Loren Data's SAM Daily™

fbodaily.com
Home Today's SAM Search Archives Numbered Notes CBD Archives Subscribe
FBO DAILY ISSUE OF JULY 03, 2009 FBO #2776
SOLICITATION NOTICE

99 -- NEAR Real-Time Phased Array Type L-band Synthetic Aperture Radar - DG133E-09-RQ-0750

Notice Date
7/1/2009
 
Notice Type
Combined Synopsis/Solicitation
 
NAICS
611310 — Colleges, Universities, and Professional Schools
 
Contracting Office
Department of Commerce, National Oceanic and Atmospheric Administration (NOAA), Acquisition and Grants Office, SSMC4 - Room 7601/OFA61, 1305 East West Highway, 7th Floor, Silver Spring, Maryland, 20910
 
ZIP Code
20910
 
Solicitation Number
DG133E-09-RQ-0750
 
Archive Date
8/7/2009
 
Point of Contact
Jay S Parsick, Phone: 301-713-3478 ext. 173, Greg Davies, Phone: 301-734-3478 x142
 
E-Mail Address
jay.parsick@noaa.gov, Greg.Davies@noaa.gov
(jay.parsick@noaa.gov, Greg.Davies@noaa.gov)
 
Small Business Set-Aside
N/A
 
Description
Solicitation No. DG133E-09-RQ-0750 The U.S. Department of Commerce (DOC)/National Oceanic and Atmospheric Administration (NOAA)/National Environmental Satellite Data Information Service (NESDIS) intends to award a requirement on a sole source basis for a base year and three (3) twelve month option periods with University of Alaska Systems to provide near real-time Synthetic Aperture Radar (SAR) data by the Alaska Satellite Facility (ASF) at the University of Alaska, Fairbanks (UAF). This SAR data/imagery are used to enhance and expand the ice/ocean/land monitoring and forecasting capabilities and services of the National Oceanic and Atmospheric Administration (NOAA); the National Environmental Satellite, Data, and Information Service (NESDIS) and the National Ice Center (NIC). The ASF system will provide SAR data/imagery of ice, ocean and land from the spaceborne Advanced Land Observation Satellite (ALOS) platform. The signal data from this spacecraft is received and processed at the UAF ASF, and transmitted via a dedicated communications link from ASF to NESDIS and the NIC in Suitland, Maryland where they are utilized to achieve the research and operational objectives. The services required by Office of Satellite Data Processing & Distribution are available from only one responsible source, University of Alaska Systems. Background During the past several years, the ASF has provided near real-time support to the NIC by way of "quicklook" processing of SAR imagery covering specific areas of NIC interests in the Arctic. In the past, at T-1 communication line (1.54 MB/sec) has been used by NASA and NOAA to transmit in real-time high bandwidth products from RADARSAT, ERS-2, and ADEOS as required by the U.S. Government. Presently, two T-1 links are operational and are being used routinely to transmit data. For SAR data use in ice and ocean monitoring, near real-time is generally defined as being processed and transmitted within 3 to 6 hours of acquisition. Scope The SOW covers scheduling, operations, and maintenance support provided by ASF for NOAA in support of near real-time processing of SAR data to meet NOAA and NIC operational and forecast data requirements. These data requirements include, but are not limited to: (1) the Arctic Snap-shot, (2) coverage of selected Alaskan rivers and lakes, Alaska coastal regions, and the Bering Sea, (3) support to field operations, (4) support of response and mitigation activities during environmental and man-made hazards, disasters and emergencies, and (5) processing of some data from the ALOS tape recorder. The quantity of data to be furnished in near real-time will be established by mutual agreement between NOAA and ASF, and may vary with season, changing NOAA and other agency requirements, health of satellites and ground system, and a determined JAXA allocation. Near real-time processing Standard Mode ALOS PALSAR products data will be up to 6 minutes per day. ScanSAR near real-time processing each week will include at a minimum the portion of the Arctic Snap-shot of interest to the NIC and NOAA which can be received and processed in near real-time and at least one other view of the ice edge between Arctic Snap-shots in the Bering, Beaufort and Chukchi Seas. Task Definition Support the following requirements on a best-effort basis commensurate with the adequacy of funding, reliability of subsystems, and the provision of applicable UA and NOAA agreements: • Ingest, processing, and submission to JAXA of data acquisition requests and orders from NOAA for standard ALOS SAR products. • Direct reception; processing; transcription, and staging of data 1. Provide support for the acquisition and processing of SAR data designed for near real-time operations, including ScanSAR, Standard and other modes of RADARSAT, ERS-2 and possibly other satellites carrying SAR instruments which are received at the ASF for U.S. Government near real-time use. 2. Provide support for the near real-time data transmission system which is co-located and integrated with ASF. 3. Provide maintenance support and repairs of designated subsystems as required, contingent upon adequacy of budgeted funds to support equipment repairs (in general, these funds come from NASA) 4. Provide notification and coordination support to NASA, NOAA/NESDIS, and NIC for repairs and maintenance. 