Loren Data's SAM Daily™

fbodaily.com
Home Today's SAM Search Archives Numbered Notes CBD Archives Subscribe
FBO DAILY ISSUE OF SEPTEMBER 19, 2007 FBO #2123
SPECIAL NOTICE

D -- ***ATTENTION CHANGES HAVE BEEN MADE*** TO IT PROPOSALS DUE DATE AND IT SELECTION DATE: Coalition Warrior Interoperability Demonstration (CWID) 2008

Notice Date
9/17/2007
 
Notice Type
Special Notice
 
NAICS
541519 — Other Computer Related Services
 
Contracting Office
Defense Information Systems Agency, Procurement and Logistics, DITCO-NCR, P.O. 4502, Arlington, VA, 22204-4502, UNITED STATES
 
ZIP Code
00000
 
Solicitation Number
CWID2008
 
Response Due
10/5/2007
 
Archive Date
10/20/2007
 
Description
1. This announcement is for the Coalition Warrior Interoperability Demonstration 2008 (CWID 2008) scheduled for 27 May through 20 Jun 08. Combatant Commands (COCOMs), Services and Department of Defense (DoD) Agencies (C/S/As), government agencies outside the DoD, North Atlantic Treaty Organization (NATO), and national participants outside the United States (U.S.) must submit Interoperability Trial (IT) proposals for CWID by 05 Oct 07 (***Please note date change/extension.) Industry partners must work through a C/S/A or government agency sponsor from outside the DoD to submit ITs. Complete details on CWID, to include references and submission instructions for ITs, are found at http://www.cwid.js.mil. 2. CWID is the Chairman of the Joint Chiefs of Staff's annual event enabling the COCOMs, U.S. military services, U.S. national civil authorities and the multinational coalition community to discover and investigate command, control, communications, computers, intelligence, surveillance, and reconnaissance (C4ISR) solutions which focus on relevant and timely objectives for enhancing Coalition, COCOM, Service, Agency (C/C/S/A) interoperability and information sharing while exploring new partnerships. U.S. Joint Forces Command (USJFCOM), on behalf of the Chairman, is responsible for the oversight of the CWID program. CWID focuses on net-centric solutions to identified C4ISR gaps that the traditional DoD acquisition process is not addressing. Gaps are identified in the CWID objectives and reflect immediate and near term (less than 24 months) capability needs. CWID analyzes the technical functionality, security features, and military utility of submitted IT proposals within the construct of the Joint Capabilities Integration and Development System. C/S/As are highly encouraged to conduct further investigation into the tactics, techniques, and procedures using CWID as a vehicle. CWID is also an appropriate venue for spiral development, risk reduction, or validation of fielded/near-fielded commercial and/or DoD systems when appropriate to reduce fielding costs or transition timelines. 3. U.S. European Command (USEUCOM) is the host COCOM for CWID 2008 and develops the simulated operational scenario. The scenario focuses on exercising military coalition task force (CTF) responsibilities in conjunction with U.S. Northern Command?s (USNORTHCOM) Homeland Security/Homeland Defense (HS/HD) initiatives, and increasing/enhancing involvement,integration, and interoperability with allies in USEUCOM?s area of responsibility (AOR). Coalition participation remains the cornerstone of CWID and the anticipated international participants include: Australia, Canada, New Zealand, United Kingdom, and NATO. In addition, COCOMs may invite nations, with prior Joint Staff approval, from within their respective AOR to participate as multinational task force members. USNORTHCOM will continue its CWID transformational efforts by investigating HS/HD applicable systems integration and interoperability solutions. USNORTHCOM?s coalition partners include US and Canadian military, government and civil agencies (e.g., Department of Homeland Security, Canada Command, Public Safety Emergency Preparedness Canada). 4. CWID is conducted in a simulated operational environment to provide context for the validation of C4ISR solutions. Depending on the demonstrated capabilities and based on the criteria set forth in the CWID Additional Information document (published on the CWID website), each IT will be categorized into one of three tiers at IT selection and may receive one or more of the following assessments: Warfighter/Operator, Technical/Interoperability, and/or Information Assurance assessment. ITs must have a sponsor and must address one or more of the objectives. Tier I trials are ready-to-field, mature technology solutions or components of current Programs of Record (POR) or operational systems. ITs related to current operational Command and Control (C2) systems may include test cases as defined in Interoperability Operational Test Requirements and Information Exchange Requirements. Tier II trials are technology solutions that possess sufficient maturity to participate, but may require additional development before fielding. Tier III trials are site demonstrations that support a CWID objective, but do not warrant a formal CWID assessment. The CWID Senior Management Group (SMG) categorizes the ITs at selection and the CWID Joint Management Office (JMO) Assessment Working Group (AWG) and Systems Engineering and Integration Working Group (SEIWG) coordinate and conduct the assessments. Results from the assessments are documented in the CWID Final Report. 