Accessibility Information

Users of assistive technologies such as screen readers should use the following link to activate Accessibility Mode before continuing: Learn more and Activate accessibility mode.

Technical Exploitation Support

Solicitation Number: TES2013
Agency: Other Defense Agencies
Office: Defense Intelligence Agency
Location: AE-2C - DODIIS Support Division
  • Print
Sources Sought
Added: Dec 12, 2012 3:56 pm

This announcement constitutes a Sources Sought, Request for Information (RFI) ONLY. The Virginia Contracting Activity (VaCA) solely for information, issues this RFI for planning purposes; it does not constitute a formal solicitation, Request for Proposal (RFP) or a promise to issue a formal solicitation or RFP. This RFI does not commit the Government to contract for any supply or service. VaCA is not seeking proposals at this time. Responders are advised that the U.S. Government will not pay for any cost incurred in response to this RFI. All costs associated with responding to this RFI will be solely at the interested parties’ expense. Not responding to this RFI does not preclude participation in any future solicitation or RFP. The following information is provided to assist Market Research of industry to identify sources of services that meet the Government’s requirements. In the event of a formal solicitation announcement, it will be issued via Federal Business Opportunities ( It is the responsibility of potential offerors to monitor the website for any information that may pertain to this RFI.

The information provided in this RFI is subject to change and is not binding on the Government.

1) Description:

VaCA is seeking to identify qualified sources capable of performing some or all of the following functions:

The Technical Exploitation Program requires contractor support to enhance its technical collection and exploitation in: triage and automation, advanced technical exploitation of digital media, advanced areas of mobile forensics, software reverse engineering, and hardware exploitation, reverse engineering, and mobile applications development & engineering. Technical Exploitation operational activities include collection, transmission, prioritization, analysis, and dissemination of collected/captured materiel, and advanced technical exploitation tools application, configuration support, and training functions to units worldwide.

Support activities for continued program management, operation, and further development of program services to provide advanced technical exploitation support and related intelligence operations to include:

Technical Exploitation

a) Automation/Triage/Deployable: Provides targeted digital forensics exploitation and analysis of digital media. Provides automation support to enable rapid triage of captured/seized media. Provides deployable personnel to contingency operations around the world.   Personnel must meet physical deployment criteria set by geographic combatant commands.

b) Software Reverse Engineering: Provides software and application reverse engineering support that includes deep analysis of malicious code/executables found in DOMEX media.

c)Advanced Exploitation support: Provides advanced exploitation support in the areas of steganography, advanced computer forensics, network forensics, memory analysis, anti-forensic detection, incident response, RAID analysis, and other advanced topics.

d) Hardware exploitation and reverse engineering: Provides deep hardware exploitation of complex media with storage capability. Also, provide reverse engineering to discover firmware artifacts to enable exploitation of media.

e) Exploitation Technology Support: Provides technical support to maintain and build exploitation systems in Windows, Mac OS, and Linux.

Advanced Mobile Exploitation

f) Analytical Support: Provides and execute full-spectrum mobile exploitation support utilizing commercially available off-the-shelf (COTS) and Government available off-the-shelf (GOTS) tools and analyze outputs to build technical reports. Provides advanced training to elements internal and external clients.

g) Mobile Engineering Support: Provides development of custom solutions that allows exploitation of mobile devices not commonly seen or devices not supported by commercial kits or tools.

Tailored Exploitation Support

h) Analytical Support: Provides analytical products and support to collection and exploitation operations supporting customers in the field.

i) Operations Support: Provides deployable technical exploitation operations support to specific customers in the Continental United States (CONUS) and outside of CONUS (OCONUS). Provides global fly-away technical exploitation capability and tailored exploitation solutions in support of technical collection and exploitation operations.

Content Exploitation

j) Development process: Provides advanced technical solutions to exploit protected files and media.

The broad objective of this requirement is to provide exploitation capabilities and technical support services to Document and Media Exploitation (DOMEX) programs for the collection and dissemination of intelligence. This objective is completed by acquiring electronic media devices; conduct screening and exploitation of these devices, in addition to translate, analyze, and report on the information/intelligence derived from these devices. Finally reports must be created and database records ingested into local and national databases; both and made readily available to analysts from the tactical to national levels.

