SPECIAL NOTICE
A -- MARKET SURVEY QUESTIONNAIRE
- Notice Date
- 1/15/2015
- Notice Type
- Special Notice
- Contracting Office
- ACC - Warren (ACC-WRN)(DTA), ATTN: AMSTA-AQ-AMB, E Eleven Mile Road, Warren, MI 48397-5000
- ZIP Code
- 48397-5000
- Solicitation Number
- VICTORYC4ISREW
- Archive Date
- 1/15/2016
- Point of Contact
- Stephanie Dickinson, 586-282-8677
- E-Mail Address
-
ACC - Warren (ACC-WRN)(DTA)
(stephanie.r.dickinson4.civ@mail.mil)
- Small Business Set-Aside
- N/A
- Description
- Sources Sought Notice. The Program Executive Office for Ground Combat Systems (PEO GCS) is conducting a market survey to identify, as potential sources, companies that may possess the expertise, capabilities, and experience to competently respond in providing non-personal engineering, professional, and technical support services required to mature open architectures for integrating electronic systems on DoD ground combat and tactical platforms. Clarification of this Action. This request is a Market Survey. It is an inquiry intended to measure the level of industry interest and capability to help determine the appropriate acquisition strategy for a potential future acquisition. The potential acquisition is for a single contract, obligated over years 2016-2020. This Market Survey neither constitutes a Request for Proposal or Invitation to Bid, nor commits the Government to an ultimate acquisition approach. Additionally, as a Market Survey, this inquiry does not bind the Government to solicit for or award a competitive contract. Participation in this survey is also wholly voluntary on the part of the contractor, as no reimbursements will be made to any contractor for ANY costs associated with their participation in the survey. Data submitted in response to this market survey will not be returned. Lastly, participation in this Market Survey, while important to Army acquisition planners, is neither mandatory nor is it requisite to future participation by a contractor in this or a similar contract RFP. You may address any part or portion of this Market Survey. However, the Government reserves the right to solicit for all or parts of these requirements in the best interest of the Government. Assumptions. a) The respondent will fully explain their depth and breadth of experience in the competencies described. b) The respondent has proven ability to support the development, validation, compliance testing and maintenance of Command, Control, Communication, Computers, Intelligence, Surveillance, Reconnaissance /Electronic Warfare (C4ISR/EW) specifications in a Standards Body environment. Scenario. The requirement for this proposed contract is to maintain and expand the architectural framework and supporting products, including standard specifications, to be used in the Vehicular Integration of C4ISR/EW Interoperability (VICTORY) initiative. Key Notes to Respondent. In this potential acquisition, the work will be conducted in the context of a Government-led Standards Body comprising both Government and Industry participants. VICTORY standard specifications and supporting products are created through the Standards Body Working Group process with full disclosure to all Standards Body members. Also, all resulting standard specifications and supporting products will be fully open Government Intellectual Property. The selected awardee shall not solicit non-disclosure agreements (or other similar agreements) from current and future Government and Industry participants who plan to join the VICTORY Standards Body. In addition, the selected awardee will gain intimate knowledge of and may potentially have influence over the VICTORY architecture and standards being developed that will enable the integration of C4ISR/EW equipment on ground combat and tactical vehicles. The selected awardee will also gain intimate knowledge of current acquisition programs. Such knowledge and influence could provide the selected awardee and its subcontractors an unfair competitive advantage as described in Federal Acquisition Regulation (FAR) subpart 9.5. Therefore, the Government or an authorized representative may, up to three years after acceptance of all programmatic documentation to be delivered under the resulting contract, restrict the awardee's ability to participate in future related program managed system acquisition action(s). Respondents who deem themselves qualified; please take the time to answer the questionnaire below. For each of the 11 competencies identified in the questionnaire, please provide a response based on your organization's (i) experience in the area, (ii) knowledge of subject matter, and (iii) manpower capabilities. PEO GCS is interested to see who is capable and experienced in meeting all areas of interest. QUESTIONNAIRE Instructions for Completing the Questionnaire: Telephone or email inquiries