5. Provide engineering and technical support to fulfill the data/imagery requirements of SAR near real-time users within the capabilities of the ASF. 6. Study, suggest and implement changes to operational and maintenance procedures that might be required or represent overall system improvements for the provision of near real-time data/imagery. 7. Provide the order and help desk services for near real-time image acquisition scheduling, order tracking, and scheduling of data processing. Submittals/Deliverables Timely submission of deliverables is essential to the successful completion of this delivery order. Schedules for deliverables are specified in the Scope and Task Definition. All material and information gathered and/or developed in the performance of the tasks listed in the contract shall be the property of the U.S. Government. Data gathered during the evaluation shall not be used or distributed by the contractor without special written government permission. Reports Submit a report at the end of each fiscal year to NOAA/NESDIS/NIC summarizing the research, operational and maintenance/repairs support provided. In addition, the ASF shall submit a monthly report evaluating regular operations. Facilities and Equipment Performance of the SOW requires the RADARSAT ScanSAR and other end-to-end subsystem equipment be located at the Alaska SAR Facility, Geophysical Institute, University of Alaska Fairbanks, Alaska, where the system has the best field of view in order to meet the SAR near real-time operational imagery/data requirements. IT Security Requirements The contractor shall comply with the IT Security requirements of the Department of Commerce as outlined in Commerce Acquisition Regulation (CAR) 1352.239-73, except that section (c) of the clause does not apply. Specifically, the C&A requirements of clause 73 do not apply, and that a Security Accreditation Package is not required. In addition, personnel shall be screened in accordance with CAR 1352.239-74 for Moderate Risk contracts. These clauses are provided below and incorporated herein in their entirety. CAR 1352.239-73- SECURITY REQUIREMENTS FOR INFORMATION TECHNOLOGY RESOURCES (a) This clause is applicable to all contracts that include information technology resources or services in which the Contractor must have physical or electronic access to DOC's sensitive or classified information, which is contained in systems that directly support the mission of the Agency. For purposes of this clause the term "Sensitive" is defined by the guidance set forth in: (1) The DOC IT Security Program Policy and Minimum Implementation Standards (http://www.osec.doc.gov/cio/itmhweb/itmhweb1.html); (2) The Office of Management and Budget (OMB) Circular A-130, Appendix III, Security of Federal Automated Information Resources, (http://csrc.nist.gov/secplcy/a130app3.txt) which states that there is a "presumption that all [general support systems] contain some sensitive information."; and (3) The Computer Security Act of 1987 (P.L. 100-235) (http://www.epic.org/crypto/csa/csa.html), including the following definition of the term sensitive information "... any information, the loss, misuse, or unauthorized access, to or modification of which could adversely affect the national interest or the, conduct of federal programs, or the privacy to which individuals are entitled under section 552 a of title 5, Unites States Code (The Privacy Act), but which has not been specifically authorized under criteria established by an Executive Order or an Act of Congress to be kept secret in the interest of national defense or foreign policy." For purposes of this clause, the term "Classified" is defined by the guidance set forth in: (1) The DOC IT Security Program Policy and Minimum Implementation Standards, Section 3.3.1.4 (http://www.osec.doc.gov/cio/itmhweb/itmhweb1.html). (2) The DOC Security Manual, Chapter 18 (http://www.osec.doc.gov/osy/). (3) Executive Order 12958, as amended, Classified National Security Information. Classified or national security information is information that has been specifically authorized to be protected from unauthorized disclosure in the interest of national defense or foreign policy under an Executive Order or Act of Congress. Information technology resources include, but are not limited to, hardware, application software, system software, and information (data). Information technology services include, but are not limited to, the management, operation (including input, processing, transmission, and output), maintenance, programming, and system administration of computer systems, networks, and telecommunications systems. The Contractor shall be responsible for implementing sufficient Information Technology security, to reasonably prevent the compromise of DOC IT resources for all of the contractor's systems that are interconnected with a DOC network or DOC systems that are operated by the Contractor. (b) All Contractor personnel performing under this contract and