JIEDDO BAA 09-02
The Joint Improvised Explosives Device Defeat Organization (JIEDDO) Broad Agency
Announcement (BAA), which is issued under the provisions of paragraph 6.102(d)(2) of the
Federal Acquisition Regulation (FAR), provides the vehicle for the competitive selection of
basic and applied research, and that part of development not related to the development of a
specific system or hardware procurement. Contracts based on responses to this BAA are
considered to be the result of full and open competition and in full compliance with the
provisions of Public Law (PL) 98-369, “The Competition in Contracting Act of 1984.” As the
issuing agency, JIEDDO will not issue paper copies of this announcement. Any proposal
documents or other materials submitted in response to this BAA will not be returned. It is the
policy of JIEDDO and its contracting agencies to treat all proposals as sensitive competitive
information and to disclose their contents only for the purposes of evaluation.
Awards for submissions under this BAA are planned in Fiscal Year 2010. However, funds may
not be available for all BAA requirements; no contract awards will be made until appropriated
funds are available from which payment for contract purposes can be made. JIEDDO reserves
the right to select for award all, some or none of the proposals in response to this BAA. JIEDDO
will not provide funding for direct reimbursement of proposal development costs.
This BAA will remain open for no less than 180 days from the publication date. Proposals may
be submitted at any time during that period. At the conclusion of that period, JIEDDO will either
extend the submission deadline or publish a new BAA.
JIEDDO will use a two-phased proposal selection process for this solicitation to minimize cost
and effort of prospective offerors. Phase 1 will solicit and evaluate proposal quad charts and
white papers. Section IX, below, provides detailed guidance on Phase 1 proposal preparation.
Section X provides information on the Phase 1 evaluation process. Proposals found to have
technical and operational merit during Phase 1 will be selected for Phase 2. Submitters will be
contacted with specific instructions for Phase 2, which will consist of technical meetings as well
as more detailed presentations and submissions to the JIEDDO acquisition management process.
Subsequent to funding approval, full technical proposals may be requested.
HBCU/MI and Small Business Set Aside
The Government encourages nonprofit organizations, educational institutions, small businesses,
small disadvantaged businesses (SDB), historically black colleges and universities (HBCU),
minority institutions (MI), women-owned businesses, and historically underutilized business
(HUB) zone enterprises as well as large businesses and Government agencies to submit
proposals for consideration or to join others in submitting proposals. However, no portion of the
BAA will be set-aside for these special entities because of the impracticality of reserving discrete
or severable areas of research and development in any specific requirement area. The final
determination will be made based on the relevance of the proposal to JIEDDO requirements,
individual technical merits of the proposal, and budget constraints within the mission priorities.
To ensure full consideration in these programs, registration in the BAA Information Delivery
1 of 19
JIEDDO BAA 09-02
System (BIDS), described later in this document, requires the appropriate business type selection
as well as accurate up-to-date information.
Limitation of Funds
The Government may incrementally fund contracts awarded from this BAA as provided by FAR
52.232-22, “Limitation of Funds.” Contracts awarded to proposals submitted under this BAA
are anticipated to be 6 to 24 months in duration. To facilitate incremental funding, submissions
shall include the cost and schedule by a task-phased structure organized by fiscal year (October
through September) with clear exit criteria, and shall be inclusive of all work to complete the
effort including any options. It is anticipated that the entire effort will be negotiated with the
initial contract award.
Technical Evaluation Support
JIEDDO will use contractor support personnel in the review, evaluation, and administration of
all submissions to this BAA. All individuals that have access to any proprietary data shall certify
that they will not disclose any information pertaining to this solicitation including any
submission, the identity of any submitters, or any other information relative to this BAA. They
shall also certify that they have no financial interest in any submissions evaluated. Submissions
and information received in response to this BAA constitute permission to disclose that
information to certified evaluators under these conditions.
I. GENERAL INFORMATION
1. BAA Issuing Agency Name: JIEDDO
2. Contracting Agency Name: Any United States Government contracting organization
may serve as the contracting agency for this BAA.
3. Sponsoring Agency Name: JIEDDO
4. Program Name: Rapid Development of Counter-IED Capabilities
5. Research Opportunity Number: BAA JIEDDO-09-02
6. Response Date: Offerors responding to this BAA may begin submitting responses on
5 September 2009. Final submissions for all proposals to this BAA are due by 1600 hours
Eastern Standard Time on 17 May 2010.
a. An Improvised Explosive Device (IED) is defined as a device placed or fabricated in
an improvised manner incorporating destructive, lethal, noxious, pyrotechnic, or
incendiary chemicals and designed to destroy, incapacitate, harass, or distract. It may
incorporate military supplies, but is normally devised from non-military components.