will not be entertained. Please submit electronic copy responses to: Grace Qi Ping Xiang (qiping.p.xiang.civ@mail.mil) and Judy Busha (judith.k.busha.civ@mail.mil) Responses are due NO LATER than close of business on 10 business days after publication of this market survey. All responses shall be postmarked by 30 Jan 2015. Refer to the Guidelines for Controlled Unclassified Information (CUI), below, for transmission information. Response Format. Submittal will be in PDF format only. Respondents to this market survey are specifically instructed to appropriately mark any document that contains proprietary data, trade secrets, or other business sensitive information. If desired, responses may address the question number in each case so as not to repeat the question in each response. Please spell out acronyms in their first instance. Also, clearly mark any confidential information per the guidance provided under the General Information section. Respondents to this questionnaire may be contacted directly in the future for additional comment and information as the Government's requirements develop. Administrative Information. 1. Company Name 2. Mailing Address and Website 3. Location of facilities 4. CAGE Code (if applicable) 5. North America Industry Classification System (NAICS) number 6. Business size and eligibility under US Government socio-economic programs and preferences 7. Does your company use a cost system that has been certified by the Defense Contract Audit Agency (DCAA)? Person Responding to Questionnaire. 8. Name 9. Title 10. Company Responsibility 11. Telephone Number/Fax Number 12. E-Mail Address Describe your firm's recent and relevant experience in the competencies outlined below. The most desirable experience is that which has been obtained within the last three (3) years. When citing Government work, please include Contract numbers and Government POCs. 1.(i) Supporting the operations of a Government-Industry Standard body relative to ground vehicle integration and/or C4ISR/EW system integration, particularly in the ground-vehicle domain. (ii) Providing personnel to serve as deputy working group chairperson and working group secretary. (iii) Developing and maintaining an access controlled web portal (which must meet the DoD PKI and information system requirements and policies) serving as the virtual workspace for the Standards Body. 2.Developing new and maintaining existing architecture, standard specifications and reference designs, particularly in regard to the ground-vehicle-integration portions of the C4ISR/EW domain. (This domain includes architecture, design, standards development, validation, maturation and compliance verification and demonstration.) 3.Maturing the existing VICTORY architecture and standard specifications in accordance with the VICTORY Standards Development Process based upon the Internet Engineering Task Force (IETF) model (http://www.ietf.org/, RFC 2026). 4.Validating the technical feasibility and suitability of the new and revised VICTORY architecture and standard specifications, with the objective of advancing them to the proposed level of maturity, relative to integration of C4ISR/EW systems, particularly in the ground-vehicle domain. 5.Developing new, and maintaining and updating existing Compliance Test Suite (CTS) for each component types identified in a VICTORY Architecture document. The CTS consists of: (a) a Compliance Test Plan (CTP) documenting the compliance verification testing procedures; (b) a Compliance Test Report (CTR) template documenting the compliance verification testing results; and (c) a Compliance Test Tool (CTT) which is a semi-automated software tool. The CTT is used to assist compliance verification testing. The CTT implements the CTPs and is capable of generating a resulting CTR as compliance verification evidence. 6.Implementing a formal Configuration Management process to be applied to VICTORY document products, software and hardware. Hardware and software will only be developed as necessary to support competencies 2-5 above. 7.Maintaining a developmental facility and appropriate engineering staff with the capability of conducting validation experiments and development at the Top Secret / Sensitive Compartment Information (TS/SCI) security clearance level. The identification of the facility's location (complete address) and identity as a SCIF shall be protected at a minimum of FOR OFFICIAL USE ONLY (FOUO). See Guidelines for Controlled Unclassified Information (CUI) for the protection measures for FOUO. 8.Summarize your organization's experience in C4ISR/EW systems, particularly in the ground- vehicle domain, addressing Information Assurance (IA) / Cyber Security requirements and designing solutions. 