Explosively Formed Penetrator - DOC

Document Sample
Explosively Formed Penetrator - DOC Powered By Docstoc
					                             FOR OFFICIAL USE ONL Y
                            JOINT IED DEFE AT ORGANIZATION
                                    5000 ARMY PENTAGON
                                W ASHINGTON DC 20310 -5000




Introduction

The Joint Improvised Explosives Device Defeat Organization (JIEDDO) Broad Agency
Announcement (BAA), which is issued under the provisions of paragraph 6.102(d)(2) of the
Federal Acquisition Regulation (FAR), provides the vehicle for the competitive selection of
research proposals. Contracts based on responses to this BAA are considered to be the result of
full and open competition and in full compliance with the provisions of Public Law (PL) 98-369,
“The Competition in Contracting Act of 1984.” Awards for submissions under this BAA are
planned in Fiscal Year 2008 and 2009. However, funds may not be available for all
requirements under this BAA. No contract awards will be made until appropriated funds are
available from which payment for contract purposes can be made.

As the issuing agency, JIEDDO will not issue paper copies of this announcement. In addition,
JIEDDO reserves the right to select for award all, some, or none of the proposals in response to
this announcement. JIEDDO also reserves the right to fund all, some, or none of the proposals
received under this BAA. JIEDDO will not provide funding for direct reimbursement of
proposal development costs. Technical and cost proposals (or any other material) submitted in
response to this BAA will not be returned. It is the policy of the JIEDDO and its contracting
agencies to treat all proposals as sensitive competitive information and to disclose their contents
only for the purposes of evaluation.

This BAA will remain open for approximately ninety days from the date of publication or until
replaced by a successor BAA. JIEDDO may publish successor BAAs at any time. Proposals
may be submitted at any time during this period. See section I for more detailed instructions.

Approach

A two-phase proposal selection process will be used for this solicitation to minimize cost and
effort of prospective offerors. Phase one will be used to solicit, receive, and evaluate a one-page
Quad Chart and White Paper (not to exceed 12 pages). If the phase one proposal is accepted for
further detailed review, phase two will consist of detailed presentations and submissions through
the JIEDDO acquisition management process. Submitters will be contacted with specific
formatting and presentation instructions if selected to proceed through phase two for funding
consideration. Subsequent to funding approval, full technical proposals will be requested.

HBCU/MI and Small Business Set Aside

The Government encourages nonprofit organizations, educational institutions, small businesses,
small disadvantaged business (SDB) concerns, Historically Black Colleges and Universities
(HBCU), Minority Institutions (MI) (HBCU/MIs), women-owned businesses, and Historically
Underutilized Business (HUB) zone enterprises as well as large businesses and Government
agencies to submit proposals for consideration and/or to join others in submitting proposals;


                             FOR OFFICIAL USE ONL Y
                              FOR OFFICIAL USE ONL Y

 however, no portion of the BAA will be set-aside for these special entities because of the
 impracticality of reserving discrete or severable areas of research and development in any
 specific requirement area. The final determination will be made based on the relevance of the
 proposal to a JIEDDO requirement, individual technical merits of the proposal and budget
 constraints within the mission priorities. To ensure full consideration in these programs,
 registration in the BAA Information Delivery System (BIDS), described later in this document,
 requires the appropriate business type selection as well as accurate up-to-date information.

 Limitation of Funds

 The Government may incrementally fund contracts awarded from this BAA as provided by FAR
 52.232-22, “Limitation of Funds.” Most contracts awarded are anticipated to be 6 to 18 months
 in duration. To facilitate incremental funding, submissions shall include the cost and schedule by
 a task-phased structure organized by fiscal year (October through September) with clear exit
 criteria, and shall be inclusive of all work to complete the effort including any options. It is
 anticipated that the entire effort will be negotiated with the initial contract award.

 Technical Evaluation Support

 It is the intent of this office to use contractor support personnel in the review, evaluation, and
 administration of all submissions for this BAA. All individuals in this category that will have
 access to any proprietary data shall certify that they will not disclose any information pertaining
 to this solicitation including any submission, the identity of any submitters, or any other
 information relative to this BAA; and shall certify that they have no financial interest in any
 submissions evaluated. Submissions and information received in response to this BAA
 constitutes permission to disclose that information to certified evaluators under these conditions.