2 of 19
JIEDDO BAA 09-02
b. Counter-IED (C-IED) is defined as the collective efforts at all levels to defeat the IED
system in order to reduce or eliminate the effects of all forms of IEDs used against
friendly forces and non-combatants according to the mission. It includes offensive
and defensive measures taken to predict, prevent, detect, neutralize, and mitigate the
IED threat, as well as train our forces to counter it. It also includes operations to
predict and prevent the IED network.
c. The PREDICT functional capability is the foretelling of activities associated with the
IED manufacture and emplacement, to include: recruitment, information operations,
financial transactions, transportation, manufacturing processes, and identification of
the people associated with these activities.
d. The PREVENT functional capability is the targeting, interdiction, and elimination of
enemy personnel (operators and bomb makers) and the associated infrastructure
(facilities and supplies) that precludes employment of IEDs against military and
e. The DETECT functional capability is the extraction of information from objects and
activities associated with IEDs (fabrication, transportation, and employment) or
components of IEDs and in sufficient time to achieve a favorable outcome.
f. The NEUTRALIZE functional capability is to provide the means to disable, disrupt or
pre-detonate IEDs or their sub-components.
g. The MITIGATE functional capability is to lessen or minimize the severity of IED-
related events through enhancement of protection. New capabilities will enhance the
protection of military personnel vehicles by mitigating the blast effects of IEDs.
8. Description of Opportunity: The Department of Defense (DoD) solicits proposals for
the development of innovative capabilities to defeat IEDs employed against U.S. and
coalition forces anywhere in the world, but especially in Iraq and Afghanistan. JIEDDO
is seeking innovative counter-IED capabilities that can be rapidly developed,
demonstrated, and deployed within 12 to 24 months from award. However, JIEDDO is
willing to entertain less mature systems with a potentially high payoff. Proposals must
address one of the following six solicitation areas:
a. Detect, neutralize or mitigate person-borne IEDs (Section II).
b. Detect, neutralize or mitigate buried IEDs or pressure initiation devices (Section III).
c. Provide stand-off detection and confirmation of explosives or chemical compounds
associated with explosives (Section IV).
d. Detect, neutralize or mitigate explosively formed penetrators (Section V).
e. Counter-IED Medical Science and Technologies (Section VI).
3 of 19
JIEDDO BAA 09-02
f. Any additional technology, information, or recommendations that would enhance
existing counter-IED systems (Section VII).
II. STAND-OFF DETECTION OF PERSON-BORNE IEDs REQUIREMENTS
The most important and difficult aspect of the person-borne IED (PBIED) detection problem
is reliable, verifiable interrogation of all individuals in an unstructured crowd at a large
public event (e.g. a crowded market square). JIEDDO is also interested in the more
manageable problem of interrogation at controlled access points, with individuals queued up
for interrogation by portal or other fixed-site technologies in a one-at-a-time scenario (e.g. an
election polling station). However, it should be emphasized that this is a subset of the larger
problem of the unstructured crowd, and does not represent a full solution. Queues represent
targets of opportunity for bombers; therefore JIEDDO is primarily interested in solutions that
address the crowd problem without requiring the cooperation or even knowledge of the
individual being interrogated.
Stand-off means that the PBIED detection and confirmation should be performed at a
distance far enough away from the suspect device that the operator or valued assets are
protected should the device detonate. The stand-off distance will vary depending on the
specific scenario, but the main objective is to develop the capability to rapidly and accurately
detect PBIED from a safe distance.
Due to the issues of occlusion, look angle, and the potentially large number of individuals
present, no single sensor can provide adequate coverage. Therefore, JIEDDO would prefer a
multi-sensor, system-of-systems approach in order to eliminate PBIEDs as a weapon system
of strategic influence. However, single sensor solutions that provide a desired capability will
also be considered.
Counter-PBIED proposals should address one or more of the following focus areas:
1. Single- and multi-sensor algorithms for aided or automated threat detection
In order to address the unstructured crowd, algorithms must be able to exploit very low
dwell time, on the order of one second or less, with real time threat assessment.
a. Proposals addressing detection algorithms should describe methods for exploiting
sensor data to extract threat features in an automated or operator-aided fashion to
reduce operators’ decision cycle. JIEDDO’s most critical need in algorithms is the
automated isolation of anomalous regions of 2D and 3D imagery of persons. It should
be noted that PBIED devices are improvised, so pattern matching has limited value.
b. Solutions may include single- and multi-sensor detection techniques, and should
therefore address combined use of disparate sensor data to enhance the probability of
detection (Pd) and minimize the false alarm rate (FAR). Confidence values should be
included for weighted, multi-sensor threat assessments inputted into fusion algorithms.
4 of 19
JIEDDO BAA 09-02
c. JIEDDO is seeking intelligent fusion engines for combining multiple sensor threat
assessments and confidence values to enhance Pd and minimize FAR.
d. Proposed solutions should address data transformation for multi-sensor algorithms.
For example, imagery captured by sensors at different look angles to the individual
being interrogated need to be transformed to correct for perspective and parallax
differences to enable direct image comparison.