9.Summarize your organization's understanding of fielded ground vehicle platforms and C4ISR/EW systems. Also address experience developing standard specifications for candidate platforms and equipment for adoption and implementation of electronic architecture and standards specifications to improve integration of C4ISR/EW systems, particularly in the ground-vehicle domain, including, but not limited to, developing platform-specific reference designs, evaluating potential technology solutions, and developing reference software for demonstrations. 10.Summarize your organization's experience conducting technical evaluations and assessments of engineering studies, reports and design documents for major systems/platforms and C4ISR/EW. Also address experience evaluating major systems/platforms and C4ISR/EW system concepts, system designs, and system support program proposals. Address experience recommending actions for optimizing system and network performance. 11.Summarize your organization's experience conducting prototyping, modeling and simulation of C4ISR/EW systems to assist in the development of specifications and other VICTORY products. GENERAL INFORMATION: The Government appreciates the time and effort taken to respond to this survey. The Government acknowledges its obligations under 18 U.S.C. 1905 to protect information qualifying as quote mark confidential quote mark under this statute. [To avoid possible confusion with the meaning of the term quote mark confidential quote mark in the context of Classified Information, we will use the term quote mark PROPRIETARY. quote mark ] Pursuant to this statute, the Government is willing to accept any PROPRIETARY (e.g., trade secret) restrictions placed on qualifying data forwarded in response to the survey questions and to protect it from unauthorized disclosure, subject to the following: 1. Clearly and conspicuously mark qualifying data with the restrictive legend (all caps) quote mark PROPRIETARY quote mark with any explanatory text, so that the Government is clearly notified of what data needs to be appropriately protected. 2. In marking such data, please take care to mark only those portions of the data or materials that are truly proprietary (over breadth in marking inappropriate data as quote mark PROPRIETARY quote mark may diminish or eliminate the usefulness of your response - see Item 6 below). Use circling, underscoring, highlighting or any other appropriate means to indicate those portions of a single page which are to be protected. 3. The Government is not obligated to protect unmarked data. Additionally, marked data that is already in the public domain or in the possession of the Government or third parties, or is afterward placed into the public domain by the owner or another party through no fault of the Government will not be protected once in the public domain. Data already in the possession of the Government will be protected in accordance with the Government's rights in the data. 4. Proprietary data transmitted electronically, whether by physical media or not, whether by the respondent or by the Government, shall contain the quote mark PROPRIETARY quote mark legend, with any explanatory text, on both the cover of the transmittal e-mail and at the beginning of the file itself. Where appropriate for only portions of an electronic file, use the restrictive legends quote mark PROPRIETARY PORTION BEGINS quote mark and quote mark PROPRIETARY PORTION ENDS. quote mark 5. In any reproduction of technical data or any portions thereof subject to asserted restrictions, the Government shall also reproduce the asserted restriction legend and any explanatory text. 6. The Government sometimes uses support contractors in evaluating responses. Consequently, responses that contain proprietary information may receive only limited or no consideration, since the Respondent's marking of data as quote mark PROPRIETARY quote mark will preclude disclosure of same outside the Government and therefore, will preclude disclosure to those support contractors assisting the evaluation effort. The Government will use its best efforts to evaluate those responses that contain proprietary information without using support contractors, consistent with the resources available. GUIDELINES FOR CONTROLLED UNCLASSIFIED INFORMATION (CUI) General: There are types of information that are not classified but that require application of access and distribution controls and protective measures for a variety of reasons. This information is known as quote mark controlled unclassified information (CUI). quote mark The types of information considered CUI for responses to this market survey include (i) technical data, and (ii) information marked quote mark For Official Use Only quote mark by the U.S. Government. When handling CUI material, all persons are to comply with these requirements and follow their company policy and/or applicable Proprietary Information