SOURCES SOUGHT
59 -- United States Coast Guard Terma Frequency- Diversity
- Notice Date
- 5/27/2009
- Notice Type
- Sources Sought
- NAICS
- 334511
— Search, Detection, Navigation, Guidance, Aeronautical, and Nautical System and Instrument Manufacturing
- Contracting Office
- Department of Homeland Security, United States Coast Guard (USCG), Commandant (CG-912), U.S. Coast Guard Headquarters, U.S. Coast Guard Headquarters (CG-912), 1900 Half Street, SW, Washington, District of Columbia, 20593-0001
- ZIP Code
- 20593-0001
- Solicitation Number
- HSCG2109239TED320
- Archive Date
- 6/5/2009
- Point of Contact
- Gwendolyn B Scott, Phone: 757-686-4273, Beverly Moody, Phone: 757-295-2271
- E-Mail Address
-
gwendolyn.b.scott@uscg.mil, beverly.j.moody@uscg.mil
(gwendolyn.b.scott@uscg.mil, beverly.j.moody@uscg.mil)
- Small Business Set-Aside
- N/A
- Description
- Request for Information NOTE: It is imperative that the Contractor is to provide a valid current copy of the TERMA Certification for this SOW. Failure to provide this documentation shall make your response to this RFI non-responsive And The Contractor shall also describe its technical approach for completing the work in the SOW. The technical information shall reference each “paragraph number” in the SOW and provide the Contractor response to each paragraph. •Cost/Price List/Catalog – no page limitation Responses should demonstrate ability to meet the following: Criteria 1: Technical Approach - The contractor's technical approach demonstrates a clear understanding of the work to be performed as described in the SOW. The RFI outlines an effective, efficient, achievable approach for accomplishing the work to be performed by this task order within the timeline either specified by performance periods or documented in a deliverable schedule. And the ability to provide fully qualified personnel to perform the task as described. Note: the contractor is to provide TERMA documentation as requested above. Criteria 2: Task Specific – As the Task are outlined in the attached SOW. Also, the manner in which the offeror proposes to provide for QA for the Task. RFI Submission Instructions to Contractors Technical and cost/price RFI’s shall be separate documents and consist of the following tabs: NOTE: While the technical RFI must not contain any reference to cost, resource information (such as data concerning labor hours and categories, materials, subcontracts, etc.) must be provided so that the contractor's understanding of the requirements may be evaluated. TAB 1 - Technical RFI. Technical RFI information will be streamlined and limited to 10 pages. At a minimum, technical information shall address the following elements: •Technical/management approach/QA for Task performed •Key personnel assigned, and the Specified Qualifications of those Key Personnel i.e. TERMA Certified and the providing a current copy of the TERMA Certification. •Teaming arrangements (including subcontractors) and Subcontractors information, i.e. Cage Code •Risks and risk mitigation plan •Period of performance •Government-furnished equipment (GFE)/Government-furnished information (GFI) •Security (including clearance level) •Other pertinent data This is a Request for Information Only. STATEMENT OF WORK and SPECIFICATION for United States Coast Guard Terma Frequency- Diversity Radar Start Date: Award of Contract Completion Date: NLT Three (3) Months from Start Date 1.0 INTRODUCTION The Coast Guard Command and Control Engineering Center (C2CEN) Portsmouth, VA desires to purchase a Terma Scanter 2001 Dual-Redundant X-band transceiver radar system for integration into C2CEN’s Command Center Integrated Systems (CCIS) “baseline” system in order to better support fielded Terma radars. The Terma radar is a sensor used in the Ports and Waterways Safety System (PAWSS), Vessel Traffic Service (VTS), and Hawkeye port security systems. From a port safety and Maritime Domain Awareness (MDA) standpoint, it is imperative that fielded Terma radars are operational on a 24/7 basis. Therefore, routine maintenance, software upgrades, and security patches must first be tested on an identical non-operational baseline system before implementation on operational Terma radars. The newly procured Terma radar will also be used in the development and evaluation of future port security projects. 