I. GENERAL INFORMATION.

  (1) BAA Issuing Agency Name. Joint Improvised Explosive Device Defeat Organization
      (JIEDDO)

  (2) Contracting Agency Name. Any/all of the United States government contracting
      organizations may serve as the contracting agency for this BAA.

  (3) Sponsoring Agency Name. Joint Improvised Explosive Device Defeat Organization
      (JIEDDO)

  (4) Program Name. Rapid Development of Counter IED Capabilities

  (5) Research Opportunity Number. BAA JIEDDO-08-01

  (6) Response Date. Offeror(s) responding to this BAA may begin submitting responses on 8
      February 2008, 1600 hours Eastern Standard Time. Final submissions to this BAA are due
      by 31 May 2008, 1600 hours Eastern Standard Time. JIEDDO reserve the right to award
      contracts for a period of approximately one (1) year from after 31 May 2008.

                              FOR OFFICIAL USE ONL Y
                                        2
                          FOR OFFICIAL USE ONLY

(7) Definitions.

   a) An Improvised Explosive Device (IED) is defined as “a device placed or fabricated in
      an improvised manner incorporating destructive, lethal, noxious, pyrotechnic, or,
      incendiary chemicals and designed to destroy, incapacitate, harass, or distract. It may
      incorporate military supplies, but is normally devised from non-military components.”

   b) Counter-IED (C-IED) is defined as “the collection of efforts and operations that include
      offensive and defensive measures taken to predict, prevent, detect, neutralize, mitigate
      or train our forces to counter the IED threat. It also includes intelligence operations to
      defeat the IED network as well as respond to the IED threat and its effects.”

   c) PREDICT Functional Capability is the foretelling of activities associated with the IED
      system to include: recruitment activities; information passing operations and
      mechanisms; financial transactions from funding sources to suppliers and operators;
      transport of IED component material from various storage facilities to/from
      manufacturing facilities; location of interim material storage, manufacturing, and
      command and control facilities; locations of manufacturing and assembly facilities;
      process of bomb manufacture and assembly; transport of the device to the place of
      emplacement and detonation; and identification of the people associated with these
      activities.

   d) PREVENT Functional Capability is the targeting, interdiction, and elimination of
      enemy personnel (operators and bomb makers) and the associated infrastructure
      (facilities and supplies) that precludes employment of IEDs against military and civilian
      personnel.

   e) DETECT Functional Capability is the extraction of information from people, objects
      and activities associated with IEDs (fabrication, transportation, and employment) or
      components of IEDs and in sufficient time to achieve a favorable outcome.

   f) NEUTRALIZE Functional Capability is to make people, objects and activities
      associated with IEDs (fabrication, transportation, and employment) or components of
      IEDs incapable of action or ineffective.

   g) MITIGATE Functional Capability is to lessen or minimize the severity of IED-related
      events through enhancement of protection. New capabilities will enhance the
      protection of military personnel vehicles by mitigating the blast effects of IEDs.

(8) Description of Opportunity. The Department of Defense (DOD) solicits proposals for the
    development of capabilities to defeat IEDs that enemy forces employ against coalition
    forces in Iraq and Afghanistan. The DOD is seeking innovative, counter IED capabilities
    that can be rapidly developed, demonstrated and fielded within 6 to 18 months from
    award and addresses one (1) of the following four (4) solicitation areas:




                          FOR OFFICIAL USE ONL Y
                                    3
                             FOR OFFICIAL USE ONLY

       1) Can predict, prevent, detect, neutralize or mitigate Explosively Formed
          Penetrators (SECTION II);

       2) Can predict, prevent, detect, neutralize or mitigate Deep Buried IEDs
          (SECTION III);

       3) Provide stand off detection of explosives and chemical compounds associated
          with explosives (SECTION IV);

       4) Offeror(s) possessing any additional technology, information, or
          recommendations that would enhance existing Counter-IED systems are
          encouraged to submit proposal(s) to this BAA (SECTION V).

