Loren Data's SAM Daily™

fbodaily.com
Home Today's SAM Search Archives Numbered Notes CBD Archives Subscribe
FBO DAILY ISSUE OF OCTOBER 04, 2012 FBO #3967
SOLICITATION NOTICE

D -- RFI - Software Integration for Crime and Threat Analysis - Draft RFI

Notice Date
10/2/2012
 
Notice Type
Cancellation
 
NAICS
541511 — Custom Computer Programming Services
 
Contracting Office
Department of the Navy, Office of Naval Research, Naval Research Laboratory, 4555 Overlook Ave. S.W., Washington, District of Columbia, 20375
 
ZIP Code
20375
 
Solicitation Number
N00173-13-R-RH01
 
Point of Contact
Richard W. Hobson,
 
E-Mail Address
richard.hobson@nrl.navy.mil
(richard.hobson@nrl.navy.mil)
 
Small Business Set-Aside
N/A
 
Description
Word Doc of Draft RFI Adversarial Modeling & Exploitation Office DRAFT RFI: TASR Market Survey Date: 09/25/12 I. Purpose Through this request for information (RFI) document, the Adversarial Modeling & Exploitation Office (AMX), US Naval Research Lab seeks to identify software systems for possible inclusion and integration in a suite of crime and threat analysis tools for the Federal Protective Service (FPS). Specifically, we are interested in software applications developed by U.S. personnel which could be utilized for crime analysis, spatial analysis, or intelligence analysis by the law enforcement community. Software systems could include, but not be limited to, those which are currently utilized by organizations including municipal police departments, county and state crime and intelligence analysis centers, and by Federal organizations. This RFI is issued solely for market research, planning and information purposes and is not to be construed as a commitment by the government to enter into a contractual agreement, nor will the government pay for information solicited hereunder. All information received will be treated as public knowledge. Any piece of proprietary or confidential information should be clearly marked. II. Background The FPS provides policing and security services to nearly all Federal buildings in the United States. It has approximately 1,200 sworn personnel and oversees the efforts of approximately 12,000 armed security personnel. The FPS is responsible for not only protecting Federal property, but also Federal employees, and the immediate geographic area surrounding Federal property. FPS personnel are therefore responsible for assessing and responding to information and intelligence at the local, state, and federal level. The Adversarial Modeling and Exploitation Office, US Naval Research Lab is involved in an ongoing project with the Department of Homeland Security, Science and Technology Directorate (DHS S&T) to assist the FPS to more efficiently and effectively use information. This effort is known as the Threat Analysis Systems Requirement (TASR) project. Through the TSAR Project, we are seeking to develop a full threat and crime analysis system specification for the FPS. The goal of this project is to identify and later develop tools which will assist them to use available data more efficiently and effectively to deploy resources and protect against threats. III. Requested Information The purpose of this solicitation is to identify capabilities of available crime, spatial, and intelligence analysis software. These areas of information are included independently below. a. Type: The underlying principle(s) associated with the software; what the software is supposed to do and what analytical framework the software uses to perform that/those function(s). i. Purpose - For which analytical purpose is the software typically marketed by the vendor (i.e. Crime Analysis, Intel Analysis, Spatial Analysis, Investigative Case Support, other)? ii. Market Audience For Software - Who within an organization is the software typically marketed to serve? (e.g., Analysts, Command Staff, Operational Personnel, Administrative Personnel, General Population, etc...) iii. Type of Analyst - Is this software typically marketed to full-time/professional analysts, part-time analysts, and/or others? iv. Software Rationale - Does the software conduct analyses, present information, and/or organize data? v. Typical Purchasers of Software- Type of organization, size of organization, etc... vi. Data Aggregator -Does the software aggregate and allow for the analysis of a variety of disparate data sources? b. Systems Administration: The effort associated with managing a multi-user computing environment; to include installing and configuring system hardware and software, establishing and managing user accounts, upgrading software and backup and recovery tasks. i. Hardware, Software, and System Requirements - What are the operating system requirements, hardware/software requirements, and installation processes? ii. System Set up & Requirements - What is the set up process? Does it require set up by the vendor? iii. Error Reporting & Debugging Process - How does the software report errors, how are these errors fixed and how do these fixes get reported back to the user? iv. Data Recovery - Does the software save the data in the case of a crash? What are the processes and error warnings associated with the crashes and recovery of information? v. Updates- Does the vendor provide automated software updates? vi. Mobile Applications - Does the software offer mobile applications for use on cell phones, tables, PDAs, etc...? vii. Backward Compatibility - Does new upgraded software work with older versions of the software? (i.e. can the software receive, read, view or play older standards/formats of the software? viii. Database Adaptors - How does the software link to underlying data? How does this link work? What records management systems does it link to? How often is it refreshed? Is adaptation done by the vendor or can it be done by the purchaser (i.e. in-house IT personnel)? c. Systems Integration: The linking of different computing systems and software applications physically or functionally, to act as a coordinating whole. i. Programming Language - In which language(s) is the software programmed (e.g., Java, C++, C, Pascal, Fortran, C#, Python, Cobol, Pearl, VBA, etc...)