, the TUCK‑19 serves as a compact, transportable mini‑TOC—providing secure SD‑WAN connectivity, dual enclave networking, and automated PACE (primary, alternate, contingency, emergency) configurations across SATCOM, Wi‑Fi, and cellular systems. When combined with Isidore Quantum, this offers expeditionary users resilient, multi‑modal communications capable of thriving in austere and contested environments.

Forward Edge-AI is integrating Isidore Quantum with REBEL Systems

Throughout, the narrative remains grounded in Isidore’s core technical strengths: its NSA‑originated, COTS‑based design; protocol and network agnosticism; zero‑trust architecture; and advanced cryptographic underpinnings (leveraging CNSA 2.0 framework, ML KEM for key management, AES‑256 GCM encryption, and autonomous ephemeral keying with features like forward secrecy). By pairing this advanced technology with Privoro’s endpoint assurance, Cubic’s processing platform, and REBEL’s tactical networking infrastructure, Forward Edge‑AI crafted a holistic, deeply layered security posture—mission‑oriented and tailored for the realities of ACE.

In combining secure endpoint, compute, and network technologies, Forward Edge‑AI not only addressed the pressing needs of expeditionary communication under fire, but also demonstrated early success and validation through recognition in challenges like the Air Force Global Strike Command’s Expedient Basing Challenge and the Army’s Autonomy X‑Tech competition (Forward Edge AI Help Center). This Phase I foundation paves the way for future deployment phases—where these integrations can scale to deliver resilient, decentralized, and quantum-safe comms across CDO-L theaters worldwide.

Under the ACE axiom, communications using foreign infrastructure including 5G, is becoming a necessity for US forces deployed abroad; however, its use raises many security concerns, even in friendly or neutral environments. For many years, the private sector and government organizations have been dealing with the problem of protecting digital information from unauthorized access. A patchwork of solutions from many vendors has emerged that addresses specific kinds of threat, by targeting specific problems that might occur at specific components of a networked environment (data in-transit).

The Evasive Warrior Experiment demonstrated the effectiveness of Isidore Quantum in securing communications across contested and adversary-controlled environments. By integrating its quantum-resistant encryption into operational scenarios, the experiment validated that Isidore Quantum could maintain secure, low-probability-of-detection communications even when reliant on foreign or compromised infrastructure, such as commercial 5G networks. The results proved that Isidore Quantum delivers mission-critical resilience, ensuring warfighters can operate with confidence in degraded, denied, or adversary-influenced domains where conventional security measures fall short.

In Phase I Forward Edge-AI worked with the Joint Base San Antonio 5G (JBSA-5G) office, and the National Security Agency (NSA) to develop and demonstrate quantum-resistant encryption, secure enclaves, and improvements to 5G core security. The solution won the Air Force Global Strike Command’s Expedient Basing Challenge, and US Army’s Autonomy X-Tech Challenge Competition.

Forward Edge-AI is integrating Isidore with SafeCase by Privoro. SafeCase is a smartphone-coupled security device providing unprecedented defense against illicit camera and microphone usage while allowing full use of the phone.

Forward Edge-AI is an authorized reseller of the Privoro SafeCase.

Isidore Quantum provides high-performance, dual enclave networking capability that is powerful enough to serve as a mini-TOC on the move. Simply plug in your SATCOM and or other WAN connection and have a truly customizable and automated PACE plan for your entire network.

Alternatively, reduce your executive comms kit SWaP-C in its standalone configuration. It offers simultaneous Wi-Fi as WAN and Wi-Fi client access to support dual wireless WAN capabilities. The TUCK-19 with Embedded Compute is the most versatile, rugged, and reliable 5G multi-network enclave platform on the market today.

Stakeholders

Awards and Recognition

Award a Phase III Sole Source Contract

Forward Edge-AI has four “easy buttons” to purchase Isidore Quantum without further competition:

Commercial Solutions Offering (CSO) - Cyber Assured Communications Ordering Process

Award a Phase III Sole Source Contract

A Federal Agency may enter into a Phase III SBIR/STTR agreement at any time with a Phase I OR II Awardee. A subcontract to a Federally funded prime contract may be a Phase III award.

  1. Step 1 Requirements Document: Prepare a Statement of Work (SOW), Statement of Objectives (SOO), or Performance Work Statement (PWS), or use our automated tool to generate a document

  2. Step 2 Market Research: Use this page as your market research, or view a list of other eligible projects, then request a Rough Order Magnitude (ROM) from Forward Edge-AI

  3. Step 3 Funding: Performed by the government

  4. Step 4 Sole Source Justification: A Memorandum for the Record is required in lieu of a J&A or SSJ

  5. Step 5 Provide Requirements Package to Contracting Officer: Performed by the government

  6. Step 6 Solicitation: Performed by the government

  7. Step 7 Pre-Negotiation Memorandum: Use GSA CALC as a benchmark to determine fair and reasonableness of our ROM

  8. Step 8: Contract Award: Performed by the government

Language for Step 4 (Determination and Finding):

  • Artificial Intelligence (Anomaly Detector), ATAK, Counter Adversarial AI, Encryption, cybersecurity, 5G, 5G core, quantum resistant, secure enclaves, Zero Trust, WIFI, Command, Control, Communications (C3), Distributed Sensing and Communications, Expeditionary Environments, Contested, Executive Communications, Denied Operationally Limited (CDO-L) environments, Telecommunications

Phase III Sole Source Awards So Far:

Additional Resources

SBIR DATA RIGHTS:

Awarding Agency: US Air Force

Contract Number: FA864923P0345

Contractor Name: Forward Edge-AI, Inc.

Contractor Address: 10108 Carter Canyon, San Antonio, TX 78255

Expiration of SBIR Data: 02 November 2042

Protection Period: 20 years from award of contract on 02 November 2022

The Government's rights to use, modify, reproduce, release, perform, display, or disclose technical data or computer software marked with this legend are restricted during the period shown as provided in paragraph (b)(5) of the Rights In Other Than Commercial Technical Data and Computer Software–Small Business Innovation Research (SBIR) Program clause contained in the above identified contract. After the expiration date shown above, the Government has perpetual government purpose rights as provided in paragraph (b)(5) of that clause. Any reproduction of technical data, computer software, or portions thereof marked with this legend must also reproduce the markings.

© 2024 Forward Edge-AI, Inc. All rights reserved.

Did this answer your question?