2.0 BACKGROUND 2.1 Ports and Waterways Safety System (PAWSS) The Ports and Waterways Safety System (PAWSS) was established to meet the goals set forth under the Ports and Waterways Safety Act of 1972 (PWSA), Title 33 USC §1221. Under this provision the Coast Guard has a statutory responsibility to ensure the safety and environmental protection of U.S. ports and waterways. The PWSA authorizes the Coast Guard to "...establish, operate and maintain vessel traffic services in ports and waterways subject to congestion." The purpose of the act was to establish good order and predictability on United States waterways by implementing fundamental waterways management practices. PAWSS is deployed in nine ports: New York, Houston/Galveston TX, Lower Mississippi River (New Orleans, LA), Sault Ste Marie MI, Berwick Bay (Morgan City, LA), Prince William Sound (Valdez, AK), San Francisco CA, Puget Sound (Seattle, WA), and Port Arthur TX. The PAWSS project was acquired through a Congressionally Mandated System to modernize Vessel Traffic Services (VTS) through the use of commercially available technology including Automatic Identification System (AIS), Radars, Closed Circuit Television (CCTV), and voice communications. PAWSS is a Vessel Traffic Service navigation information system that is based on commercial off-the-shelf (COTS) products consisting of sensors, communications, and decision support equipment. PAWSS is deployed in a number of coastal locations throughout the U.S. and allows the Coast Guard to propagate important navigation information to mariners, thereby reducing collisions, groundings, and facilitates the safe and efficient transit of vessel traffic. The system compresses radar, VHF-FM voice, AIS, and video from remote sites into commercial leased land lines or microwaves and sends the information to a central Vessel Traffic Center (VTC). 2.2Terma Frequency Diversity Radar System C2CEN chose the Terma radar system based on its superior performance and features; it is a highly sensitive and high-resolution radar system, tailored for use where requirements to interference rejection, signal processing and resistance to a tough environment are necessary parameters to maintain continuous radar coverage. Terma radars are used extensively throughout the PAWSS system, including remote sites in Alaska which are accessible only by helicopter. It is therefore imperative that C2CEN have an identical radar system on our support baseline in order to test maintenance and upgrade procedures prior to attempting field implementation. Terma North America Inc. has over 50 years of experience within the radar market and has supplied the Coast Guard with radar sensor solutions since the inception of the PAWSS and VTS systems. 3.0 SCOPE 3.1Radar System and Installation The Contractor is responsible for installation and setting to work (STW) of the radar sensor system. Only Terma-qualified technicians will be authorized to perform the installation. U. S. Coast Guard C2CEN will support the installation task with at least one technically competent person and one person acquainted with local rules and regulations regarding electrical installations. Expenses related to crane hiring and hoisting of the antenna are not included. If requested by the COTR, the Contractor shall provide drawings showing the “footprint” of the antenna in order to facilitate mounting. Installation site is at the Coast Guard Command and Control Engineering Center (C2CEN), 4000 Coast Guard Blvd., Portsmouth, VA 23703 3.1.1 Integration and Fine Tuning at Site (C2CEN Portsmouth, VA) The Contractor is responsible for onsite integration of the radar sensor system with C2CEN’s baseline system as well as fine-tuning of radar site profiles. This activity includes observation of clutter suppression and small target detection using test target and/or targets of opportunity. Fine-tuning of radar system is site dependent (antenna height, weather conditions, etc.) and may result in special settings or profiles for best possible performance against small targets. 3.2.2 Factory Acceptance Test (FAT) C2CEN representatives will witness and verify the FAT. The FAT test results will be accepted as part of the documentation package. 3.2 Terma Factory-Certified Training Technical training by Terma representatives will be performed for C2CEN support technicians. The training enables the technicians to assist in installation, make on site fault analysis and effect system repair. The technical training shall be carried out in conjunction with the FAT. Technician training shall be completed in a 5-day course. 