II. EXPLOSIVELY FORMED PENETRATOR REQUIREMENTS.

  (1) An Explosively Formed Penetrator (EFP) is a class of IEDs with a shaped warhead
      designed to penetrate armor effectively at stand-off distances. An EFP system comprises
      three major components: 1) an arming device, 2) a trigger device and 3) the explosive
      device. Figure 1 shows a block diagram for an EFP. The explosive device component
      consists of four elements: a concave metal liner (the warhead), case, base plate, and
      explosive charge (propellant). The case holding the explosive is generally cylindrical,
      fabricated from commonly available materials (e.g. PVC pipe, steel pipe), with the forward
      end closed by a concave copper or steel disk-shaped liner to create a penetrator. Generally
      military grade explosive is loaded behind the metal liner to fill the casing. A blasting cap
      initiator in place though a hole centered in the base plate. Upon detonation, the explosive
      projects the liner to form a projectile in a direction in line with the EFP at a speed well over
      one kilometer per second, depending on the design and type of explosive used. Detonation
      is controlled by command wire, radio control (RC), or remote arming with trigger. EFPs
      can be deployed singly, in pairs, or in arrays, and camouflaged in painted foam to look
      similar to natural rocks or with man made artifacts (e.g. trash) depending on the tactical
      situation.




                                     Figure 1 EFP block diagram


                             FOR OFFICIAL USE ONL Y
                                       4
                          FOR OFFICIAL USE ONL Y

(2) Counter-EFP Operational Requirements. Proposals should address one or more of the
    following operations: 1) Route Clearance, 2) Mounted Patrols, 3) Traffic Control Points, 4)
    Entry Control Points or 5) Network Defeat.

   a) Route Clearance. Route clearance operations deliberately search roads, find and mark
      IEDs to include EFPs, and to secure the immediate area while Explosive Ordnance
      Disposal team members render safe procedures on discovered IEDs. The proposed
      system should have the capability to move along military routes at a pace sufficient to
      support route clearance operations and to:

       i) Detect emplaced EFPs with a high probability of detection and a low false alarm
          rate, and alert route operating forces in sufficient time to remain outside the blast
          zone of the explosive device;

       ii) Neutralize EFPs with or without detection cue while keeping route operating forces
           outside the blast zone of the explosive device;

       iii) Mitigate the effects of EFPs to improve survivability of the route operating forces
            over currently employed solutions.

   b) Mounted Patrols. Mounted Patrols perform many different missions along military
      roads. The proposed system should have the capability to operate on or over military
      routes at a pace that supports mounted patrol operations and to:

       i) Detect emplaced EFPs with a high probability of detection and a low false alarm
          rate, and in sufficient time to keep the supported patrol outside the kill zone of the
          explosive device;

       ii) Neutralize EFPs with a high confidence of effectiveness with or without detection
           cue while outside the blast zone of the explosive device;

       iii) Mitigate the effects of EFPs to improve survivability of the patrol over currently
            employed solutions.

   c) Traffic Control Points. Dismounted patrols randomly establish temporary traffic
      control points off base to inspect vehicles and people for contraband. The proposed
      system should be transportable and have the capability to non intrusively inspect:

       i) Vehicles or personnel for components associated with EFPs in transit from supplier
          to fabricator or to operator,

       ii) With a high probability of detection and a low false alarm rate at a pace sufficient to
           support traffic control operations, and

       iii) At a sufficient range or with enough advance warning to prevent a lethal EFP
            employment event.

                          FOR OFFICIAL USE ONL Y
                                    5
                              FOR OFFICIAL USE ONLY


       d) EFP Network Defeat: Networks are the system of people, facilities, supplies and
          finances that terrorists use to produce, transport or employ IEDs. Proposals should
          identify, track or target portions of an EFP production, transportation or employment
          network.

           i) It can be employed in either a wide geographic area or a localized tactical area.

           ii) It must have operating ranges commensurate with its employment method.

           iii) It must have sufficiently high event detection rates with sufficiently low false event
                detections to be operationally useful.

       e) Other General Requirements:

           i) The proposed solutions will need to operate and not interfere with, physically or
              electromagnetically, other fielded systems. The operating environment will range
              from urban to rural.

           ii) If the system will be integrated into a military vehicle it must be capable of being
               ruggedized for use in an austere environment including potential combat.

