The contractor shall provide internet investigative, research, and analytical services to conduct
assessments of people, profiles, locations, and/or infrastructure that leverages the most advanced
publicly and commercially available tools, data, and techniques in order to proactively analyze data
aggregation, conduct threat monitoring, and determine vulnerabilities of online exposure and ubiquitous
technical surveillance. These services would minimally include collection and analysis of Publicly
Available / Commercially Available Information, vulnerability/threat assessment and monitoring
services, quality control / quality assurance, report deliverables, and debriefing with assigned analysts or
program managers.
The contractor will utilize both conventional online queries and advanced PAI/CAI tools,
databases, capabilities, research & investigative techniques on any information / selectors provided by
ACIC. The contractor then utilizes any findings to piece together both public and hidden relationships
between these selectors and their connections to any other people, places, or activities and evaluating /
assessing how these connections may impose security risks / vulnerabilities to ACIC.
** See PWS attached.