USAID Nigeria MEL

USAID Nigeria MEL

The U.S. Agency for International Development (USAID) has awarded the new Monitoring, Evaluation and Learning Support activity to Navanti Group to provide a broad range of technical assistance to USAID/Nigeria mission.

Navanti’s support will include data quality assessments, field-based monitoring, evaluations, enhanced data analytics through improvement in the utilization of Geographic Information Systems and mapping, and support for learning.

“As a small business, we are excited to expand our relationship with USAID,” said Fred Payne, Navanti Group, Chief Executive Officer. “Through incremental growth on small development projects, through learning-by-doing, and a focus on building our internal capability, Navanti has gained the trust of USAID to carry out this important work.”

Specifically, Navanti Group has engaged in qualitative and quantitative data collection related to public health, security, governance, community cohesion, and food security in Nigeria since 2012, including in areas hardest hit by the humanitarian crisis, empowering local voices, and perspectives as the core component of creating actionable analysis linked to USAID’s Mission.

Our partner on this prime award, Social Impact, is a global leader in innovative monitoring, evaluation and learning practices. They have over 25 years of experience using data to increase aid effectiveness and promote programmatic and institutional learning. Together we have created a team that will work with USAID/Nigeria to advance accountability and learning across their programmatic portfolio, with a focus on building local capacity for MEL.


ABOUT NAVANTI GROUP: For 12 years, Navanti Group’s mission has been to deliver information through on-demand analytical reports, with clients benefiting from subject matter expertise and near real-time data on atmospherics, conflict, and population trends throughout Africa, the Arabian Peninsula, Central Asia, the Levant, and Eastern Europe. Through primary research, publicly available information, and open-source analysis, Navanti’s subject matter experts advise on cultural nuances and answer client driven requests for information on food security, health, civil society development, peace and conflict, and governance. For further information visit: NavantiGroup.com


ABOUT USAID: USAID leads international development and humanitarian efforts to save lives, reduce poverty, strengthen democratic governance, and help nations progress beyond assistance. In Nigeria, USAID supports health systems strengthening, transparent and accountable governance, basic education, and a more market-led, trade-friendly economy. For more information about USAID and its programs, please visit https://www.usaid.gov/nigeria. Follow us on Facebook and Twitter.


Navanti Homepage

Our Expertise

Polling & Surveys

Food Security

Risk & Security Analysis

GIS & Mapping

AI & Data Mining

Market Assessments

Crisis, Stabilization and Governance

Staffing & Training

Latest News

What Our Analysts Are Reading – August, 2021

Africa There has been a recent deterioration of the conflict in Ethiopia’s Tigray region after the…

Yemen Conflict: Ma’rib Governorate IDP Update by John Yager

Synopsis: An uptick in fighting amid the Houthis’ renewed Ma’rib offensive has led to massive civilian…

USAID Awards Monitoring, Evaluation and Learning Activity to Navanti Group

Washington, DC – August 17, 2021 - the U.S. Agency for International Development (USAID) has awarded the new…

Where Clients Benefit

For 12 years, Navanti Group’s mission has been to deliver information through on-demand analytical reports, with clients benefiting from subject matter expertise and near real-time data on atmospherics, conflict, and population trends throughout Africa, the Arabian Peninsula, Central Asia, the Levant, and Eastern Europe. Through primary research, publicly available information, and open-source analysis, Navanti’s subject matter experts advise on cultural nuances and answer client driven requests for information in areas of food security, civil society development, peace and conflict, and governance. Each deliverable typically includes imagery, maps, and/or data analysis covering an array of topics including target audiences, local economic conditions, infrastructure, media, humanitarian needs, and socio-cultural assessments.

Why We Are Different

Our Differentiator is that our team has extensive experience managing data collection and understanding cultural norms for difficult environments, including extremely remote locations and conflict zones. Our tenants are Access, Insight, Speed, and Flexibility.

Access – Since 2008, Navanti has built vetted local networks of researchers in over 70 countries throughout Latin America, Africa, Eastern Europe, the Middle East and Central Asia. They are native to the environments in which they operate, providing nuanced access across ethnic group, gender and class lines.

Insight – Access, without a deep understanding of local dynamics is necessary, but not sufficient for acting in emerging markets. Navanti develops and maintains highly trained subject matter experts that combine unparalleled access of our researchers with cutting edge analytical techniques to surface the “why” that that might otherwise go unnoticed.