3.3 Spare Parts Kit A spare parts kit is also included in this procurement in order to facilitate troubleshooting and repair efforts in the event of a Terma radar system failure. The contents of the spare parts kit is provided in the table below. Pos Description Unit Price EURO Qty Discount % Net Price EURO Repair Price SCANTER 2001 Transceiver 254400-001 X-Band Receiver, 9300 - 9500 MHz 1 254400-002 x-Band Receiver 9100 -9300 MHz 1 253720-001 Modulator, High Power 1 262039-002 Motherboard and Power Assembly 1 262060-001 Radar signal Distribution 1 262032-001 Transceiver Controller (TC 3) 1 262815-002 ASC 2 - VP3 Assy 1 262162-001 Sea Clutter Discriminator 1 262075-001/8 Mains Distribution (excluding motor controller) 1 258544-002 Diplexer 1 262122-001 Radar PCI Interface (Service Display) 1 221723-001WG Switch for FD 1 Antenna & ACU Spares 259221-001 Rotary joint incl 1 encoder - 8192 1 258512-101 Motor Antenna Drive 1 261130-012 Motor controller 4,0 kW, 230 / 400 v ADD-ON 1 Total Price Table 1 4.0 APPLICABLE DOCUMENTS a.COMDTINST M9077.1A, Equipment Tag Out Procedure b.COMDTINST M5100.47, Safety and Environmental Health Manual c.NAVSHIP 250-660-42, Electric Shock – Its Causes and Prevention d.OPNAVINST 5100.23, Navy Occupational Safety and Health (NAVOSH) Program Manual e.COMDTINST M10500.25, Electronics Manual f.Terma Scanter FD Radar Hardware Installation Manual g.Federal Travel Regulations 5.0 TECHNICAL REQUIREMENTS 5.1 System Architecture DHS Enterprise Architecture Compliance All solutions and services shall meet DHS and USCG Enterprise Architecture policies, standards, and procedures. Specifically, the contractor shall comply with the following Homeland Security Enterprise Architecture (HLS EA) and Coast Guard Enterprise Architecture (CGEA) requirements: •All developed solutions and requirements shall be compliant with the HLS EA and CGEA. •All IT hardware or software shall be compliant with the HLS EA Technical Reference Model (TRM) Standards and Products Profile. •All data assets, information exchanges and data standards, whether adopted or developed, shall be submitted to the DHS Enterprise Data Management Office (EDMO) for review and insertion into the DHS Data Reference Model. •In compliance with Office of Management and Budget (OMB) mandates, all network hardware shall be IPv6 compatible without modification, upgrade, or replacement. •All Information Technology assets being developed, procured, or acquired shall be IPv6 capable. 5.2 Radar System Required technical specifications for the Radar Sensor Systems include: •Dual Redundant X-Band Transceiver with Frequency Diversity. •21ft High Gain Slotted Waveguide antenna, fan beam radiation pattern, horizontal polarization. •Antenna Control Unit, ACU, 4kW, 3-phase mains power supply. •Frequency Diversity (FD) processing to de-correlate sea clutter, reduce small target fluctuation, thereby improving the long-range detection. •Auto-Adaptive Sensitivity Control (ASC) to provide automatic two-dimensional STC, eliminating the need for operator setting of the radar during normal operation. •Pulse-to-pulse integration to improve signal-to-noise ration for improved small target detection. •Digital FTC and sweep-to-sweep correlation. •Pulse Repetition Frequency (PRF), Pulse Width (PW) and random PRF stagger. Although it is possible for other radar systems to meet these technical requirements, it is imperative that C2CEN procures a Terma system since that is the brand currently installed at PAWSS sites. Testing and troubleshooting on a “similar” radar is meaningless. 5.3 Training C2CEN support technicians must be trained by Terma factory-certified technicians. This is necessary due to the fact that only Terma-certified technicians are authorized to service fielded radar systems. Any work performed on operational field units by uncertified technicians could void product warranties and service agreements. Technician training shall be completed in a 5-day course. 5.4 Installation Radar system installation, testing, acceptance, and on-site radar optimization must be performed by Terma factory representatives. Installation site is Coast Guard Command and Control Engineering Center (C2CEN), 4000 Coast Guard Blvd., Portsmouth, VA 23703 6.0 PERSONNEL REQUIREMENTS The Contractor shall provide delivery, installation, testing, on-site radar optimization, technician training, and acceptance documentation for the Terma Frequency Diversity radar system. 6.1 Personnel. During the period of performance of this specification, the following personnel shall be required. 61.1 Installation Manager. The Contractor shall designate an Installation Manager as a single point of contact for all technical matters for the requirements of this specification. The name of this person shall be submitted with the proposal. This individual will be designated a key personnel. During any absence of the Installation Manager, only one alternate shall serve as the Government contact point. The Installation Manager, and any designated alternate(s) shall have full authority to act for the Contractor on all contract matters of this specification. The Installation Manager and all designated alternates shall be able to read, write, speak and understand English fluently. 6.1.1.1 Installation Manager Availability. While Contractor installation teams are on-site at a government facility, the Installation Manager, or designated alternate, shall be available within 30 minutes (by phone or in person) upon initial notification for discussion and resolution of emergent problem areas or installation issues. 