Loren Data's SAM Daily™

fbodaily.com
Home Today's SAM Search Archives Numbered Notes CBD Archives Subscribe
FBO DAILY ISSUE OF MAY 07, 2004 FBO #0893
SPECIAL NOTICE

D -- JWID 2005 (formerly JWID)

Notice Date
5/5/2004
 
Notice Type
Special Notice
 
NAICS
541519 — Other Computer Related Services
 
Contracting Office
Defense Information Systems Agency, Acquisition Directorate, DITCO-NCR, 5111 Leesburg Pike Skyline 5, Suite 900A, Falls Church, VA, 22041-3206
 
ZIP Code
22041-3206
 
Solicitation Number
Reference-Number-CWID2005
 
Response Due
9/15/2004
 
Archive Date
9/30/2004
 
Point of Contact
Rhonda LaGarde, Contract Specialist, Phone (703)681-1250, Fax (703)681-1211,
 
E-Mail Address
lagarder@ncr.disa.mil
 
Description
1. This Federal Business Opportunities (FBO) announcement is for the Coalition Warrior Interoperability Demonstration 2005 (CWID 2005), formally known as the Joint Warrior Interoperability Demonstration, scheduled for 31 May through 24 June 2005. The focus for CWID 2005 is on coalition interoperability, Homeland Defense (HLD), and Homeland Security (HLS). Combatant commands, Services and Department of Defense (DOD) Agencies (C/S/As), government agencies outside the DOD, North Atlantic Treaty Organization (NATO), and national participants outside the United States must submit interoperability trial proposals for CWID 2005 by 15 September 2004. Industry partners must work through a C/S/A or government agency sponsor from outside the DOD to submit trials. Complete details on CWID 2005, to include the format and submission instructions for trials, can be found at http://www.jwid.js.mil. 2. CWID is the Chairman of the Joint Chiefs of Staff's annual event that enables the US combatant commands and international community to investigate command, control, communications, computers, intelligence, surveillance, and Reconnaissance (C4ISR) solutions that focus on relevant and timely objectives for enhancing coalition interoperability. US Joint Forces Command (USJFCOM) on behalf of the Chairman is responsible for the oversight of CWID. The intent is to conduct trials of C4ISR capabilities during CWID which can then be moved into operational use within 6-12 month following the execution period. Trials are not limited to evaluations of hardware or software solutions. The tactics, techniques, and procedures associated with using technology are just as important as the solutions themselves and further investigations into these areas using CWID as a vehicle are encouraged. The USJFCOM J86I Joint Interoperability and Integration (JI&I) Transformation Change Proposal (TCP) process will be the primary method used to responsibly field promising technologies to fit warfighter requirements in the 6-12 month timeframe. 3. United States Northern Command (USNORTHCOM) is the host combatant command for CWID 2005. Consequently, the scenario for CWID 2005 will incorporate aspects of HLD and HLS in addition to traditional coalition operations. USNORTHCOM plans to include the Federal Emergency Management Agency (FEMA), the Federal Bureau of Investigation (FBI), and the Coast Guard. USNORTHCOM intends to use CWID as a proving ground for emerging C4ISR technologies relevant to HLD and HLS. Coalition participation remains the cornerstone of CWID. Anticipated international participants will include Australia, Canada, New Zealand, United Kingdom, and NATO to include several constituent nations. In addition, all combatant commanders may invite nations, with prior JFCOM approval, from within their respective area-of-responsibility to participate as multinational task force (MTF) members. 4. CWID is conducted in a simulated operational environment to provide context for validation of C4ISR solutions. Depending on capabilities to be demonstrated during CWID Execution each trial may receive one or more of the following assessments based on the criteria set forth in the CWID 2005 additional information document: Warfighter/Operator, Technical/Interoperability, and/or Security Capabilities assessment. The Systems Engineering Integration Working Group (SEIWG) with input from other working groups will report on trials not formally assessed by the Assessment Working Group (AWG). Results from all trials will be reported on in the CWID final report. Trials with coalition partners are conducted over a worldwide secure network enabling trials classified SECRET releasable to Australia, Canada, New Zealand, United Kingdom and NATO. Use of other information domains over other networks to support participation of additional nations and the information flow required for the HLS/HLD portion of the scenario depends on which other nations and which U.S. government agencies participate. The CWID Joint Management Office (JMO) coordinates, engineers and supervises the network backbone(s), information domains and the worldwide venue, and provides the trial assessments. 