Speed – Insight, on difficult to acquire in-depth analysis, is useless unless it can be delivered in time to support operational decisions. Navanti structures all data efforts to meet client decision cycles and formats.

Flexibility – Navanti research adapts as local dynamics evolve, providing an opportunistic capacity that enables clients to anticipate and plan for near horizon change. Together, these principles allow Navanti to provide industry best reporting that provides clients with near real-time data.

Navanti Insights

The War in Yemen - The Unbeautiful South

Mohammed Albasha, Communication and Client Engagement Manager at Navanti Group, was interviewed by The Economist on the war in Yemen.

Learn More

For the first time, an alleged terrorist has broadcast a confession in real time on Facebook Live

John Arterbury, Project Manager at Navanti Group, was cited by Caitlin Dewey and Sarah Parnass of The Washington Post on live-streaming of terror attacks.

Learn More

Yemen in Focus: Allies turn rivals on strategic Socotra island

Mohammed Albasha, Communication and Client Engagement Manager at Navanti Group, was interviewed by the London-based ‘The New Arab’ on the crisis in Socotra Archipelago.

Learn More

Quiet Support for Saudis Entangles U.S. in Yemen

Mohammed Albasha, Communication and Client Engagement Manager at Navanti Group, was interviewed by By Mark Mazzetti and Eric Schmitt, The New York Times on the how the quiet support for Saudis entangles U.S. in Yemen.

Learn More

Privacy Policy

Privacy Policy

Privacy Policy

Last updated: August 16, 2021

This Privacy Policy describes Our policies and procedures on the collection, use and disclosure of Your information when You use the Service and tells You about Your privacy rights and how the law protects You.

We use Your Personal data to provide and improve the Service. By using the Service, You agree to the collection and use of information in accordance with this Privacy Policy. This Privacy Policy has been created with the help of the Privacy Policy Generator.

Interpretation and Definitions

Interpretation

The words of which the initial letter is capitalized have meanings defined under the following conditions. The following definitions shall have the same meaning regardless of whether they appear in singular or in plural.

Definitions

For the purposes of this Privacy Policy:

  • Account means a unique account created for You to access our Service or parts of our Service.
  • Company (referred to as either “the Company”, “We”, “Us” or “Our” in this Agreement) refers to Navanti Group.
  • Cookies are small files that are placed on Your computer, mobile device or any other device by a website, containing the details of Your browsing history on that website among its many uses.
  • Country refers to: Virginia, United States
  • Device means any device that can access the Service such as a computer, a cellphone or a digital tablet.
  • Personal Data is any information that relates to an identified or identifiable individual.
  • Service refers to the Website.
  • Service Provider means any natural or legal person who processes the data on behalf of the Company. It refers to third-party companies or individuals employed by the Company to facilitate the Service, to provide the Service on behalf of the Company, to perform services related to the Service or to assist the Company in analyzing how the Service is used.
  • Usage Data refers to data collected automatically, either generated by the use of the Service or from the Service infrastructure itself (for example, the duration of a page visit).
  • Website refers to Navanti Group, accessible from navantigroup.com
  • You means the individual accessing or using the Service, or the company, or other legal entity on behalf of which such individual is accessing or using the Service, as applicable.

Collecting and Using Your Personal Data

Types of Data Collected

Personal Data

While using Our Service, We may ask You to provide Us with certain personally identifiable information that can be used to contact or identify You. Personally identifiable information may include, but is not limited to:

  • Email address
  • Usage Data

Usage Data

Usage Data is collected automatically when using the Service.

Usage Data may include information such as Your Device’s Internet Protocol address (e.g. IP address), browser type, browser version, the pages of our Service that You visit, the time and date of Your visit, the time spent on those pages, unique device identifiers and other diagnostic data.

When You access the Service by or through a mobile device, We may collect certain information automatically, including, but not limited to, the type of mobile device You use, Your mobile device unique ID, the IP address of Your mobile device, Your mobile operating system, the type of mobile Internet browser You use, unique device identifiers and other diagnostic data.

We may also collect information that Your browser sends whenever You visit our Service or when You access the Service by or through a mobile device.