Contractor equipment used to process or store DOC data, or to connect to DOC networks, must comply with the requirements contained in the DOC Information Technology Management Handbook (http://www.osec.doc.gov/cio/itmhweb/itmhweb1.html), or equivalent/more specific agency or bureau guidance as specified immediately hereafter [insert agency or bureau specific guidance, if applicable]. (c) For all Contractor-owned systems for which performance of the contract requires interconnection with a DOC network or that DOC data be stored or processed on them, the Contractor Shall: (1) Provide, implement, and maintain an IT Security Plan. This plan shall describe the processes and procedures that will be followed to ensure appropriate security of IT resources that are developed, processed, or used under this contract. The plan shall describe those parts of the contract to which this clause applies. The Contractor's IT Security Plan shall comply with federal laws that include, but are not limited to, the Computer Security Act of 1987 (40 U.S.C. 1441 et seq.) and the Federal Information Security Management Act of 2002, Pub. L. No.107-347, 116 Stat. 2899, 2946-2961 (2002); Pub. L. No. 107-296, 116 Stat. 2135, 2259-2273 (2002). 38 WEEKLY COMP. PRES. DOC. 51, 2174 (Dec. 23, 2002) (providing statement by President George W. Bush regarding Federal Information Security Management Act of 2002). The plan shall meet IT security requirements in accordance with Federal and DOC policies and procedures that include, but are not limited to: (a) OMB Circular A-130, Management of Federal Information Resources, Appendix III, Security of Federal Automated Information Resources (http://csrc.nist.gov/secplcy/a130app3.txt); (b) National Institute of Standards and Technology Special Publication 800-18, Guide for Developing Security Plans for Information Technology Systems (http://csrc.nist.gov/publications/nistpubs/800-18/Planguide.PDF) ; and (c) DOC Procedures and Guidelines in the Information Technology Management Handbook (http://www.osec.doc.gov/cio/itmhweb/itmhweb1.html).. (d) National Industrial Security Program Operating Manual (NISPOM) for classified systems (http://www.dss.mil/isec/nispom.htm); and (e) [Insert agency or bureau specific guidance]. NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION IT SECURITY MANUAL 212-1301, March 31, 2008. (2) Within 14 days after contract award, the contractor shall submit for DOC approval a System Certification and Accreditation project plan following the process outlined in the DOC IT Security Program Policy, Sections 3.4 and 3.5 (http://home.osec.doc.gov/DOC-IT-Security-Program-Policy.htm). The Certification and Accreditation Package must be consistent with and provide further detail for the security approach contained in the offeror's proposal or sealed bid that resulted in the award of this contract and in compliance with the requirements stated in this clause. The Certification and Accreditation Package, as approved by the Contracting Officer, in consultation with the DOC IT Security Manager, or Agency/Bureau IT Security Manager/Officer, shall be incorporated as part of the contract. DOC will use the incorporated IT Security Plan as the basis for certification and accreditation of the contractor system that will process DOC data or connect to DOC networks. Failure to submit and receive approval of the Certification and Accreditation Package, as outlined in DOC IT Security Program Policy, Sections 3.4 and 3.5 (http://home.osec.doc.gov/DOC-ITSecurity-Program-Policy.htm) may result in termination of the contract. (d) The Contractor shall incorporate this clause in all subcontracts that meet the conditions in paragraph (a) of this clause. CAR 1352.239-74 SECURITY PROCESSING REQUIREMENTS FOR CONTRACTORS/SUBCONTRACTOR PERSONNEL FOR ACCESSING DOC INFORMATION TECHNOLOGY SYSTEMS (a) Contractor personnel requiring any access to systems operated by the Contractor for DOC or interconnected to a DOC network to perform contract services shall be screened at an appropriate level in accordance with Commerce Acquisition Manual 1337.70, Security Processing Requirements for Service Contracts. DOC shall provide screening using standard personnel screening forms, which the Contractor shall submit to the DOC Contracting Officer's Technical Representative (COTR) based on the following guidance: 1) Contract personnel performing work designated Contract High Risk and personnel performing work designated Contract Moderate Risk in the information technology (IT) occupations and those with "global access" to an automated information system require a favorable pre-employment check before the start of work on the contract, regardless of the expected duration of the contract. After a favorable pre-employment check has been obtained, the Background Investigation (BI) for Contract High Risk and the Minimum Background Investigation (MBI) for Contract IT Moderate Risk positions must be initiated within three working days of the start of work. 2) Contract personnel performing work designated Contract Moderate Risk who are not performing IT-related contract work do not require a favorable pre-employment check prior to their employment; however, the Minimum Background Investigation (MBI) must be initiated within three working days of the subject's start of work on the contract, regardless of the expected duration of the contract. 