5. To be selected, each proposed IT must address one or more of the CWID objectives and sub-objectives listed in paragraph 7 and commit to provide all funding, personnel, training, hardware, software, and documentation necessary to participate at one or more execution locations. The CWID SMG will select IT proposals on how well the IT?s proposal satisfies one or more of the objectives and sub-objectives and the need to share and exchange critical, time-sensitive information between military organizations, international coalitions and civilian agencies. The selection criteria are specified in the CWID Additional Information document. ITs must be submitted with a DoD or government sponsor in the format outlined on the CWID web site. 6. ITs are hosted on the Combined Federated Battle Lab Network (CFBLNET), a worldwide secure network, enabling classified, releasable data to be exchanged among the CFBLNET participants. The CWID JMO coordinates, engineers, and supervises the network and the information domains for the worldwide venue. The CWID hardware and software demonstrations support the overall Network Centric Warfare construct. During the CWID execution phase, IT activities will be conducted over the CFBLNET, which supports military and coalition operations while providing the infrastructure to facilitate the military?s role in providing Defense Support of Civil Authorities (DSCA). 7. The 2008 Objectives, developed by USJFCOM, are supported by sub-objectives that reference clearly defined U.S. COCOM and coalition capability gaps and service inputs. The objectives are linked to the USJFCOM and COCOM Integrated Priority Lists, the USJFCOM Transformation Roadmap, USJFCOM C2 Capability Portfolio Management (C2 CPM) initiative and other coalition and Joint Staff source documentation. The objectives reflect the following recurring themes: a. Discovering and investigating emerging and relevant coalition information sharing technologies, b. Focus on demonstrating solutions for COCOM theater capability gaps and challenges, and c. Enhance multi-service, multinational, and inter-agency cooperation and communication. These process improvements facilitate post-CWID execution efforts to develop strategies aimed at responsibly bringing technology solutions to the DoD Acquisition, Technology and Logistics (AT&L) community for consideration. Scope: All multinational (to include DoD and non-DoD entities) information sharing solutions should be built on a foundation that is net-centric, secure, scalable, and bandwidth sensitive. Objective 1 Improve Coalition and Joint C4ISR Architecture. This objective will enhance leadership?s capability to command, control and coordinate across joint & coalition forces, government agencies, non-governmental organizations (NGOs) and first responders. Technologies will: a. Demonstrate cohesive C2 linkages between military, government agencies and coalition partners. b. Demonstrate enhanced interoperability for NATO Response Force C2. c. Demonstrate open & secure mobile C2 capabilities between communities of interest (COIs). d. Demonstrate communication tools that streamline decision-making and integrate with existing systems or that present entirely new solutions. e. Demonstrate communication tools that share Chemical Biological Radiological Nuclear Explosive (CBRNE) contingency information with first responders & emergency services. f. Demonstrate improved general Identification and Blue Force tracking capabilities, g. Demonstrate counter insurgency Indications and Warning tools. h. Demonstrate targeting tools for non-lethal weapons and corresponding Margin of Error, i. Demonstrate systems to rapidly extend communications in support of Defense Support of Civil Authorities (DSCA) operations. j. Demonstrate tools to support neutralization of Improvised Explosive Devices (IEDs). k. Demonstrate expanded integration of open-source tools to open standards Service Oriented Architectures. l. Demonstrate tools to support the entire deployment process from requirements identification through force closure, including redeployment and rotational operations. Explanation: Improved C4ISR Architecture will aid coalition, military and civilian authorities to harness