Tracking Technologies and Cookies

We use Cookies and similar tracking technologies to track the activity on Our Service and store certain information. Tracking technologies used are beacons, tags, and scripts to collect and track information and to improve and analyze Our Service. The technologies We use may include:

  • Cookies or Browser Cookies. A cookie is a small file placed on Your Device. You can instruct Your browser to refuse all Cookies or to indicate when a Cookie is being sent. However, if You do not accept Cookies, You may not be able to use some parts of our Service. Unless you have adjusted Your browser setting so that it will refuse Cookies, our Service may use Cookies.
  • Flash Cookies. Certain features of our Service may use local stored objects (or Flash Cookies) to collect and store information about Your preferences or Your activity on our Service. Flash Cookies are not managed by the same browser settings as those used for Browser Cookies. For more information on how You can delete Flash Cookies, please read “Where can I change the settings for disabling, or deleting local shared objects?” available at https://helpx.adobe.com/flash-player/kb/disable-local-shared-objects-flash.html#main_Where_can_I_change_the_settings_for_disabling__or_deleting_local_shared_objects_
  • Web Beacons. Certain sections of our Service and our emails may contain small electronic files known as web beacons (also referred to as clear gifs, pixel tags, and single-pixel gifs) that permit the Company, for example, to count users who have visited those pages or opened an email and for other related website statistics (for example, recording the popularity of a certain section and verifying system and server integrity).

Cookies can be “Persistent” or “Session” Cookies. Persistent Cookies remain on Your personal computer or mobile device when You go offline, while Session Cookies are deleted as soon as You close Your web browser. Learn more about cookies: What Are Cookies?.

We use both Session and Persistent Cookies for the purposes set out below:

  • Necessary / Essential Cookies

    Type: Session Cookies

    Administered by: Us

    Purpose: These Cookies are essential to provide You with services available through the Website and to enable You to use some of its features. They help to authenticate users and prevent fraudulent use of user accounts. Without these Cookies, the services that You have asked for cannot be provided, and We only use these Cookies to provide You with those services.

  • Cookies Policy / Notice Acceptance Cookies

    Type: Persistent Cookies

    Administered by: Us

    Purpose: These Cookies identify if users have accepted the use of cookies on the Website.

  • Functionality Cookies

    Type: Persistent Cookies

    Administered by: Us

    Purpose: These Cookies allow us to remember choices You make when You use the Website, such as remembering your login details or language preference. The purpose of these Cookies is to provide You with a more personal experience and to avoid You having to re-enter your preferences every time You use the Website.

For more information about the cookies we use and your choices regarding cookies, please visit our Cookies Policy or the Cookies section of our Privacy Policy.

Use of Your Personal Data

The Company may use Personal Data for the following purposes:

  • To provide and maintain our Service, including to monitor the usage of our Service.
  • To manage Your Account: to manage Your registration as a user of the Service. The Personal Data You provide can give You access to different functionalities of the Service that are available to You as a registered user.
  • For the performance of a contract: the development, compliance and undertaking of the purchase contract for the products, items or services You have purchased or of any other contract with Us through the Service.
  • To contact You: To contact You by email, telephone calls, SMS, or other equivalent forms of electronic communication, such as a mobile application’s push notifications regarding updates or informative communications related to the functionalities, products or contracted services, including the security updates, when necessary or reasonable for their implementation.
  • To provide You with news, special offers and general information about other goods, services and events which we offer that are similar to those that you have already purchased or enquired about unless You have opted not to receive such information.
  • To manage Your requests: To attend and manage Your requests to Us.
  • For business transfers: We may use Your information to evaluate or conduct a merger, divestiture, restructuring, reorganization, dissolution, or other sale or transfer of some or all of Our assets, whether as a going concern or as part of bankruptcy, liquidation, or similar proceeding, in which Personal Data held by Us about our Service users is among the assets transferred.
  • For other purposes: We may use Your information for other purposes, such as data analysis, identifying usage trends, determining the effectiveness of our promotional campaigns and to evaluate and improve our Service, products, services, marketing and your experience.

