Loren Data's SAM Daily™

fbodaily.com
Home Today's SAM Search Archives Numbered Notes CBD Archives Subscribe
FBO DAILY - FEDBIZOPPS ISSUE OF OCTOBER 01, 2015 FBO #5060
SOLICITATION NOTICE

70 -- CyberCity - Sole Source J&A

Notice Date
9/29/2015
 
Notice Type
Justification and Approval (J&A)
 
NAICS
334118 — Computer Terminal and Other Computer Peripheral Equipment Manufacturing
 
Contracting Office
Department of the Air Force, Direct Reporting Units, USAF Academy - 10 CONS, 8110 Industrial Drive, Suite 200, USAF Academy, Colorado, 80840-2315, United States
 
ZIP Code
80840-2315
 
Solicitation Number
FA7000-15-T-0151
 
Archive Date
10/30/2015
 
Point of Contact
Pamela A. Reimers, Phone: 7193338269
 
E-Mail Address
pamela.reimers@us.af.mil
(pamela.reimers@us.af.mil)
 
Small Business Set-Aside
N/A
 
Award Number
FA7000-15-T-0151
 
Award Date
9/30/2015
 
Description
Sole Source J&A FEDBIZOPS NOTICE OF INTENT FOR SOLE SOURCE: The 10 CONS/LGCB, Operational Contracting Office, United States Air Force Academy (USAFA) received a Sole Source justification for the purchase of a SANS CyberCity. The award will be issued to Escal Institute of Advanced Technologies (Doing Business as SANS, Inc.), a large business, at 8120 Woodmont Ave. Ste. 310, Bethesda, MD, 20814-2743. This procurement is for the acquisition of a sole source commercial item using simplified procedures in accordance with FAR Part 12 and 13. The North American Industrial Classification System (NAICS) number is 334418 and the business size standard is 500 employees. a. Only one responsible source and no other item will satisfy the USAFA requirement. b.Market research found products that met similar needs; however, no other products could fully satisfy all aspects of the requirement and the kinetic/hands-on experience offered by SANS CyberCity without the need for extensive programming/customization. Several remote access products were identified. The key difference between the CyberCity and remote access is the capacity for students to visualize the kinetic/physical effects of cyber attacks. When the students attack a power plant with the SANS CyberCity they can see the lights go off in the model city. Other simulator models identified were principally designed to simulate SCADA networks to train users of those networks. In order to simulate a SCADA network and attack it, the USAFA faculty would need the expertise to build the simulated network which is a labor intensive configuration which cannot be supported. Additionally, this simulator would not facilitate visualization of physical impacts of cyber attacks. A variety of professional peers, both within the DoD and private sector, were queried to identify other companies they utilized to meet their cyber security education and training needs. One military location currently utilizing SANS CyberCity remotely. Another military location is currently in the process of procuring the same CyberCity from SANS. They were contacted regarding other possible CyberCity sources and were also unable to identify another source that provides a miniature replica with kinetic effects. c. This request is issued for the Dean of Faculty, USAF Academy. SANS is the only known source that meets the USAFA requirements. Requirements for the CyberCity are: SAMS CyberCity model is a miniature replica of a city's industrial control networks and critical infrastructures. This includes but is not limited to transportation (traffic lights, railroads, and airports), utility services (electrical and water), community services (residential, business, medical, and banking), and the cyber realm (medical, bank, and social network accounts and records). The model provides a customizable training and educational environment that is easy to use and configure. It must provide prebuilt contextual training scenarios to support cadet learning exercises and demonstrate physical effects to help cadets visualize the kinetic capabilities in Cyberspace. 1)CyberCity (model): includes buildings, lighting structures, and train system for the infrastructure described above (see section I. Background, A.). a. CyberCity Little Iron (fits under the CyberCity model) is a the computer that directly interfaces with CyberCity's kinetic assets through USB/interfaces. Must communicate with USAFA's data center virtualization servers, VMware software, and VPNs. 2)Installation and testing for CyberCity (components include but are not limited to the CyberCity Module Editor, Scoring Server, and Little Iron). CyberCity Little Iron will need to be set-up and configured. 