3) Contract personnel performing work designated Contract Low Risk will require a National Agency Check and Inquiries (NACI) upon the subject's start of work on the contract if the expected duration of the contract exceeds 365 calendar days. The NACI must be initiated within three working days of the subject's start of work on the contract. 4) Contract personnel performing work designated Contract Low Risk will require a Special Agreement Check (SAC) upon the subject's start of work on the contract if the expected duration of the contract (including options) exceeds 180 calendar days but is less than 365 calendar days. The SAC must be initiated within three working days of the subject's start of work on the contract. 5) Contract personnel performing work on contracts requiring access to classified information must undergo investigative processing according to the Department of Defense National Industrial Security Program Operating Manual (NISPOM), (http://www.dss.mil/isec/nispom.htm) and be granted eligibility for access to classified information prior to beginning work on the contract. The security forms may be obtained from the cognizant DOC security office servicing your bureau, operating unit, or Departmental office. At the option of the government, interim access to DOC IT systems may be granted pending favorable completion of a pre-employment check. Final access may be granted only on completion of an appropriate investigation based upon the risk level assigned to the contract by the Contracting Officer. (b) Within 5 days after contract award, the Contractor shall certify in writing to the COTR that its employees, in performance of the contract, have completed annual IT security awareness training in DOC IT Security policies, procedures, computer ethics, and best practices, in accordance with DOC IT Security Program Policy, section 3.13 (http://home.osec.doc.gov/DOC-IT-Security-Program-Policy.htm). The COTR will inform the Contractor of any other available DOC training resources. (c) Within 5 days of contract award, the Contractor shall provide the COTR with signed Nondisclosure Agreements as specified in Commerce Acquisition Regulation (CAR), 1352.209-72, Restrictions Against Disclosures. (d) The Contractor shall afford DOC, including the Office of Inspector General, access to the Contractor's and subcontractor's facilities, installations, operations, documentation, databases, and personnel used in performance of the contract. Access shall be provided to the extent required to carry out a program of IT inspection, investigation, and audit to safeguard against threats and hazards to the integrity, availability, and confidentiality of DOC data or to the function of computer systems operated on behalf of DOC, and to preserve evidence of computer crime. (e) The Contractor shall incorporate this clause in all subcontracts that meet the conditions in paragraph (a) of this clause Interested parties who believe that they can meet the Government's requirement are requested to submit in writing an affirmative response; all responses must include detailed technical information and other technical literature demonstration the ability to meet the above requirements. In your response, you must address each of the items listed above in sufficient detail to permit agency analysis to establish a bona fide capability to meet the requirements. Failure to submit documentation will result in the Government proceeding as stated above. A determination by the Government not to open competition based upon responses to this notice is solely within the discretion of the Government. Affirmative written response must be received no later than fifteen days after publication of this synopsis. The solicitation for this requirement will be prepared in accordance with FAR Part 12 procedures. A firm fixed price contract is contemplated. The Period of Performance for this task is from date of award through July 24, 2009. Responses may be emailed to Jay.Parsick@noaa.gov. Reference Solicitation No. NEEC0000-9-10087 in your response.
 
Web Link
FBO.gov Permalink
(https://www.fbo.gov/spg/DOC/NOAA/AGAMD/DG133E-09-RQ-0750/listing.html)
 
Place of Performance
Address: U.S. Department of Commerce (DOC) National Oceanic and Atmospheric Administration (NOAA)/National Environmental Satellite Information Service (NESDIS)/Office of Satellite Data Processing & Distribution, 4231 Suitland Road, Room 1430, Suitland, Maryland, 20746, United States
Zip Code: 20746
 
Record
SN01863183-W 20090703/090702002301-c8992b64e20f6c1d18cf1c4b8428771c (fbodaily.com)
 
Source
FedBizOpps Link to This Notice
(may not be valid after Archive Date)

FSG Index  |  This Issue's Index  |  Today's FBO Daily Index Page |
ECGrid: EDI VAN Interconnect ECGridOS: EDI Web Services Interconnect API Government Data Publications CBDDisk Subscribers
 Privacy Policy  © 1994-2020, Loren Data Corp.