We may share Your personal information in the following situations:

  • With Service Providers: We may share Your personal information with Service Providers to monitor and analyze the use of our Service, to contact You.
  • For business transfers: We may share or transfer Your personal information in connection with, or during negotiations of, any merger, sale of Company assets, financing, or acquisition of all or a portion of Our business to another company.
  • With Affiliates: We may share Your information with Our affiliates, in which case we will require those affiliates to honor this Privacy Policy. Affiliates include Our parent company and any other subsidiaries, joint venture partners or other companies that We control or that are under common control with Us.
  • With business partners: We may share Your information with Our business partners to offer You certain products, services or promotions.
  • With other users: when You share personal information or otherwise interact in the public areas with other users, such information may be viewed by all users and may be publicly distributed outside.
  • With Your consent: We may disclose Your personal information for any other purpose with Your consent.

Retention of Your Personal Data

The Company will retain Your Personal Data only for as long as is necessary for the purposes set out in this Privacy Policy. We will retain and use Your Personal Data to the extent necessary to comply with our legal obligations (for example, if we are required to retain your data to comply with applicable laws), resolve disputes, and enforce our legal agreements and policies.

The Company will also retain Usage Data for internal analysis purposes. Usage Data is generally retained for a shorter period of time, except when this data is used to strengthen the security or to improve the functionality of Our Service, or We are legally obligated to retain this data for longer time periods.

Transfer of Your Personal Data

Your information, including Personal Data, is processed at the Company’s operating offices and in any other places where the parties involved in the processing are located. It means that this information may be transferred to — and maintained on — computers located outside of Your state, province, country or other governmental jurisdiction where the data protection laws may differ than those from Your jurisdiction.

Your consent to this Privacy Policy followed by Your submission of such information represents Your agreement to that transfer.

The Company will take all steps reasonably necessary to ensure that Your data is treated securely and in accordance with this Privacy Policy and no transfer of Your Personal Data will take place to an organization or a country unless there are adequate controls in place including the security of Your data and other personal information.

Disclosure of Your Personal Data

Business Transactions

If the Company is involved in a merger, acquisition or asset sale, Your Personal Data may be transferred. We will provide notice before Your Personal Data is transferred and becomes subject to a different Privacy Policy.

Law enforcement

Under certain circumstances, the Company may be required to disclose Your Personal Data if required to do so by law or in response to valid requests by public authorities (e.g. a court or a government agency).

Other legal requirements

The Company may disclose Your Personal Data in the good faith belief that such action is necessary to:

  • Comply with a legal obligation
  • Protect and defend the rights or property of the Company
  • Prevent or investigate possible wrongdoing in connection with the Service
  • Protect the personal safety of Users of the Service or the public
  • Protect against legal liability

Security of Your Personal Data

The security of Your Personal Data is important to Us, but remember that no method of transmission over the Internet, or method of electronic storage is 100% secure. While We strive to use commercially acceptable means to protect Your Personal Data, We cannot guarantee its absolute security.

Children’s Privacy

Our Service does not address anyone under the age of 13. We do not knowingly collect personally identifiable information from anyone under the age of 13. If You are a parent or guardian and You are aware that Your child has provided Us with Personal Data, please contact Us. If We become aware that We have collected Personal Data from anyone under the age of 13 without verification of parental consent, We take steps to remove that information from Our servers.

If We need to rely on consent as a legal basis for processing Your information and Your country requires consent from a parent, We may require Your parent’s consent before We collect and use that information.

Links to Other Websites

Our Service may contain links to other websites that are not operated by Us. If You click on a third party link, You will be directed to that third party’s site. We strongly advise You to review the Privacy Policy of every site You visit.

We have no control over and assume no responsibility for the content, privacy policies or practices of any third party sites or services.

Changes to this Privacy Policy

We may update Our Privacy Policy from time to time. We will notify You of any changes by posting the new Privacy Policy on this page.

We will let You know via email and/or a prominent notice on Our Service, prior to the change becoming effective and update the “Last updated” date at the top of this Privacy Policy.

You are advised to review this Privacy Policy periodically for any changes. Changes to this Privacy Policy are effective when they are posted on this page.

Contact Us

If you have any questions about this Privacy Policy, You can contact us:

  • By email: info@navantigroup.com


Cart

Cart

Your cart is currently empty.

Return to shop


Periodic Table

Periodic Table

Periodic Table of Terrorist Groups

Navanti’s Periodic Table of Terrorist Groups provides a visualization of State Department’s list of designated Foreign Terrorist Organizations.

History

Originally designed in 2010 as a fun side project by our analysts, the Periodic Table has become popular among practitioners and academics as a useful visualization for the state of global terrorism. The Periodic Table received updates in 2012, 2014, 2018, 2019, and 2021 as it was augmented with up-to-date academic data.