2. Threat-detection sensor technologies
In order to address the unstructured crowd, aimed, standoff sensors must provide fast
slew rates (on the order of milliseconds) and the ability to address small fields of regard
(either by an overall narrow field of view, or resolution and algorithms which can address
a small portion of a larger field of view). Heavy, low-slew rate, pan and tilt solutions are
of limited value.
a. Active or passive, imaging or non-imaging, millimeter wave (MMW) and terahertz
(THz). Preference will be given to those proposed sensor technologies which operate
in the 10-1200 GHz (0.01 to 1.2 THz) frequency range where clothing transmission is
significant. Modalities may include imaging, polarimetry and spectroscopy.
b. Metal detection sensors – optimally, sensors should be packaged and miniaturized,
with methods to secure the sensors to the ground to enable them to be deployed in
crowds, on paved and unpaved surfaces, while making it difficult for persons to
remove the sensors or damage them intentionally or inadvertently.
c. Stand-alone air-sampling spectroscopic sensors. As in the case of metal detection
sensors, spectroscopic sensors would ideally be miniaturized and packaged to enable
secure, rapid deployment. A combined package of metal detection and spectroscopic
detection would be considered as well.
d. Active or passive, imaging or non-imaging, infrared (IR) sensors, including
technologies for standoff spectroscopic identification of explosives on (trace) and
through (bulk) clothing.
e. Electronics sensors for non-linear junction (diode) detection.
f. Behavioral detection technologies – gate analysis, aggression, respiration and heart
rate – to enable assessment of threat potential of persons.
g. Ancillary technology which actively enhance signatures for other modalities.
3. Personnel tracking software and sensors
a. Algorithms to enable situational awareness and tracking of all individuals in the area
of coverage as well as hand off of individuals’ tracks from one sensor to another.
5 of 19
JIEDDO BAA 09-02
b. Methods for passive tagging of tracked individuals so that lost tracks can be
automatically reacquired. These may include color histogram, texture, or shape
characterization to provide a passive tag, and may be informed by color cameras,
LIDAR, or other technologies.
c. Proposals addressing personnel tracking should describe sensors to be used, as well as
the software to be used for location and tracking of individuals in the area of coverage.
d. Video analytics software for analysis and prediction of individuals’ behavior and
detection of suspicious inanimate objects (e.g. bags, backpacks, and boxes).
4. Multi-sensor architecture
a. Proposals addressing multi-sensor architectures should describe a software network
backbone which: enables straight-forward addition of new sensors and computing
resources to the system; is capable of auto-discovery of those sensors and computing
resources; assigns computational tasks to available computing resources.
b. Software developer kit (SDK): Proposals addressing multi-sensor architectures should
include a SDK to allow plug-and-play addition of sensors by enabling sensor
developers to rapidly complete a software control interface for new sensors.
c. Proposed solutions should provide a graphical user interface (GUI) which enables
command, control, and interface with sensors, computing resources, communications
systems, operators and interdictors, as well as intelligent, simultaneous display of
multiple sensor inputs and threat status for system area of coverage.
5. Counter-PBIED proposals should specifically address their methodology to provide early
stand-off detection of potential suicide attackers without providing undue alert to the
attacker. Where appropriate, the detection proposal should include:
a. Description of key detection signatures or observables, and why the vendor believes
those key signatures to be unique and reliable. Proposals which include preliminary
test data demonstrating the existence of a strong observable will be given preference.
In all cases, information or empirical data on solution’s dependence upon
environmental conditions and clothing types will greatly assist JIEDDO in assessing
the value of proposed solutions.
b. Description of potential false alarm sources especially in high-clutter environments
and how those false alarm sources will be mitigated.
c. Description of expected Pd and FAR, and their dependence upon range,
environmental conditions and variations due to the body types of those being
interrogated. For existing technologies, proposers are encouraged to provide test data
in support of the expected performance of the proposed detection system.
d. A clear statement of the current and end-state technical maturity of the primary
6 of 19
JIEDDO BAA 09-02
Vendors should address interoperability in a radio-frequency jamming environment,
collateral effects (human exposure limits), and any other issue relevant to the integration of
the proposed system into a military operating environment.
III. BURIED IED & PRESSURE INITIATION DEVICE REQUIREMENTS.
Detection of Buried IEDs
Buried IEDs are emplaced on or under the ground with the intent to detonate them beneath
vehicles and personnel. They are used on roadways, thoroughfares and choke points where
intended victims are likely to pass over. Emplacements vary widely, but burial depth often
corresponds with the net explosive weight of the device (i.e. larger devices can be emplaced
more deeply or in culverts). The explosive charge can be composed of: metallic ordnance,
low metal mines, bulk explosives in metal, plastic or fabric containers; or combinations of
these elements. Devices are frequently emplaced in or near features that screen their
signatures and reduce visible evidence of their burial, such as repaired holes and culverts.
The most common initiators for buried IEDs are pressure switches and command wires.
Command wires lead from the main charge off the road to a switch, battery and person at a
remote firing point. Pressure switches are emplaced under light overburden near the main
charge and close a contact when compressed under a wheel or foot. Frequent association and
proximity of pressure switches to main charges enable detection strategies that address either
or both IED components.
Common pressure switches are fabricated from lightweight conductive components that are
held apart by non-conductive flexible or collapsible spacers. Although they can be fabricated
from most anything conductive, common components are saw blades, nails, foil, dual
conductor wires and commercial pressure switches. Metal content can be deliberately
minimized. Other components associated with pressure switches are batteries, wire leads to
the main charge, command arming wires and radio control arming devices.
