Innovation Funding Database

Choose Your Area of Innovation:

  • Advanced Materials & Manufacturing

  • Aerospace & Spacetech

  • Agtech & Foodtech

  • Artificial Intelligence & Machines Learning

  • Biotech

  • Cleantech & Climatetech

  • Cybersecurity

  • Defensetech & Dual-Use Tech

  • eXtended Reality

  • Healthtech

  • Medtech

  • Other Tech

  • Quantum & Photonics

  • Robotics & Autonomous Systems

Broad Topic Josiah Wegner Broad Topic Josiah Wegner

DARPA Strategic Technology Office-Wide Broad Agency Announcement (BAA)

Deadline: December 19, 2025

Funding Award Size: Est. $2 million

Description: DARPA’s Strategic Technology Office (STO) is seeking revolutionary, high-risk research ideas that can create new mission-level capabilities across air, space, sea, land, and the electromagnetic spectrum. This BAA supports disruptive systems, devices, or architectures that go beyond incremental improvements and are not already covered under existing STO programs.

Executive Summary:

DARPA’s Strategic Technology Office (STO) BAA is soliciting breakthrough research concepts that create new mission-level capabilities beyond the current state of practice. The agency will fund a limited number of high-risk, high-reward proposals across a broad range of defense and national-security technical domains. Applications are due December 19, 2025.

Complimentary Assessment

How much funding would I receive?

DARPA does not publish fixed award amounts for this BAA. STO funds a limited number of proposals, and budgets are determined by the technical approach, the scope of work, and alignment with STO priorities.

What could I use the funding for?

DARPA's STO seeks innovative ideas and disruptive technologies that provide the U.S. military and national security leaders with trusted, disruptive capabilities across all physical domains (Air, Space, Sea, and Land) and across the spectrum of competition. STO programs deliver solutions at speed and scale for today's warfighters while developing the resilient "breakthrough" systems and technologies needed for future battlespaces. STO does not focus on one area of responsibility or phenomenology. Rather, STO programs capture the strategic, logistical, and tactical complexity of today's national security environments. STO is a "systems office" seeking to create new "proof-of-concept" mission systems. Its goals are to develop and demonstrate new capabilities that expand what is technically possible.

Research areas of current interest to STO include, but are not limited to, the following topics:

  •  Acoustic communication and sensing

  •  Adaptability

  •  Advanced computing

  •  Additive manufacturing

  •  Architecture and advanced systems engineering

  •  Artificial intelligence

  •  Autonomy and control algorithms

  •  "Big data" analytics

  •  Combat identification

  •  Command and control (C2)

  •  Communications and networking, virtual and adaptive

  •  Complexity management

  •  Critical infrastructure defense

  •  Decision aids and C2 technology

  •  DevOps and novel software development and integration

  •  Directed energy (DE)

  •  Distributed autonomy and teaming (machine-machine, human-machine)

  •  Economic security

  •  Effects chain functions (disaggregated find, fix, finish, target, engage, assess)

  •  Electro-optic/infrared sensors

  •  Electromagnetic warfare (EW)

  •  High-frequency (HF) communications and sensing

  •  High voltage electric power systems and architecture

  •  Human behavior modeling

  •  Human-machine symbiosis

  •  Industrial engineering

  •  Integration and reliability technologies

  •  Interoperability

  •  Logistics

  •  Modeling and simulation

  •  Microwave and millimeter wave communications and sensing

  •  Novel kinetic effects

  •  Non-kinetic effects (EW, DE, cyber)

  •  Optical technologies

  •  Photonics

  •  Radio technologies (especially software-defined and novel waveforms and processing)

  •  Radar and adaptive arrays

  •  Resilient systems

  •  Robotics

  •  Seekers and other expendable sensors and processing

  •  Sensors and analytics

  •  Signal processing

  •  Space sensors, communications, autonomy, and architectures (especially supporting proliferated low earth orbit constellations)

  •  Strategy analysis technology

  •  Supply chain analytics

  •  System of systems

  •  Undersea and seabed technology

  •  Tactics development technology

  •  Testing and data collection

  •  Very low earth orbit (VLEO) technology

  •  Very low frequency (VLF) technology

Are there any additional benefits I would receive?

Beyond the direct award, DARPA funding offers significant strategic advantages:

Government Validation and Credibility:
Receiving a DARPA award signals exceptional scientific and engineering merit, which accelerates engagement with primes, integrators, strategic partners, and investors.

Enhanced Visibility and Notoriety:
DARPA programs are frequently highlighted in federal communications, technical conferences, and defense media—boosting your company’s profile across the national security sector.