    (3) Other Unspecified Capabilities and solutions. Offeror(s) possessing any additional
        technology, information, or recommendations that would enhance counter EFP prediction,
        detection, neutralization, mitigation systems and training solutions are encouraged to
        submit proposal(s) to this BAA.

III. DEEP BURIED IED REQUIREMENTS.

   (1) Deep Buried IED (DBIED) is a class of IEDs that are buried deeper than 0.5 meters with a
       large quantity of explosives (sufficient weight to destroy an armored military vehicle). A
       DBIED system typically comprises three major components: 1) an arming device, 2) a
       trigger device and 3) the explosive device. The explosive device consists of three elements:
       explosives, a container for the explosives and initiator. Figure 2, is a notional depiction of
       an operationally emplaced DBIED. Figure 3 includes pictures of explosive devices. While
       there are hundreds of possible explosive elements, DBIED explosives are likely to be either
       1) military grade explosives such as TNT, RDX, COMP B, or propellants common to
       military munitions (artillery shells, mortar rounds, mines and rockets); 2) bulk explosives
       in the form of plastic explosives, Urea Nitrates (UN) or Ammonium Nitrates (AN); or 3)
       ordinary fuels such as gasoline, or propane. The case that holds the explosives are the
       munitions themselves which can be metal or plastic for certain anti tank mines; or steel
       and plastic containers (e.g. one gallon water jug) for AN or UN or fuel liquids. The
       initiator is likely to be a blasting cap or detonation cord. The explosive device is placed
       under roads typically, but not limited to, from 0.5 meters to 2 meters from the top of the
       road surface to the top of the explosive device. Actual depths of emplacement are
       dependent on the type and amount of explosives available and the tactical scenario to

                              FOR OFFICIAL USE ONL Y
                                        6
                         FOR OFFICIAL USE ONLY

   emplace the explosives. The explosive device is placed under the road by digging from the
   top of the road or for elevated roads such as causeways, from the side of the road, or by
   using existing infrastructure such as storm drains, man-hole covers in or along roads, or
   culverts, tunnels or pipes that traverse roads. Once emplaced, there are several means of
   initiating the explosive device. The operator can initiate the detonation by command wire
   or radio once the target is over the device. Another method, allows the operator to arm the
   device and the victim then triggers the detonation by driving over a pressure plate or wire
   that closes the circuit for initiation.




(2) Counter-DBEID Operational Requirements. Proposals should address one or more of the
    following operations: 1) Route Clearance, 2) Mounted Patrols, 3) Traffic Control Points
    and 4) Network Detection.

   a) Route Clearance. Route clearance operations deliberately search roads, find and mark
      IEDs to include DBIEDs, and to secure the immediate area while Explosive Ordnance
      Disposal team members render safe procedures on discovered IEDs. The proposed
      system should have the capability to move along military routes at a pace sufficient to
      support route clearance operations and to:


                         FOR OFFICIAL USE ONL Y
                                   7
                      FOR OFFICIAL USE ONLY

    i) Detect emplaced DBIEDs with a high probability of detection and a low false alarm
       rate, and alert route operating forces in sufficient time to remain outside the blast
       zone of the explosive device;

    ii) Neutralize DBIEDs with or without detection cue while keeping route operating
        forces outside the blast zone of the explosive device;

    iii) Mitigate the effects of DBIEDs to improve survivability of the route operating
         forces over currently employed solutions.

b) Mounted Patrols. Mounted Patrols perform many different missions along military
   roads. The proposed system should have the capability to operate on or over military
   routes at a pace that supports mounted patrol operations and to:

   i) Detect emplaced DBIEDs with a high probability of detection and a low false alarm
      rate, and in sufficient time to keep the supported patrol outside the kill zone of the
      explosive device;

   ii) Neutralize DBIEDs with a high confidence of effectiveness with or without
       detection cue while outside the blast zone of the explosive device;

   iii) Mitigate the effects of DBIEDs to improve survivability of the patrol over currently
        employed solutions.