6.2 Security Requirements 6.2.1 Access to Unclassified Facilities, Information Technology Resources, and Sensitive Information: The assurance of the security of unclassified facilities, Information Technology (IT) resources, and sensitive information during the acquisition process and contract performance are essential to the DHS mission. DHS Management Directive (MD) 11042.1 Safeguarding Sensitive But Unclassified (For Official Use Only) Information, describes how contractors must handle sensitive but unclassified information. DHS MD 4300.1 Information Technology Systems Security and the DHS Sensitive Systems Handbook prescribe policies and procedures on security for IT resources. Contractors shall comply with these policies and procedures, any replacement publications, or any other current or future DHS policies and procedures covering contractors specifically for all Task Orders that require access to DHS facilities, IT resources or sensitive information. Contractors shall not use or redistribute any DHS information processed, stored, or transmitted by the contractor except as specified in the task order. 6.2.2Security Review The Government may elect to conduct periodic reviews to ensure that the security requirements contained in this contract are being implemented and enforced. The Contractor shall afford DHS including the organization of the DHS Office of the Chief Information Officer, the Office of the Inspector General, authorized Contracting Officer’s Technical Representative (COTR), and other government oversight organizations, access to the Contractor’s facilities, installations, operations, documentation, databases, and personnel used in the performance of this contract. The Contractor will contact the DHS Chief Information Security Officer to coordinate and participate in the review and inspection activity of government oversight organizations external to the DHS. Access shall be provided to the extent necessary for the government to carry out a program of inspection, investigation, and audit to safeguard against threats and hazards to the integrity, availability, and confidentiality of DHS data or the function of computer systems operated on behalf of DHS, and to preserve evidence of computer crime. 6.2.3 Interconnection Security Agreements Interconnections between DHS and non-DHS IT systems shall be established only through controlled interfaces and via approved service providers. The controlled interfaces shall be accredited at the highest security level of information on the network. Connections with other Federal agencies shall be documented based on interagency agreements; memoranda of understanding, service level agreements or interconnect service agreements. 6.2.4Hardware, Software and Services Compliance: All hardware, software or services provided will be in accordance with DHS MD 4300.1. and 1. HSAR 3052.204-70: Security Requirements for Unclassified Information Technology Resources (JUN 2006). (a)The Contractor shall be responsible for Information Technology (IT) security for all systems connected to a DHS network or operated by the Contractor for DHS, regardless of location. This clause applies to all or any part of the contract that includes information technology resources or services for which the Contractor must have physical or electronic access to sensitive information contained in DHS unclassified systems that directly support the agency's mission. (b)The Contractor shall provide, implement, and maintain an IT Security Plan. This plan shall describe the processes and procedures that will be followed to ensure appropriate security of IT resources that are developed, processed, or used under this contract. (c)Within 30 days after contract award, the contractor shall submit for approval its IT Security Plan, which shall be consistent with and further detail the approach contained in the offeror's proposal. The plan, as approved by the Contracting Officer, shall be incorporated into the contract as a compliance document (d)The Contractor's IT Security Plan shall comply with Federal laws that include, but are not limited to, the Computer Security Act of 1987 (40 U.S.C. 1441 et seq.); the Government Information Security Reform Act of 2000; and the Federal Information Security Management Act of 2002; and with Federal policies and procedures that include, but are not limited to, OMB Circular A-130. (e)The security plan shall specifically include instructions regarding handling and protecting sensitive information at the Contractor's site (including any information stored, processed, or transmitted using the Contractor's computer systems), and the secure