Loren Data's SAM Daily™

fbodaily.com
Home Today's SAM Search Archives Numbered Notes CBD Archives Subscribe
FBO DAILY - FEDBIZOPPS ISSUE OF FEBRUARY 05, 2016 FBO #5187
SOURCES SOUGHT

A -- Command, Control, Communications, Computer & Cyber Technologies Base OTA

Notice Date
2/3/2016
 
Notice Type
Sources Sought
 
NAICS
541330 — Engineering Services
 
Contracting Office
Department of the Army, Army Contracting Command, ACC - NJ (W15QKN), BUILDING 10 PHIPPS RD, PICATINNY ARSENAL, New Jersey, 07806-5000, United States
 
ZIP Code
07806-5000
 
Solicitation Number
W15QKN-16-X-03AK
 
Archive Date
3/19/2016
 
Point of Contact
Daniel A. Witt, Phone: 9737247180
 
E-Mail Address
daniel.a.witt.civ@mail.mil
(daniel.a.witt.civ@mail.mil)
 
Small Business Set-Aside
N/A
 
Description
The Army Contracting Command - New Jersey (ACC-NJ), on behalf of the Office of the Assistant Secretary of the Army for Acquisition, Logistics, and Technology (ASA(ALT)) and the Armament Research, Development, and Engineering Center (ARDEC) is releasing this sources sought notice to inform interested parties about the Government's interest in establishing a Section 815 Other Transaction Agreement (OTA) with an eligible entity or group of entities, to develop and mature technologies in the critical fields of command, control, communications, computer, and cyber technologies. Section 815, Amendments to Other Transaction Authority, of the National Defense Authorization Act (NDAA) for Fiscal Year 2016, inserts new Section 2371b, Authority to carry out prototype projects. Section 2371b authorizes the Secretary of a military department to carry out certain prototype projects that are directly relevant to enhancing the mission effectiveness of military personnel and the supporting platforms, systems, components, or materials proposed to be acquired or developed by the Department of Defense (DoD), or to improvement of platforms, systems, components, or materials in use by the armed forces. When a Government agency enters into an OTA for a prototype project under this authority, the Government must ensure that a nontraditional defense contractor(s) participate(s) to a significant extent in the prototype project; all participants are small business or nontraditional defense contractor(s); or at least one-third of the total cost of the prototype project is paid out of funds provided by parties to the transaction other than the Federal Government. The Government is seeking to collaborate with a consortium to perform a coordinated research and development program designed to attract new technologies and spur development of basic and advanced prototypes which are critical to the modernization of the DoD. In both the near and long term, the DoD is interested in application and technologies for command, control, communications, computer, and cyberspace to directly enhance mission effectiveness of military personnel and the supporting platforms, systems, components or materials. Collaboration among industry, university, and Government will facilitate continued U.S. military supremacy in these technology areas. A consortium comprised of educational, nonprofit, and commercial organizations with broad and open membership is required to provide the Government a partner able to collaborate across barriers that include military/civilian, public/private, local/regional/national, and political/jurisdictional concerns. The consortium should be open to new membership and display a broad array of expertise and experience, connected to the domains identified herein. It is the Government's intention to enter into an OTA with only one (1) Consortium that can best meet the Government requirements above. This Sources Sought notice has incorporated the requirements from the previous Special Notice W15QKN-15-Z-8430. The Government is seeking a Consortium to perform an integrated and coordinated research and development effort designed to mature and assist in operationalizing full scope DoD command, control, communications, computer and cyberspace technologies: • Leverage insights obtained via collaborative planning between the Government and Consortium members so that the Government is better informed on emerging cyberspace technologies from the private sector and industry achieves greater understanding of emerging DoD operational needs that can be addressed with selected technology solutions. • Pursue the development of designs, processes, tools and equipment for cost effective implementation of novel/new control unit systems, weapon automated systems, weapon system security, software performance strategies, field support and training, obsolescence, rapid prototyping and technology insertion. • Reduce the DoD's reliance on legacy system architectures and improve mobile systems and automated application platforms. • Advance the development of weapon system mitigation technologies to sustain fielded applications and improve protection of personnel from potential hazardous operations. • Pursue emerging and mature technologies and support demonstrating the technology in an operationally relevant environment. • Deliberately mature specified emerging technologies to the point of demonstrating the technology in an operationally relevant environment. • Conduct research, including development and maturation of innovative information assurance, cyber operations and related technologies in a manner that enables effective transition of the technology to programs of record via early consideration of life-cycle support aspects (affordability, manufacturability, sustainment, training, testing, etc.). • Ensure