Agreements (PIA) concerning the protection of proprietary information in situations not clearly stated herein. Technical Data Description: Any recorded information related to experimental, developmental, or engineering works that can be used to define an engineering or manufacturing process, or can be used to design, procure, produce, support, maintain, operate, repair, or overhaul program material (to include hardware such as armor, engines, etc). The data may be graphic or pictorial delineations in media (e.g., computer software, drawings, or photographs), text in specifications, related performance or design documents, or computer printouts. Examples of technical data include research and engineering data, engineering drawings, and associated lists, specifications, standards, process sheets, manuals, technical reports, catalog-item identifications, and related information, and computer software documentation. For Official Use Only (FOUO) Information Description: quote mark For Official Use Only (FOUO) quote mark is a Government designation applied to unclassified information that may be exempt from mandatory release to the public under the Freedom of Information Act (FOIA). FOUO information includes information identified as such in the Security Classification Guide or information from a government document marked FOUO. CUI Markings Marking of FOUO documents will be in accordance with Army Regulation (AR) 25-55. Information extracted from an FOUO document will carry the FOUO marking until formally reviewed by the government. AR 25-55 can be found at http://www.apd.army.mil/pdffiles/r25_55.pdf. Marking of Technical Data will include the statement provided in the Security Classification Guide. If the contents of the technical document require more than one Distribution Statement, apply the most restrictive statement. This does not preclude additional mandated markings as may be required by the contract. Protection of CUI Information Access: CUI may be released only to an individual who has a valid need for such access in connection with the accomplishment of a lawful and authorized Government purpose. Information in any media format may only be disseminated on a need-to-know basis. The need-to-know restricts the use or dissemination of CUI data to those individuals or organizations with direct affiliation with the given program or project. Further dissemination of such information will be at the discretion of the Government Security Manager. Personnel no longer requiring access to CUI must dispose (see quote mark Disposal quote mark below) or surrender any in their possession and terminate future access to it. Storing/Handling: During working hours, persons preparing responses to this market survey, and including CUI in the response, should take reasonable steps to minimize risk of access to the CUI by unauthorized personnel. After working hours, when not in physical possession of the owner, all CUI (whether hardcopy or media that contains CUI) must be afforded a reasonable degree of physical protection to prevent theft of program information (e.g., store CUI information in locked desks or file cabinets, locked rooms, cable lock laptops, storing in a trunk, storing out of site or similar means). Do not display CUI in public places (e.g., airports, airplanes, restaurants). Computers used to process CUI do not need to be accredited for classified use, but shall be in accordance with DFARS 252.204-7012 Safeguarding of Unclassified Controlled Technical Information. Do not process CUI on public computers (e.g., those available for use by the general public in kiosks, hotel business centers), public wireless networks or computers that do not have access control. Personally owned computers and personally owned devices are not authorized to process CUI. Mobile devices used to store CUI electronically (e.g., company-issued laptops, personal electronic devices [PED]) must be physically protected and use NIST/NIAP-approved cryptographic products/algorithms. These are available at http://iase.disa.mil/pki/eca or http://csrc.nist.gov/cryptval/. All media shall be marked in accordance with the Security Classification Guide and protected as below: Portable electronic devices (e.g., smartphones, laptop computers, tablets) and removable media (e.g., external hard drives, flash drives, USB drives; not including optical media) must be physically and electronically protected as described in this instruction. Optical Media (e.g., DVDs, CDs) and non-portable computers (e.g., desktop or tower computers) are required to be physically protected; however, they are not required to be electronically protected as described in this quote mark Protection of CUI quote mark portion of the market survey. Dissemination: CUI printed documents and material in market-survey responses may be transmitted