TechNet Augusta 2019 Sponsorship and Branding Opportunities


AFCEA has developed an enhanced sponsorship program that will offer maximum visibility to those who participate! What better way to make sure you stand out and increase your exposure at this foremost event in which industry leaders can learn about military requirements and connect with decision makers and operators, where senior military and government officials can gain feedback, and where industry thought leaders will discuss and demonstrate solutions. Sponsorship opportunities are offered at several investment levels, ensuring your ability to participate.

Browse available options below, or jump to specific categories: Patron Packages, Individual Sponsorships, Branding Opportunities.

Solution Abstracts


The Army Cyber Center of Excellence (CCOE) was seeking solutions to address emerging or existing challenges. TechNet Augusta attendees and exhibitors were encouraged to submit potential solutions to one of the questions below. AFCEA leadership has reviewed the submissions, and the top abstracts were each selected for a 15 minute presentation at TechNet Augusta.

To view the Solution Abstract Schedule please click on “View Solution Presentations” below.
To view the compendium of abstracts, please click on “View Solutions Showcase” below.

Problem Statement 1:

The Army requires Advanced Analytics utilizing/including Artificial Intelligence (AI) to support the planning, execution, and training of offensive and defensive cyberspace operations.

Why is it important?

  • Army networks and network defenders encounter a high volume and velocity of a constantly evolving threat.
  • Threat identification and isolation requires a complex combination of machine learning, AI, and human interface in order to reduce time to reconfigure, react to an adversary, or change techniques and/or tools to support a mission.
  • Reduce the cognitive workload and manpower intensity of analytic functions; for example, Cyber Electromagnetic Activity (CEMA) planners and the offensive and defensive cyberspace operators should not require “data scientist” skills in-order to accomplish their mission.
  • Enable autonomous active cyber operations.
  • Reduce the time gap between human reaction and dynamic threat response.
  • Enable the Military Decision Making Process (MDMP) for Multi-Domain Operations (MDO) to increase speed and responsiveness.
  • Enable pre-authorized/managed cyber payload deployment.

Problem Statement 2:

The Army requires cyberspace Modeling and Simulation (M&S) in support of cyber mission planning, proficiency training, cyberspace operations (CO), and exercise support.

Why is it important?

  • Cyberspace M&S is required for cyberspace mission and support personnel at all levels. For mission planning, it must be intuitive and include a level of artificial intelligence that identifies likely challenges, viable courses of action and potential impacts to mission.
  • For proficiency training and exercises, M&S must be able to emulate an array of realistic mission-specific logical environments. For example, the M&S capability must include a high fidelity of user activity and system interactions, both commercial and military, and generate realistic traffic. This traffic should include adversary cyberspace effects, anomalous network activity and insider threat.
  • M&S is necessary for cyberspace situational understanding (Cyber SU) to blend seamlessly with mission/maneuver command for the Military Decision Making Process driving Course of Action (COA) analysis development. This is a time dependent requirement for available staff planning and COA validation through modeling and simulation.
  • There are currently ongoing M&S environments being created concurrently at different classification levels. The effects implemented in one conventional warfare scenario (on one M&S) must be synchronized with a cyber training scenario (on another platform). This is an inherent factor to be resolved for CO training. This will enable persistent cyber training integration with the Synthetic Training Environment (STE).

Problem Statement 3:

The Army requires low probability of detection/low probability of attribution (LPD/LPA) enabling signature masking and reduction.

Why is it important?

  • Force protection of Tactical Cyber Mission Forces (CMF) is required in a Peer/Near-Peer Fight in multi-domain battle and to assure mission success.
  • CMF protection capabilities will enable the CMF to screen/guard against adversary network defenders and
  • CMF capabilities are enhanced with an automated identification of friend/foe that can protect CMF actions in and through cyberspace to counter the cyber threat out front of friendly network boundaries.
  • Enables cyberspace operations (CO) deception and counter infiltration actions.

Problem Statement 4:

What progress has industry made toward the development of elastic compute, storage, and services in a contested communications environment?

Why is it important?

  • The U.S. recognizes that adversaries will contest all domains and U.S. dominance is not assured.
  • Multidomain formations will require the capacity, capability, and endurance necessary to operate across multiple domains in contested spaces against a near-peer adversary.
  • The ability to scale and tailor resources as dictated by mission requirements will be an important asset for success in future large-scale combat operations.

Problem Statement 5:

What efforts are currently being made toward developing tactical terminals utilizing Digital RF to reduce the overall footprint of the terminal/dish size while emulating the gain of larger dishes?

Why is it important?

  • Commanders will require the ability to maneuver anywhere on the battlefield and maintain connectivity to the network without the need to stop and set up communications, which would make them vulnerable to attacks.
  • Combat vehicles integrated with lower footprint terminals may be leveraged to provide the on-the-move communications, mission command, and situational awareness that commanders need to lead from anywhere on the battlefield.
  • Managing the trade space between terminal/dish transportability and operational and range effectiveness will be critical when balancing requirements and resources available.

Problem Statement 6:

What are the efforts/initiatives that industry is pursuing to enhance SATCOM resiliency so our forces can perform in multi-domain operations? Describe your efforts in developing capabilities that will enable SATCOM ground terminals to perform multi-beam operation with the ability to utilize LEO/MEO/GEO satellites, both at-the-halt, and on-the-move.

Why is it important?

  • Without a protected SATCOM capability, the warfighter will not be able to communicate effectively via SATCOM links in a contested (jamming) environment.
  • U.S. Forces will require options that provide protection against interference either intentional or unintentional in large scale ground combat operations.

Problem Statement 7:

The Army requires communication systems with low probability of intercept/low probability of detection (LPD/LPI) capabilities to reduce platform and electromagnetic signature.

Why is it important?

  • Force protection of tactical Cyber Mission Forces (CMF) is required in a peer/near-peer fight in a multi-domain battle to assure mission success.
  • Enables assured communication in all conditions and operating environments.
  • Reduces electromagnetic signature when conducting military operations.
  • Conceals location when maneuvering to positions of advantage.

Problem Statement 8:

The Army requires a more efficient (less power, heat and cost) encryption module over current technologies to support "classified up to secret" voice and data tactical communications.

Why is it important?

  • To reduce the cost of overall force modernization and sustainment.
  • To reduce soldier load and heat signature of operating tactical communications in a peer/near-peer fight.

Problem Statement 9: “Man-Portable Electronic Attack”

The Army requires a man-portable electronic attack capability that can be easily transported and rapidly deployed.

Why is it important?

  • Man-portable systems must be developed to provide complementary capabilities to large EW systems that are deployed on trucks and aerial platforms.
  • Man-portable systems are inherently.
  • Transportable over differing terrains with the supported soldiers.
  • Persistent in presence regardless of weather or other factors.

Problem Statement 10: “Class III UAV Electronic Attack”

The Army requires aerial electronic warfare (EW) systems capable of conducting simultaneous electronic attack (EA) and electronic warfare support (ES) from the same platform.

Why is it important?

  • EW systems need to be able to continue sensing and collection of electromagnetic emissions while conducting EA (jamming) missions in order to maintain direction finding to continue to geo-locate the adversary for situational awareness and further targeting.
  • Class III UASs operate at the brigade combat team level and provide aerial ISR. These systems must also integrate electronic attack capabilities.

Problem Statement 11: “Small Form-Factor Long Range Sensor”

The Army requires long range EW sensors built in a small deployable form factor that can achieve ranges greater than 40 kilometers.

Why is it important?

  • EW systems need form factors that are as small as possible and still provide battlefield situational awareness to the commander. The system must be transportable and deployable.