3)CyberCity Module Editor: allow customer to customize and create new challenge modules/missions and/or change existing modules/missions. 4)CyberCity Scoring Server: allow for utilization of the system to run competitions and keep score between teams. 5)Offer twelve (12) Pre-programmed Modules/Missions and Provide USAFA at least six (6) of these Pre-programmed Modules/Missions: a.Kinetic Reconnaissance & Differentiation: Mission participants must gain access to all five cameras in CyberCity so that they can view kinetic actions from the satellite, commercial, industrial, residential, and military cameras. b.Power Grid: Attackers have hacked the power grid causing a blackout. Mission participants must gain control of power computers and the associated Industrial Control Systems to turn the lights back on. c.Missile Launcher: Mission participants must prevent the launching of the missile at the commercial sector of the city by gaining control of it and aiming it to fire harmlessly over the horizon. d.Water Reservoir: Attackers have manipulated the Human Machine Interface (HMI) of the water system to make it look contaminated, causing reservoir employees to take the wrong actions in purifying the water. Mission participants must alter the system so that the HMI readings are correct, preventing the contamination of the water and changing its color. e.Traffic Lights: Attackers have set all traffic lights into the city at green to cause traffic mayhem. Mission participants must access the traffic system and normalize the traffic system. f.Landing Strip Denial of Service: Attackers have launched a denial of service attack that results in the lights on the landing strip of the military quadrant to be disabled. Mission participants must fight through the denial of service to get the landing strip lights back on. g.Enumeration of CyberCity Network and Assets: In this mission, cyber warriors are challenged to scan the CyberCity network, inventorying network and host assets that will be used in missions. Through further in-depth exploration, participants must analyze given subnets of CyberCity to devise attack and defense strategies and tactics. Depending on participant's skill level, stealthy scanning techniques can be required to evade detection. h.Network Reconnaissance: In this mission, participants must use CyberCity assets to gain information about potential attacker activity by combing through the CyberCity social networking site and analyzing detailed evidence. Through exploring posts by CyberCity citizens, cyber warriors will be able to discern details of their relationships and interactions, as well as the technical infrastructure of CyberCity. i.Telephone Infrastructure: Cyber attackers are trying to exploit CyberCity's telephony infrastructure, both to intercept sensitive phone calls and to disrupt other phone interactions. Cyber warriors must ensure that the telephony infrastructure of CyberCity is safe and secure to prevent such attacks. j.ISP Data Center HVAC System: To undermine the CyberCity's Internet service, attackers attempt to gain control of the Heating, Ventilation, and Air Conditioning systems of CyberCity's ISP data center. In this attack, they attempt to disable cooling, driving up the temperature at the ISP to cause damage to routers, switches, and other equipment. Cyber warriors are charged with preventing this from happening. k.Bank Alarm System: Cyber warriors must gain control of the bank's alarm system to prevent a catastrophe, with the alarm status indicated by the color of the light in the bank (blue = active alarm, red = disabled alarm). l.Train Derailment: Attackers have loaded a radiological bomb on the train, and have threatened to detonate it in the residential section of CyberCity. Mission participants must gain control of the train's SCADA system and either shut it off, or switch it so that it derails before reaching the residential quadrant. 6)Must have the ability to accommodate 250 students over an academic year and 25 students at a time. 7)Must provide initial training, train-the-trainer, annual maintenance, and backend support (to include resolving performance issues and fixing reasonable repairs) a.Initial training (one session): must consist of training one (1) individual to use, load, and start modules/missions. b.Train-the-trainer (one session): must consist of training one (1) individual to run the CyberCity. In turn this individual will teach professors and students, to use, load, and start modules/missions and to run the CyberCity. c.Maintenance: to include at least two visits. d.Backend support: must include at least 40 hours of phone support. Both will be used to resolve performance issues and fix repairs. 