c) Traffic Control Points. Dismounted patrols randomly establish temporary traffic
   control points off base to inspect vehicles and people for contraband. The proposed
   system should be transportable and have the capability to non intrusively inspect:

   i) Vehicles or personnel for components associated with DBIEDs in transit from
      supplier to fabricator or to operator,

   ii) With a high probability of detection and a low false alarm rate at a pace sufficient to
       support traffic control operations, and

   iii) At a sufficient range or with enough advance warning to prevent a lethal DBIED
        employment event.

d) DBIED Network Defeat: Networks are the system of people, facilities, supplies and
   finances that terrorists use to produce, transport or employ IEDs. Proposals should
   identify, track or target portions of a DBIED production, transportation or employment
   network.

   i) It can be employed in either a wide geographic area or a localized tactical area.

   ii) It must have operating ranges commensurate with its employment method.



                      FOR OFFICIAL USE ONL Y
                                8
                              FOR OFFICIAL USE ONLY

           iii) It must have sufficiently high event detection rates with sufficiently low false event
                detections to be operationally useful.

       e) Other General Requirements:

           i) The proposed solutions will need to operate and not interfere with, physically or
              electromagnetically, other fielded systems. The operating environment will range
              from urban to rural.

           ii) If the system will be integrated into a military vehicle it must be capable of being
               ruggedized for use in an austere environment including potential combat.

  (2) Other Unspecified Capabilities and solutions. Offeror(s) possessing any additional
      technology, information, or recommendations that would enhance counter DBIED prediction,
      detection, neutralization, mitigation systems and training solutions are encouraged to submit
      proposal(s) to this BAA.

IV. STAND-OFF DETECTION OF EXPLOSIVES REQUIREMENTS.

  (1) Stand-off Detection of Explosives is the means to detect bulk and trace amounts of explosive
      compounds, chemical compounds associated with the fabrication of explosives, or the by-
      products from explosives at a range in excess of the device’s effective employment range.

  (2) Stand-off Detection of Explosives Operational Requirements. Proposals should address one
      or more of the following operations: 1) Route Clearance, 2) Mounted Patrols, 3) Traffic
      Control Points, 4) Entry Control Points or 5) Network Defeat.

     a) Route Clearance. Route clearance operations has the mission to deliberately search roads,
        find and mark IEDs, and to secure the immediate area while Explosive Ordnance
        Disposal team members render safe procedures on found IEDs. The proposed system
        must have the capability to move along military routes at a pace sufficient to support
        route clearance operations and provide stand-off detection of explosives, chemical
        compounds associated with the fabrication of explosives or the by products from
        explosives on people, vehicles, buildings or other objects with a high probability of
        detection and a low false alarm rate.

     b) (U) Mounted Patrols. Mounted Patrols perform many different missions along military
        roads. The proposed system must have the capability to operate on or over military
        routes at a pace that supports mounted patrol operations and provide stand-off detection
        of explosives, chemical compounds associated with the fabrication of explosives or the
        by products from explosives on people, vehicles, buildings or other objects with a high
        probability of detection and a low false alarm rate.

     c) Traffic Control Points. Dismounted patrols randomly establish temporary traffic control
        points off base to inspect vehicles and people for contraband. The proposed system must
        have the capability to non intrusively inspect and detect explosives or chemical

                              FOR OFFICIAL USE ONL Y
                                        9
                              FOR OFFICIAL USE ONLY

        compounds associated with the fabrication of explosives on people, vehicles, buildings or
        other objects with a high probability of detection and a low false alarm rate and with a
        stand-off range sufficient to prevent IED employment.

    d) Entry Control Points. Coalition forces have established entry control points to restrict
       access to Forward Operating Bases for vehicles and people. Both are inspected for
       contraband but without stand off detection capability. The proposed system must have
       the capability to non intrusively inspect and detect explosives or chemical compounds
       associated with the fabrication of explosives on people, vehicles or other objects with a
       high probability of detection and a low false alarm rate and with a stand-off range
       sufficient to prevent IED employment.

    e) Network Defeat: Networks are the system of people, facilities, supplies and finances that
       terrorists use to produce, transport or employ IEDs. Proposals should be able to identify
       trace explosive compounds from surveillance distances with enough accuracy to enable
       the detection of network manufacturing facilities and transportation systems while being
       employed over an operationally useful area.

    f) Other Unspecified Capabilities and solutions. Offeror(s) possessing any additional
       technology, information, or recommendations that would enhance trace explosives
       detection are encouraged to submit proposal(s) to this BAA.

