You are here

Next Generation Identity Management Technologies / Tools

Award Information
Agency: Department of Defense
Branch: Special Operations Command
Contract: D17PC00001
Agency Tracking Number: S161-003-0067
Amount: $149,623.00
Phase: Phase I
Program: SBIR
Solicitation Topic Code: SOCOM16-003
Solicitation Number: 2016.1
Timeline
Solicitation Year: 2016
Award Year: 2017
Award Start Date (Proposal Award Date): 2016-10-25
Award End Date (Contract End Date): 2017-04-30
Small Business Information
626 Admiral Drive
Annapolis, MD 21401
United States
DUNS: 199441481
HUBZone Owned: No
Woman Owned: No
Socially and Economically Disadvantaged: No
Principal Investigator
 Dr. Kojo Linder
 Sr. Scientist
 (410) 224-0951
 klinder@orbistechnologies.com
Business Contact
 Katie McClung
Phone: (443) 569-6702
Email: kmcclung@orbistechnologies.com
Research Institution
N/A
Abstract

The objective of Global Watch is to design, develop and demonstrate an affordable next generation high performance, scalable identity management solution that provides automated, Big Data analysis tools to enable rapid, concise understanding of adversaries knowledge of USSOCOM operators and assets.The Global Watch solution embeds the perspective of an exploitation analyst by creating analytics that pull together data from open source Social Media aggregators, public information and open source Dark Web data to create a comprehensive Identity database.Advanced Big Data analytics aggregate and exploit the information from various sources so that they can be displayed via a web based open source business intelligence platform.Collectively, the analytics provide a comprehensive view of the USSOCOM personnel.Specifically, by identifying the people and places with whom USSOCOM members associate (via their social media profiles), the Global Watch system will provide a Digital Footprint Vulnerability Score[1] that qualitatively examines and assigns color coordinated ranks to an individuals online presence to establish how much information is available for an enemy to exploit. The qualitative assessment of the threat is derived from the Dark Web threat monitoring where terrorist openly discuss Tactics, Techniques, and Procedures (TTPs).

* Information listed above is at the time of submission. *

US Flag An Official Website of the United States Government