5. To be considered for participation in CWID 2005, each proposed trial must: a. Address one or more of the CWID 2005 objectives listed in paragraph 6. b. Commit to fully resource the trial (funding, personnel, training, hardware, software, documentation, etc.) for CWID 2005 at one or more CWID site. c. Industry partners must submit trials in concert with a DOD sponsor or with a government sponsor from outside the DOD. Trial proposals must be provided in a specific format as detailed on the CWID web site. The CWID Senior Management Group (SMG), in concert with the coalition partners, will select specific trial proposals for execution by 7 November 2004 given projected availability of resources, how well the trial dovetails with the objectives, and additional considerations as specified on the CWID web site in the supplemental guidance to the FBO. USNORTHCOM will provide an initial determination on those trials related to HLD/HLS. 6. USJFCOM, in coordination with USNORTHCOM, gathered and prioritized objectives for CWID 2005 from the Unified Commands, NATO, Australia, Canada, New Zealand, and the United Kingdom. A summary of the eight specific CWID 2005objectives follows. CWID 2005 Overarching Objectives and Explanations Overview: The term coalition has changed significantly since the events of 9/11. The traditional thought of coalitions that included national military to military, now incorporate civilian agencies. The Global War on Terrorism (GWOT) has highlighted the need for unimpeded information sharing between traditional coalition partners, and perhaps as significantly between DoD and non-DoD agencies. The interagency requirements for information sharing are, in many cases, more complex than those of traditional military to military coalition partners because of a lack of common standards for both hardware and software. Coalition operations in response to international crises continue to highlight the requirement for coalitions to exchange C4ISR information seamlessly. The acceptance and endorsement of the network centric warfare concept by the U.S. and the nations within the various coalitions participating in these operations, points to the need to resolve the technical, procedural and policy challenges that accompany this concept. The Coalition Warrior Interoperability Demonstration (CWID) program remains the premier event for U.S. and Homeland Security/Homeland Defense (HLS/D) coalitions, and traditional international coalition participants to explore interoperability solutions. The emphasis on technical assessments, military utility assessments, warfighter, and security evaluations of these solutions will lead to accelerated fielding by the U.S. to its warfighters and inter-agencies. CWID also provides the proper framework to nominate technologies and trials for joint standards. CWID 2005 offers a continuation of this successful venue to work through all aspects of the solution, focusing on network centricity, and accompanying needs to refine current procedures and policies or create new ones in support of technical advances. All hardware, software, or Tactics, Techniques or Procedures (TTPs) solutions to a CWID 2005 objective should support the overall network centric warfare and information centric concept. During CWID planning and execution, trial activities may be run over, or connected to, the coalition wide area network either in support of military operations or military assistance to civil agencies. All trials are run within the context of an overarching scenario to show how coalition warfighting and civil operations can benefit by using the technology, procedures, or policy changes, associated with the trial. Objective 1: Improve command mission assurance planning and execution capabilities and procedures for Homeland Defense and Civil Support, by providing applications and innovative operational constructs (i.e., procedures, processes, concepts) that address integrated and technology-enabled planning across information assurance, continuity of operations, anti-terrorism/force protection and critical infrastructure protection. (Mission Assurance) Explanation: Mission Assurance requirements are key to the success of overall Coalition, DoD, and civil authority Homeland Defense efforts. Mission Assurance is defined to incorporate the areas of: Anti-Terrorism/Force Protection (AT/FP), Critical Infrastructure Protection (CIP), Information Assurance (IA), Responsive Effective Logistics, and Continuity of Operations (COOP). Software & hardware tools are required for coordinated planning within and across these areas. A critical capability for these tools includes the requirement to monitor, assess and report threats and hazards affecting critical infrastructure vulnerabilities; plan to detect, deter and mitigate threats; and defend critical infrastructure throughout the Area of Responsibility. Solutions must address the capability to automatically access and display actionable Homeland Defense and Civil Support information from multiple organizations, including military, DoD, and non-DoD agencies. Information must be available to the user in multiple media (e.g., Web Portal, GIS enabled thin client, etc) regardless of information domain membership and must be capable of tailoring to priority user needs. Solutions presented should address system