CINA Open RFP 2020-21CINA Request for White Papers
RFP Last Updated: June 30, 2020
Proposals accepted anytime through June 30, 2021
Submit proposals through EasyChair: CINA Open RFP 2020-21
Download full RFP document (incl. submission guidelines)
CINA is seeking white papers presenting research ideas intended to address questions and challenges that CINA, DHS, and/or its federal partners are currently facing, or are expected to be facing in the near future. This is an open, rolling RFP. Submissions will be accepted at any time during the RFP open period (June 2020 – June 2021). CINA leadership and DHS center managers and sponsors will review white paper submissions as they are received to identify those for which a detailed statement of work will be requested. The process typically takes about eight weeks from white paper receipt to SOW request. A formal request for full SOW development does not guarantee a grant award. Projects typically range from 6-24 months in duration (pre-transition) and have funding levels from $50k to $250k per year.
Current Topics of Interest
Topics of interest may change over the open period for this RFP. The latest version of this RFP and its topics can be found at https://cina.gmu.edu/rfps/.
- Content processing/extraction at the edge/sensor
Sensors acquire orders of magnitude more data than can be transmitted to a central location for processing. Algorithms and methods are sought to address this problem. Approaches may include processing at the sensor to reduce volume and identify critical data or create derivative data, distributed processing to include fog computing, and hybrid approaches. Imagery, video, audio, and other sensor data are all of interest.
- Digital video processing
Investigators are overwhelmed with the volume of digital video data available. Algorithms and methods are sought to aid in entity extraction, activity classification, contraband detection, and extraction and representation of linkable elements. Of particular interest are approaches which permit the identification of an arbitrary item of interest (e.g., analyst provides an image of a particular weapon or electronic component and the approach finds all similar occurrences), or approaches which find general classes of objects (e.g., all guns). Proposed approaches should provide at least one order of magnitude improvement over current methods (i.e., an analyst using the proposed solution should be able to effectively review 10 times the video footage compared to current methods).
- Traditional forensics
Of interest are methods which leverage existing traditional forensics to extract evidence characteristics which may be linked with other data sources. For example, the ability to perform chemical analysis on a substance or product and identify the sources and routes of its component elements, which may then be linked with geospatial, open source, supply chain, financial, or other data.
- Infer criminal network flow and structure from indirect observables
Of interest are methods to infer criminal network structures, flows, and operations from indirect observables. For example, past work has used illicit drug prices in different cities to infer drug flows (higher costs may be due to transportation expenses which implies drug flow from lower cost to higher cost cities). All criminal activity is of interest, and sources of indirect observables may be open source, proxy, or synthetic data. Natural, randomized, and controlled experiments are all of interest.
- Automate network creation from data
Of interest are approaches to integrate and automate analysis of entities and linkable elements extracted from automated text and OCR processing, speech transcription, call record data, financial record data, video, imagery, audio, geospatial data, and other sources. Approaches are presumed to operate on the extracted or derived content from these sources (methods for such extraction are separate topics).
- Develop early and near real-time warning indicators for human smuggling activity
Of interest are algorithms and methods to derive early and near real-time warning indicators from financial data (especially money service businesses), second-order indicators (e.g., ER visits by undocumented individuals, media reports of unusual activity in warehouses, homes, etc.), and other data in the context of the logistics, communications, supply chains, and financial activity around human smuggling activities. Also of interest are human identification technologies to facilitate kinship identification and the incorporation of genomic data in the warning indicator algorithms and methods above.
- De-anonymizing network connections
Of interest are methods to de-anonymize network connections such as TOR, Private VPNs, and similar. Approaches may be passive (analyze available data) or active (generate traffic to facilitate the de-anonymization).
- Vehicle forensics: extraction and sanitization
Of interest are approaches to (a) extract potentially useful data from vehicle digital systems (infotainment and otherwise), and (b) sanitize vehicle digital systems (primarily infotainment). The first item is to collect evidence, and of particular interest are approaches which work across multiple platforms and via native interfaces. The second item is to support law enforcement operations where agents may use a vehicle and have reason to remove their digital exhaust from that vehicle.
- Cybercrime investigations and other training
Of interest are proposals to develop training materials specific to cybercrime investigations for federal law enforcement officers. Proposed training is expected to be delivered in a face-to-face format, should go beyond an introductory level and include practical skills and examples, and should include hands-on components. Training may include open source software or tools as well as software or tools known to be used by the federal law enforcement community. Training should be designed to be delivered over 3-5 days, typically contiguous.
- Models and signatures of specific criminal operations
Of interest are (a) algorithms and methods to develop models of criminal operations from data, and (b) signatures of specific criminal operations. The models in the first item should reflect and compensate for the inherent uncertainty in this domain (partial data from dynamic operations) while also allowing for network analytics (e.g., what are the critical nodes and flows), speculative action (what-if), and data gap analysis (e.g., what additional data would strengthen the model). The models are expected to be dynamic and allow for ingest of new data in near real time. The signatures of the second item are expected to be knowledge products relating to a specific criminal operation. Approaches for this second item may be (i) case studies to include identification of warning signs that may be applied to current operations, or (ii) development of a reusable method or process which can be subsequently applied to different data sources/sets in order to extract signatures unique to that data and criminal operation. Models and signatures may include suppliers and/or consumers in the criminal operation, and data sources for both items may be open source, proxy, or synthetic data.
- Systematic reviews
Submissions under this topic will propose a systematic review of DHS law enforcement operations to identify evidence gaps and operational needs. The output of this topic will be a report detailing the data collected, analysis, and findings/recommendations.
- Effect of COVID-19 and response on criminal organizations, criminal activity, and law enforcement
The CINA Science Committee produced a preliminary paper (May 2020) addressing the effects of the COVID-19 pandemic and response on criminal organizations and activity, arguing that criminal organizations changed in response to the pandemic. The paper also suggested ways that law enforcement might adapt to these changes and speculated that unanticipated opportunities may arise from these changes. This topic requests a more thorough and rigorous collection and examination of available data and analysis to validate or refute the observations, conclusions, and speculation in the preliminary paper, to identify any criminal organization and activity changes not yet identified, and to suggest law enforcement adaptations and actions to mitigate the changing threat and exploit potential opportunities.
- Other
The Center will also consider submissions which do not address a topic listed above but do address a problem, challenge, gap, or need related to CINA’s mission to support the detection, analysis, monitoring, and dismantling of criminal networks and activities.