8)Power constraints: must be compatible with 120v and 220v and circuits up to 30A. Item Unique Identification and Valuation (IUID) (DFARS 252.211-7003) applies to this requirement. This synopsis is for informational purposes only and does not constitute a solicitation for bids or proposals. DO NOT submit a bid/quote at this time. Any offerors believing they can provide the required CyberCity with all of the features and functions of the requirement described above may provide evidence for consideration. Evidence must support the offeror's claim they can fulfill the specification listed above. All qualified sources may submit a response, which if timely received, will be considered by this agency. Information received will be considered solely for the purpose of determining whether a competitive procurement can be conducted. A determination not to compete this proposed procurement based on response to this notice is solely within the discretion of the Government. Responses must be received NLT 4:00 pm Mountain Standard Time (MST) on 29 September 2015. Responses received after this will be considered late IAW FAR 52.212-1(f) and will not be evaluated. The Government does not intend to pay for any information provided under this announcement. Contractors must have a current registration with the System for Award Management (SAM) https://www.sam.gov/portal/public/SAM/ The Government awarded a Firm Fixed Price contract processed IAW FAR 12 and 13. The closing date of this synopsis is 4:00 pm, Mountain Standard Time (MST) on 29 September 2015. Questions should be addressed to the both the Primary POC: Pamela Reimers, Contract Specialist, (719) 333-8269, pamela.reimers@us.af.mil and the Alternate POC: Susan Hashemi, Contracting Officer, (719)-333-8059, susan.hashemi@us.af.mil. 5352.201-9101 OMBUDSMAN (NOV 2012) (a) An ombudsman has been appointed to hear and facilitate the resolution of concerns from offerors, potential offerors, and others for this acquisition. When requested, the ombudsman will maintain strict confidentiality as to the source of the concern. The existence of the ombudsman does not affect the authority of the program manager, contracting officer, or source selection official. Further, the ombudsman does not participate in the evaluation of proposals, the source selection process, or the adjudication of protests or formal contract disputes. The ombudsman may refer the interested party to another official who can resolve the concern. (b) Before consulting with an ombudsman, interested parties must first address their concerns, issues, disagreements, and/or recommendations to the contracting officer for resolution. Consulting an ombudsman does not alter or postpone the timelines for any other processes (e.g., agency level bid protests, GAO bid protests, requests for debriefings, employee-employer actions, contests of OMB Circular A-76 competition performance decisions). (c) If resolution cannot be made by the contracting officer, the interested party may contact the Center/MAJCOM/DRU or AFISRA ombudsmen, James A. Anderson 8110 Industrial Drive, Ste 103 USAFA, CO 80840 Telephone number 719-333-2074 FAX 719-333-9018 email: james.anderson.72@us.af.mil Concerns, issues, disagreements, and recommendations that cannot be resolved at the Center/MAJCOM/DRU or AFISRA level, may be brought by the interested party for further consideration to the Air Force ombudsman, Associate Deputy Assistant Secretary (ADAS) (Contracting), SAF/AQC, 1060 Air Force Pentagon, Washington DC 20330-1060, phone number (571) 256-2397, facsimile number (571) 256-2431. (d) The ombudsman has no authority to render a decision that binds the agency. (e) Do not contact the ombudsman to request copies of the solicitation, verify offer due date, or clarify technical requirements. Such inquiries shall be directed to the Contracting Officer. (End of clause)
 
Web Link
FBO.gov Permalink
(https://www.fbo.gov/spg/USAF/DRU/10ABWLGC/FA7000-15-T-0151/listing.html)
 
Place of Performance
Address: US Air Force Academy, Colorado Springs, Colorado, 80840, United States
Zip Code: 80840
 
Record
SN03907960-W 20151001/150929235431-9430b73748161cae0deadddb8959f8ca (fbodaily.com)
 
Source
FedBizOpps Link to This Notice
(may not be valid after Archive Date)

FSG Index  |  This Issue's Index  |  Today's FBO Daily Index Page |
ECGrid: EDI VAN Interconnect ECGridOS: EDI Web Services Interconnect API Government Data Publications CBDDisk Subscribers
 Privacy Policy  Jenny in Wanderland!  © 1994-2024, Loren Data Corp.