V. OTHER COUNTER IED PROPOSALS

   (1) Offeror(s) possessing any additional technology, information, or recommendations that
       would enhance the detection, identification, or defeat of IEDs or their supporting
       manufacturing, transportation, emplacement or personnel networks are also encouraged to
       submit proposal(s) to this BAA.

   (2) Identify what aspect(s) of the IED problem “as a weapon system of strategic influence”
       your proposal addresses and how your proposed solution would mitigate the effectiveness
       of the IED weapon system.

   (3) Ensure your proposal otherwise follows the preparation instructions listed in Section VI of
       this document.

VI. PROPOSAL PREPARATION GUIDELINES

   (1) This section provides information and instructions for the preparation and submission of all
       proposals under this BAA. All submissions must meet these requirements including
       format, content, and structure, and must include all specified information to avoid
       disqualification, submission rejection, or delays in evaluation.

   (2) Submission Process. Proposals will be submitted electronically through a secure web-
       based submission site. The link to the submission site is: https://bids.acqcenter.com/jieddo.



                              FOR OFFICIAL USE ONL Y
                                        10
                            FOR OFFICIAL USE ONLY

 (3) The above web site will be available on or about 8 Feb 08. Detailed instructions are
     available at the submission site. BIDS will not allow proposals to be uploaded, or
     modified, or classified placeholders to be entered after the closing date and time. Any
     proposal, regardless of classification, submitted by any other means, or that is late
     will not be considered by the government. Refer to the Special Handling Procedures
     for Classified Information paragraphs 13 and 14 in Section V for instructions on
     classified submissions.

 (4) Registration. Offerors interested in submitting proposals must register at the submission
     site.

 (5) BAA Information Delivery System (BIDS). The BAA may be accessed at
     https://bids.acqcenter.com/jieddo which is secure website that is used to collect all
     unclassified submissions, and to collect placeholder records for all classified submissions.
     BIDS also provides submission progress tracking, evaluation comment collection, and
     results notification back to the submitter.

 (6) Submitter Registration. A BIDS submitter registration is required to respond to this BAA.
     Existing BIDS accounts are acceptable for a new BAA if the company contact information
     is the same or can be corrected. The User Name is created by the offeror, must be unique,
     and is used for BIDS login and submission tracking. Registration acceptance for submitters
     is automatic, but takes several seconds to be recognized by BIDS. A success e-mail will be
     sent to indicate that the User Name and account are accepted. BIDS is e-mail dependent
     and uses the Registration e-mail as the single point of contact for all notifications
     associated with the BAA. This e-mail address should be monitored frequently during the
     BAA process for the notices. E-mail addresses included in the submissions or any other
     data field in BIDS will not be used for contact and notification purposes.

 (7) User Accounts and Password Resets. Registration account information such as the point
     of contact (POC), e-mail, and password can be updated after login. The Forgot My
     Password link on the BIDS Homepage allows registered users with a valid e-mail address
     to automatically reset a password. The system will verify the account User Name and e-
     mail to send a new password to that e-mail.

 (8) Registration and Account Help. BIDS Help requests can be e-mailed to BIDS
     administrators at the Help Request link located on the BIDS Homepage.

 (9) BIDS Security and Access Control. All data uploaded to BIDS is secure from public view.
     All submissions will be considered proprietary/source selection sensitive and protected
     accordingly. The documents can only be reviewed by the registrant and authorized
     Government and contractor representatives with no conflict of interest.

(10) Electronic File Format. It is mandatory that offers provide both a quad chart and white
     paper submission that meets the format requirements provided below.