Detecting buried IEDs is a significant challenge. JIEDDO’s investments to meet this
challenge will encompass technologies intended to directly detect the device in situ and
technologies intended to detect signs of emplacement, either by coherent change detection or
by identifying the characteristic signatures of disturbed earth and other artifacts. Partially or
fully automated threat identification capabilities will be required in most operational
scenarios. White papers should provide a clear discussion of the automated threat
identification approach proposed. Potential platforms include manned and unmanned ground
vehicles and aircraft.
Detection of a buried IED from a ground vehicle must be completed before the vehicle enters
the blast area or detonates the device. The minimum safe detection range (stand-off distance)
will vary with the type of operation. Explosive ordnance disposal (EOD) operations are
performed when a possible IED location has been identified. The EOD team interrogates the
location to confirm the presence of an IED images it if possible and disables it. EOD teams
can loiter at the threat location for a brief period, and they may direct detection or imaging
system at a likely IED from a robot or interrogation arm. EOD operations require that a
7 of 19
JIEDDO BAA 09-02
system have high resolution imaging capability and a high probability of detection (P d), but
the detection range can be short and determination of a threat can be left to the operator.
Route Clearance operations are intended to find and remove threats on frequently travelled
routes. While advancing along the route, the route clearance team can direct its attention to
discovering threats, and may proceed at a slow pace near likely threat locations. Detection
systems intended for route clearance require that threats be automatically nominated with
high Pd in time for the operator to stop, and that the false alarm rate (FAR) be low enough to
permit reasonable forward progress as determined by the mission and operators.
Tactical and convoy operations require higher speeds and demand more of the operator’s
attention, so detection systems need to automatically find and identify threats independent of
the operator at a distance that accommodates the vehicle speed. Tactical and convoy
scenarios will require a forward looking or closely linked airborne system. A lower Pd may
Detection of Buried IEDs from the air benefits all ground forces regardless of mission, but
success of an airborne system depends on: meeting the size, weight and power requirements
of the proposed platform; availability of the platform; search rate; rapid communication of
IED nominations to ground forces; and viability of the required search CONOPS.
JIEDDO’s near term goal is to enhance buried-IED detection capabilities in EOD and route
clearance scenarios in both theaters. Our ultimate goal is to provide buried IED detection
capabilities that are effective in convoy and tactical scenarios. To accomplish our goals,
JIEDDO will field a suite of systems that can provide buried IED detection capability to units
in most operational scenarios.
The technical issues associated with the various operational profiles are different, and
solutions that address any part of the problem will be pursued. All viable solutions will
exploit signatures that are robust, distinct and persistent. The technical challenges include:
Penetration through air, pavement, and soil
Identification of target signatures in clutter (natural or man-made)
Identification of a wide variety of targets, including non-metallic
Automated threat detection and identification (e.g. pressure plate vs. main charge)
Variations in sensor perspective and environment on consecutive searches
Timely and clear communication of target location to ground forces
Interoperability of sensor systems with other systems used in the operating environment
Mitigation of collateral effects on friendly forces, civilians, and electronic infrastructure
8 of 19
JIEDDO BAA 09-02
IV. STAND-OFF DETECTION & CONFIRMATION OF EXPLOSIVES
Stand-off explosives detection is different and more challenging than stand-off explosives
confirmation. Explosives detection is defined as the ability to find explosives associated with
a threat when there is no prior evidence of the presence of a target material or other cueing
indicator. Explosives confirmation is the ability to determine the composition of a material at
a suspicious location. Stand-off means that the explosives detection and confirmation should
be performed at a distance far enough away from the suspect device that the operator or
valued assets are protected should the device detonate. The stand-off distance will vary
depending on the specific scenario, but the main objective is to develop the capability to
rapidly and accurately interrogate from a safe distance. In terms of the JIEDDO mission, the
most challenging aspects of this problem are the requirements to have a high probability of
detection and a low probability of false alarms at relatively large stand-off distances in an
environment that is contaminated with explosives.
1. Stand-off detection of explosives is challenging. A key consideration to meeting this
capability gap is that stand-off explosives detection is required for a wide variety of
situations, including but not limited to: personnel and vehicle borne IEDs in complex
environments such as marketplaces; buried or hidden IEDs; and assembly and production
facilities. Ideal solutions should encompass looking for all potential explosives, both in
the detection and confirmation mode. However, the following categories are of particular
interest: bulk home-made explosives and enclosed or hidden military grade explosives. In
general, detection capability should provide wide area scanning capability and a
preliminary indication of where the confirmation sensor should interrogate.
2. Stand-off confirmation of explosives is not a standalone capability. Cueing from
another system or an observable is usually required. In this context, cueing involves
indicators that an IED threat may be present and the need to perform stand-off explosives
confirmation. Cueing may be from the explosive itself, or other indicators (e.g. disturbed
earth, etc.). Ideally, confirmation should rapidly interrogate a selected area of interest and
provide an unambiguous indication that explosives are (or are not) present.
3. Comprehensive solutions to address the stand-off explosives confirmation gap should
include consideration of the following components:
Sampling protocol: when, where, and how often to interrogate in order to confirm the
presence of an explosive threat.
Discrimination: the ability to link the presence of a chemical species to the presence
of an explosive threat.
Selectivity and sensitivity: the ability to detect the presence of an explosive threat in
an environment already contaminated with explosives.
