Loren Data's SAM Daily™

fbodaily.com
Home Today's SAM Search Archives Numbered Notes CBD Archives Subscribe
FBO DAILY - FEDBIZOPPS ISSUE OF JUNE 06, 2015 FBO #4943
MODIFICATION

A -- Army Cyberspace Operations Other Transaction Agreement

Notice Date
6/4/2015
 
Notice Type
Modification/Amendment
 
Contracting Office
ACC - New Jersey, Center for Contracting and Commerce, Building 10 Phipps RD, Picatinny Arsenal, NJ 07806-5000
 
ZIP Code
07806-5000
 
Solicitation Number
W15QKN15Z8430
 
Archive Date
6/3/2016
 
Point of Contact
Kristen Kachur, 973-724-3217
 
E-Mail Address
ACC - New Jersey
(kristen.kachur@us.army.mil)
 
Small Business Set-Aside
N/A
 
Description
The Army Contracting Command - New Jersey (ACC-NJ), on behalf of the Department of Assistant Secretary Army Acquisition Logistics and Technology (ASAALT) is releasing this special notice to inform interested parties about the Government's interest in establishing a Section 845 Other Transaction Agreement (OTA), with an eligible entity or group of entities, to include industry, academic, non-profit, and not-for-profit partners, for research and development efforts to support Department of the Army Cyberspace Operations requirements as related to weapons or weapon systems. The ASAALT develops, acquires, fields, and sustains the world's best equipment and services through efficient leveraging of technologies and capabilities to meet current and future Army needs. The ASAALT is seeking to leverage multiple vehicles as a holistic approach for effective and efficient execution of Army Cyberspace capability development. Additional information about ASAALT is available at http://www.army.mil/asaalt. The Government is anticipating establishing a Section 845 Prototype Other Transaction Agreement (OTA) with a new or existing consortium that has significant non-traditional contractor participants. The goal of this consortium community is to assist in maturing Army Cyberspace Operations through re-use and augmenting existing cyber technologies and fostering relevant cyber weapons systems and awareness in the newly established Cyber domain. Cyberspace is a global domain within the information environment consisting of the interdependent network of information technology infrastructures and resident data, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers (JP 1-02). Maturing the Army Cyberspace domain requires an effective understanding of the technology landscape as it relates to current and future cyberspace capability needs. The mission of the consortium will be to establish the Army as a leader in cyberspace operations, capability development, R&D, education and training programs, and policy development. Additional goals will include: Be a thought and action leader across the cyberspace operations stakeholder community Serve as proof-of-concept test bed and blueprint for requirements articulation and capability development Facilitate the advancement of membership cyber maturity levels (as this domain knowledge grows the probability of warfighter technological advantage increases) Create a cyber center of gravity as incubator and engine for a cyberspace capability Shape and enable cyberspace operations education Section 845(a)(2) of the National Defense Authorization Act (NDAA) for Fiscal Year 1994, Public Law (P.L.) 103-160, as amended (Title 10 United States Code (U.S.C.) Section 2371 note), authorizes the Secretary of the Army (SA) to carry out prototype projects that are directly relevant to weapons or weapon systems. In accordance with the above referenced law, the Government must ensure that no official of an agency enters into an Other Transaction Agreement (OTA) for a prototype project under this authority unless there is significant non-traditional defense contractor(s) participation in the prototype project; or at least one third of the total cost of the prototype project is to be paid out of funds provided by parties to the transaction other than the Federal Government. In addition to existing consortiums, industry members may propose forming a new consortium that would seek to work with the Government, through an OTA agreement in the below areas. Any company, university, or research organization is eligible to join the consortium. The Government is seeking interested parties that are willing to join and/or establish a consortium with collective expertise in the following technology areas specifically related to Army Cyberspace Operations: Cyberspace Operations Technology Objectives: Innovative technologies, processes, methods, facilities and capabilities are sought to identify, develop, test, provide access to, and improve technologies resident in universities, private and federal labs, incubators and industry that are focused on Army Cyberspace requirements (offensive, defensive, and DoDIN) related to weapons and weapons-systems. At all levels, the Army seeks to build, operate, and secure defensible networks, defending them against specific threats to achieve mission assurance, while denying the adversary freedom of action in the cyberspace domain. Offensive Cyberspace Operations Objectives - Technologies to supporting operations to project power by the application of force against enemies and adversaries in and through cyberspace. Technologies for Cyber situational awareness and integration with offensive operations. Technologies for delivery of denial effects in cyberspace. Technologies for planning and management of integrated cyberspace and electronic warfare tools. Defensive Cyberspace Operations Objectives - Technologies supporting operations conducted to defend DOD or other friendly cyberspace and preserve the ability to utilize friendly cyberspace capabilities. Technologies to gain and maintain situational awareness through the visualization of key cyber terrain and an understanding of the actions occurring within. Technologies that actively predict and hunt (search and discover) for advanced internal cyber threats and vulnerabilities that do not trigger or generate warnings using routine detection measures. Technologies that allow friendly cyber forces to outmaneuver adversaries by performing preapproved, automated, agile, internal countermeasures that stop or mitigate cyber attacks; and when authorized, conduct response actions external to friendly networks in order to create effects that deny the adversary use of offensive cyber capabilities. Technologies to conduct DCO mission planning and