the nature of the agreement facilitates and eases the entry of small and non-traditional companies, academia, etc. into this sector of the Defense market. • Advance the development of relevant standards and architectures to ensure interoperability, subsystem and component inter-changeability. Under this agreement and associated initiatives, the Government is seeking an established consortium with collective expertise, which shall perform coordinated planning and research and development prototype efforts designed to encompass the following as they relate to command, control, communications, computer, and cyberspace technologies. Potential technology applications will include but not be limited to the following: • Situational awareness through the visualization of key cyber terrain and an understanding of the actions occurring within. • Prediction and hunting (search and discover) for advanced internal cyber threats and vulnerabilities that do not trigger or generate warnings using routine detection measures. • Allowance of friendly cyber forces to outmaneuver adversaries by performing preapproved, automated, agile, internal countermeasures that stop or mitigate cyber attacks; and when authorized, conduct response actions external to friendly networks in order to create effects that deny the adversary use of offensive cyber capabilities. • Conducting DCO mission planning and protection that identifies and assures the availability of key cyber terrain and critical infrastructure to the Army, DoD, host nation, and civil authorities that support Army missions. • Protection of networks, information technology platforms, and data by controlling inbound/outbound traffic, dynamically managing locations of critical services, and hardening information systems. • Conducting mission assurance actions that dynamically re-establish, re-secure, re-route, reconstitute, or isolate degraded or compromised networks. • Conducting site exploitation and forensic analysis and determine technical and operational impacts of intrusions. • Evaluation of the defensive posture of networks and information systems using vulnerability assessment methods and threat emulation in order to recommend or direct changes to ensure operational readiness. • Building (plan, engineer, install) secure, resilient, and defensible networks • Global, secure, adaptive, and rapid access across trusted and authenticated domains to authorized entities. • Secure operation of networks. (i.e. automated scanning and remediation of vulnerabilities) • Integration with mission partners during garrison and deployed operations. • Discovery, delivery, and storage of data to provide awareness and access to information in a timely and efficient manner. • Ventronics The Consortium for this OTA should have the full breadth, depth, ability, and expertise to support the scope of the high-level technology objectives (non-inclusive) as they relate to command, control, communications, computer and cyberspace technologies are as follows: Offensive Cyberspace Operations : To develop, demonstrate, implement and transition technologies supporting operations to project power by the application of force against enemies and adversaries in and through cyberspace. Related areas of interest include development of technologies for cyber situational awareness and integration with offensive operations, delivery of denial effects in cyberspace, and integrated cyberspace and electronic warfare tools. Defensive Cyberspace Operations : To develop, demonstrate, implement and transition technologies supporting operations conducted to defend DOD or other friendly cyberspace and preserve the ability to utilize friendly cyberspace capabilities. This includes technologies to gain and maintain situational awareness through the visualization of key cyber terrain and an understanding of the actions occurring within. Related areas of interest include technologies for cyber threat detection and response, network protection, information technology platforms, vulnerability assessments, and operational readiness. DoD Information Network (DoDIN) Operations : To develop, demonstrate, implement and transition technologies supporting operations to design, build, configure, secure, operate, maintain, and sustain networks. This includes technologies to build (plan, engineer, install) secure, resilient, and defensible networks. Related areas of interest include technologies for trusted and authenticated domains, secure operation of networks, and integration. Systems Security : To develop, demonstrate, implement and transition technologies that improve the DoD's cyber-warfare capabilities (both offensive and defensive), weapon system cyber security, concepts and designs that address threats, vulnerabilities, and cyber security requirements of systems, and applications. Related areas of interest include development of software systems using applied system security engineering processes that enforce risk mitigation as well as implementing cost-effective countermeasures not limited to information assurance controls, software protection products, effective rigorous software development processes as well as enforcing software design rigor and physical security measures. Control Systems : To develop, demonstrate, implement and transition technologies to improve control system concepts and designs that address expanded performance, ranges, and advanced technologies to increase targeting precision and situational awareness. Related areas of interest include development of advanced sensors and control systems, to include cyberspace, with