4. Operational Utility of proposed stand-off capabilities is a key consideration in order to
meet the objectives of the JIEDDO mission. In order to more fully determine the
potential effectiveness of a proposed standoff explosives detection or confirmation
9 of 19
JIEDDO BAA 09-02
capability, consideration should be given to the specific scenario under which the
proposed technology could be employed. Examples of relevant operational scenarios are:
Interrogation of suspect vehicles, at a checkpoint, parked along a roadway, or
travelling freely. Detection and confirmation can focus either on explosives (military
grade or homemade), or chemical materials required to construct an IED.
Route clearance interrogation from ground or aerial assets. Consideration should be
given to the speed of the platform and the area to be interrogated in a set timeframe.
Interrogation of suspect facilities where homemade explosive production may be
taking place or where IEDs are being assembled. Detection and confirmation can
focus on the explosive, the chemical materials required for manufacturing explosives,
or the assembly of an IED.
Interrogation of a suspect individual, either at a checkpoint or in an unstructured
crowd. For this scenario detection and confirmation should be limited to the explosive.
Scenarios are not limited to those listed above; however, proposed scenarios must be
clearly associated with the JIEDDO mission space.
5. Additional capabilities. As stand-off explosives detection and confirmation capabilities
advance, there will be a continuing need to increase the speed, accuracy, and automation
of the detection process. Solutions could include:
Aided or automated detection
Cooperative use of multiple sensors and data cueing
Increased resolution and selectivity
Reduced size, up to and including handheld sensors for dismounted operations
Novel approaches using new technologies. Examples include, but are not limited to:
Capacitance trans-impedance array (CTIA) detector based technologies
Nanotechnology-based sensors with promise for more sensitive IR and laser
Effective sensors that are small, inexpensive and usable for wide area surveillance
by dispersal over an area of interest may be useful, but sensing of this type has the
10 of 19
JIEDDO BAA 09-02
potential for unintended consequences such as environmental contamination,
health effects, or other unforeseen outcomes that must be addressed.
V. EXPLOSIVELY FORMED PENETRATOR REQUIREMENTS.
An explosively formed penetrator (EFP) is a class of IED designed to fire a shaped warhead
that effectively penetrates armor at stand-off distances. An EFP system has four major
Arming Switch. This component arms or disarms the EFP. More sophisticated EFPs use a
radio-controlled (RC) device (e.g. cell phone or long range cordless telephone) to
transmit a control signal.
Trigger Switch. This component triggers the explosive device. More sophisticated EFPs
use a victim operated trigger. Less sophisticated EFPs use command operated trigger.
Explosive Device. The explosive device consists of four elements: a concave metal liner
(the penetrator), case, base plate, and explosive charge (propellant). The case is generally
cylindrical and fabricated from commonly available materials (e.g. PVC or steel pipe).
The forward end of the case is closed by a concave copper or steel disk-shaped liner,
which forms the penetrator. Generally military-grade plastic explosives are loaded behind
the liner to fill the casing. A blasting cap initiator is placed though a hole in the base plate.
The penetrator can reach speeds well over one kilometer per second with kinetic energy
on the order of mega joules, depending on the design and type of explosive used.
Camouflage. This component conceals the EFP system and often consists of hardened
polyurethane foam designed to blend the system in to the immediate environment.
An EFP detection system is expected to perform detection, interrogation and discrimination
in both rural and urban environments, with their associated clutter.
Rural Environment. Clutter in a rural environment is dominated by natural objects.
Examples include, but are not limited to: trees, grass, gravel roads, culverts, agriculture
Urban Environment. Clutter in an urban environment is dominated by manmade objects.
Examples include, but are not limited to: trash (e.g. plastic bottles, paper, etc.), building
material (e.g. concrete blocks, stone building blocks, metal rebar or mesh), buildings,
curbs, roads, concrete barricades and humans. In addition to physical clutter, urban
environments have EMI clutter from man-made electronic devices.
JIEDDO’s requirement is to develop algorithms for automated detection and discrimination
on the explosive device and camouflage while on the move in the presence of urban and rural
clutter. Proposals shall provide a clear and concise discussion on the features the algorithms
will use for detection. Proposals will also provide a clear and concise discussion on how their
system will operate in both a rural and urban environment. Proposals that only discuss
hardware without discussing algorithm development will not be considered. JIEDDO
11 of 19
JIEDDO BAA 09-02
requires that these detection algorithms support detection from a moving vehicle while
performing route clearance operations. Detection of the EFP must occur in time to provide a
safe stand-off-distance for the vehicle’s crew to react.
JIEDDO is interested in technologies that can:
Detect the EFP explosive device using radar techniques in a rural and urban environment.
Detect the EFP explosive device and camouflage using acoustic techniques in a rural and
Concurrently detect and defeat EFP as a weapon
Combine two or more detection and interrogation techniques on EFP components (i.e.
arming switch, trigger switch, explosive device and camouflage) to increase the
probability of detection and reduce the false alarm rate. Combined techniques shall have
the ability to detect, interrogate and discriminate in rural and urban environments.
