SOURCES SOUGHT
99 -- Counter-IED Program and Training Expert/Expertise for Development and Sustainment
- Notice Date
- 3/1/2023 11:23:41 AM
- Notice Type
- Sources Sought
- NAICS
- 541990
— All Other Professional, Scientific, and Technical Services
- Contracting Office
- MILLENNIUM CHALLENGE CORPORATION Washington DC 20005 USA
- ZIP Code
- 20005
- Solicitation Number
- AAF-PR-23-0046
- Response Due
- 3/13/2023 9:00:00 AM
- Point of Contact
- Raymond Staniewski, Contract Specialist (KTR), Maxwell Sarpong, Contracting Officer
- E-Mail Address
-
staniewskirj@mcc.gov, sarpongmb@mcc.gov
(staniewskirj@mcc.gov, sarpongmb@mcc.gov)
- Small Business Set-Aside
- SBA Total Small Business Set-Aside (FAR 19.5)
- Description
- REQUEST FOR INFORMATION Counter-IED Program and Training Expert/Expertise�for Development and Sustainment. THIS IS A REQUEST FOR INFORMATION ONLY.� The Millennium Challenge Corporation (MCC) is currently conducting market research. This is NOT a solicitation or pre-solicitation, and this notice does not guarantee that a solicitation will be released in the future or as an obligation on the part of the MCC. Currently, no solicitation exists. Introduction: The Millennium Challenge Corporation (""MCC"") is a Federal Corporation created under Title VI of the Foreign Operations, Export Financing and Related Programs Appropriations Act, 2004. Intention: This is a �Sources Sought� for information on the following services with the intent to create a Blanket Purchase Agreement but is no guarantee that a solicitation or award may be issued as a result of this notice. Call Orders will be issued at time of need for the specific elements and within the specific countries and locations. MCC requires support from a reputable contractor/vendor to provide all of the elements listed herein. MCC is not interested in companies only able to provide portions of the requirements listed herein. This is an all or none requirement. This requirement is a 100% small business set-aside. Access To and Presentations made at: Unless otherwise notated, all presentations shall be made at the MCC HQ located in Washington, DC. or a mutually agreed upon location. For some tasks, contractor may have to travel to our countries of operation. Classified access to MCC locations is required by the contractor. Locations: Locations required for service: The following services may be required for worldwide MCC operations that could include, but not limited to, the following geographic areas, Europe, Asia, Africa, and South America. For a list of countries where MCC operates, please refer to https://www.mcc.gov/where-we-work. Reports: Trends analysis of IED use worldwide: 1)�Gathering Data: Collect data on the types of IEDs used, the materials used to construct them, the tactics employed in deploying them, and the targets selected by terrorists. 2)�Identify Patterns: Analyze the data to identify patterns in the types of IEDs used, the locations where they are deployed, and the tactics employed in deploying them. This could include looking for trends in the size and composition of the explosives, the use of remote triggers, or the selection of specific targets. 3)�Identify Changes: Monitor changes in the patterns over time. This could involve tracking changes in the materials used to construct IEDs, the tactics used to deploy them, or the targets selected by terrorists. 4)�Analyze Causes: Look for the root causes of changes in the trends. This could involve examining political or social events that may be motivating the terrorists, changes in the availability of materials or technology used to construct IEDs, or changes in the tactics used by counter-terrorism forces. 5)�Forecast Future Trends: Use the data and analysis to forecast future trends in the use of IEDs by terrorist organizations. This could include predicting the types of IEDs that may be deployed in the future, the locations where they may be used, or the tactics that may be employed to deploy them. By conducting a trends analysis, you can gain valuable insights into the strategies and tactics employed by terrorists, which can help inform counter-terrorism efforts and improve security measures. Overview of IED Tactics, Techniques and Procedures: ""Overview of improvised explosive device trends, techniques, and procedures"" refers to the monitoring and analysis of the evolving tactics, technologies and methods used by individuals and groups to construct and deploy improvised explosive devices (IEDs). This includes collecting data on the types of explosives and other components used, as well as the methods and tactics employed in their deployment. Monitoring IED trends, techniques, and procedures is important for several reasons. First, it allows counterterrorism and security organizations to anticipate and prepare for potential attacks. By analyzing past attacks and monitoring changes in tactics and materials used, security officials can better understand the evolving threat landscape and adjust their counter-IED programs accordingly. Second, monitoring IED trends can also help identify emerging threats and new technologies or materials being used by terrorist organizations. This information can then be used to develop more effective countermeasures to detect and prevent IED attacks. Third, understanding IED trends, techniques, and procedures can also aid in identifying the individuals or groups responsible for attacks. By analyzing the types of materials used and methods employed, it is possible to identify patterns or connections between attacks that could lead to avoiding or surviving attacks. In summary, monitoring IED trends, techniques and procedures is crucial for identifying emerging threats, developing effective countermeasures and identifying those responsible for attacks. It is an essential component of any comprehensive counter-IED program. Review and assess MCC�s counter-IED mitigation measures: It is important to continually review and assess the effectiveness of a counter-IED (improvised explosive device) program for several reasons: 1)�Adapt to Emerging Threats: Terrorist organizations are constantly adapting their tactics and techniques in response to countermeasures. A counter-IED program that is effective today may not be effective tomorrow. Continual review and assessment allows for the identification of emerging threats and the development of new countermeasures to address them. 2)�Improve Efficiency: A review of a counter-IED program can identify areas where resources are being misallocated or where procedures can be streamlined. This can improve the efficiency of the program and ensure that resources are being used effectively to address the most significant threats. 3)�Identify Gaps: A review of a counter-IED program can identify gaps in knowledge, equipment, or training that may be hindering its effectiveness. By identifying these gaps, steps can be taken to address them and improve the program's overall effectiveness. 