Grant: Information Innovation Office

General Information
Information Innovation Office
Award Information
08/02/2016 05:00 PM
08/12/2016 05:00 PM

 DARPA Information Innovation Office (I2O) invites research proposals in two thrust areas:

1) Empower the human within the information ecosystem. 
I2O develops technologies to enable computing systems to
understand human speech and other modes of human communication; derive
information contained in diverse media; learn, reason and apply knowledge gained
through experience; and respond intelligently to new and unforeseen events.
Incorporating these technologies in military systems will enable warfighters to make
better decisions in complex, time‐critical, battlefield environments; intelligence analysts
to make sense of massive, incomplete, and contradictory information; and autonomous
systems to operate with high degrees of assurance. I2O empowers the human by
creating new ways for humans and computers to work together to achieve levels of
performance beyond what either can achieve individually

2) Guarantee trustworthy computing and information

I2O aims to create software that is inherently resilient to attack and
computing architectures that can be rapidly restored following an attack. To accomplish
this, I2O is supporting research in areas such as formal methods, software diversity,
transparency/causality/information flow tracking, and automated cyber response. I2O
interests span military systems, embedded systems, critical infrastructure, industrial
systems, vehicular systems, the Internet of Things, and enterprise networks. 

I2O is also concerned with the integrity and confidentiality of information. I2O develops privacy‐preserving
technologies to ensure that the collective security benefits of big data do not come at
the expense of personal privacy, and to protect the proprietary and sensitive
information of enterprises and coalition partners. In all of these areas, exploration of
offensive methods expands and informs our defensive work by providing a deeper
understanding of current and emerging threats, giving realism to our efforts to develop
information technologies and systems that we can trust.

For more information, see attached.