VI. COUNTER-IED MEDICAL SCIENCE AND TECHNOLOGIES
In order to ensure and enhance medical research and studies, the JIEDDO Surgeon's office
provides Science and Technology and research for medical initiatives that enhance lifesaving
measures, prevention, early detection and informatics for US and Multinational Service
members; as a result of IED blasts.
Proposals shall address capability gaps in which significant medical research is required
to conduct or mitigate the unknown effects of blast and blast trauma for improved War
Proposals shall address specific medical research, studies, prototypes, software
enhancement, equipment and or training materials that will assist in attacking the network,
defeating the device, training the force or data fusion.
VII. OTHER COUNTER-IED PROPOSALS
Offerors possessing any additional technology, information, or recommendations that would
enhance the detection, identification, or defeat of IEDs or their supporting manufacturing,
transportation, emplacement or personnel networks are also encouraged to submit proposals
to this BAA.
Identify what aspects of the IED problem as a weapon system of strategic influence your
proposal addresses and how your proposed solution would mitigate the effectiveness of the
IED weapon system.
Ensure your proposal otherwise follows the preparation instructions listed in Section IX of
12 of 19
JIEDDO BAA 09-02
VIII. PROPOSAL PREPARATION CONSIDERATIONS
There are two key considerations for a successful proposal: it must be operationally relevant
and technically feasible.
The best technology in the world will be rejected if the warfighter says “so what;” therefore
proposals must demonstrate that they satisfy a valid C-IED requirement. While Section VII
allows for proposals that solve problems not considered when the BAA was published,
proposers must still discuss how they address a valid need for that solution.
In addition, careful thought must be given to the concept of operations (CONOPS) for the
system once it is deployed. Factors to consider are: interoperability and compatibility with
other systems; vehicle integration (size, weight and power); human factors; logistics burden;
and safety (both of the operators and civilian bystanders).
Proposals that are operationally relevant to the warfighter and satisfy a valid C-IED
requirement must also be technically feasible. JIEDDO is looking for innovative solutions to
our problems, and is willing to accept higher risk for the opportunity of higher payoffs in a
short time. However, proposals should balance these risks with a solid scientific foundation.
All proposals are initially evaluated by a panel of scientists and engineers with expertise
relevant to the proposed technology. Proposals that are little more than marketing brochures
or concept papers are not favorably considered. In fact, a common reason for rejecting
proposals is that they fail to provide sufficient technical detail for the evaluation panel to
understand the theory, and have confidence that the proposer can successfully develop it.
JIEDDO will occasionally fund multiple development efforts for the same C-IED capability
to reduce the risk of any one failure. However, proposals that duplicate already fielded
capabilities, or more mature development efforts, should provide sufficient technical detail to
demonstrate how they will significantly enhance those current operational capabilities.
Finally, data sometimes speaks louder than words. Performance claims substantiated by test,
experimental or modeling & simulation data provide a higher level of confidence. At a
minimum, proposals should provide theoretical calculations or scientific basis for their
To better understand the current threat and operational environments, as well as our
requirements, you should consider attending one of the JIEDDO Technical Outreach
Conferences. Please contact Ms. Leslie Darby at 703-601-5750 for more information.
Another source of useful information is the JIEDDO Reading Room. It is intended to
provide customers, stakeholders, and industry partners with easy access to information on
JIEDDO’s capability gaps, emerging critical initiatives, new developments, studies,
documents, and items of interests for the effort in defeating IEDs. You can learn how to
access the reading room at the following website: https://www.jieddo.dod.mil/rr.aspx.
13 of 19
JIEDDO BAA 09-02
IX. PROPOSAL PREPARATION GUIDELINES
This section provides information and instructions for the preparation and submission of all
proposals under this BAA. All submissions must meet these requirements including format,
content, and structure, and must include all specified information to avoid disqualification,
submission rejection, or delays in evaluation.
1. Submission Process: All proposals must be submitted electronically to the BAA
Information Delivery System (BIDS) website at: https://bids.acqcenter.com/JIEDDO .
This secure website is used to collect all unclassified proposals, and to collect
placeholder records for classified submissions. DO NOT UPLOAD CLASSIFIED
DOCUMENTS TO THE BIDS WEBSITE; see paragraph 10 below for instructions
on classified submissions. BIDS also provides submission progress tracking, evaluation
comment collection, and results notification back to the submitter.
2. The BIDS web site will not allow proposals to be uploaded or modified, or classified
placeholders to be entered, after the closing date and time. Any proposal submitted by
any other means, or that is late will not be considered by the government.
3. Submitter Registration: Submitters must register on the BIDS website to respond to
this BAA. Existing BIDS accounts are acceptable for a new BAA; offerors should make
sure that the company contact information is current. A unique username is created by
the offeror and is used for BIDS login and submission tracking. Registration acceptance
for submitters is automatic, but takes several seconds to be recognized by BIDS. A
success email will be sent to indicate that the username and account were accepted.
BIDS is email dependent and uses the registration email as the single point of contact for
all notifications associated with the BAA. It is very important to keep BIDS registration
contact information updated, especially contact e-mail address, since all BIDS
notifications will be sent via e-mail to that address.
