
HAWK, Request for Information (RFI)
​​
Multi‑Domain Intelligence & Security Platform (SEDENA/SEMAR/GN/CNI)
​
-
SOLUTION: ‘HAWK’ (Mobile, Autonomous, PnP Modules, AI Compatible, Surveillance & Analysis Security Platform) / (Disruptive Technology) / DUAL USE DEEPTECH
-
DEPLOYMENT MODEL (On‑prem / Sovereign Cloud / Hybrid):
a) ANSWER: Client-Dependent: Any of the three configurations may be implemented.
1) Mission Fit & Outcomes:
-
MISSION ALIGNMENT: Supports counter‑huachicol (stolen fuel), convoy/site protection, CI defence, counter‑kidnapping, cyber defence of govt networks.
a) ANSWER: HAWK is positioned for homeland/security, mobile autonomous surveillance, asset protection and infrastructure protection (pipeline, power, border, city).
b) EVIDENCE: System Design Topology.
-
OPERATIONAL IMPACT (3/6/12 months): KPIs (e.g., % reduction in taps, interdiction lead time, cyber MTTR).
a) ANSWER: Autonomous monitoring / edge analytics can reduce detection/interdiction timelines
b) EVIDENCE: Platform is modular, AI/edge focused and built for continuous surveillance
c) Risk/Notes: KPIs dependent on the Client equipment selected for integration.
-
JOINT OPs SUPPORT: Common operating picture, cross‑command tasking (Army, Navy, GN), multilingual (ES‑MX).
a) ANSWER: Architected as autonomous flexible interchangeable platform for multi-system operations (open, third-party modules).
b) EVIDENCE: Open platform, third-party integration and “common” deployments
2) Intelligence Fusion & Interagency:
​
-
DATA SOURCES: ‘Native Ingest’ (SCADA/OT, EO/IR/UAV, AIS, sat imagery, OSINT/HUMINT/SIGINT summaries, financial intel).
a) ANSWER: YES — Platform designed to host/ingest a wide range of sensors and apps (EO/IR, UAV, edge sensors, OT/SCADA).
-
INTERAGENCY SHARING: PEMEX, CFE, CNI, FGR, state police; need‑to‑know controls & releasability tags.
a) ANSWER: YES — Platform can be used as a node or “Honeycomb” network — sharing is feasible in design.
-
DECONFLICTION: Case/lead deconfliction to avoid blue‑on‑blue.
a) ANSWER: HAWKs implementation are at the discretion of the Client security protocols.
3) Architecture & Interoperability:
​
-
DEGRADED COMMS: Edge processing, store‑and‑forward, mesh/SATCOM fallback.
a) ANSWER: YES, HAWK is an Edge platform intended for remote / mobile deployments implying local processing and store-and-forward capability.
-
C4ISR/ICS INTEGRATION: APIs; standards (e.g., STANAG‑like symbology, ONVIF, Modbus/DNP3); alert/event formats.
a) ANSWER: Platform is integration friendly (open APIs and third-party modules implied) plug-and-play third-party equipment integration.
-
IDENTITY & ACCESS: MFA, RBAC/ABAC, compartmentalisation; (Global Languages) UI/labels.
a) ANSWER: Biometric, Fingerprint, HQ remote (and authorised mobile technologies)
4) Cybersecurity & Data Sovereignty:
​
-
ACCREDITATIONS & TESTS: ISO 27001/SOC 2, secure SDLC, third‑party pen tests, SBOM availability.
a) ANSWER: High security standards and mentions compliance with industrial safety and cyber standards (IEC family, DEF STAN reference), and Pending NATO STANAG Certification
b) ANSWER: DEF STAN 139, IEC 62443, IEC 61508, IEC 62061
c) ANSWER: SEMENS: CE, MG1-12, UL 1004, EISA, CSA-C22.2 No 100, EER, CCC, CEL, ECL, EAC.
-
ZERO TRUST & CRYPTO: Micro‑segmentation; encryption at rest/in transit; KMS/HSM; crypto agility.
a) ANSWER: YES — Zero trust & Crypto thought-out the HAWK platform
b) ANSWER: The Client to implement Zero Trust & Crypto protocols on their private network.
-
DATA RESIDENCY: All mission data can remain under Sovereign/Corp control.
a) ANSWER: Full system residency on the HAWK platform (DUAL or QUAD)
​
5) Legal, Policy & Human Rights (MX):
​
-
COMPLIANCE: Public‑sector data law, lawful intercept, use‑of‑force frameworks.
a) ANSWER: YES — the platform supports open configuration to meet client compliance requirements.
-
CHAIN OF CUSTODY: Immutable/WORM logs; time‑stamped audit trails exportable for FGR.
a) ANSWER: YES — the platform supports open configuration to meet client compliance requirements.
-
PRIVACY CONTROLS: Minimisation, retention, redaction, oversight audit dashboards.
a) ANSWER: YES — the platform provides an open architecture enabling clients to configure privacy controls such as minimisation, retention, redaction, and audit oversight dashboards.
