Receive free information research on technical topics
Technical Inquiries (TIs)
The core function of CSIAC is to answer technical questions using our in-house technical personnel, vast DoD information resources, and our extensive network of subject matter experts (SMEs). CSIAC has technical staff available to conduct technical research in order to give you a head start on your analysis or study in any of our technical focus areas. We offer a free 4-hour TI research service or, for slightly larger research efforts, we offer an extended technical inquiry (ETI) service.
Technical Inquiry Features
Our TIs include the following to help you with your research:

Free Technical Inquiry Services
CSIAC’s free TI service offers 4 hours of free research per inquiry on any topic within our technical focus areas. Typical TI efforts may include answering technical questions, literature searches, document requests, or referrals to SMEs. Completed responses are compiled and delivered to the inquirer in less than 10 business days. Registered users can submit TIs online through the provided form or by phone.
Extended Technical Inquiry (ETI) Services
ETIs are externally funded research efforts that go slightly beyond 4 research hours. ETIs require between 5 and 160 technical hours of research, with a $50K maximum ceiling and period of performance up to 2 months.

Ready to submit a technical inquiry?
Notable Technical Inquiries
Notable TIs are findings and/or summaries of responses to the most recent and impactful technical inquiries submitted by CSIAC members under our 4 free hours of information research support.
Overarching Wireless Technology Programs for the U.S. Air Force
Is there an overarching Wi-Fi program for the U.S. Air Force?
Artificial Intelligence/Machine Learning Transition Timetable
How fast do artificial intelligence (AI)/machine-learning (ML) technologies transition from paper to fielded capability for the People’s Republic of China (PRC)?
Microelectronics Overview
What is the current state of the art in microelectronics and its impact on the DoD?
The State of 5G Technology and Applications to the U.S. Department of Defense and Military
What is the state of 5G technology (and beyond) as it applies to the U.S. Department of Defense and military?
Banking Security Framework
What cyber risk assessment framework best fits the banking sector?
Security-Conscious Password Behavior From the End-User’s Perspective
How do end-users perceive their own password security practices, and how does this behavior differ from acceptable standards?
Example Technical Inquiries
Example TIs are samples of the wide range of technical inquiries submitted by CSIAC members under our 4 free hours of information research support.
Common Data Models
What common data models exist that allow merging and generating data from different information repositories?
Risk Management Framework Requirements
Can you provide a checklist of requirements that DoD agencies use to set up an Authority to Connect (ATC), Authority to Test (ATT), or Authority to Proceed (ATP)?
The State of Today’s Cyber Ranges
What is the state of cyber technical ranges, and what current software tools are used at each range?
IPv6 Overview for Senior Leaders
Can you provide an overview to inform leadership on what IPv6 really is, its implications, and where tactical/strategic issues might arise?
Chiplet-based Architectures
What are the latest advances and applications of newer microelectronics architectures and applications in industry, DoD, and academia with specific focus on Chiplet-based architectures?
Solutions for Labeling Independent Zeek Logs for Attacks and Exploits
Has anyone ever labeled individual records in Zeek logs for attacks/exploits? If so, how did they do it?