4. User Accounts and Password Resets: Registration account information such as the
point of contact (POC), e-mail, and password can be updated after login. The “Forgot
My Password” link on the BIDS homepage allows registered users with a valid e-mail
address to automatically reset a password. The system will verify the account name and
e-mail to send a new password to that e-mail.
5. Registration and Account Help: BIDS help requests can be emailed to the BIDS
administrator at the “Help Request” link located on the BIDS homepage.
6. BIDS Security and Access Control: All data uploaded to BIDS is secure from public
viewing. All submissions will be considered proprietary and source selection sensitive,
and protected accordingly. The documents can only be reviewed by the registrant and
authorized Government and contractor representatives with no conflict of interest. (See
paragraph 10 below for instructions on classified submissions).
7. Proposal Format: It is mandatory that offers provide both a quad chart and white paper
that meet the format requirements provided below. Acceptable file formats are Microsoft
Word, Microsoft PowerPoint and Adobe Acrobat.
14 of 19
JIEDDO BAA 09-02
a. Quad Chart Content: A quad chart conveys the essence of the proposed solution on
a single page. When preparing a submission, the offeror shall ensure that the specific
criteria of the requirement are addressed, the solution is clear, and can be
accomplished with the proposed technology, cost, and schedule. The quad chart
includes header information and four quadrants. The quad chart format and sample
are provided at the BIDS website under “Reference Materials”.
i) Header information shall include the BAA announcement number and the
proposal title. The date and company name should be included along with the
appropriate document markings.
ii) The top left quadrant is a graphical depiction, photograph, or artist’s concept of
the proposed solution or prototype. Include labels or brief descriptive text as
needed for clarification. Ideally, this will convey the system concept, use,
capability, and any relevant size or weight.
iii) The top right quadrant contains a summary of operational and performance
iv) The bottom left quadrant contains a summary of the technical approach.
Specifically, describe the technology involved, how it will be used to solve the
problem, actions done to date, and any related on-going efforts. Briefly describe
the tasks to be performed for each phase if applicable. Bullet lists are acceptable.
v) The bottom right quadrant contains the rough order of magnitude (ROM) cost,
schedule, products and deliverables, and corporate contact information. The ROM
and schedule shall be proposed in phases, and include the cost, period of
performance (POP), and exit criteria for each phase. A total cost and POP that
combines all phases shall also be included. Products and deliverables shall include,
by phase, a list of all prototype hardware and software. Corporate contact
information shall include the submitter’s company name, point of contact, phone
number, and e-mail address. Include any significant teaming partner (contact
information) relevant to the evaluation. Note that the contact information in the
BIDS registration is used for all notices and contact purposes.
b. White Paper Content: Offerors shall prepare and upload a white paper detailing
their proposed technical approach, schedule in phases, and ROM costs. Proposals are
evaluated by a technical panel of subject matter experts (i.e. scientists and engineers
with advanced degrees in the subject area), as well as experienced operational
personnel. The technical approach and concept of operations should be written with
sufficient detail for the panel to make an informed decision. If available, a summary
of modeling and simulation or test data should be provided to confirm performance
claims. The white paper shall be no more than 12 pages plus a cover page; each page
shall be 8 ½ by 11 inches with one inch margins. The text shall be double-spaced with
fonts no smaller than 10 point. Each page of the submission shall contain the BAA
announcement number and the proposal title in the header. If the white paper contains
15 of 19
JIEDDO BAA 09-02
more than 12 pages including tables, charts, and figures only the first 12 pages will be
8. Status and Inquiries: Inquiries by phone concerning the submission status will not be
accepted. Submitters can check the status of their submissions at the BIDS website
under “My Submissions.” All submission will complete the Phase 1 evaluation process;
the steps of that process correspond to the following BIDS website status levels:
a. Level 1: Initial Technical Reviews.
b. Level 2: Technical Evaluation Panel.
c. Level 3: Internal coordination and staffing of panel recommendation.
d. Level 4: Management review of panel recommendation.
e. Level 5: Vice Director approval of panel recommendation and release of
notification to offeror.
9. Notification to Offeror: The Government will notify the offeror by email when their
submission has completed Phase 1 evaluation.
10. Classified Proposal Submission Instructions: DO NOT UPLOAD CLASSIFIED
DOCUMENTS TO THE BIDS WEBSITE. For any proposal related to current or
previously funded Government work, the offeror should submit the proposal to the
sponsor for classification review prior to submission to BIDS. If any submission
contains classified information, the offeror shall upload an unclassified placeholder
document in BIDS, and identify in the comments section of the submission record that
the submittal cannot be uploaded due to classification. Classified proposals shall then be
mailed or delivered to the following address:
2521 South Clarke Street
Arlington, VA 22202
The BIDS document identifier must be clearly identified on the mailed submittal.
Classified proposals (up to SECRET) must be appropriately and clearly marked
(including all paragraphs and pages containing the subject data), packaged, and
shipped in accordance with classified material handling procedures and security
regulations pertaining to the level of classification.
11. Intellectual Property, Technical Data and Software: All anticipated intellectual
property, technical data or software rights shall be disclosed.
16 of 19
JIEDDO BAA 09-02
12. Patents and Patent Applications: Identify any existing, applied for, or pending patents
that will be used in the conduct of this effort. Provide patent number or application
number and title. If no patents or patent applications are relevant; so state.