management, operation, maintenance, programming, and system administration of computer systems, networks, and telecommunications systems. (f)Examples of tasks that require security provisions include-- (1)Acquisition, transmission or analysis of data owned by DHS with significant replacement cost should the contractor's copy be corrupted; and (2)Access to DHS networks or computers at a level beyond that granted the general public (e.g., such as bypassing a firewall). (g)At the expiration of the contract, the contractor shall return all sensitive DHS information and IT resources provided to the contractor during the contract, and certify that all non-public DHS information has been purged from any contractor-owned system. Components shall conduct reviews to ensure that the security requirements in the contract are implemented and enforced. (h)Within 6 months after contract award, the contractor shall submit written proof of IT Security accreditation to DHS for approval by the DHS Contracting Officer. Accreditation will proceed according to the criteria of the DHS Sensitive System Policy Publication, 4300A (Version 2.1, July 26, 2004) or any replacement publication, which the Contracting Officer will provide upon request. This accreditation will include a final security plan, risk assessment, security test and evaluation, and disaster recovery plan/continuity of operations plan. This accreditation, when accepted by the Contracting Officer, shall be incorporated into the contract as a compliance document. The contractor shall comply with the approved accreditation documentation. 6.2.5CONTRACTOR EMPLOYEE ACCESS (a)Sensitive Information, as used in this Chapter, means any information, the loss, misuse, disclosure, or unauthorized access to or modification of which could adversely affect the national or homeland security interest, or the conduct of Federal programs, or the privacy to which individuals are entitled under section 552a of title 5, United States Code (the Privacy Act), but which has not been specifically authorized under criteria established by an Executive Order or an Act of Congress to be kept secret in the interest of national defense, homeland security or foreign policy. This definition includes the following categories of information: (1)Protected Critical Infrastructure Information (PCII) as set out in the Critical Infrastructure Information Act of 2002 (Title II, Subtitle B, of the Homeland Security Act, Public Law 107-296, 196 Stat. 2135), as amended, the implementing regulations thereto (Title 6, Code of Federal Regulations, Part 29) as amended, the applicable PCII Procedures Manual, as amended, and any supplementary guidance officially communicated by an authorized official of the Department of Homeland Security (including the PCII Program Manager or his/her designee); (2)Sensitive Security Information (SSI), as defined in Title 49, Code of Federal (3)Regulations, Part 1520, as amended, “Policies and Procedures of Safeguarding and Control of SSI,” as amended, and any supplementary guidance officially communicated by an authorized official of the Department of Homeland Security (including the Assistant Secretary for the Transportation Security Administration or his/her designee); (4)Information designated as “For Official Use Only,” which is unclassified information of a sensitive nature and the unauthorized disclosure of which could adversely impact a person’s privacy or welfare, the conduct of Federal programs, or other programs or operations essential to the national or homeland security interest; and (5)Any information that is designated “sensitive” or subject to other controls, safeguards or protections in accordance with subsequently adopted homeland security information handling procedures. (b)“Information Technology Resources” include, but are not limited to, computer equipment, networking equipment, telecommunications equipment, cabling, network drives, computer drives, network software, computer software, software programs, intranet sites, and internet sites. (c)Contractor employees working on this contract must complete such forms as may be necessary for security or other reasons, including the conduct of background investigations to determine suitability. Completed forms shall be submitted as directed by the Contracting Officer. Upon the Contracting Officer's request, the Contractor's employees shall be fingerprinted, or subject to other investigations as required. All contractor employees requiring recurring access to Government facilities or access to sensitive information or IT resources are required to have a favorably adjudicated background investigation prior to commencing work on this contract unless this requirement is waived under Departmental procedures. (d)The Contracting Officer may