Army seeks OSINT, social media exploitation
On October 4, the U.S. Army posted an RFI for Social Media/Open-source intelligence (OSINT) Exploitation. Responses are due no later than Thursday, 10 October 2019 at 10:00 AM EST.
This is a Request for Information (RFI) from the United States (U.S.) Army Contracting Command (ACC) – New Jersey (NJ) located at Fort Dix. ACC-NJ is surveying the market for potential contractors capable of satisfying the subject requirement for Social Media/Open-source intelligence (OSINT) Exploitation in support of the US Army Criminal Investigation Command (CIDC). The period of performance for this requirement will be for one 12 month base year plus two 12 month option years.
The contractor shall provide an Internet based service to provide worldwide web-based access to reliable social media threat analytics service, also referred to as a Softwareas-a-Service (SaaS) solution required for use in criminal investigations and the other missions conducted by the CIDC. Administration of the service will be done from Headquarters, USACIDC, Quantico, VA, with users located throughout the US and overseas where there is a USACIDC presence. This SaaS solution shall provide a secure and legal social media threat detection and risk mitigation. The SaaS solution shall be software based with subscription service to support organizations’ ability to quickly unlock the value of social media and big data to assess risk, respond to threats, and discover actionable intelligence. The specifications are as follows:
1. There should be the capability to set up unlimited individual user accounts with unlimited queries available -The SaaS must be web based. No hardware or software to install.
2. The software and service must cover all major social networking services. Understanding that technology is always changing, the service should search against all social media that allows public access (i.e., Twitter, Facebook, Instagram, Google+, etc.)
3. The service will be capable of conducting queries by various methods, including but not limited to keyword, location-based, Meta data queries.
4. Vendor shall state whether or not they will be retaining the data or if the vendor will allow the CIDC to retain the data.
5. The software and service must have the capability to download the results of the query in a format that will allow for visualization/link analysis (.csv).
6. There shall be the capability of visualization and/or link analysis tool provided to facilitate analysis of the data. This function shall also allow for the integration of the CIDC’s internal data.
7. The software and service should allow for the search of archived data gathered as a result of established queries/on-going collection efforts.
8. The software and service should have the capability for the customer administrators to establish user accounts and set user permissions (role-based controls). The administrators should also have the ability to conduct audits of users search histories and current collection efforts.
9. The vendor shall provide a training program that teaches attendees on how to effectively utilize the SaaS to exploit social media sources. Training will be provided on-site or through an appropriate Internet platform.
10.Technical support must be available from 0800 to 2000, Monday-Friday EST.
Full information is available here.