? ii. Web Service - Does the software operate on a web-service (i.e. does the software have a way of communicating via a web service that is independent the language/OS)? iii. Availability of Plug-Ins - Do users have the capacity to write their own modules and use them on the software (e.g., Access Macros)? iv. Integration - With what other common software application(s) is the software integrated? Is there software application(s) with which the software does not integrate? v. Open Source - Is the product considered an open source (i.e. are the end product, source material and documentation available at no cost to the public)? d. End User: The person for whom a hardware or software product is designed from the developers, installers, and servicers (Versus other users who are making the product for the end user). i. Availability of Training - Does the vendor offer training? If so, in what form (e.g., online, instructor based, etc...)? ii. Demonstration Products - Does the vendor offer a demonstration product for potential purchasers? iii. Manual Availability - Is there a manual available documenting capabilities and processes of the software? iv. Online Tutorials & User Forums- Are there online tutorials or user forums available to assist in use and troubleshooting? e. Tools: Types of analyses the software can/is supposed to perform (A.K.A. Analytical Tools). Please note definitions of for i-iii below are included in Appendix A below. i. Data Analysis Functions- If the software conducts crime analysis; does it perform any of the following functions: Descriptive Statistics, Data Queries, String Manipulation, Inferential Statistics, Temporal Analysis, Data Text/Mining, Spatial-Temporal Analysis, Crime Series Sequence/Pattern Analysis, Forecasting/Predictive Analysis, and/or any other function(s)? ii. Intelligence Analysis Functions- If the software conducts intelligence analysis; does it perform any of the following functions: Association/Network Analysis, Data/Text Mining, Link Analysis/Flowcharting, Telephone Records/Toll Analysis, and/or any other function(s)? iii. Spatial Analysis Functions- If the software conducts spatial analysis; does it perform any of the following functions: Graduated Symbol Mapping, Chloropleth Mapping, Density Mapping, Spatial Queries, Spatial Joins, Spatial Statistics, Geographic Profiling/Journey to Crime Analysis, Temporal Animation, and/or other function(s)? iv. Z-Coordinate - If applicable, does the software allow for 3-Dimensional Mapping (i.e. length, width, height)? v. Base Model Functionality - Does the user have the full system usage with the base model or is the user required to purchase additional add-ons (e.g., plugins, modules, extensions) for full or varied functionality? vi. Data Import & Export - What type(s) of data does the software import and export? How does the process work? Is it automated? vii. Transparency of Methodology - Can the user verify the software's methods, models and algorithms? viii. Auto-Flagging - Does the software have the capability to automatically notify the user when specific types of information are found or incidents occur? ix. Geocoding- Does the software have the ability to automatically or manually geocode? x. Geoprocessing, Digitizing & Editing- Does the software have geoprocessing, digitizing and editing capabilities? xi. Online Map Layers- Does the software link to online map layers? xii. Intelligence Function- Does the software have the ability to control for intelligence access and management (e.g., classification/access levels and purging)? xiii. Classification- Does the software have the ability to record and process information based on its reliability, validity, and sensitivity? xiv. Open Source Intelligence- Does the software link to an open source intelligence database? f. Outputs: The products produced by the software to depict the outcome drawn from an analysis or set of analyses. i. Typical Outputs - What type of output(s) does the software provide (e.g., Tabular data, graphs/charts, maps, standardized reports, customizable reports)? ii. External Reporting - Can the software link to an external reporting system ? g. Cost: The monetary expenses required to purchase, set up, and maintain the software for use by an agency/department, includes cost for Single License, Enterprise License, Incremental License related to each of the below. i. License Costs - Cost for licenses (i.e. single license, enterprise license, incremental license). ii. Update & Maintenance Costs - Cost and level of service provided (i.e. single license, enterprise license, incremental license). iii. Training Costs - Cost and type of training provided (i.e. cost per student/employee and/or cost per proctored course). iv. Upgrade Costs - Cost and frequency of upgrade (i.e. single license, enterprise license, and incremental license). v. Open Source- Cost to access open source intelligence systems (i.e. per use, per user, and/or duration based). IV. References Please provide a list of 3-5 customers in the law enforcement community who have acquired and installed the proposed software. The list should include the following information: a. Organization/Agency Name b. Contact Name c. Contact Title d. Contact Information: Address, Telephone Number, and Email e. Nature of Services Provided to Organization (Software, technical advice, maintenance etc...) V. Response