the power of their respective information environments to execute collaboratively operations even in a bandwidth-constrained environment. Operations require an information environment that is not only scaleable, but one that spans multiple COIs and a variety of legacy C2 equipment. These COIs may be populated and maintained by military or civil agencies or a combination of both and it is likely they will be bandwidth-constrained. The information exchange between these COIs must be accomplished in such a way that it inspires confidence at each activity that the information is being disseminated securely, and will only be available to the agreed upon and authorized participants. Solutions to achieve this data dissemination, across and within COIs, should consider the use of existing, approved multi-level security implementations, innovative adaptations of these implementations, or propose new approaches that are well on their way to gaining security certification for operational use. Objective 2 Improve Information Sharing across the full Range of Civil and Military Operations. Provide the capability to share information across multiple networks of potentially different security classifications and caveats. Emphasis should be on passing information to both U.S. controlled, coalition networks such as U.S. Central Command?s Combined enterprise Regional Information Exchange System (CENTRIXS) and coalition/alliance controlled networks such as NATO?s Initial Data Transfer System, NATO Mission Wide Area Network, or releasable to Republic of Korea. Data sharing encompasses the need for cross-domain solutions (CDS) and the assurance that information passed through CDS can be utilized by systems within all security enclaves. The criteria used to determine whether data can be shared should also focus on existing doctrine and/or policy-based information management and implement robust information assurance capabilities to protect data. Military and coalition operations require CDS devices to permit collaboration with first responders, NGOs, state and local governments as well as information sharing. Technologies will: a. Demonstrate multi-level security & multi-domain applications that promote information sharing with planned and unanticipated mission partners. b. Demonstrate effective network defense applications to protect shared data. c. Demonstrate tools that improve utility, accuracy and timeliness of real time translation for collaboration in specific areas of responsibility. d. Demonstrate complementary planning tools that support military, local law enforcement, first responders, governmental, non-governmental and coalition planning activities. e. Demonstrate tools to improve Request for Forces process. f. Demonstrate tools to improve deployment and visibility of coalition and/or interagency/Private Voluntary Organization (PVO)/NGO forces. g. Demonstrate use of free-ware and share-ware open standards capabilities to fully connect civilian and military planners. Explanation: Coalition operations require an information environment that spans multiple COIs. These COIs may be mobile, fixed or remotely located where the combination of military and/or civil agencies is likely to be affected by limited bandwidth. Within any COI, mission success relates to the commander?s C2 ability to communicate directly with individual users or first responders who may be detached from fixed information domains. Decision makers and/or first responders require interoperable, reliable, clear and/or secure wireless capabilities to receive and transmit critical voice, data, and video information to support the Network Centric warfare construct. Solutions to achieve improved C2 between diverse COIs should consider the use of existing approved multi-level security implementations, innovative adaptations of these implementations, or propose new approaches that are well on their way to gaining security certification for operational use. A major challenge to achieving a single integrated cross domain solution is the development of a method, strategy, and universal standard for electronically marking or labeling classification and release caveats of documents and information streams. Since recent directives require DoD systems to use eXtensible Markup Language (XML) for data exchange, there is a need for XML-based technology that can provide a robust and secure method for marking classification and release caveats of documents and information streams. Objective 3 Enhance Cross Domain and Multiple Security Level Information Exchange Tools. Provide CDS and multi-lingual translation solutions that improve the commander's ability to share intelligence information products (documents, images, databases, etc.) with coalition partners, including joint and coalition