Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
US Air Force adopting Cass Sunstein Cyber-proposals
#1
From the FedBizOpps.gov site

Persona Management Software.

Solicitation Number: RTB220610
Agency: Department of the Air Force
Office: Air Mobility Command
Location: 6th Contracting Squadron


Quote:
Solicitation Number:
RTB220610

Notice Type:
Sources Sought


Synopsis:
Added: Jun 22, 2010 1:42 pm Modified: Jun 22, 2010 2:07 pmTrack Changes
0001- Online Persona Management Service. 50 User Licenses, 10 Personas per user.
Software will allow 10 personas per user, replete with background , history, supporting details, and cyber presences that are technically, culturally and geographacilly consistent. Individual applications will enable an operator to exercise a number of different online persons from the same workstation and without fear of being discovered by sophisticated adversaries. Personas must be able to appear to originate in nearly any part of the world and can interact through conventional online services and social media platforms. The service includes a user friendly application environment to maximize the user's situational awareness by displaying real-time local information.

0002- Secure Virtual Private Network (VPN). 1 each
VPN provides the ability for users to daily and automatically obtain randomly selected
IP addresses through which they can access the internet. The daily rotation of
the user s IP address prevents compromise during observation of likely or
targeted web sites or services, while hiding the existence of the operation. In
addition, may provide traffic mixing, blending the user s traffic with traffic from
multitudes of users from outside the organization. This traffic blending provides
excellent cover and powerful deniability. Anonymizer Enterprise Chameleon or equal

0003- Static IP Address Management. 50 each
Licence protects the identity of government agencies and enterprise
organizations. Enables organizations to manage their persistent online personas
by assigning static IP addresses to each persona. Individuals can perform
static impersonations, which allow them to look like the same person over time.
Also allows organizations that frequent same site/service often to easily switch IP
addresses to look like ordinary users as opposed to one organization. Anonymizer IP Mapper License or equal

0004- Virtual Private Servers, CONUS. 1 each
Provides CONUS or OCONUS points of presence locations that are setup for
each customer based on the geographic area of operations the customer is
operating within and which allow a customer?s online persona(s) to appear to
originate from. Ability to provide virtual private servers that are procured using
commercial hosting centers around the world and which are established
anonymously. Once procured, the geosite is incorporated into the network and
integrated within the customers environment and ready for use by the customer.
Unless specifically designated as shared, locations are dedicated for use by
each customer and never shared among other customers. Anonymizer Annual Dedicated CONUS Light Geosite or equal

0005- Virtual Private Servers, OCONUS. 8 Each
Provides CONUS or OCONUS points of presence locations that are setup for
each customer based on the geographic area of operations the customer is
operating within and which allow a customer?s online persona(s) to appear to
originate from. Ability to provide virtual private servers that are procured using
commercial hosting centers around the world and which are established
anonymously. Once procured, the geosite is incorporated into the network and
integrated within the customers environment and ready for use by the customer.
Unless specifically designated as shared, locations are dedicated for use by
each customer and never shared among other customers. Anonymizer Annual Dedicated OCONUS Light Geosite or equal

0006- Remote Access Secure Virtual Private Network. 1 each
Secure Operating Environment provides a reliable and protected computing
environment from which to stage and conduct operations. Every session uses a
clean Virtual Machine (VM) image. The solution is accessed through sets of
Virtual Private Network (VPN) devices located at each Customer facility. The
fully-managed VDI (Virtual Desktop Infrastructure) is an environment that allows
users remote access from their desktop into a VM. Upon session termination,
the VM is deleted and any virus, worm, or malicious software that the user inadvertently downloaded is destroyed. Anonymizer Virtual Desktop Infrastructure (VDI) Solution or equal.


Contracting Office Address:
2606 Brown Pelican Ave.
MacDill AFB, Florida 33621-5000
United States


Place of Performance:
Performance will be at MacDIll AFB, Kabul, Afghanistan and Baghdad, Iraq.
MacDill AFB , Florida 33679
United States


Primary Point of Contact.:
Russell Beasley,
Contracting Officer
russell.beasley-02@macdill.af.mil
Phone: (813) 828-4729
Fax: (813) 828-5111
Scary stuff eh? They're clearly getting serious about flooding 'Target Sites' with disinfo-agents. I wonder what the pay-rate is?
Peter Presland

".....there is something far worse than Nazism, and that is the hubris of the Anglo-American fraternities, whose routine is to incite indigenous monsters to war, and steer the pandemonium to further their imperial aims"
Guido Preparata. Preface to 'Conjuring Hitler'[size=12][size=12]
"Never believe anything until it has been officially denied"
Claud Cockburn

[/SIZE][/SIZE]
Reply
#2
Probably minimum wage and reduced benefits but I bet they'll have plenty of takers due to the economy they are creating there. pcguru
"The philosophers have only interpreted the world, in various ways. The point, however, is to change it." Karl Marx

"He would, wouldn't he?" Mandy Rice-Davies. When asked in court whether she knew that Lord Astor had denied having sex with her.

“I think it would be a good idea” Ghandi, when asked about Western Civilisation.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  British Army "Chindit" Force to Psychowar on Facebook and Twitter David Guyatt 0 3,059 31-01-2015, 10:39 AM
Last Post: David Guyatt
  Turkey's Killing Machine: The Contra-Guerrilla Force Tracy Riddle 0 2,555 04-06-2014, 01:18 AM
Last Post: Tracy Riddle
  Inside the Pentagon's cyber war games Ed Jewett 0 2,387 14-10-2010, 04:34 AM
Last Post: Ed Jewett
  Coming To A Police Force, Private 'Security' or Stormtroopers near you soon! Peter Lemkin 11 7,094 03-09-2010, 07:38 PM
Last Post: Peter Lemkin
  Task Force 7 from Tosh Magda Hassan 2 4,108 13-06-2010, 04:58 PM
Last Post: Peter Lemkin
  Cyber attacks against Australia 'will continue' David Guyatt 1 2,912 13-02-2010, 02:24 PM
Last Post: Peter Presland
  Life In The Time Of False-Flag Operations: This One Cyber-Terror. Peter Lemkin 3 6,476 15-08-2009, 04:24 AM
Last Post: Carsten Wiethoff
  US army field manual Special Operations Force - Unconventional Warfare Magda Hassan 1 5,536 20-12-2008, 02:36 PM
Last Post: Magda Hassan

Forum Jump:


Users browsing this thread: 1 Guest(s)