Loren Data's SAM Daily™

fbodaily.com
Home Today's SAM Search Archives Numbered Notes CBD Archives Subscribe
FBO DAILY ISSUE OF DECEMBER 15, 2010 FBO #3308
SOLICITATION NOTICE

A -- CYBER ASSURANCE TECHNOLIGIES

Notice Date
12/13/2010
 
Notice Type
Presolicitation
 
NAICS
541712 — Research and Development in the Physical, Engineering, and Life Sciences (except Biotechnology)
 
Contracting Office
Department of the Air Force, Air Force Materiel Command, AFRL - Rome Research Site, AFRL/Information Directorate, 26 Electronic Parkway, Rome, New York, 13441-4514
 
ZIP Code
13441-4514
 
Solicitation Number
BAA-11-01-RIKA
 
Point of Contact
Lynn G. White, Phone: (315) 330-4996
 
E-Mail Address
Lynn.White@rl.af.mil
(Lynn.White@rl.af.mil)
 
Small Business Set-Aside
N/A
 
Description
FUNDING OPPORTUNITY NUMBER: BAA 11-01-RIKA CFDA Number: 12.800 I. FUNDING OPPORTUNITY DESCRIPTION: This BAA is a contracting tool directly responsive to Air Force Research Laboratory (AFRL) Integrated Cyber Defense attributes. This BAA seeks to procure proactive cyberspace defensive capabilities for anticipating and avoiding threats through understanding the cyber situation, predicting adversarial actions, assessing potential impacts, and for implementing deterrence and effects-based defensive methodologies. It also supports work to detect and defeat threats and protect information systems by engagement and influence through defensive mechanisms employing such methods as adversary denial and deception. Also included are areas to adaptively maintain, organize, and automatically regenerate and reconstitute resources to ensure continued mission operations. The Air Force Research Laboratory, Information Directorate is soliciting white papers for Cyber Mission focus areas and Computer Network Defense & Support. The following section provides a description of focus areas within Integrated Cyber Defense and a general description of the Computer Network Defense (CND) & Support Technology base. NOTE: The POC for each focus area is provided for QUESTIONS ONLY. See Section IV Paragraph 6 for submission details. FY 11 SPECIFIC FOCUS AREA: CYBER AGILITY Background: Currently, adversaries can plan their attacks carefully over time by relying on the static nature of our networks, and launch their attacks at the times and places of their choosing. The DoD needs new tools and technologies to reverse the current asymmetry that favors our cyber adversaries, by forcing them to spend more, cope with greater levels of complexity and uncertainty, and accept greater risks of exposure and detection due to the significantly increased requirements for reconnaissance and intelligence collection of our networks. If we control the dynamics of our systems and networks, any deviation from these known dynamics can also provide an opportunity for increased discrimination of attacker activity and unexpected system states. AFRL will pursue Science & Technology for defensive cyber maneuver and agility to disrupt adversary cyberspace operations, including adversary attack planning and execution. Agility mechanisms must be incorporated in such a way that they are transparent to authorized users, and must introduce minimal functional and performance impacts. We wish to disrupt our adversaries and not ourselves. The security of such mechanisms is also paramount, so that their power is not co-opted by attackers against us for their own purposes. Objective: The objective is to avoid attacks by making it harder for a determined adversary to succeed by increasing agility, diversity, and redundancy, to disrupt attack planning and execution. Questions regarding this focus area can be directed to: Walt Tirenin (315) 330-1871 Walt.Tirenin@rl.af.mil For FY12, we are specifically seeking white papers in the two areas of "Polymorphic Enclaves" and "Polymorphic Machines" as described below. FY 12 SPECIFIC FOCUS AREA: POLYMORPHIC ENCLAVES Background: The current static nature of our systems and networks allows attackers to continually gather intelligence, and perform planning needed, to execute cyber attacks at will. Intelligence collection can occur from both outside and inside our networks; therefore agility must be incorporated comprehensively across our networks to address these threats. Network intelligence gathered by an attacker remains valid for as long as the network remains static. In order to help defend and shield our networks from attack, we must break the underlying assumption of their static nature. Objective: We seek to create a rapidly-shifting network architecture with automated agility and diversity mechanisms, to continually, dynamically, and unpredictably modify or morph the network into secure operational modes both before and during attacks. If a successful attack should occur, the network must not only survive the attack, but also ensure minimal disruption of the services provided by the network by "mutating" or shifting into a form that can prevent further or future attacks. These capabilities must, however, maintain the transparency and utility of the network and its services to authorized users, while creating uncertainty and complexity for the attacker. Potential agility techniques may include asymmetric routing; MAC, IP, and Port hopping; service