In short, Technical Exploitation has the following primary roles in the pursuit of its mission of collection, exploitation, reporting/dissemination and education/training of technical capabilities: 

a) Provide technical and management support to all facets of this initiative.

b) Provide support to the development of technical exploitation activities.

c) Provide support to the Media Exploitation Division with contractors that have the requisite technical exploitation knowledge, skills, abilities, and technical experience to support this intelligence enabler.

d) Provide and implement a technical media exploitation education and training program that supports the development of an enduring capability across all echelons.

e) Provide and implement technical solutions to expedite the capture, screening, and exploitation of capture/collected materials; identify and document requirements.

f) Provide and support the development of tactics, techniques and procedures that ensure a standardized technical exploitation process.

g) Provide support to Staff elements to ensure technical exploitation is effectively integrated into the intelligence system and able to support operations within that specific theater.


2) Requested Information:

Prospective sources, possessing the qualifications, capability, and experience to respond to this RFI, in part or in whole, are invited to submit documentation (no more than five  pages all-inclusive, Times New Roman style, and 12 point font) providing a concise narrative of current capabilities to meet the requirements as detailed above under Section 1 and outlining the following items:

a) Company information, which includes point of contact, address, type of company, size and level of facility clearance, CAGE Code, and DUNS number;

b) Description of experience in the field of advanced technical exploitation and reverse engineering;

c) Research, development, and other past work to improve technical exploitation and reverse engineering programs;

d) Description of experience operating and maintaining technical exploitation and reverse engineering programs;

e) Research and past work performed developing protocols, procedures, test plans and training materials;

f) Description of technical and managerial capabilities to assess current technologies, design and develop prototypes, verify/test prototypes and provide training/materials to end users;

g) Description of the quality control and quality assurance processes and procedures implemented to ensure reproducible results;

h) Description of labor categories of current and future staff/personnel to support the general requirements, with commercial pricing details or GSA/GWAC rates, categories, descriptions, and contract reference information;

i)  Is your interest in this area as a prime or sub-contractor?

j) Describe your in-house partnering ability with subcontractors;

k) How much transition time would your company require to perform all requirements of this program?

l) Are you currently registered in the Central Contractor Registry (CCR), Online Representations and Certifications Application (ORCA), and System for Award Management (SAM)?

3) Submission Instructions:

Interested parties are requested to respond to this RFI inclusive of answers to the requested information listed above.

a) The associated North American Industry Classification System (NAICS) code is 541690 (Other Scientific and Technical Consulting Services). Based on this NAICS code what is your size status?

b) VaCA reserves the right to review late submissions but makes no guarantee to the order of or possibility for review of late submissions. Responses shall be submitted via email ONLY to Mr. Quentin McCoy, Contracting Officer at

c) Responses shall be in Microsoft Word compatible format (no more than five  pages all-inclusive, Times New Roman style, and 12 point font) and are due on or before 3:00 PM (local Eastern Time), 04 January 2013.

d) Proprietary information, if any, should be minimized and MUST BE CLEARLY MARKED and completely separated. Be advised that no submissions will be returned. All submissions will be disposed of in accordance with the instructions provided in prospective sources response. If no instructions are listed, the VaCA will dispose of at organizational discretion.

e) Responses to this RFI may be evaluated by Non-Government technical experts. The program office has contracted for various Non-Government, scientific, engineering, technical, and administrative staff support services, some of which require contractors to obtain access to proprietary information submitted by other contractors. All Non-Government support personnel have signed and are bound by the appropriate non-disclosure agreements (NDAs) and organizational conflict of interest (OCI) statements. The Government may also use these selected support contractor personnel as technical advisors in the evaluation of responses. Non-Government staff support personnel will not have access to proposals labeled by the offerors as Government Access Only. Non-Government staff support contractors in an administrative role will only handle proposals labeled by the offerors for "Administrative Purposes Only."

f) Prospective offerors are advised that only a Government Contracting Officer is legally authorized to commit the Government.

4) Special Considerations:

Performance requires contractor personnel performing under this contract to possess a final TOP SECRET clearance with a Single Scope Background Investigation (SSBI), and shall be eligible for indoctrination to the Sensitive Compartmented Information (SCI) level. Some positions may require a Counter Intelligence (CI) Polygraph examination if additional accesses are required. The contractor is responsible for obtaining all necessary security clearances for contractor personnel.


Please consult the list of document viewers if you cannot open a file.


Other (Draft RFPs/RFIs, Responses to Questions, etc..)
Posted Date:
December 12, 2012
Description: RFI
Wahington, DC

United States
Quentin McCoy,
Contracting Officer