Active Technical Inquiries

Active technical inquiries are designed to host collaborative discussions to help gather information in response to technical inquiries submitted by those in the DoD research and engineering community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.

completed

What state-of-the-art COTS/GOTS communication surveillance kits are capable of noise limiting/filtering at the microphone portion of the device?

The Cybersecurity and Information Systems Information Analysis Center (CSIAC) is seeking to identify information on advanced noise canceling headsets or surveillance kit (earphone and microphone) technologies that can be used for peer-to-peer communication and are…

completed

What relational database applications are authorized for use on systems at the Secret/Top Secret classification levels?

The Cybersecurity and Information Systems Information Analysis Center (CSIAC) is seeking to identify examples of relational database applications authorized for use at the Secret/Top Secret classification levels. These databases should be capable of handling SQL-92,…

completed

What approved project management/CRM software is available for DoD systems within an IL6 boundary?

The Cybersecurity and Information Systems Information Analysis Center (CSIAC) is seeking to identify examples of project management/customer relationship management (CRM) software that has been reviewed from a security standpoint and authorized to operate on U.S….

completed

What are the key technical considerations and best practices in integrating APIs in DoD Systems?

The Cybersecurity and Information Systems Information Analysis Center (CSIAC) is seeking to identify specific examples of U.S. Department of Defense (DoD) application programming interface (API) integration, common approaches used by DoD organizations in enabling data…

completed

What AI/ML-assisted RPA, IDP, or other software, tools, or applications can handle unstructured data to automate the evaluation process of government forms for completeness and accuracy?

The Cybersecurity and Information Systems Information Analysis Center (CSIAC) is seeking commercial-off-the-shelf or government-off-the-shelf artificial intelligence (AI)/machine learning (ML)-assisted robotic process automation (RPA), intelligent document processing (IDP), or other software, tools, or applications that can…

completed

What government-owned artificial intelligence/machine-learning (AI/ML) software and tools can detect unique text and logos from a large dataset of images?

The Cybersecurity and Information Systems Information Analysis Center (CSIAC) is seeking to identify government-owned AI/ML software, applications, and tools that incorporate natural language processing, name entity recognition, optical character recognition, and computer vision to conduct…

completed

What are viable solutions for nonperson entity authentication?

The Cybersecurity and Information Systems Information Analysis Center is seeking to identify automated nonperson entity (NPE) authentication approaches, structures, or tools that provide the same level of cyber traceability as two-factor authentication within a U.S….

completed

What guidance or policies identify cybersecurity requirements for third-party-funded energy systems?

The Cybersecurity & Information Systems Information Analysis Center is seeking to identify and understand the existing U.S. Department of Defense (DoD) policies currently addressing cybersecurity requirements for third-party energy projects (e.g., energy savings performance contracts,…

completed

What is the latest optical AI technology for scanning and digitizing, and what are the risks if given to an adversary?

The Cybersecurity & Information Systems Information Analysis Center (CSIAC) is seeking optical AI technology and software that can scan and digitize various items and products for indisputable identification, authentication, and tracing. This technology would use…

completed

What COTS/GOTS Software as a Service (SaaS) data analytics solutions are available that support data capture through alternative collection methods?

The Cybersecurity & Information Systems Information Analysis Center (CSIAC) is seeking possible commercial off-the-shelf/government off-the-shelf (COTS/GOTS) SaaS data analytic solutions that support alternative data gathering methods, such as crowdsourcing and direct observation, to provide “ground…

completed

What common cloud computing environments and shared DevOps platforms are available to military branches handling classified workloads, and what are their various software factories?

CSIAC is seeking information regarding the enterprise-level common cloud computing environments currently available to the U.S. Navy, Marines, Army, and Coast Guard which support workloads processing Controlled Unclassified Information (CUI) at Impact Levels 4 and…

completed

What are possible solutions for labeling independent Zeek logs for attacks and exploits?

The Cybersecurity and Information Systems Information Analysis Center (CSIAC) is seeking possible solutions to automatically label network events/sessions based on time and IP addresses of known attacks using Zeek logs. Documentation, potential points of contact…