integration and data conversion issues. Objective 2: Provide an enhanced interoperable situation awareness capability, scalable in time, scope and bandwidth within and between information domains. Inherent in this objective is the underlying, continuing need to fuse and distribute information. (Situational Awareness) Explanation: Situational awareness is more then providing a common operational picture at the strategic or major echelon level of command. Situational awareness must be able to be scaleable in scope and bandwidth for use at the theater, tactical, and unit levels. Inherent in this requirement is the need to fuse dissimilar information and to extract specific data sets needed at the theater, tactical, unit levels. Trial proposals must use existing interface standards that define the format, content, and exchange mechanisms for shared data to the greatest extent possible. Solutions must support each nation?s disclosure and release policy. Possible information to exchange would include friendly and hostile order of battle, targeting information, safe areas for marshalling, weather data, imagery, GIS map data, other intelligence information, etc. Of particular interest to USNORTHCOM is the exchange of GIS and GCCS information with non-DOD, Federal, State and local participants via a protected network, common to all. Information exchange should support planning and execution of operations. At a higher level, this issue concerns effective information dissemination and knowledge management. This includes problems of integration, translation, or conversion of data in one format to another; identification of producers and consumers of information; and how to transmit the information securely from end to end while supporting national disclosure/release policy. A key subset to this situational awareness environment is that users must be able to securely access, extract and utilize information contained within dissimilar databases across multiple information domains, when operating with limited bandwidth. Objective 3: Provide solutions to facilitate information sharing across multiple information domains. (Multi-Level/Multi-Domain Protection) Explanation: Information sharing requirements prompted by the Global War on Terrorism (GWOT) are complex. The complexity is increased by the need for civil agencies of one nation to interact with those of other nations in addition to traditional military to military coordination. Coalitions inherently require separation of participants into various information domains. Information domains are frequently equated to individual, separated networks or to electronically isolated enclaves (protected information exchange environments) within a given network. The information exchange between these participants must be accomplished in such a way that all participants establish a sense of trust that such sharing of information is required, will be disseminated securely, and will be only available to agreed upon and authorized participants. Additionally, the integrity of sharing the information across networks must be preserved. Traditional guarding technologies employed at information domain boundaries limit the advantages of network centric warfare where information dissemination is at a premium. Potential trials need to explore web technology, improved data labeling, or enhancements to existing solutions while being realistically acceptable to security management concerns. Where applicable data encryption must be accomplished at the lowest level. Objective 4: Provide solutions and offer techniques and procedures that enable collaborative planning across a bandwidth constrained operational environment. (Collaborative Information Environment) Explanation: Network centric warfare implies that coalition, DoD and civil authorities can harness the power of their information environment to collaboratively plan and execute operations even when bandwidth is constrained. Collaborative planning in a bandwidth constrained environment across and within domains is an emerging issue for the warfighter particularly as software and procedure tools are now robust enough to be extended from the theater to tactical levels. Existing tools such as Sametime and DCTS must be adapted to easily interoperate with each other. Procedures must be established and validated by the warfighters to maximize the use of these tools. Objective 5: Provide solutions to permit enhanced sharing and dissemination of intelligence, surveillance, and reconnaissance (ISR) products within and across information domains. (ISR Dissemination) Explanation: Operations require an information environment that spans multiple information domains. These information domains may be populated and maintained by military or civil agencies or a combination of both and likely will be bandwidth constrained. ISR products represent essential information exchange requirements (IER) between these information domains. Solutions to achieve this movement of ISR products should consider use of existing approved multi-level security implementations, innovative adaptations of these