A general principle of data protection in secure environments is the creation of isolated networks. These networks implement a security constraint that protects the information in the network from leaking to unwanted or unapproved destinations. This isolation, however, does not allow the flow of information to travel between the isolated networks and surrounding networks and limits productivity and the usefulness of the information. CTTSO, the Seeker for this Challenge, is soliciting ideas on how to create a comprehensive work experience on one computer that will provide a remote desktop like viewing experience across multiple isolated networks without allowing the protected data or information to bleed over to the user’s native network. Solutions must allow for complete visibility into the protocols and code that comprise the underlying solution.
This is an Ideation Challenge with a guaranteed award for at least one submitted solution.
The use of isolated networks is a general principle of data protection in secure environments. Security constraints on these networks prevent the flow of information between the network and surrounding networks and prevents the protected information from leaking to unwanted or unauthorized destinations. The main advantage of isolating a network is the layer of protection it provides against online attacks. Unfortunately, the same measures that protect an isolated network make it difficult to use the information on the network by forcing users to use solutions such as multiple computers in conjunction with KVM (keyboard, video, mouse) switches when working with other networks.
CTTSO, the Seeker for this Challenge, is soliciting ideas on how to create a comprehensive work experience on one computer that will provide a remote desktop like viewing experience across multiple isolated networks without allowing the protected data or information to bleed over to the user’s native network. Solutions must allow for complete visibility into the protocols and code that comprise the underlying solution. Several commercial solutions are known but these use proprietary protocols that are closed source and therefore there is no way to verify the information being transferred between the two environments.
This is an Ideation Challenge, which has the following unique features:
Submissions to this Challenge must be received by 11:59 PM (US Eastern Time) on October 15, 2017.
Late submissions will not be considered.
After the Challenge deadline, the Seeker will complete the review process and make a decision with regards to the Winning Solution(s). All Solvers that submit a proposal will be notified on the status of their submissions; however, no detailed evaluation of individual submissions will be provided.
ABOUT THE SEEKER
The Combating Terrorism Technical Support Office (CTTSO) provides a forum for interagency and international users to discuss mission requirements to combat terrorism, prioritizes those requirements, funds and manages solutions, and delivers capabilities. The CTTSO accomplishes these objectives through rapid prototyping of novel solutions developed and field-tested before the traditional acquisition systems are fully engaged. This low-risk approach encourages interdepartmental and interagency collaboration, thereby reducing duplication, eliminating capability gaps, and stretching development dollars.
What is an InnoCentive Ideation™ Challenge?
An InnoCentive Ideation™ Challenge is a broad question formulated to obtain access to new ideas, similar to a global brainstorm for producing a breakthrough idea or market survey which may include ideas for a new product line, a new commercial application for a current product, or even a viral marketing idea to recruit new customers. Ideation™ Challenge submissions are typically about two written pages, and Seekers receive a non-exclusive, perpetual license to use all submissions.
In an Ideation™ Challenge, Solvers may:
Solvers should not reveal any confidential information in their submissions. Often the Ideation™ Challenge will be followed by one or more of the other three Challenge types to further develop the ideas and gain Intellectual Property protection when the concept has been well-defined.