protection that identifies and assures the availability of key cyber terrain and critical infrastructure to the Army, DoD, host nation, and civil authorities that support Army missions. Technologies that protect networks, information technology platforms, and data by controlling inbound/outbound traffic, dynamically managing locations of critical services, and hardening information systems. Technologies to conduct mission assurance actions that dynamically re-establish, re-secure, re-route, reconstitute, or isolate degraded or compromised networks. Technologies to conduct site exploitation and forensic analysis and determine technical and operational impacts of intrusions. Technologies to evaluate the defensive posture of networks and information systems using vulnerability assessment methods and threat emulation in order to recommend or direct changes to ensure operational readiness. DoDIN Operations Objectives - Technologies supporting operations to design, build, configure, secure, operate, maintain, and sustain networks. Technologies to build (plan, engineer, install) secure, resilient, and defensible networks Technologies that supports global, secure, adaptive, and rapid access across trusted and authenticated domains to authorized entities. Technologies that allow for the secure operation of networks. (i.e. automated scanning and remediation of vulnerabilities) Technologies that support the integration with mission partners during garrison and deployed operations. Technologies that support the discovery, delivery, and storage of data to provide awareness and access to information in a timely and efficient manner. The Government requests submission of formal Letters of Intent in response to this announcement from new or existing interested Consortia. Responses can be sent to Ms. Kristen Kachur, Contract Specialist, via email at Kristen.e.kachur.civ@mail.mil no later than 4:00 PM EST 30 June 2015. NO TELEPHONE INQUIRIES WILL BE ACCEPTED. Electronic responses are to be in Adobe PDF or Microsoft Word format using a size 12 font with one inch margins. Adobe PDF format is preferred. The Letter of Intent should include the following: 1. A cover page labeled with the heading, in quotation marks, quote mark Army Cyberspace Operations quote mark, name of consortium, name of corporate point of contact (POC), name of technical POC, telephone number for each POC, full mailing address, e-mail addresses for each POC, and any other pertinent information. 2. The consortium's vision, mission statement, goals, membership (indicating traditional and non-traditional defense contractors including corporate locations), success criteria, metrics, management framework, articles of collaboration/by-laws, Consortium Member Agreement (CMA), accounting practices, fee structure, and other information which the respondent considers important. Responses should also contain the interested parties' experience and capability information in the technology areas listed in this notice along with a description of their capabilities for the categories under which they have experience IAW paragraph 3 below. 3. No more than twenty (20) pages of technical information including: (a) Narrative describing how the specified technical requirements would be addressed and fulfilled (b) Corporate competencies and past performance experience with regard to development and modification of systems including relevant history of ability to develop and integrate similar technologies. (c) An indication as to whether the technology is sufficiently mature to build and demonstrate, or whether additional development would be more appropriate prior to a subsequent build. (d) Describe any Independent Research and Development (IRAD) programs applicable to this announcement regarding Government modified commercial systems for applications such as this. (e) Describe experience gained by working on projects across the services and the other defense agencies, as well as affiliations, associations, and specific involvement in and with the federal and non-federal research and development, testing and engineering community, sufficient to demonstrate a well-established presence in that community. (f) Describe experience in cyberspace operations technologies from current and historical sources across Government, industry, and academia, your experience contributing to the cyber domain, and experience promoting efficient and effective cyber-related information sharing and collaboration. (g) Describe the notional management model for the community, including any proposed consortium agent, physical location of management entity, and proposed government engagement process. Please submit all pages as a single (.doc or.pdf) file. Proprietary information, if any, should be minimized and MUST BE CLEARLY MARKED. Please be advised that all submissions become Government property and will not be returned. This Special Notice is for information and planning purposes only, shall not be construed as an invitation for bid, request for quotation, request for proposal, or a commitment by the U.S. Government. The U.S. Government does not intend to award a contract on the basis of this announcement. All information is to be submitted at no cost or obligation to the Government. The U.S. Government is not obligated to notify respondents of the results of this announcement. The U.S. Government reserves the right to reject, in whole or in part, any private sector input, as a result of this announcement. If a formal solicitation is generated at a later date, a separate solicitation notice will be published. Interested parties are responsible for adequately marking proprietary or competition sensitive information contained in their response. No sensitive or classified information will be discussed. Foreign-owned, controlled, or influenced firms are advised that security restrictions may apply that may preclude their participation in these efforts.
 
Web Link
FBO.gov Permalink
(https://www.fbo.gov/notices/438f25c3be6a65d6739c4019ea5ff900)
 
Record
SN03753417-W 20150606/150604235719-438f25c3be6a65d6739c4019ea5ff900 (fbodaily.com)
 
Source
FedBizOpps Link to This Notice
(may not be valid after Archive Date)

FSG Index  |  This Issue's Index  |  Today's FBO Daily Index Page |
ECGrid: EDI VAN Interconnect ECGridOS: EDI Web Services Interconnect API Government Data Publications CBDDisk Subscribers
 Privacy Policy  Jenny in Wanderland!  © 1994-2024, Loren Data Corp.