Technical Inquiries (TIs)

The core function of CSIAC is to answer technical questions using our in-house technical personnel, vast DoD information resources, and our extensive network of subject matter experts (SMEs). CSIAC has technical staff available to conduct technical research in order to give you a head start on your analysis or study in any of our technical focus areas. We offer a free 4-hour TI research service or, for slightly larger research efforts, we offer an extended technical inquiry (ETI) service.

Technical Inquiry Features

Our TIs include the following to help you with your research:

magnifying glass
Literature Searches

A curated bibliography given a technical topic

Document Requests

Dissemination of technical reports to authorized users

User Icon
SME Referrals

Contacts and connections with relevant, technical SMEs

business documents on office table with smart phone and digital

Free Technical Inquiry Services

CSIAC’s free TI service offers 4 hours of free research per inquiry on any topic within our technical focus areas. Typical TI efforts may include answering technical questions, literature searches, document requests, or referrals to SMEs. Completed responses are compiled and delivered to the inquirer in less than 10 business days. Registered users can submit TIs online through the provided form or by phone.

Extended Technical Inquiry (ETI) Services

ETIs are externally funded research efforts that go slightly beyond 4 research hours. ETIs require between 5 and 160 technical hours of research, with a $50K maximum ceiling and period of performance up to 2 months.

Relaxed informal IT business startup company team meeting.

Ready to submit a technical inquiry?

Receive free information research on technical topics

Notable Technical Inquiries

Notable TIs are findings and/or summaries of responses to the most recent and impactful technical inquiries submitted by CSIAC members under our 4 free hours of information research support.

6G and Its Advancements Over 5G Networks

What major advancements are proposed by 6G, and when is it projected to deploy?

Overarching Wireless Technology Programs for the U.S. Air Force

Is there an overarching Wi-Fi program for the U.S. Air Force?

Artificial Intelligence/Machine Learning Transition Timetable

How fast do artificial intelligence (AI)/machine-learning (ML) technologies transition from paper to fielded capability for the People’s Republic of China (PRC)?

Microelectronics Overview

What is the current state of the art in microelectronics and its impact on the DoD?

The State of 5G Technology and Applications to the U.S. Department of Defense and Military

What is the state of 5G technology (and beyond) as it applies to the U.S. Department of Defense and military?

Banking Security Framework

What cyber risk assessment framework best fits the banking sector?

Example Technical Inquiries

Example TIs are samples of the wide range of technical inquiries submitted by CSIAC members under our 4 free hours of information research support.

Combining Physics and Human Recognition Logic to Improve Hybrid AI Methods for Simultaneous Localization and Mapping (SLAM)

Can you provide information about a hybrid AI method that combines physics and human recognition logic to improve the AI for SLAM (Simultaneous Localization and Mapping), detection, recognition, classification and tracking?

Use Cases for State-of-the-art Artificial intelligence/Machine Learning (AI/ML) in Aviation

What are the state-of-the-art use cases for Artificial Intelligence(AI) and Machine Learning(ML) in Aviation?

Sensor Fusion Research Using Artificial Intelligence/Machine-Learning (AI/ML) Methods

Can you provide information on sensor fusion research (e.g., radars and sensors) using ML or AI methods, regardless of military application?

Extracting Underlying Binary From Artificial Intelligence/Machine-Learning (AI/ML) Models

How can you identify the underlying framework used in AI/ML models and extract the binary?

Mission- and Campaign-Level Simulations of Cyber Warfare

What are some examples of mission- and campaign-level simulations of cyber warfare?

Current State of Malware and Cyber Threats on Embedded Systems

What is the current state of malware and cyber threats on embedded systems?