Technical Inquiries (TIs)

The core function of CSIAC is to answer technical questions using our in-house technical personnel, vast DoD information resources, and our extensive network of subject matter experts (SMEs). CSIAC has technical staff available to conduct technical research in order to give you a head start on your analysis or study in any of our technical focus areas. We offer a free 4-hour TI research service or, for slightly larger research efforts, we offer an extended technical inquiry (ETI) service.

Technical Inquiry Features

Our TIs include the following to help you with your research:

magnifying glass
Literature Searches

A curated bibliography given a technical topic

Document
Document Requests

Dissemination of technical reports to authorized users

User Icon
SME Referrals

Contacts and connections with relevant, technical SMEs

business documents on office table with smart phone and digital

Free Technical Inquiry Services

CSIAC’s free TI service offers 4 hours of free research per inquiry on any topic within our technical focus areas. Typical TI efforts may include answering technical questions, literature searches, document requests, or referrals to SMEs. Completed responses are compiled and delivered to the inquirer in less than 10 business days. Registered users can submit TIs online through the provided form or by phone.

Extended Technical Inquiry (ETI) Services

ETIs are externally funded research efforts that go slightly beyond 4 research hours. ETIs require between 5 and 160 technical hours of research, with a $50K maximum ceiling and period of performance up to 2 months.

Relaxed informal IT business startup company team meeting.

Ready to submit a technical inquiry?

Receive free information research on technical topics

Notable Inquiries

Notable TIs are findings and/or summaries of responses to the most recent and impactful technical inquiries submitted by CSIAC members under our 4 free hours of information research support.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.

Challenges in Applying the Law of Armed Conflict to Cyberwar

Given the United States-Russian bilateral recommendation from the 47th Munich Security Conference, what are some of the foreseen challenges in applying the law of armed conflict to cyberwar?

Commercially Available Firewalls

Which firewalls are currently available commercially?

Commercially Available Vulnerability Assessment Tools

Which vulnerability assessment tools are currently commercially available?

Current Malware Threats and Mitigation

What are the current malware threats we are facing, and how can we mitigate against them?