require the contractor to prohibit individuals from working on the contract if the government deems their initial or continued employment contrary to the public interest for any reason, including, but not limited to, carelessness, insubordination, incompetence, or security concerns. (e)Work under this contract may involve access to sensitive information. Therefore, the Contractor shall not disclose, orally or in writing, any sensitive information to any person unless authorized in writing by the Contracting Officer. For those contractor employees authorized access to sensitive information, the contractor shall ensure that these persons receive training concerning the protection and disclosure of sensitive information both during and after contract performance. (f)The Contractor shall include the substance of this clause in all subcontracts at any tier where the subcontractor may have access to Government facilities, sensitive information, or resources. (g)Before receiving access to IT resources under this contract the individual must receive a security briefing, which the Contracting Officer’s Technical Representative (COTR) will arrange, and complete any nondisclosure agreement furnished by DHS. (h)The contractor shall have access only to those areas of DHS information technology resources explicitly stated in this contract or approved by the COTR in writing as necessary for performance of the work under this contract. Any attempts by contractor personnel to gain access to any information technology resources not expressly authorized by the statement of work, other terms and conditions in this contract, or as approved in writing by the COTR, is strictly prohibited. In the event of violation of this provision, DHS will take appropriate actions with regard to the contract and the individual(s) involved. (i)Contractor access to DHS networks from a remote location is a temporary privilege for mutual convenience while the contractor performs business for the DHS Component. It is not a right, a guarantee of access, a condition of the contract, or Government Furnished Equipment (GFE). (j)Contractor access will be terminated for unauthorized use. The contractor agrees to hold and save DHS harmless from any unauthorized use and agrees not to request additional time or money under the contract for any delays resulting from unauthorized use or access. (k)Non-U.S. citizens shall not be authorized to access or assist in the development, operation, management or maintenance of Department IT systems under the contract, unless a waiver has been granted by the Head of the Component or designee, with the concurrence of both the Department’s Chief Security Officer (CSO) and the Chief Information Officer (CIO) or their designees. Within DHS Headquarters, the waiver may be granted only with the approval of both the CSO and the CIO or their designees. In order for a waiver to be granted: (1)The individual must be a legal permanent resident of the U.S. or a citizen of Ireland, Israel, the Republic of the Philippines, or any nation on the Allied Nations List maintained by the Department of State; (2)There must be a compelling reason for using this individual as opposed to a U.S. citizen; and (3)The waiver must be in the best interest of the Government. (l)Contractors shall identify in their proposals the names and citizenship of all non-U.S. citizens proposed to work under the contract. Any additions or deletions of non-U.S. citizens after contract award shall also be reported to the contracting officer. 6.3 Section 508 Determination and Certification DHS OAST has reviewed this acquisition and determined that it meets the "System(s) critical to the direct fulfillment of military or intelligence missions" criterion for a National Security Exception. 7.0 Acronyms: Table 2 lists the acronyms used in this SOW. AISAutomatic Identification System CCISCommand Center Integrated System CCTV Closed Circuit Television COTSCommercial off the Shelf CONUSContinental United States FATFactory Acceptance Test IDPInstallation Design Plan OEMOriginal Equipment Manufacturer PAWSSPorts and Waterways Safety System PWSAPorts and Waterways Safety Act of 1972 STWSet To Work VTSVessel Traffic System Table 2. List of Acronyms
- Web Link
-
FBO.gov Permalink
(https://www.fbo.gov/spg/DHS/USCG/GACS/HSCG2109239TED320/listing.html)
- Place of Performance
- Address: United States Coast Guard's Command and Control Engineering Center (C2CEN), 4000 Coast Guard Boulevard, Portsmouth, Virginia, 23703, United States
- Zip Code: 23703
- Zip Code: 23703
- Record
- SN01828503-W 20090529/090527235733-3f65751fc9d8f8179db32f0e109cadf4 (fbodaily.com)
- Source
-
FedBizOpps Link to This Notice
(may not be valid after Archive Date)
| FSG Index | This Issue's Index | Today's FBO Daily Index Page |