Army posts cyber intel apps RFI
On October 4, the U.S. Army posted an RFI for Intelligence Applications Support to Cyber. Responses to this RFI are due no later than 5:00 p.m. Eastern on October 25.
This is a Request for Information (RFI), as defined in Federal Acquisition Regulation (FAR) 15.201(e). Army Contracting Command – Aberdeen Proving Ground (ACC-APG) in support of the Combat Capabilities Development Center (CCDC) Command, Control, Computers, Communications, Cyber, Intelligence, Surveillance and Reconnaissance (C5ISR) Center Aberdeen Proving Ground (APG), is conducting market research to identify commercial items to satisfy Intelligence Applications capabilities as defined in section 2 below with additional supporting Draft Requirements Checklist available upon request. The Government invites all business and academic organizations to respond to this RFI notice.
Cyber intelligence analysis is multifaceted operation and it relies on close collaboration between all areas of cyberspace operations. The Intelligence Application will provide an analysis capability that will identify, monitor and track the cyber threats, and it will provide the predictive analysis to determine the levels of the threats and their future actions. The Intelligence Application will need to provide globally accessible, collaborative cyber-space data that incorporates a multitude of cyber related information sources into a dedicated cyber ontology within single topic-centered database.
Globally distributed analysts will update information within the database and those updates will be tagged to provide data history over time. The Intelligence Application shall provide tools for cyber data ingest, management, and access to support the Cyber Electromagnetic (CEM) Cell in both Defensive Cyber Operations (DCO) and Offensive Cyber Operations (OCO). The data shall be filterable and selectable to support geographical metadata and built upon an ontology supporting the cyberspace domain. The Intelligence Application shall provide the capability to integrate cyber intelligence data, allow designated workflows and processes, and provide users the capability to enrich data/knowledge within a central repository for storing or referencing knowledge.
Full information is available here.