through mail channels, commercial carrier or hand-carried without formal courier orders. Once market-survey responses are in the Government's possession, FOUO information may be disseminated to DoD personnel and DoD contractors to conduct official business for the program. If dissemination is required outside of DoD personnel or DoD contractors, Government personnel will contact the Government Security Manager for approval. Technical data will follow the release instructions identified in the Distribution Statement. Use secure communications whenever possible; however, land-line telephones are more secure than cellular telephones and should be used whenever available for discussions involving CUI. Transmit voice and facsimile transmissions only when you have a reasonable assurance that only authorized recipients will have access to the transmission. Digital transmission shall comply with the below: All transmission and/or dissemination of CUI (i.e., email and file transfers) must use NIST/NIAP-approved cryptographic products/algorithms, e.g., DoD-approved Public Key Infrastructure Certification or AMRDEC Safe Exchange at https://safe.amrdec.army.mil/safe. These are available at http://iase.disa.mil/pki/eca or http://csrc.nist.gov/cryptval/. This encryption requirement includes communications that contain passcodes to teleconferences or web conferences where there is a reasonable expectation that CUI may be discussed. When encryption is not available, a government collaborative suite (aka Integrated Digital Environment [IDE]) must be used to transmit CUI. Contractor-hosted collaborative suites may be used for digital transmission and/or dissemination of CUI by personnel not located on a government backbone (e.g., NIPRNET), provided the following conditions apply: Use only NIST/NIAP-approved cryptographic products/algorithms. The latest validation lists may be obtained at http://iase.disa.mil/pki/eca or http://csrc.nist.gov/cryptval/. Use an internally hosted service that does not use a third-party collaborative suite service provider. Do not post CUI to web pages that are publicly available or have access limited only by domain/IP restrictions. CUI may be posted to web pages that control access through the use of a DoD approved Public Key Infrastructure Certification and that provide protection via use of secure sockets, or other equivalent technologies. These are available at http://iase.disa.mil/pki/eca. The Internet is quote mark Public Access quote mark. CUI must be reviewed and officially approved by the PEO GCS Public Affairs Officer for public release by the Government before placing on the Internet. This is not applicable when the Internet is used for e-mail transmissions and encryption is used as noted above. Disposal: Destroy CUI documents by any means approved for the destruction of classified information, i.e. cross-cut shredding or other means that would make it difficult to recognize or reconstruct the information. Clear, purge, or destroy CUI on removable media IAW BBP 03-PE-O-0003 Army Information Assurance Sanitization of Media to AR 25-2. This is available at https://informationassurance.us.army.mil. Report of Loss of CUI: Report any loss of CUI or loss of CUI from a contractor information system that is known to the contractor within the period of this market survey response to the Government Security Manager. Initial reports shall be made as expeditiously as possible in all cases within 72 hours of discovery. If additional information is required after submission and review of the initial report, guidance will be provided at that time. Mark any reports For Official Use Only, exemptions 2 and 5 apply. Initial report content shall include the following information as available. Applicable dates, including dates of compromise and dates of discovery Threat methodology, including all known resources used (e.g. IP addresses, domain names, software tools) Account of what actions the threat(s) may have taken on victim system/network What information may have been compromised, exfiltrated, or lost, and its potential impact on government programs Report of Cyber Intrusions: Report cyber intrusions or other compromises of CUI during the period of this market survey response to your supporting counterintelligence office, which will inform the DoD-DIB Common Information Sharing Environment (DCISE). Notify the Government Security Manager of any incidents as well. Refer to Report of Loss of CUI for what needs to be reported, when, and how.
- Web Link
-
FBO.gov Permalink
(https://www.fbo.gov/notices/874ebd4c07f999a1edd22254fc7b2f43)
- Record
- SN03617776-W 20150117/150115235318-874ebd4c07f999a1edd22254fc7b2f43 (fbodaily.com)
- Source
-
FedBizOpps Link to This Notice
(may not be valid after Archive Date)
| FSG Index | This Issue's Index | Today's FBO Daily Index Page |