Purpose

However you use the Periodic Table, we’d love to hear about it. Drop us a line at: info@navantigroup.com. In the last eight years, we’ve heard about the Periodic Table being used in undergraduate syllabi, figures in PhD dissertations, practitioner reference guides, as a hotly debated item on blogs and forums, and one famous example in a Business Insider article.

Navanti Periodic Table of Terrorist Groups – March 2021

The most significant change between 2019 and 2020 was the proliferation of violent extremist organizations (VEO) in Africa. Harakat Sawa’d Misr – also known as HASM – in Egypt, Islamic State of Iraq and Syria – Democratic Republic of the Congo (ISIS-DRC), and the Islamic State of Iraq and Syria – Mozambique (ISIS-Mozambique) were added to the Foreign Terrorist Organizations list under section 219 of the Immigration and Nationality Act, as amended. Additionally, The Middle East and South Asia experienced the most change in force size and number of attacks – most significantly, AQAP reduced the pace of their attacks on civilian and government targets.

Download

Navanti Periodic Table of Terrorist Groups-August 2019

All previous references on the table to the Islamic State of Iraq and the Levant (ISIL) have been updated to the Islamic State of Iraq and Syria (ISIS) as the latter is now more conventional in State Department documentation. ISIS was added to the FTO list in 2004 and since then, the group’s influence has spread to many countries across the regions. Only one group (ANO) was removed from the previous table and eight were added to the list between 2017 and 2019 (Africa: ISIS-WA, ISIS-GS, & JNIM; Middle East: AAB*Bahrain & IRGC; South Asia: HM, ISIS-B, & ISIS-P). Two groups were changed to an inactive status (ETA – Europe and LTTE – South Asia). Notably, Hamas experienced growth in its membership, and increased attacks in the Gaza Strip between 2017 and 2018.

Download

Navanti Periodic Table of Terrorist Groups-January 2018

The most significant change between 2014 and 2017 was the proliferation of the Islamic State (ISIL) and its affiliates in Africa, the Middle East, and South Asia, adding five of the thirteen new groups over the reporting period. The Middle East and South Asia also experienced the most change in force size and number of attacks, with AQAP, AUM, DHKP, H, Hi, IG, JAT, and KACH increasing. While eight groups in total reduced the pace of their attacks on civilian and government targets, eight others maintained the level of activity by increasing their attacks: AAD, AQAP, ETA, Hi, IM, JeM, LJ, and TTP.

Download

Navanti Periodic Table of Terrorist Groups-September 2014

The design was stretched in 2014 as the total number of groups jumped to 61 designated FTOs. This is a 30% increase over the 2010 data set, with the Middle East growing to 23 and South Asia growing to 14 entities.

Download

Navanti Periodic Table of Terrorist Groups-October 2012

The 2012 update showed the total number of designated FTOs grow to 51 worldwide, with the Middle East growing to 19 organizations.

Download

Navanti Periodic Table of Terrorist Groups-October 2010

The original Periodic Table. This was our first attempt at organizing the FTO list and assigning values for group size and number of attacks. 47 groups in all, with 2 being considered Global.

Download

USAID GISR IDIQ

USAID GISR IDIQ

Navanti Group secured a seat with the Governance Integration for Stabilization and Resilience in the Middle East and North Africa (GISR MENA) Consortium. GISR can be used by USAID missions and offices for analytical work, field implementation and capacity development of staff, implementing partners and host country institutions. Technical Areas of Work focus are Learning & Knowledge Management, Enabling Effective Governance Response to Shocks and Stressors, Community Resilience.

Buy-ins can be initiated to:

Conduct assessments to understand shocks, stressors and changing political and social dynamics to inform governance, countering violent extremism (CVE) and conflict mitigation programming

Meet rapid response needs to address significant political or socioeconomic shocks and unexpected governance opportunities

Test pilot activities related to stabilization, governance, conflict / CVE and resilience and adapt them for scaling

Share promising practices and lessons learned and strengthen knowledge and skills to address governance and fragility challenges

Develop bridge activities that help span gaps in governance programming while developing a new strategy or program or the transition from humanitarian to development assistance

Ensure the inclusion of youth, women and marginalized populations in governance and conflict programming

TO INITIATE A BUY-IN,

Contact ME/TS COR Najiyah Alwazir at nalwazir@usaid.gov and A/ COR Rachel Goldberg at rgoldberg@usaid.gov to discuss your project concept or scope of work and its fit with GISR’s scope of work.