implementations, or propose new approaches that are well on their way to gaining security certification for operational use. Objective 6: Provide solutions to address in-transit security of information being exchanged between fixed domains and mobile users. (Wireless Security) Explanation: Within any information environment, there are users who must operate away from fixed information domains that span multiple locations. These users and/or first responders require interoperable secure wireless approaches to receive and transmit critical voice, data, and video information to support the network centric warfare concept. Solutions presented should be security accredited by national authorities or very close to accreditation. Objective 7: Provide improvements to language translation tools to allow grammatically correct, simultaneous multi-language translations to support verbal and textual collaboration. (Language Translation) Explanation: Coalition operations may involve multiple nations and organizations that do not use a common language. Tools to translate documents, displays, and written/audio-exchanges with planners and end-users, is a requirement of operations at the military, agency, and other government organization levels. Current tools have limited vocabularies for limited languages and may not provide grammatically correct translations. Additionally, no tool currently provides for the simultaneous translation of a single language to multiple languages. Objective 8: Provide solutions for responsive effective logistics within and between multiple information domains. (Integrated Logistics) Explanation: Within the information environment of a coalition operation, military and civil-agencies have requirements to provide responsive effective logistics. Logistic data availability is contained within multiple logistic information systems maintained by the military and civilian agencies across the coalition. Access to the data implies combining total asset visibility and information on transit of friendly forces into a single information presentation available across multiple information domains. Solutions should address the locating and fusion of logistics information feeds into part of the commander?s general situation awareness. Technologies such as Radio Frequency Identification (RFID) must be explored to ensure full support of integrated logistics. All solutions to achieve this should consider use of existing approved multi-level security implementations, innovative adaptations of these implementations or propose new approaches that are relatively mature in gaining security certification for operational use. 7. Subject to changes, the following milestones are to be used for planning purposes: a. Interoperability Trial proposals due ? 15 September 2004. b. Initial Planning Conference ? 15-19 November 2004, tidewater area VA. c. Mid Planning Conference 31 January ? 4 February 2005, tidewater area VA. d. Final Planning Conference 28 March - 1 April 2005, tidewater area VA. e. CWID 2005 Execution period ? 31 May -24 June 2005. (1) Preliminary Set Up 31 May- 5 June 2005. (2) Training and Rehearsal ? 6-12 June 2005. (3) Trials assessment and visitors - 13-23 June 2005. (4) Hot Wash - 24 June 2005. 8. Administrative requirements: a. All information submitted will be considered and handled as non-proprietary. b. Unclassified and classified networks will be used. US DOD trial participants will require a minimum of DOD SECRET clearance to participate in CWID 2005. The principal DOD information domain that trials will use will be at a combined SECRET-releasable security level. c. Military or government civilian personnel will operate the trials during assessments. Trials must provide required training at each CWID 2005 site where their trial will operate from during execution. CWID funds will not be provided for training. d. Trials will be required to provide on-site technical and operational representation throughout all CWID 2005 planning conferences and execution phases. CWID funds will not be used. 9. The CWID JMO point of contact is Todd Henry, 757-225-2164 (DSN 575) OR E-MAIL: Todd.Henry@langley.af.mil. Please refer to the JWID web site (http://www.jwid.js.mil.) for specific information about IT proposal submissions. 10. With its focus on HLD/HLS and coalition interoperability, CWID will play a large part in improving information sharing between coalition partners and between the DOD, government agencies supporting Homeland Defense and Security, and non-government agencies. 11. This announcement is not a request for proposal; no contract award shall be made as a result of this request for information. Industry participation in CWID 2005 is at no cost to the government.
 
Record
SN00580124-W 20040507/040505211558 (fbodaily.com)
 
Source
FedBizOpps.gov Link to This Notice
(may not be valid after Archive Date)

FSG Index  |  This Issue's Index  |  Today's FBO Daily Index Page |
ECGrid: EDI VAN Interconnect ECGridOS: EDI Web Services Interconnect API Government Data Publications CBDDisk Subscribers
 Privacy Policy  © 1994-2020, Loren Data Corp.