DFOP0017248 - Preventing U.S. Adversaries’ Access to Critical Technologies and Exploitation of Scientific and Commercial Facilities for Military Advancement
Request Ticket // Limit: 1 // Tickets Available: 1
Eligibility
Applicants can submit one application in response to the NOFO. If more than one application is submitted by an organization, only the final application received, and time stamped by grants.gov will be reviewed for eligibility. Each application can include multiple projects that will be evaluated independently.
Executive Summary
U.S. adversaries, including China, are seeking advanced and emerging technologies to advance their military capabilities and to develop and deploy weapons of mass destruction (WMD) and advanced conventional weapons against the United States. A significant number of foreign governments, public and private research organizations, tech industries, and start-up communities are unaware of dual-use applications of technologies and remain vulnerable to theft and loss of technologies, data, intellectual property (IP), knowledge and talent that can be leveraged for military end uses. For example, semiconductors, which are critical components in a most of today’s electronic devices, are also a critical input for the development of military technologies, WMD and WMD delivery systems, and technologies with potential dual-uses – such as artificial intelligence. In addition to seeking advanced technologies, adversaries exploit commercial and scientific facilities, training centers, and the seas to conduct illegal military operations.
Malign actors use legal and illegal means such as joint commercial ventures, talent recruitment programs, research partnerships/funding, predatory contracting agreements, private equity investments, joint scientific facilities/laboratories, cybertheft, state-sponsored industrial espionage, supply chain diversion, or sales or donation of untrusted hardware and software to acquire foreign intellectual property, conduct dual-use research and development, or conduct military activities under the guise of science diplomacy or commercial activity. Affiliations and links to military entities are often obfuscated or disguised when establishing collaborations and partnerships in order to gain admission and secure visas to study or conduct research on sensitive advanced and emerging technologies at foreign universities; to procure critical equipment and components from unsuspecting or indiscriminate commercial or scientific institutions; or when establishing joint scientific facilities or operating in international business markets.
ISN/CTR seeks to enable key foreign partners to protect critical advanced and emerging technologies from exploitation by our adversaries for military, technological, and economic advancement; secure U.S. intellectual property (IP) abroad; and prevent the exploitation of commercial and scientific partnerships in several key areas, including but not limited to: aerospace and space technologies, artificial intelligence (AI), nanotechnologies, neuroscience, quantum computing and sensing, semiconductors, and smart cities. ISN/CTR also seeks to apply risk reduction tools to more traditional security vulnerabilities that are exploited by proliferator states for military training, geographic influence, etc.