Ecosystem Access and Collaboration Opportunities:
Awardees gain access to DARPA program managers, government labs, test ranges, and a high-level innovation network—opening doors to future contracts and partnerships.

Stronger Exit and Acquisition Potential:
Nondilutive funding that matures breakthrough technology, combined with the DARPA “stamp,” often increases valuation and attractiveness to large defense, aerospace, semiconductor, and AI-focused acquirers.

What is the timeline to apply and when would I receive funding?

Applications are due December 19, 2025.

DARPA does not publish a fixed award timeline.

Where does this funding come from?

Funding comes from the Defense Advanced Research Projects Agency (DARPA) under the Strategic Technology Office (STO), a DoD organization responsible for advanced mission-level systems and emerging technologies.

Who is eligible to apply?

The BAA does not restrict eligibility. Typical DARPA BAAs accept proposals from:

  • U.S. businesses of any size

  • Universities

  • Nonprofits

  • Federally-funded research and development centers (with limitations)

Foreign entities may be subject to additional restrictions depending on classification and export-control considerations.

What companies and projects are likely to win?

DARPA will select proposals that score highly on scientific merit, mission relevance, and cost realism.

  • High Scientific & Technical Merit: Innovative, feasible, and well-justified approaches with clear deliverables, identified risks and credible mitigations, and a team with the expertise to execute.

  • Strong Contribution to DARPA’s Mission: Efforts that meaningfully advance U.S. national security capabilities, show a credible transition path to U.S. defense applications, and include an IP strategy that does not hinder government use.

  • Realistic, Well-Substantiated Costs: Budgets that accurately reflect the level of effort, materials, labor, and technical scope—avoiding artificially low estimates and demonstrating efficient use of prior research and existing capabilities.

Complimentary Assessment

Are there any restrictions I should know about?

  • Proposals must not duplicate existing STO programs or other active STO BAAs.

  • Research that yields incremental or “evolutionary” improvements is specifically excluded.

  • Offerors are strongly encouraged to review current STO programs and speak with program managers before applying.

How long will it take me to prepare an application?

For a first-time applicant, preparing a competitive submission under this BAA will likely take 120–160 hours in total.

How can BW&CO help?

Our team specializes in complex federal R&D proposals and can:

  • Triple your likelihood of success through proven strategy and insider-aligned proposal development

  • Reduce your time spent on the proposal by 50–80%, letting your team focus on technology and operations

  • Ensure you are targeting the best opportunity for your project and positioning your company for long-term growth under Federal & State R&D Initiatives.

How much would BW&CO Charge?

Our full service support is available for a flat fee of $15,000 Project + a 5% Success Fee.

Fractional support is $300 per hour, with most DARPA proposal projects requiring 80–100 hours of expert support from strategy through submission of full proposal.

For startups, we offer a discounted rate of $250 per hour to make top-tier grant consulting more accessible while maintaining the same level of strategic guidance and proposal quality.

Additional Resources

See solicitation on sam.gov

Read More
Broad Topic Josiah Wegner Broad Topic Josiah Wegner

Applications for Cyber Warfare: Genesis

Deadline: September 29, 2030

Funding Award Size: $10 million to $50 million

Description: Funding to develop cyber operations prototypes that can transition into operational DoD platforms to maintain U.S. superiority in the cyber domain.

Executive Summary:

The Air Force Research Laboratory (AFRL) is offering up to $99.99M per award through the Applications for Cyber Warfare: Genesis ARA to develop advanced cyber operations prototypes for transition to operational DoD platforms. White papers are accepted until September 29, 2030.

Complimentary Assessment

How much funding would I receive?

Typical awards range from $10M to $50M, with the possibility of awards up to $99.99M. Projects generally span up to 60 months.

What could I use the funding for?

Technologies of interest to the strategic vision of this ARA include, but are not limited to: platforms and architectures for the facilitation of cyber operations, command and control capabilities for the facilitation of cyber operations, effects based capabilities for the facilitation of cyber operations, predictive analysis capabilities for the facilitation of cyber operations, cross domain capabilities for the facilitation of cyber operations, intelligence gathering capabilities for the facilitation of cyber operations, intelligence processing capabilities for the facilitation of cyber operations, stealth delivery capabilities for the facilitation of cyber operations, stealth and persistence capabilities for the facilitation of cyber operations, and planning based utilities for the facilitation of cyber operations.