6) Domain‑Specific Capabilities:
​
-
ILLICIT FUEL/PIPELINES: SCADA anomaly detection; UAV/EO‑IR correlation; QRF geofencing.
a) ANSWER: YES — the platform is open and can be configured by clients to address all areas, including SCADA anomaly detection, UAV/EO‑IR correlation, and QRF geofencing.
-
ENERGY/MINING & OC: Network/link analysis; Extortion patterning; Insider‑threat analytics.
a) ANSWER: YES — the platform provides an open architecture that enables clients to configure solutions for all specified areas, including network/link analysis, extortion patterning, and insider‑threat analytics.
-
MINING SECURITY: Duress/geofencing; Convoy monitoring; Crisis/K&R workflows.
a) ANSWER: YES — the platform provides an open architecture that enables clients to configure solutions for all specified areas, including duress/geofencing, convoy monitoring, and crisis/K&R workflows.
-
CYBER: Ransomware containment; Mobile EDR/DLP; SOC/SIEM/SOAR integration.
a) ANSWER: YES — the platform provides an open architecture that enables clients to configure solutions for all specified areas, including ransomware containment, mobile EDR/DLP, and SOC/SIEM/SOAR integration.
-
CROSS-BORDER FLOWS: Route risk scoring (road/rail/maritime/airstrips); Binational sharing controls; Financial disruption cues.
a) ANSWER: (summary): YES — the platform provides an open architecture that enables clients to configure solutions for all specified areas, including route risk scoring (road/rail/maritime/airstrips), binational sharing controls, and financial disruption cues.
7) AI/Analytics & Usability:
​
-
EXPLAINABILITY: Confidence scores, rationale, thresholds; human‑in‑the‑loop validation.
a) ANSWER: YES — the platform provides an open architecture that enables clients to configure solutions for all specified areas, including confidence scores, rationale, thresholds, and human-in-the-loop validation.
​
-
LOCALISATION: UI, MX threat models, STANAG symbology.
a) ANSWER: UI: Global User language User Interface
a) ANSWER: MX threat models: Open platform for the Clients configuration (or Configured via EXSIS/SIEMENS)
b) ANSWER: YES — Security (STANAG) Symbology
-
MODEL OPs: Drift/Bias monitoring, retraining cadence, rollback/versioning.
-
ANSWERS:
-
Key functions of Model Ops (HAWK Platform / SIEMENS):
-
Deployment & Versioning: Ensuring the right model version is running on the platform.
-
Monitoring for Drift & Bias: Tracking if models start performing worse due to changing conditions or biased data.
-
Retraining: Updating models with new data to maintain accuracy.
-
Rollback: Ability to revert to a previous model version if a new one fails.
-
Audit & Compliance: Keeping logs of model predictions and changes for accountability.
-
-
8) Fielding, Training & Support:
​
-
TIME TO IOC/FOC: Dependencies (power, racks, connectivity) and realistic timelines.
a) ANSWER: Mobile enclosures exist and platform is modular.
-
TRAINING: Role‑based, train‑the‑trainer in Spanish; certification pathways.
a) ANSWER: Training provided by EXSIS and SIEMENS.
-
SUPPORTABILITY: 24/7 in‑country support, SLAs, spares/repair, environmental hardening.
a) ANSWER: Global technical support by EXSIS & SIEMENS.
9) Standards, Evidence Export & Reporting:
​
-
OPEN APIs & FORMATS: Geospatial/video/intel standards; bandwidth‑aware streaming.
a) ANSWER: YES — Open, modular design on the Client side.
-
EVIDENCE EXPORT: Court‑ready packages; compatibility with case management systems.
a) ANSWER: Third-party integration on the Client network.
10) Trials, KPIs & Assurance:
​
-
PILOT DESIGN: Sensor mix, area of operations, participating units, duration.
a) ANSWER: Dependant on the client’s needs.
-
KPIs/MOEs: Detection precision/recall, lead time, loss reduction, cyber MTTR, analyst throughput.
a) ANSWER: Full active Digital Twin via SIEMENS 24/7 services (Functions and activities accessible via HQ).
-
INDEPENDENT TESTING: Red‑team/emulation support; acceptance of third‑party validation.
a) ANSWER: Full active Digital Twin via SIEMENS 24/7 services.
11) Commercials, Sovereignty:
​
-
TCO & LICENSING:​
a) TCO: Terms and conditions included in the order submission.
b) EXIT STRATEGY: Data portability, escrow, no lock‑in, continuity in contingencies.
c) DATA PORTABILITY: YES — Open for implementation on the client’s network
d) ESCROW: YES — Open for implementation on the client’s network
e) NO LOCK-IN: Open platform to all of the clients’ vendors
f) CONTINUITY IN CONTINGENCIES: YES, MESH NETWORK
-
Localisation & Industry: In‑country staffing, tech transfer, MX industry participation.
-
ANSWER: EXSIS & SIEMENS presents global delivery capabilities to our clients.
-