4)�Ensure Compliance: A review of a counter-IED program can ensure that it is compliant with legal and ethical standards. This can help maintain the program's legitimacy and ensure that it is not unintentionally contributing to human rights abuses or other negative outcomes. 5)�Increase Accountability: Review and assessment of a counter-IED program increases accountability and transparency. This can help build public trust and confidence in the program and ensure that it is operating in a responsible and effective manner. Overall, continual review and assessment of a counter-IED program is essential to ensure that it remains effective, efficient and compliant with legal and ethical standards. By identifying emerging threats, improving efficiency, identifying gaps, ensuring compliance, and increasing accountability, the program can continue to adapt and improve over time. Research and analysis on Improvised Explosive Devices: Research and analysis on improvised explosive devices (IEDs) involves the study and examination of the components, construction, deployment, and effects of these devices. This research and analysis is conducted by experts in fields such as explosive ordnance disposal (EOD). The goal of research and analysis on IEDs is to develop a deeper understanding of these devices and the threats they pose, in order to inform counter-IED efforts. This may involve the study of past attacks to identify patterns and trends in IED use, as well as the examination of materials and components used in the construction of IEDs to identify their sources and origins. Research and analysis on IEDs may also involve the development and testing of new countermeasures and technologies to detect, neutralize, or mitigate the effects of these devices. Research and analysis on IEDs plays an important role in informing counter-IED efforts and improving the safety and security of communities and individuals at risk of IED attacks. Consultation for MCC Security Programs: Provide expert consultation and analysis, when requested, on existing or proposed MCC Security Programs with a primary focus on Counter-IED and Movement in Operational Theatres.�� Development of security policies and programs, specifically Counter-IED and Convoy Operations: Review, assess, audit, and make recommendations to improve, if necessary, MCC�s Counter-IED and Convoy Operations programs and procedures. For training: Training MCC and local staff on counter-IED programming: Counter-IED (improvised explosive device) training refers to instruction and education provided to individuals and organizations in order to enhance their knowledge and skills in detecting, neutralizing and mitigating the effects of IEDs. Counter-IED training may cover a range of topics, including: 1)�IED Awareness: This includes information on the various types of IEDs, their components, and the tactics and techniques used by terrorist organizations to construct and deploy them. 2)�Detection: This training covers methods for detecting IEDs, including the use of detection equipment and visual cues. 3)�Protection and Prevention: This includes instruction on personal protective equipment (PPE), security protocols, and preventative measures that can be taken to reduce the risk of IED attacks. 4)�Post-Incident Actions: This training covers responses in the immediate aftermath of an IED attack. Counter-IED training may be conducted in a classroom setting or through practical exercises and simulations. It may also be tailored to the specific needs and objectives of the organization receiving the training. Overall, counter-IED training plays a critical role in enhancing the safety and security of communities and individuals at risk of IED attacks. By providing individuals and organizations with the knowledge and skills needed to detect, neutralize, and mitigate the effects of IEDs, this training helps to save lives and prevent the devastating impact of IED attacks. Threat environment monitoring: Threat environment monitoring training involves instruction and education on monitoring and assessing potential safety and security threats to an organization (MCC). Threat environment monitoring training covers a range of topics, including: Threat Assessment: This includes identifying potential threats to the organization, assessing the level of risk they pose, and developing strategies to mitigate those risks. Situational Awareness: This training emphasizes the importance of maintaining situational awareness at all times, including identifying potential threats and suspicious activities, and taking appropriate action to respond to those threats. Communication and Reporting: Effective communication and reporting are critical components of threat environment monitoring. This training covers the importance of clear and concise communication, as well as the proper channels for reporting potential threats. Technology and Tools: Threat environment monitoring may involve the use of various tools and technologies.� This training covers the effective use of these technologies to monitor and mitigate potential threats. Response Planning: In the event of a threat, effective response planning is critical. This training covers the development of emergency response plans and procedures, as well as the importance of regular drills and training exercises to ensure readiness. Overall, threat environment monitoring training plays a critical role in enhancing the safety and security of organizations and individuals. By providing personnel with the knowledge and skills needed to identify and respond to potential threats, this training helps to prevent and mitigate the impact of security incidents. Deliverables: Any and all deliverables, in the form of reports and briefings, will be identified in each BPA Call Order as required. Submissions: No phone calls will be accepted. Ensure that the ""Notice ID - AAF-PR-23-0046"" is on thte subject line of your e-mail. Send all question to�staniewskirj@mcc.gov�NO QUESTIONS ACCEPTED AFTER MARCH 1, 2023 @ 12:00 PM. Send all official submissions to staniewskirj@mcc.gov by March 13, 2023 @ 01:00 PM Ensure that all submissions are able to print out onto 8 1/2 x 11 paper with proper margins and headers. Ensure that your proper company name, Unique Entity Identifier and point-of-contact are properly listed on the first page of your submission. (END OF NOTICE)
- Web Link
-
SAM.gov Permalink
(https://sam.gov/opp/732e3b6d3e1449e78e75004173eba054/view)
- Place of Performance
- Address: Washington, DC 20005-3553, USA
- Zip Code: 20005-3553
- Country: USA
- Zip Code: 20005-3553
- Record
- SN06605967-F 20230303/230301230109 (samdaily.us)
- Source
-
SAM.gov Link to This Notice
(may not be valid after Archive Date)
| FSG Index | This Issue's Index | Today's SAM Daily Index Page |