enhanced survivability for manned and unmanned systems. This includes both lethal and non-lethal applications, military research operations, emergency response, software development, testing, and training. Automation Systems : To develop, demonstrate, implement and transition technologies to improve concepts and designs that address DoD information technology needs, including logistics systems support and software development, data architecture and design, enterprise solutions, product lifecycle management and training. Related areas of interest include development of hardware and software systems that support client/server architecture, open system portability and scalability, improved mobile systems and automated application platforms. Specifically, the cyberspace domain demands increased automation, increased analytical capability, and visualization of large data sets. Hardware/Software Performance Analysis : To develop, demonstrate, implement and transition technologies to improve hardware and software performance concepts and designs that address system engineering and integration services for weapon systems, research and development programs, modeling and simulation, and using data to develop/improve/refine products and analysis tools. Related areas of interest include development of systems that identify vulnerabilities and key technology gaps. Hardware/Software Sustainment/Supportability: To develop, demonstrate, implement and transition information technologies to improve engineering design, technical support data and software development support services that address supportability design and analysis, engineering process improvement, field support, obsolescence, rapid prototyping, systems engineering, and technology insertion. Related areas of interest include engineering methodologies and agile development approaches to explore the potential of delivering new or increased effects over weapons systems/platforms in hours/days. Emerging Software/Hardware Technologies : To develop, demonstrate, implement and transition command, control, communication and computer technologies, systems, concepts and designs that address the broad and diverse capabilities in research, prototyping, software development, testing, advanced engineering development and training for weapon systems and networks to achieve greater levels of tactical autonomy and security. Related areas of interest include development of software systems, data architecture and design, high- performance computing technologies, sensors, rapid prototyping and research and development of emerging cyber technologies, in support of full scope cyberspace operations. Any responsible/interested sources shall submit their qualifications and capabilities, to include consortium name, personnel, facilities, membership network and past experience to meet specific needs stated above. Specifically, responses should contain the consortium's experience and capability information, to include vision, mission statement, goals, membership (indicating traditional and nontraditional defense contractors (including industry size standards: small/large businesses) and academia), success criteria, metrics, management framework, articles of collaboration/by-laws, Consortium Member Agreement (or equivalent), accounting practices, fee structure, proposed processes for project selection and other information which the respondent considers of assistance in developing successful Government/academia/industrial partnerships. In addition, the consortium shall provide a list of its members which are experienced in each of the cyberspace operations, command, control, communications, and computer technology areas listed in this notice, along with a description of their capabilities for the categories under which they have experience. Interested parties shall submit all pages as a single (.doc or.pdf) file. Proprietary information, if any, should be minimized and MUST BE CLEARLY MARKED. Please be advised that all submissions become Government property and will not be returned. No sensitive or classified information will be discussed. Foreign-owned, controlled, or influenced firms are advised that security restrictions may apply that may preclude their participation in these efforts. This Sources Sought notice is for information and planning purposes only, and does not constitute a Request for Proposal (RFP). It is not to be construed as a commitment by the U.S. Government. All information is to be submitted at no cost or obligation to the Government. The Government is not obligated to notify respondents of the results of this survey. THIS IS NOT A SOLICITATION AND DOES NOT OBLIGATE THE GOVERNMENT TO ISSUE A SOLICITATION. Electronic submittals are preferred. Any responsible/interested sources shall submit their qualifications and capabilities within thirty (30) calendar days of this notice to: U.S. Army Contracting Command - New Jersey, ATTN: ACC-NJ-MAS, Mr. Daniel Witt, Bldg. 10, Picatinny, NJ 07806-5000 or submit the information electronically to the email address: daniel.a.witt.civ@mail.mil.
 
Web Link
FBO.gov Permalink
(https://www.fbo.gov/notices/62b88c7e84ea6a3fc885e4f67bd4c8d5)
 
Record
SN04009059-W 20160205/160203234622-62b88c7e84ea6a3fc885e4f67bd4c8d5 (fbodaily.com)
 
Source
FedBizOpps Link to This Notice
(may not be valid after Archive Date)

FSG Index  |  This Issue's Index  |  Today's FBO Daily Index Page |
ECGrid: EDI VAN Interconnect ECGridOS: EDI Web Services Interconnect API Government Data Publications CBDDisk Subscribers
 Privacy Policy  Jenny in Wanderland!  © 1994-2024, Loren Data Corp.