                            FOR OFFICIAL USE ONL Y
                                      11
                             FOR OFFICIAL USE ONLY

   a) Quad Chart Content. A Quad chart conveys the essence of the proposed solution on a
      single page. When preparing a submission, the offeror shall ensure that the specific
      criteria of the requirement are addressed, the solution is clear, and can be accomplished
      with the proposed technology, cost, and schedule. The Quad Chart includes a document
      header and four quadrants. The Quad Chart format and sample are provided at the BIDS
      website under Reference Materials

         i) Header Information. Header information shall include the BAA Announcement
            number and the Proposal Title. The date and company name should be included
            along with the appropriate document markings.

         ii) Top Left Quadrant, Graphical Depiction. The top left quadrant is a graphical
             depiction, photograph, or artist’s concept of the proposed solution or prototype.
             Include labels or brief descriptive text as needed for clarification. Ideally, this will
             convey the system concept, use, capability, and any relevant size or weight
             relationships based on the published requirement.

         iii) Top Right Quadrant, Operational and Performance Capabilities. The top right
              quadrant contains the operational and performance capabilities summary.

         iv) Bottom Right Quadrant, Cost and Schedule. The bottom right quadrant contains
             the Rough Order of Magnitude (ROM) and Schedule, Products and Deliverables,
             and Corporate Contact Information. ROM and Schedule shall be proposed by phase
             and include the cost, period of performance (POP), and exit criteria for each phase.
             A total cost and POP that combines all phases shall also be included. Products and
             Deliverables shall include, by phase, a list of all prototype hardware and software
             along with the required data as described in “Product and Deliverable
             Requirements” in section 2 of this document. Corporate Contact Information shall
             include the submitter’s company name, point of contact, phone number, and e-mail
             address. Include any significant teaming partner (contact information) relevant to
             the evaluation. (Note that the contact information in the BIDS registration is used
             for all notices and contact purposes.)

   b) White Paper Format. Offerors shall prepare and upload a White Paper with no more
      than twelve (12) pages plus a cover page in response to Phase 2 of this BAA. All
      submission pages shall be 8 ½ by 11 inches, double-spaced with fonts no smaller than 10
      point; all margins shall be one inch. Each page of the submission shall contain the
      document identifier in the document header. If the White Paper contains more than 12
      pages including tables, charts, and figures only the first 12 pages will be evaluated. All
      White Paper submissions must include a cover page.

(11) Status and Inquiries. Inquiries by phone concerning the status of submission will not be
     accepted. After login to the BIDS website, submitters are able to check the status of their
     submission(s) under My Submissions.




                             FOR OFFICIAL USE ONL Y
                                       12
                              FOR OFFICIAL USE ONLY

  (12) Notification to Offeror. The Government will notify the offeror when a submission has
       been accepted or rejected via email.

  (13) Special Handling Procedures for Classified Information. If a submittal contains
       classified information, the offeror must first create a placeholder record in BIDS with an
       unclassified cover page attachment. Identify in the comments section of the submission
       record that the submittal cannot be uploaded due to classification. The BIDS tracking
       number must be clearly identified on the mailed submittal. Classified responses (up to
       SECRET) must be appropriately and clearly marked (including all paragraphs and
       pages containing the subject data), packaged, and shipped in accordance with
       classified material handling procedures and security regulations pertaining to the
       level of classification.

  (14) Classified Submittal Instructions. Classification does not in any way eliminate the
       offeror’s requirement to comply with all instructions in this BAA. Classified proposals
       shall be submitted as one (1) copy each of the quad chart and white paper. Classified
       proposals shall be mailed or delivered to the following address:

         Polk Building
         2521 South Clarke Street
         Suite 1850
         Arlington, VA 22202
         ATTN: Security, TRID (ITB)

  (15) Intellectual Property, Technical Data and Software. All anticipated intellectual
       property, technical data or software rights shall be disclosed.

  (16) Patents and Patent Applications. Identify and existing, applied for, or pending patents
       that will be used in the conduct of this effort. Provide Patent number or application number
       and title. If no patents or patent applications are relevant; so state.

  (17) Rights in Technical Data. Identify any technical data and/or computer software that will
       be delivered with less than unlimited rights as prescribed in DFARS 252.227-7017 and
       DFARS 252.227-7028. If unlimited rights in technical data are proposed, so state this.

