Secure Remote Desktop Access to Isolated Networks

$25,000 USD

Challenge overview

A general principle of data protection in secure environments is the creation of isolated networks. These networks implement a security constraint that protects the information in the network from leaking to unwanted or unapproved destinations. This isolation, however, does not allow the flow of information to travel between the isolated networks and surrounding networks and limits productivity and the usefulness of the information. CTTSO, the Seeker for this Challenge, is soliciting ideas on how to create a comprehensive work experience on one computer that will provide a remote desktop like viewing experience across multiple isolated networks without allowing the protected data or information to bleed over to the user’s native network. Solutions must allow for complete visibility into the protocols and code that comprise the underlying solution. 

This is an Ideation Challenge with a guaranteed award for at least one submitted solution.

The use of isolated networks is a general principle of data protection in secure environments. Security constraints on these networks prevent the flow of information between the network and surrounding networks and prevents the protected information from leaking to unwanted or unauthorized destinations. The main advantage of isolating a network is the layer of protection it provides against online attacks. Unfortunately, the same measures that protect an isolated network make it difficult to use the information on the network by forcing users to use solutions such as multiple computers in conjunction with KVM (keyboard, video, mouse) switches when working with other networks. 

CTTSO, the Seeker for this Challenge, is soliciting ideas on how to create a comprehensive work experience on one computer that will provide a remote desktop like viewing experience across multiple isolated networks without allowing the protected data or information to bleed over to the user’s native network. Solutions must allow for complete visibility into the protocols and code that comprise the underlying solution. Several commercial solutions are known but these use proprietary protocols that are closed source and therefore there is no way to verify the information being transferred between the two environments. 

This is an Ideation Challenge, which has the following unique features:

  • There is a guaranteed award.  The award(s) will be paid to the best submission(s) as solely determined by the Seeker. The total payout will be $25,000, with at least one award being no smaller than $5,000 and no award being smaller than $1,000. 
  • The Solvers are not required to transfer exclusive intellectual property rights to the Seeker.  Rather, by submitting a proposal, the Solver grants to the Seeker a royalty-free, perpetual, and non-exclusive license to use any information included in this proposal, including for promotional purposes.

Submissions to this Challenge must be received by 11:59 PM (US Eastern Time) on October 15, 2017. 

Late submissions will not be considered.

After the Challenge deadline, the Seeker will complete the review process and make a decision with regards to the Winning Solution(s). All Solvers that submit a proposal will be notified on the status of their submissions; however, no detailed evaluation of individual submissions will be provided

ABOUT THE SEEKER

The Combating Terrorism Technical Support Office (CTTSO) provides a forum for interagency and international users to discuss mission requirements to combat terrorism, prioritizes those requirements, funds and manages solutions, and delivers capabilities.  The CTTSO accomplishes these objectives through rapid prototyping of novel solutions developed and field-tested before the traditional acquisition systems are fully engaged.  This low-risk approach encourages interdepartmental and interagency collaboration, thereby reducing duplication, eliminating capability gaps, and stretching development dollars.

Use the slider to explore how the Challenge process works:

Register

Review & Accept

Submit

Win

To start solving this Challenge, log in to the Challenge Center or register as a Solver

Visit the Wazoku Crowd Community to start the conversation