  • The Air Force Research Laboratory is soliciting white papers under this Advanced Research Announcement (ARA) to research, design, develop, implement, and refine next-generation cyber warfare capabilities to advance the nation’s ability to prepare and fight wars as well as to build enduring advantages in Cyberspace.  This includes both cyber platforms and cyber weaponry.

    The Internet enables global connectivity, communication, and innovation. It has brought increased prosperity to the United States, inaugurating new industries and revitalizing old ones. It has also helped to ensure the superiority of the Joint Force, strengthening our ability to coordinate and quickly adapt to dynamic circumstances. In this decisive decade, the success of our Nation depends upon a free, open, and secure cyberspace.

    The Department of Defense’s (DoD) experiences have shown that cyber capabilities held in reserve or employed in isolation render little deterrent effect on their own. Instead, these military capabilities are most effective when used in concert with other instruments of national power, creating a deterrent greater than the sum of its parts. In this way, cyberspace operations represent an indispensable element of United States and Allied military strength and form a core component of integrated deterrence.

    The DoD will also use cyberspace operations for the purpose of campaigning, undertaking

    actions to limit, frustrate, or disrupt adversaries' activities below the level of armed conflict and to

    achieve favorable security conditions. By persistently engaging malicious cyber actors and other

    malign threats to United States interests in cyberspace, United States Cyber Command (USCYBERCOM) will support Department-wide campaigns to strengthen deterrence and gain advantages. As it campaigns in cyberspace, the Department will remain closely attuned to adversary perceptions and will manage the risk of unintended escalation.

    Among multiple lines of effort that are identified in the DoD’s most recent cyber strategy, two are particularly relevant to this solicitation:

    “Prepare to Fight and Win the Nation's Wars. The Department will campaign in and through

    cyberspace to advance Joint Force objectives. We will ensure the cybersecurity of the

    Department of Defense Information Network (DODIN) and conduct defensive cyberspace

    operations in order to protect it. The Department will enhance the cyber resilience of the Joint

    Force and ensure its ability to fight in and through contested and congested cyberspace. We

    will utilize the unique characteristics of cyberspace to meet the Joint Force's requirements and

    generate asymmetric advantages.”

    “Build Enduring Advantages in Cyberspace. The Department will pursue institutional

    reforms to build advantages that will persist for decades to come. We will optimize the

    organizing, training, and equipping of the Cyberspace Operations Forces and Service-retained

    cyber forces. We will ensure the availability of timely and actionable intelligence in support of

    cyberspace operations and explore the intersection of emerging technologies and cyber

    capabilities. We will foster a culture of cybersecurity and cyber awareness, investing in the

    education, training, and knowledge development of personnel across the defense enterprise.”

                                                          -2023 Summary, Cyber Strategy, US Department of Defense

    The purpose of this Advanced Research Announcement (ARA) is to research, design, develop, implement, and refine next-generation cyber warfare capabilities to advance the nation’s ability to prepare and fight wars as well as to build enduring advantages in Cyberspace.  This includes both cyber platforms and cyber weaponry.

    The scope and direction of this ARA are derived from these as follows:

    Preparing to win the nations wars - Capabilities researched, designed, developed, implemented, and refined under this Advanced Research Announcement will allow for:

    -Support to joint campaigns in and through cyberspace to reinforce deterrence objectives while achieving informational and military advantages. Adversaries of the United States will be made to doubt the efficacy of their military capabilities as well as the belief that they can conduct unattributed coercive actions against the United States. As the DoD campaigns in cyberspace for this purpose, offensive and defensive options will be furnished to support the Joint Force so that it is ready to respond rapidly across the spectrum of conflict.

    -The enhancement of cyber resilience of the Joint Force and ensure its ability to fight through contested and congested cyberspace. Prioritization will be given to those cyber capabilities that support the Joint Force's military mission assurance and commit to training the force to operate amid network and warfighting platform degradation.

    -The continual integration of state-of-the-art cyberspace operations platforms and weaponry. Further refinement of this approach, developing options that utilize the unique characteristics of cyberspace to meet the Joint Force's requirements and generate asymmetric advantages will occur throughout the lifecycle. This will include the pursuit of cross-domain effects during large-scale combat operations.

    Building Enduring Advantages in Cyberspace - Capabilities researched, designed, developed, implemented, and refined under this Advanced Research Announcement will allow for:

    -The prioritization of necessary reforms to meet the intelligence needs of the cyberspace operations community. Cyber requirements will be addressed through continued improvements to the business practices, human capital management, and organization of the Defense Intelligence Enterprise. Barriers to information sharing will be reduced and broader access to technical data consistent with applicable law, policies and procedures facilitated. Addressing gaps, ambiguities,

    and policy issues to enable intelligence activities in support of cyberspace operations will be facilitated.