13. Identify any technical data and/or computer software that will be delivered with less
than unlimited rights as prescribed in DFARS 252.227-7017 and DFARS 252.227-7028.
If unlimited rights in technical data are proposed, state this.
14. Central Contract Registration (CCR): Prospective contractors must be registered in
the DoD CCR database prior to award of an agreement. By submitting an offer to this
BAA, the offeror acknowledges the requirement that they must be registered in the CCR
database prior to award, during performance, and through final payment of any
agreement resulting from this BAA. The CCR may be accessed at http://www.ccr.gov/.
Assistance with registration is available by phone at 1-888-227-2423.
X. PHASE 1 EVALUATION PROCESS
1. Proposals are evaluated as they are received, not at the conclusion of the BAA
submission deadline. Upon receipt, proposals receive an administrative review for
compliance with BAA Section IX, above, followed by an initial technical review.
Proposals are then evaluated by the technical evaluation panel, which normally meets on
a monthly basis. Proposals are not evaluated against each other. After any necessary
staff coordination, a recommendation to either accept or reject the proposal for Phase 2
is staffed to the JIEDDO Vice Director for approval.
2. Technical review panels will use the following selection criteria, in descending order of
importance, when conducting proposal evaluations:
a. Addresses one of the JIEDDO C-IED requirements published in this BAA.
b. Overall scientific and technical merits; to include potential for successful
performance of intended functions in an actual operational environment. Proposals
exhibiting technical or scientific innovation to solve a requirement are desired and,
in such instances, a higher than average risk of initial failure may be allowable.
c. The proposed solution provides a significant enhancement in operational capability
compared to existing fielded systems.
d. Offeror’s capabilities, experience, facilities, techniques or unique combinations of
these which are integral factors for achieving the proposal objectives.
e. Proposed schedule to deliver a prototype that can be tested at a Government facility.
f. Proposed cost.
3. Each proposal will be evaluated on its own merit and relevance to the descriptions of
opportunity requirements (at Sections II – VII) rather than against other proposals.
17 of 19
JIEDDO BAA 09-02
4. Proposal submissions may be rejected for the following reasons:
a. The submission does not comply with the guidelines listed in Section IX.
b. The proposed solution does not address a C-IED requirement;
c. The proposed solution includes development or acquisition of an aerial vehicle
platform which is not within JIEDDO’s fielding authority.
d. The proposed solution does not provide a significant enhancement in operational
capability compared to existing fielded systems.
5. Proposals submitted electronically to the BAA Information Delivery System (BIDS)
website which are determined to contain classified information will be rejected and the
potential breach of information security reported to the appropriate authority.
6. Proposal submissions that are determined to be offers of commercial items, as defined
by FAR, 2.01 may be rejected from BIDS. The FAR prescribes policies and procedures
unique to the acquisition of commercial items.
7. The socio-economic merits of each proposal seeking a procurement contract will be
evaluated in the context of the requirements described in this announcement. The
evaluation process will consider the extent of commitment in providing meaningful
subcontracting opportunities for small businesses, HUB Zone small businesses, small
disadvantaged businesses, woman-owned small business concerns, veteran-owned small
businesses, historically black colleges and universities, and minority institutions. The
North American Industry Classification System (NAICS) code for this solicitation,
334511 (which corresponds with the standard industrial classification code of 8731),
specifies a small business size standard of 750 employees or less. A Small Business
Subcontracting Plan prepared in accordance with FAR 52. 219-9 must accompany
contract proposals that exceed $500,000 submitted by all but small businesses. Entities
that must submit a Small Business Subcontracting Plan for contract proposals that
exceed $500,000 include universities/colleges, nonprofits, and large businesses.
Historically black colleges and universities (HBCU) and minority institutions (MI) are
encouraged to submit proposals and/or join others in submitting proposals. However, no
portion of this BAA will be set-aside for HBCU and MI participation due to the
impracticality of reserving discrete or functionally separable areas of this technology for
exclusive competition among these entities.
XI. OTHER BAA INFORMATION.
This notice constitutes a BAA as contemplated by FAR 6.102(d) (2). Unless otherwise stated
herein, no additional written information is available, nor will a formal RFP or other
solicitation regarding this announcement be issued. Requests for the same will be
disregarded. The Government reserves the right to select all, some, or none of the proposals
received in response to this announcement. Interested parties are invited to respond to this
synopsis. No hard copy version of this announcement will be made available. The
18 of 19
JIEDDO BAA 09-02
Government intends to issue awards based on the optimum combination of proposals that
offers the best overall value to the Government. One or more technology areas may receive
no funding. Also, the Government reserves the right to select for award some portions of the
proposals received in response to this BAA. In that event, the Government may select for
negotiation all, or portions, of a given proposal. The Government may incrementally fund
any award issued under this BAA. The Government will not pay for proposal preparation
costs. The cost of preparing proposals in response to this BAA is not allowable as a direct
charge to any contract resulting from this BAA or to any other Government contract.
Offerors are advised that only Contracting Officers are legally authorized to contractually
bind or otherwise commit the Government.
19 of 19