Format a. Responses should be one electronic submission in machine readable format (typically PDF, ASCII, MS Word, or WordPerfect format). Please feel free to submit other attachments and documentation related to software capabilities and functionality. Responses should answer those questions described in Part III above in a similar order and be no more than 5 pages, excluding the cover page. Responses should be submitted via email to the following address: Email: amx.market.survey@nrl.navy.mil b. Cover page should include the following: i. Contact and Organization Information ii. Name of Person Submitting Document iii. Software Name iv. Vendor Name v. Date of Incorporation vi. Number of years in Business vii. Number of Employees viii. Software Version ix. Number of Years Software Has Been Sold x. Location xi. Mailing Address xii. Phone Number xiii. Website Address xiv. Email Address xv. Note that all RFI respondents shall designate a single point of contact for receipt of all information pursuant to this RFI. c. Any vendor's proprietary information, performance capabilities and/or future modification plans should be clearly identified and marked. Respondents are solely responsible for any and all expenses incurred pursuant to responding to this RFI. Responses to the RFI will not be returned. Responses to the RFI may be used to develop government documentation. Unsolicited proposals in response to this RFI will not be considered. d. Supporting documentation (such as marketing brochures, fliers, published presentations or papers and other materials that summarize the methodology/technology and more about your vendor) is acceptable (up to 100 pages worth), and may be referenced by reviewers only in support of claims identified in the White Paper, and only where specifically referenced in the White Paper. The government makes no guarantee that the supporting documentation will be reviewed and/or considered. e. Format For Submissions is Outlined Below: i. Type ii. Systems Administration iii. Systems Integration iv. End User v. Tools vi. Outputs vii. Costs VI. Point of Contact Nathan Meehan Ph.D. Social Scientist Adversarial Modeling and Exploitation Office US Naval Research Lab Email: nathan.meehan@nrl.navy.mil Phone: (202) 767-1426 Appendix A: Definitions Type of Analysis Definition Data Analysis Functions Descriptive Statistics The ability to describe in terms of the frequency with which variables occur. This can include, but is not limited to, percentage distributions, measures of central tendency and measures of dispersion around the mean. Data Queries The ability to question and retrieve information from a set of data. String Manipulation The ability to manipulate, manage, merge, and clip string or free text variable information. Inferential Statistics Statistical methods used to make a decision or understand a population from a sample drawn from that population. Temporal Analysis The ability to study time and how it relates to events. Data/Text Mining Methods to automate the identification of patterns and relationships in large volumes of information, often too large for an individual to manage. Spatial-Temporal Analysis The ability to study time and space together, and how they relate to events. Crime Series Analysis Methods to identifying and analyzing a pattern of crimes believed to be committed by the same person or persons; a.k.a. pattern analysis. Forecasting Methods to predict future events based on past events; a.k.a. predictive analysis. Can include methods to identify where a future event may occur or trends in future events. Association Analysis The ability to collect and analyze information that indicates relationships among varied individuals suspected of involvement in criminal activity; a.k.a. network analysis. Data/Text Mining See Description in "Data Analysis Functions" above. Link Analysis The ability to link associated information from a structured data source and the links between entities in a graphic display; a.k.a. timeline/flow-charting. Telephone Record Analysis The ability to review and organize records reflecting communications (e.g., telephone, email, pager, text messaging, etc.) among entities for indicators of criminal associations or activity; a.k.a. toll analysis. Graduated Symbol Mapping The ability to display data with symbols in various sizes according to the value of specific attributes. Chloropleth Mapping The ability to depict changes in crime levels (or other data) through shading of geographic regions or areas. Density Mapping Methods of generalizing point data into smoothed regions of higher and lower density. Spatial Queries Software used to display geographic data using points or shapes corresponding to specific locations on a map; a.k.a. geographic analysis. Spatial Joins Takes information from one or more layers and adds or joins it with another layer of information. Spatial Statistics Statistical methods that use space and spatial relationships to study data. Geographic Profiling Methods to analyze the locations of a crime series to determine the most probable area of an offender residence; a.k.a. journey to crime analysis. Temporal Animation Display of temporal data as a part of an animated sequence of events in a map.
 
Web Link
FBO.gov Permalink
(https://www.fbo.gov/spg/DON/ONR/N00173/N00173-13-R-RH01/listing.html)
 
Record
SN02906702-W 20121004/121002234841-468756a6e3b8fa14a5890d66d7e214e0 (fbodaily.com)
 
Source
FedBizOpps Link to This Notice
(may not be valid after Archive Date)

FSG Index  |  This Issue's Index  |  Today's FBO Daily Index Page |
ECGrid: EDI VAN Interconnect ECGridOS: EDI Web Services Interconnect API Government Data Publications CBDDisk Subscribers
 Privacy Policy  Jenny in Wanderland!  © 1994-2024, Loren Data Corp.