When a potential project concept or scope of work matches GISR’s mandate, your Mission or office can select one of the following options:

Option 1: Submit a rough or fully fleshed out scope of work to the COR and A/COR for feedback and/or approval; or

Option 2: Put forward a concept that still needs development to define a scope of work, and request one or more of the following forms of assistance:

Technical and political economy assessments and/or stakeholder consultations to inform concept development and scope of work design; and/or

a co-design process with ME/TS and the MSI consortium to convert the concept into a scope of work. 3. Once there is an approved scope of work, the COR will request the MSI consortium to provide comments on the SOW and a draft budget for discussion with your Mission or office and the ME/TS COR.

GISR can also be used to support technical and organizational assessments that will inform the conceptualization of long-term governance and fragility programs that will be competed separately.


USAID ASIV IDIQ

USAID ASIV IDIQ

Analytical Services IV (ASIV)

Navanti secured a seat on Analytical Services IV (ASIV) IDIQ. It is an Agency-wide $70 million indefinite delivery indefinite quantity contract. The purpose of the IDIQ is to provide the Bureau for Democracy, Conflict and Humanitarian Assistance’s Center of Excellence on Democracy, Human Rights and Governance (DCHA/DRG) with the experts, resources, and analytical tools to respond to requests for democracy, human rights and governance (DRG) Assessments, DRG sub-sectoral, and related assessments or analysis; technical assistance to support DRG strategic planning, program design, and results management; research, special studies, and surveys; training and networking support; and rapid response transitional environment support. Analytical services under this IDIQ will improve USAID’s ability to promote resilient, democratic societies, and support U.S foreign policy objectives. Support for democracy, human rights and governance is vital to the pursuit of freedom and national security, and is essential to achieve the Agency’s and the U.S. Government’s broader social and economic development goals.

Specifically, units can use ASIV to:

DRG assessments, applied political economy analyses, sub-sectoral and technical assessments or analyses;

DRG strategy development and support for strategic planning;

Program design and results management support;

Research, special studies and surveys;

Training development and delivery, and professional networking; and

DRG rapid response analytical and technical assistance support for transitional environments.

WHO CAN USE ASIV
USAID operating units will be able to draw upon the IDIQ’s analytical services to ensure that DRG sector and sub-sector strategies, planning and decision making, programs, performance management plans, and monitoring and evaluation plans are based on in- depth, well-informed, gender sensitive assessments and analyses; research; valid data; expertise and best practices in the field of democracy, human rights, and governance. The IDIQ will also provide expertise to operating units seeking to apply PEA across sectors, such as health, agriculture, education, and biodiversity, in order to encourage integrated programming and improved governance in those and other sectors. The analytical workperformed under the IDIQ will strengthen DRG outcomes across USAID’s fieldmissions, including in complex, transitioning, and post-conflict environments. The analytical work performed under the IDIQ will also integrate the principles of ADS 205 on Integrating Gender Equality and Female Empowerment in USAID’s Program Cycle.This IDIQ also gives DCHA/DRG a degree of technical oversight and engagement with analytical activities undertaken in the field.


USAID MEO IDIQ

USAID MEO IDIQ

Management Excellence for Operations (MEO)

Navanti secured a seat on The Management Excellence for Operations (MEO) IDIQ. It is an Agency-wide $40 million indefinite delivery indefinite quantity contract. The purpose of the MEO IDIQ is to strengthen operations performance management practices at USAID. Specifically, operating units can use MEO to:

analyze operations performance data, processes, and management issues to improve USAID’s efficiency and effectiveness;

provide surge capacity, support, and technical assistance to USAID operating units to comply with internal and external requirements related to operations performance management;

improve the USAID’s internal and external communications, products, and information.

WHO CAN USE MEO
All Washington and overseas USAID operating units can access MEO. The Bureau for Management’s Office of Management Policy, Budget, and Performance (M/MPBP) manages the MEO contract, and each task order is independently administered by the issuing operating unit. If an operating unit is interested in using MEO, it must submit a scope of work to the contracting office representative (COR) for approval. The COR, Maggie Strong, can be reached at mastrong@usaid.gov