    -The application and refinement of cyber platforms and weaponry. Technologies that can confound malicious cyber actors and prevent them from achieving their objectives in and through cyberspace will be prioritized. These include high assurance architectures and their associated technologies, advanced endpoint monitoring capabilities, tailored data collection strategies, automated data analytics, and systems that enable network automation, network restoration, and network deception.

    -The disruption and degradation of malicious cyber actors will be achieved through forward defense and by disrupting the activities of malicious cyber actors and degrading their supporting ecosystems.  These operations will be primarily conducted by USCYBERCOM, leveraging its authorities and in close coordination with other departments and agencies. A number of such operations have been occurring under this policy since 2018. Lessons learned from these operations inform pursuit of new capabilities and shape approached to risk management.  These operations will support the strategic approach outlined in the 2023 National Cybersecurity Strategy, in which the Department's cyberspace operations may complement concurrent actions by the diplomatic, law enforcement, and intelligence communities, among others. Together, these actions will support a whole-of-Government effort to reduce the perceived and actual utility of malicious cyber activity and render cybercrime unprofitable.

Are there any additional benefits I would receive?

Beyond the direct funding, awardees gain several indirect advantages:

Government Validation and Technical Credibility:
Winning an AFRL-funded cyber program signals that your technology meets high national-security thresholds—accelerating trust with primes, operators, and investors.

Enhanced Visibility and Notoriety:
AFRL awardees often receive recognition in government communications and defense-tech media, elevating your company’s profile in the cyber and national-security ecosystem.

Pathway to Follow-On Production:
OT prototype awards may transition to follow-on production contracts, enabling larger-scale procurement without a new competition—significantly increasing commercial value.

Stronger Valuation and Exit Potential:
Scaling cyber technologies under nondilutive funding, coupled with Air Force validation, can improve investor confidence and long-term acquisition potential in the defense tech sector.

What is the timeline to apply and when would I receive funding?

White papers may be submitted anytime before September 29, 2030, but AFRL recommends aligning with fiscal-year funding cycles:

  • FY26: by December 30, 2025

  • FY27: by September 30, 2026

  • FY28: by September 30, 2027

  • FY29: by September 30, 2028

  • FY30: by September 30, 2029

Selected offerors will be invited to submit full proposals. Funding timing depends on fiscal-year availability but typically follows several months after invitation and review.

Where does this funding come from?

Funding comes from the Department of the Air Force, Air Force Materiel Command, through the Air Force Research Laboratory (AFRL), Rome Research Site.

Who is eligible to apply?

Eligible applicants include U.S. organizations capable of conducting advanced research and prototype development. Both FAR-based contracts and Other Transactions (OTs) may be awarded. There is no set-aside, allowing large businesses, small businesses, and research institutions to participate.

What companies and projects are likely to win?

Competitive submissions will:

  • Demonstrate strong capability to develop cyber operations prototypes

  • Present feasible transition paths to DoD operational platforms

  • Show technical merit and alignment with cyber dominance objectives

  • Provide credible teams with relevant cyber R&D and integration experience

Projects focused on scalable, operationally relevant cyber capabilities with clear transition potential are most likely to receive funding.

Complimentary Assessment

Are there any restrictions I should know about?

  • Awards may be issued as either FAR-based contracts or Other Transactions (OTs) under 10 USC 4021–4023. Each mechanism has different compliance requirements and follow-on potential, especially for successful prototype efforts .

  • While technical and contracting discussions are allowed, communications with AFRL do not constitute a government commitment to fund or award any proposal. Only Contracting Officers can legally bind the government .

  • Applicants are cautioned that failure to follow proposal formatting or submittal instructions may result in lower evaluation ratings or rejection .

How long will it take me to prepare an application?

For a first-time applicant, preparing a competitive white paper will likely take 20–50 hours in total.

How can BW&CO help?

Our team specializes in complex federal R&D proposals and can:

  • Triple your likelihood of success through proven strategy and insider-aligned proposal development

  • Reduce your time spent on the proposal by 50–80%, letting your team focus on technology and operations

  • Ensure you are targeting the best opportunity for your project and positioning your company for long-term growth.

How much would BW&CO Charge?

Our full service support is available for the white paper for $5,000.

Fractional support is $300 per hour.

For startups, we offer a discounted rate of $250 per hour to make top-tier grant consulting more accessible while maintaining the same level of strategic guidance and proposal quality.

Additional Resources

Access the funding announcement here.



Read More