forces, government agencies, NGOs and first responders. Technologies will: a. Demonstrate data fusion tools that support cross domain information sharing and consolidates multiple sources of information into a single reference source. b. Demonstrate situational awareness tools that disseminate and display time critical information for tactical forces and first responders to include defense against IEDs. c. Demonstrate visualization and integration tools that can simultaneously manage multiple Intelligence, Surveillance and Reconnaissance inputs. d. Demonstrate capabilities to enhance Maritime Domain Awareness between Federal, State and local agencies. Explanation: Cross domain and multiple security level information exchange represent more than providing a common operational picture at the strategic or major echelon level of command.Exchange tools must be secure, scaleable in scope and functional within the theater bandwidth available at all levels of warfare. Trial proposals should be capable of using existing interface standards and protocols that define the format, content, and exchange mechanisms for shared data. Solutions must support each nation?s disclosure and release policies as well as provide a secure means of consistently communicating accurate information in a multi-lingual military and/or local authority context. Possible information to exchange includes: directive commentary, visualization of the battlespace, friendly and hostile order of battle, targeting information, safe areas for marshalling, weather data, three dimensional imagery, Geographic Information Systems (GIS) map data, equipment status, scaleable intelligence estimates, personnel movements and other intelligence related products. A key subset to creating and sustaining a coalition information sharing environment is that users must be able to consistently and securely access, extract and utilize common information derived from dissimilar databases across multiple domains. Tools to translate documents, displays, and written/audio-exchanges between planners and end-users, is a necessity for successful operations at the military, agency, and other government organization levels. Objective 4 Enhance Integrated Logistics Planning and Coordination Tools. Demonstrate the ability to access, consolidate and display logistical information to include movement, location and status of joint forces, military services, interagency, coalition, NGO, first responders as well as equipment and supplies in near real time across organizational boundaries. Technologies will: a. Demonstrate secure abilities to assess & display information regarding the movement, location, & status of Coalition equipment & personnel. b. Demonstrate logistics data access, fusion, & integration among COIs. c. Demonstrate Logistic data sharing for medical and health protection services. d. Demonstrate capability to exchange logistic data between government agencies, NGOs and military systems. Explanation: Within the information environment of coalition, military and non-military operations, the commander must have responsive and effective logistics. Logistical data is contained within diverse logistics information systems maintained by the military and civilian agencies across the coalition. Access to that data implies combining total asset visibility and information during the transit of friendly forces into a single information presentation available across multiple information COIs. Solutions should address the locating and fusion of logistics information feeds as part of the commander?s general situation awareness. Solutions to achieve CWID objectives should consider the use of existing approved multi-level security implementations, innovative adaptations of these implementations or propose new approaches that are progressing toward operational security certification. Objective 5 Enhance Government Agency Interoperability. Provide solutions that improve the Combatant Commander?s ability to conduct collaborative planning with coalition partners, including joint and coalition forces, government agencies, NGOs and first responders. Focus on enhanced collaboration and engendering a ?need to share? vice a ?need to know? culture. Technologies will: a. Demonstrate data access, fusion & integration among joint forces, international, Federal and State Agencies & local law enforcement. b. Demonstrate the ability to distribute and track key policy and strategy documents (memorandum of agreement, memorandum of understanding, standard operating procedures, industry standard architecture) between government agencies. c. Demonstrate tools to improve Information Assurance and posture between government agencies. d. Demonstrate a situational awareness tool that uses advanced visualization technologies