The vendor required to provide social media monitoring services to minimizing digital threats to elections through a variety of defense, monitoring and response processes and tools.
- Digital risk management and mis-, dis-, mal- (MDM) mitigation
• Offeror must demonstrate experience AND capability to rapidly detect, alert, and respond to social media and digital attack surface threats related to board and state of elections.
- Requirement:
• Multimodal deepfake detection: provide comprehensive analysis of multimodal deepfakes, including detection of voice cloning and video manipulation, supported by explainable AI (XAI) reports.
• Coordinated inauthentic behavior (CIB) identification: utilize advanced ai-driven methodologies to detect distributed, low-signal inauthentic activity and 'astroturfing' campaigns.
• Authenticity verification: implementation of blockchain-based verification (B-DAVF), c2pa and content credentials, or similar "root of trust" frameworks to verify the authenticity and edit history of digital assets.
• Board domain monitoring, reporting, and protection, including, but not limited to:
o Sufficient API and keyword queries
o Dedicated analysis and correlation leveraging ai-powered agents or workflows for automated mitigation and remediation.
• Board official and executive risk protection (minimum of 10)
• Web monitoring, alerting and protection, including, but not limited to:
o Surface web
o Dark web and deep web
o App store
o Sufficient takedowns for these types of risks and attacks (minimum of 5)
• Web and social media monitoring and defense:
o Must include twitter, Facebook, Instagram, LinkedIn, YouTube, and Tiktok (specifically monitoring for video-first misinformation and algorithmic manipulation).
o Sufficient social media takedowns (unlimited preferred)
o Pre-bunking: the tool should offer actionable insights that support the creation of 'pre-bunking' content to build audience resilience.
• Unified security integration:
o Integration with existing board security workflows
o The vendor should demonstrate a history of collaborative threat intelligence sharing and the technical capability to ingest external threat feeds.
• Operational requirements
o Authenticated defense for board social media accounts (minimum 6): dedicated analyst (or equivalent)
o Access for a minimum of 5 users.
o Easy-to-use dashboard and reporting targeted at both technical and executive users.
• The offeror’s work with 4 recent clients to show experience (government and election experience preferred).
- Contract Period/Term: 1 year