19-March, 2018 U.S. Army Intelligence and Security Command (INSCOM) posted a request for white papers to address their technology needs and the anticipater 2018 INSCOM Industry Day.
INSCOM executes mission command of operational intelligence and security forces; conducts and synchronizes worldwide multi-discipline and all-source intelligence and security operations; delivers linguist support and intelligence-related advanced skills training, acquisition support, logistics, communications, and other specialized capabilities in support of Army, Joint, and Coalition Commands and the U.S. Intelligence Community
Focus Areas and Requirements:
INSCOM has identified areas for which we are requesting White Papers from Industry on mature COTS solutions relevant to the following Focus Areas and requirements:
a. Machine translation capability from native language to English for use across social media mediums. Must account for slang and jargon. Must retain content normally understood by native speakers.
- Capability to collect, process, analyze and extract features from Full Motion Video (FMV). Must extract, analyze location and entity ID (Person, Place, Logos, Flags, etc.).
a. Artificial Intelligence capability for end point detection of malicious activity in real time
- Cyber intelligence capability that provides identification of malware author, controller, and source of release in real time
- Deployable infrastructure and capabilities to provide critical Cyberspace Surveillance and Reconnaissance (C-S&R), Operational Preparation of the Environment (OPE), and effects based Cyber capabilities at Echelons Corps and Below.
0003: Language Translation:
- Full spectrum language translation capability (voice to voice, voice to text, text to text, etc.) equal to or better than human ability.
0004: Cross Domain Solutions
a. Ability to run advanced analytics and machine learning across unified multi-domain data set
- Provide a capability to automatically transfer files and documents between multiple classified domains to include SAP.
0005: Collection and Communication:
- On board aircraft sensors that are smaller, more modular while increasing on-board/off board LOI3 flexibility.
- Capability for smarter airborne sensors that are able to provide a micro to macro field of view while alerting / tipping operators to relevant activity.
- Portable discrete tablet size capability, with detachable keyboard, which allows 1-2 man teams to conduct interviews, debriefings and/or interrogations while allowing ease of access to a secure network (UNCLASS and SECRET) through tunneling in from existing regional communications networks. Standard load of Microsoft products, camera, regional map software download capability, SSD HD, reporting templates and VoIP capable.
- Light weight (under 30lbs) small form factor, low profile SATCOM and/or non SATCOM, long-haul, high data, secure communications system for operations in austere environments. Potential solutions for non SATCOM are HF or the capability to securely tunnel through available communications such as WiFi, cellular and landline.
- Collection system for Force Protection which uses unclassified, open source signatures to identify and geo-locate WIFI/Bluetooth or next generation of wireless Internet of Things (IOT).
- Multiple sensors that can be unattended or soldier/vehicle mounted which records time / location / type of RF energy.
- Capability for an EMARSS integrated multi-function display with a COMSEC port capable of loading mapping date. Display should be able to be turned off/on with a simple switch allowing a classified overlay in parallel with FAA/ICOA/Jeppesen mapping. System needs capability to be zeroized after every flight and will be reloaded during pre-flight operations.
- COTS capability for Battle Damage Assessment (ingest, query, retrieve and disseminate). Must be able to operate from fixed as well as austere locations. Must be able to ingest USMTF, operate with DCGS-A, with capability for releasibility and auto translation to allies.
- Data Science capability that provides the technologies and methodologies necessary to execute data mining, statistical models, predictive analytics, optimization, risk analysis and data visualization.
- Capability to pull relevant citation information from message handling databases, such as M3, Palintir, HOTR and possibly Chrome into the endnotes section of Microsoft products.
- Capability for an automated identity resolution tool for security vetting managers, which is able to aggregate associated data for one persona, located across disparate law enforcement, open source, and classified holdings.
Submissions are due 31-May, 2018.