Active Technical Inquiries

Active technical inquiries are designed to host collaborative discussions to help gather information in response to technical inquiries submitted by those in the DoD research and engineering community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.

completed

What is the latest optical AI technology for scanning and digitizing, and what are the risks if given to an adversary?

The Cybersecurity & Information Systems Information Analysis Center (CSIAC) is seeking optical AI technology and software that can scan and digitize various items and products for indisputable identification, authentication, and tracing. This technology would use…

completed

What COTS/GOTS Software as a Service (SaaS) data analytics solutions are available that support data capture through alternative collection methods?

The Cybersecurity & Information Systems Information Analysis Center (CSIAC) is seeking possible commercial off-the-shelf/government off-the-shelf (COTS/GOTS) SaaS data analytic solutions that support alternative data gathering methods, such as crowdsourcing and direct observation, to provide “ground…

completed

What common cloud computing environments and shared DevOps platforms are available to military branches handling classified workloads, and what are their various software factories?

CSIAC is seeking information regarding the enterprise-level common cloud computing environments currently available to the U.S. Navy, Marines, Army, and Coast Guard which support workloads processing Controlled Unclassified Information (CUI) at Impact Levels 4 and…

completed

What are possible solutions for labeling independent Zeek logs for attacks and exploits?

The Cybersecurity and Information Systems Information Analysis Center (CSIAC) is seeking possible solutions to automatically label network events/sessions based on time and IP addresses of known attacks using Zeek logs. Documentation, potential points of contact…

completed

What systems can geolocate a cellphone signal from approximately a mile away in rugged terrain?

The Cybersecurity & Information Systems Information Analysis Center (CSIAC) is seeking information for cellphone detection systems in rugged terrain and their cost, federal use, and points of contact. The options for such a system should…