capable of integrating existing systems into one common operational picture, e. Demonstrate a Blue Force tracking capability for first responders. f. Demonstrate computer network defense capabilities to support non-military partners, g. Demonstrate computer network capabilities that support collaboration with the Department Homeland Security Emergency Management COI. h. Demonstrate multi-lingual interoperability between international agency systems and DoD, multinational systems to support Global Disaster Relief efforts. Explanation: Collaborative planning and dissemination of products in a bandwidth constrained environment horizontally across and vertically within COIs is an emerging issue for the warfighter, particularly as software and procedure tools become sufficiently robust to be extended from the operational to the tactical level of warfare. The lack of robust planning and collaboration tools makes it difficult to provide the commander timely and complete information on which to develop decisions. Communications in a CWID context is interpreted as ?coalition information sharing,? and is more than providing a radio communication or common operational picture at or between the strategic, operational, or tactical level of command. It must be secure, scaleable in scope and functional within the theater bandwidth available at all levels of warfare. Solutions must support each nation?s disclosure and release policies as well as provide a secure means of consistently communicating accurate information in a multi-lingual military and/or local authority context. Possible information exchanges include: directive commentary, friendly and hostile order of battle, targeting information, safe areas for marshalling, weather data, imagery, GIS map data, equipment status, personnel movements and other intelligence related products. A key subset to creating and sustaining a coalition information-sharing environment is that users must be able to consistently and securely access, extract and utilize common information derived from dissimilar databases across multiple domains. Further, coalition operations are routinely conducted with multiple nations and organizations that are challenged with using a common language. A tool to translate documents, displays, and written/audio-exchanges between planners and end-users, is a requirement of operations at the military, agency, and other government organization levels. Inherent in this requirement is the need to fuse dissimilar information and extract specific data sets while providing reliable language translations for communicating guidance to coalition partners. 8. Subject to changes, the following milestones are to be used for planning purposes: a. IT proposals due: 05 October 07 b. IT selection: 17 October 07 c. Initial Planning Conference: 5 - 9 Nov 07, Tidewater area, VA. d. Mid Planning Conference: 28 Jan - 1 Feb 08, Tidewater Area, VA. e. Final Planning Conference: 31 Mar - 4 Apr 08, Tidewater Area, VA. f. CWID 2008 Execution: 27 May -20 Jun 08: 1. Preliminary set-up: 27 - 30 May 08. 2. Training and Rehearsal: 2 - 6 Jun 08. 3. Interoperability Trials assessment and visitors: 9 - 19 Jun 08. 4. Hotwash: 20 Jun 08. 9. Administrative requirements: a. Information submitted in IT proposals is considered and handled as non-proprietary. b. Unclassified and classified networks will be used. Trial participants require a minimum of DoD SECRET clearance to participate. ITs desiring to focus only on the HS/HD mission set will not require a clearance. c. Military or government civilian personnel will operate the ITs during the execution phase. ITs must provide required training and documentation at each CWID 2008 site where they intend to demonstrate their technology. CWID funds will not be provided for training. d. ITs will be required to provide on-site technical and operational representation throughout all CWID 2008 planning conferences and execution phases. CWID funds will not be used to support this effort. 10. The CWID JMO Points of Contact are Ms.Carla Jolly or Ms. Sheryl Mitchell at (703)681-2861 or e-mail: cwidit@disa.mil. 11. This announcement is not a request for proposal; no contract award shall be made as a result of this request for information. Industry participation in CWID 2008 is at no cost to the government.
 
Place of Performance
Address: DISA/GE312,
Zip Code: 22041
Country: UNITED STATES
 
Record
SN01409062-W 20070919/070917220046 (fbodaily.com)
 
Source
FedBizOpps Link to This Notice
(may not be valid after Archive Date)

FSG Index  |  This Issue's Index  |  Today's FBO Daily Index Page |
ECGrid: EDI VAN Interconnect ECGridOS: EDI Web Services Interconnect API Government Data Publications CBDDisk Subscribers
 Privacy Policy  Jenny in Wanderland!  © 1994-2024, Loren Data Corp.