Skip to main content
Phase I - Cyber Compliant Communications in Expeditionary Environments
E
Written by Eric Adolphe
Updated over 7 months ago

January 01, 2024

Forward Edge-AI is integrating Isidore Quantum with Privoro® SafeCase®

Adversarial technological advances in all-domain long-range fires have placed air bases at significantly increased risk. Fiscal and political constraints limit the establishment of new permanent bases. To address these challenges, the Air Force introduced Agile Combat Employment (ACE), a proactive operational scheme of maneuver executed within threat timelines to increase survivability while generating combat power. ACE requires communications that are mobile, survivable, secure, and sustainable across the electromagnetic spectrum to provide access to DOD networks and voice services alongside foreign infrastructure in Contested, Degraded, and Operationally Limited (CDO-L) environments.

Forward Edge-AI is integrating Isidore Quantum with Cubic/DTEC M3X Compute Platform

Under the ACE axiom, communications using foreign infrastructure including 5G, is becoming a necessity for US forces deployed abroad; however, its use raises many security concerns, even in friendly or neutral environments. For many years, the private sector and government organizations have been dealing with the problem of protecting digital information from unauthorized access. A patchwork of solutions from many vendors has emerged that addresses specific kinds of threat, by targeting specific problems that might occur at specific components of a networked environment (data in-transit).

See also Isidore Quantum's adaptive beam steering antenna for Low Probability of Detection/Low Probability of Intercept capabilities

Adversaries are developing low-cost cyber capabilities to interrupt critical communications and information links (satellite communications, positioning, navigation, timing, intelligence, surveillance, and reconnaissance) across multi-domain networks.

Adaptive Beam Steering Antenna

Moreover, by 2030, all of our civilian and military systems will be vulnerable to quantum computers – a significant national security challenge. The pacing security challenge is acute in Beyond Line of Site (BLoS) scenarios across the vast enroute support structure of the Pacific AOR.

See also Isidore Quantum's packet obfuscator technology.

Isidore Quantum™ (Isidore) is a pioneering new technology originally developed under a National Security Agency (NSA) innovation project to provide a secure communication device for the President of the USA. Isidore was developed using commodity/Commercial-Off-The-Shelf (COTS) hardware and software, and a unique/patented architecture. Isidore also incorporates a patent pending AI-based alarm discriminator that learns the patterns of life, detects anomalies, and mimics operator real-time analysis and problem solving.

Important Information About Isidore Quantum's Keying Methodology:

  • Physical and logical trust boundary with no cryptographic bypass

  • Commercial National Security Algorithm Suite 2.0 (CNSA2.0) compliant framework that leverages Crystals Kyber for key management, a PSK for authentication, and AES-256 (symmetric) encryption. Solution includes Galois/Counter Mode (GCM) with authentication (inner tunnel), and cipher feedback mode (outer tunnel)

  • Final key store is ephemeral, unique to the channel pair (loss of one is not the loss of another channel)

  • Key and channel management is autonomous to the pair (rekeying, key recovery, forward secrecy, anti-replay, dead peer detection)

  • Protocol, device and network agnostic

  • Isidore Quantum is Zero Trust by default

Forward Edge-AI is integrating Isidore Quantum with REBEL Systems

In Phase I Forward Edge-AI worked with the Joint Base San Antonio 5G (JBSA-5G) office, and the National Security Agency (NSA) to develop and demonstrate quantum-resistant encryption, secure enclaves, and improvements to 5G core security. The solution won the Air Force Global Strike Command’s Expedient Basing Challenge, and US Army’s Autonomy XTech Challenge Competition.

Isidore is now being tested by the Air Force Special Operations Command (AFSOC), and the Naval Information Warfare Center (NIWC). Isidore also won the AFWERX/Air Force Global Strike Command’s (AFGSC) Expedient Basing Challenge.

Forward Edge-AI is integrating Isidore with SafeCase by Privoro. SafeCase is a smartphone-coupled security device providing unprecedented defense against illicit camera and microphone usage while allowing full use of the phone.

Forward Edge-AI is an authorized reseller of the Privoro SafeCase.

Forward Edge-AI is also integrating Isidore with Rebel Systems' TUCK-19. The TUCK-19 with Embedded Compute is an ultra-rugged, mobile, tactical networking system. Designed for the harshest of deployments in mind. It integrates the class-leading, 5G Cradlepoint R1900 for SD-WAN and truly global cellular connectivity.

It also provides high-performance, dual enclave networking capability that is powerful enough to serve as a mini-TOC on the move. Simply plug in your SATCOM and or other WAN connection and have a truly customizable and automated PACE plan for your entire network.

Alternatively, reduce your executive comms kit SWaP-C in its standalone configuration. It offers simultaneous Wi-Fi as WAN and Wi-Fi client access to support dual wireless WAN capabilities. The TUCK-19 with Embedded Compute is the most versatile, rugged, and reliable 5G multi-network enclave platform on the market today.

Stakeholders

Awards and Recognition

Award a Phase III Sole Source Contract

A Federal Agency may enter into a Phase III SBIR/STTR agreement at any time with a Phase I OR II Awardee. A subcontract to a Federally funded prime contract may be a Phase III award.

  1. Step 1 Requirements Document: Prepare a Statement of Work (SOW), Statement of Objectives (SOO), or Performance Work Statement (PWS), or use our automated tool to generate a document

  2. Step 2 Market Research: Use this page as your market research, or view a list of other eligible projects, then request a Rough Order Magnitude (ROM) from Forward Edge-AI

  3. Step 3 Funding: Performed by the government

  4. Step 4 Sole Source Justification: A Memorandum for the Record is required in lieu of a J&A or SSJ

  5. Step 5 Provide Requirements Package to Contracting Officer: Performed by the government

  6. Step 6 Solicitation: Performed by the government

  7. Step 7 Pre-Negotiation Memorandum: Use GSA CALC as a benchmark to determine fair and reasonableness of our ROM

  8. Step 8: Contract Award: Performed by the government

Language for Step 4 (Determination and Finding):

  • Artificial Intelligence (Anomaly Detector), Counter Adversarial AI, Encryption, cybersecurity, 5G, 5G core, quantum resistant, secure enclaves, Zero Trust, WIFI

  • Command, Control, Communications (C3), Distributed Sensing and Communications, Expeditionary Environments, Contested, Executive Communications, Denied Operationally Limited (CDO-L) environments, Telecommunications

List of Phase III contracts awarded so far

Additional Resources

SBIR DATA RIGHTS:

Awarding Agency: US Air Force

Contract Number: FA864923P0345

Contractor Name: Forward Edge-AI, Inc.

Contractor Address: 10108 Carter Canyon, San Antonio, TX 78255

Expiration of SBIR Data: 02 November 2042

Protection Period: 20 years from award of contract on 02 November 2022

The Government's rights to use, modify, reproduce, release, perform, display, or disclose technical data or computer software marked with this legend are restricted during the period shown as provided in paragraph (b)(5) of the Rights In Other Than Commercial Technical Data and Computer Software–Small Business Innovation Research (SBIR) Program clause contained in the above identified contract. After the expiration date shown above, the Government has perpetual government purpose rights as provided in paragraph (b)(5) of that clause. Any reproduction of technical data, computer software, or portions thereof marked with this legend must also reproduce the markings.

© 2024 Forward Edge-AI, Inc. All rights reserved.

Did this answer your question?