  (18) Central Contract Registration (CCR). Prospective contractors must be registered in the
       DoD CCR database prior to award of an agreement. By submission of an offer resulting
       from this BAA, the offeror acknowledges the requirement that a prospective contractor
       must be registered in the CCR database prior to award, during performance, and through
       final payment of any agreement resulting from this BAA. The CCR may be accessed at
       http://www.ccr.gov/. Assistance with registration is available by phone at 1-888-227-2423.

VII. EVALUATION PROCESS

    Evaluation of Submissions: Evaluations will be conducted using the following selection
    criteria: (1) Overall scientific and technical merits, (2) Addresses one of the JIEDDO C-IED

                              FOR OFFICIAL USE ONL Y
                                        13
                               FOR OFFICIAL USE ONLY

    needs, exhibits technical/scientific innovation and risk to solve the requirement, (3) The
    Offeror’s capabilities, related experience, facilities, techniques or unique combinations of these
    which are integral factors for achieving the proposal objectives, (4) An assessment of tactical
    feasibility for deployment (e.g. implications to manpower, training & operations), (5) Proposed
    cost, (6) Proposed schedule to deliver a prototype which can be tested at a government test
    facility.

    Proposal submissions may be rejected (at a minimum) for the following reasons:

                  The submission is non-compliant, one or more of the electronic files are not in
                   the correct format;
                  The proposed solution does not address a C-IED requirement;
                  The proposed solution includes development or acquisition of an aerial or
                   vehicle platform which is not within JIEDDO’s fielding authority;
                  The proposed solution cannot be fielded with 6 - 18 months;
                  The proposed solution does not provide a significant enhancement in
                   operational capability compared to existing fielded systems.

    The socio-economic merits of each proposal seeking a procurement contract will be evaluated
    in the context of the requirements described in this announcement. The evaluation process will
    consider the extent of commitment in providing meaningful subcontracting opportunities for
    small businesses, HUB Zone small businesses, small disadvantaged businesses, woman-owned
    small business concerns, veteran-owned small businesses, historically black colleges and
    universities, and minority institutions. The North American Industry Classification System
    (NAICS) code for this solicitation, 334511 (which corresponds with the standard industrial
    classification code of 8731), specifies a small business size standard of 750 employees or less.
    A Small Business Subcontracting Plan prepared in accordance with FAR 52.219-9 must
    accompany contract proposals that exceed $500,000 submitted by all but small businesses.
    Entities that must submit a Small Business Subcontracting Plan for contract proposals that
    exceed $500,000 include universities/colleges, nonprofits, and large businesses. Historically
    Black Colleges and Universities (HBCU) and Minority Institutions (MI) are encouraged to
    submit proposals and/or join others in submitting proposals. However, no portion of this BAA
    will be set-aside for HBCU and MI participation due to the impracticality of reserving discrete
    or functionally separable areas of this technology for exclusive competition among these
    entities.

VIII. OTHER BAA INFORMATION

    This notice constitutes a BAA as contemplated by FAR 6.102(d) (2). Unless otherwise stated
    herein, no additional written information is available, nor will a formal RFP or other
    solicitation regarding this announcement be issued. Requests for the same will be disregarded.
    The Government reserves the right to select all, some, or none of the proposals received in
    response to this announcement. Interested parties are invited to respond to this synopsis. No
    hard copy version of this announcement will be made available. The Government intends to
    issue awards based on the optimum combination of proposals that offers the best overall value
    to the Government. One or more technology areas may receive no funding. Also, the

                               FOR OFFICIAL USE ONL Y
                                         14
                          FOR OFFICIAL USE ONLY

Government reserves the right to select for award some portion(s) of the proposals received in
response to this BAA. In that event, the Government may select for negotiation all, or portions,
of a given proposal. The Government may incrementally fund any award issued under this
BAA. The Government will not pay for proposal preparation costs. The cost of preparing
proposals in response to this BAA is not allowable as a direct charge to any contract resulting
from this BAA or to any other Government contract. Offerors are advised that only Contracting
Officers are legally authorized to contractually bind or otherwise commit the Government.




                          FOR OFFICIAL USE ONL Y
                                    15

				
DOCUMENT INFO
Shared By:
Categories:
Tags:
Stats:
views:34
posted:11/23/2011
language:English
pages:15