migration; OS "fingerprint" spoofing; and possibly protocol mutations. These techniques must be employed in combination with a system-level architecture that ties these mechanisms together, to ensure optimal effectiveness and proper management. Questions regarding this focus area can be directed to: Walt Tirenin (315) 330-1871 Walt.Tirenin@rl.af.mil FY 12 SPECIFIC FOCUS AREA: POLYMORPHIC MACHINES Background: Large-scale adoption of homogeneous computing environments, such as the Federal Desktop Core Configuration (FDCC), creates significant risk of wide-spread and rapidly-executed disabling attacks. Standardized machine configurations like the FDCC are widely adopted in government and industry. They have been shown to reduce maintenance costs and some vulnerabilities by simplifying and standardizing configuration, and thus reducing the incidence of attacks due to human errors. Unfortunately, a single attack exploit for the standardized configuration can be used to compromise all systems with that configuration. To counter this threat, we can leverage for example, virtualization extensions found in modern commodity processors to provide low overhead diversification of code. We can also apply metamorphic transformations on code, a technique that has been effectively used by malware authors, to create semantically equivalent but behaviorally different variants of programs. Objective: We seek a variety of different methods and mechanisms, integrated and applied in a manner that is controlled by the transformation and diversification process, and yet appears to an attacker to be a continuously and randomly shifting target space. These capabilities must, however, maintain the transparency and utility of the systems to authorized users, while creating uncertainty and complexity for the attacker. Questions regarding this focus area can be directed to: Sergey Panasyuk (315) 330-4721 Sergey.Panasyuk@rl.af.mil FY 11 & FY12 SPECIFIC FOCUS AREA: INCORRUPTIBLE DATA CODES / EXECUTABLES Background: The Department of Defense (DoD) requires trustworthy data and software executables for successful performance of assigned missions. Objective: Deliver self-contained, verifiably incorruptible/trustworthy data and executables with protection while at rest, under execution, or in transit upon and within any environment/system relevant to the warfighter. This includes both our own systems and systems that we do not own or directly control. Research Concentration Areas: The "Incorruptible Data Codes / Executables" focus area is interested in the research challenges identified below. However, different approaches and concepts deemed to have significant potential to achieve the stated objectives will be considered. • Development and technical evaluation and refinement of watermarking algorithms and protocols for the purpose of information provenance, pedigree, and assurance: • Addressing all forms of data and multimedia formats; to include but not limited to: images, audio, video, formatted and raw data types • Protocols with provable security which incorporate other accepted security mechanisms (timestamping, hashing, key exchange, etc.) • Particular emphasis on: Interaction of watermarked data with watermarked/secured code which has Anti-Tamper and Protection guarantees • Watermarking algorithms and protocols which provide multiple aspects (provenance, pedigree, assurance) while working in conjunction with data for specific application (sensing, etc) • Software-only data and executable protections • Hardware-assisted data and executable protections • Measuring and verifying incorruptibility/trust Questions regarding this focus area can be directed to: Chad Heitzenrater (315) 330-2575 Chad.Heitzenrater@rl.af.mil FY11 & FY12 FOCUS AREA: ASSURED EXECUTION Background: The current focus of computer security is at the operating system (e.g. role-based users), applications (e.g. anti-virus programs), and the network (e.g. firewalls). Focus needs to be shifted to the operating system at the hardware and virtualized hardware layers. Innovative technology developments are sought to defend computers and computer networks, and assure dynamic mission objectives. Objective: The vision of this program is "A trusted execution environment within each device (e.g. computer, network router) that is a platform for conducting cyber defensive operations that uses "out of band" communication, and remains trusted should the host be compromised." The two areas of high interest are 1) Virtualization and 2) Root of Trust. Virtualization: The combination of complex applications running on complex operating systems presents a very large footprint to attack. Additionally, DoD has very little control over modern shrink-wrapped software applications and operating systems. Current cost concerns prohibit DoD from developing, building, and maintaining their own applications, operating systems, and hardware. Virtualization technologies offer ways to defeat cyber attacks prior to engagement. Key concepts include but are not limited to: A secure environment that encapsulates and protects the operating systems, device drivers, and applications; secure, segregated, inaccessible areas for critical code; and secure communications for critical code processes. Root of Trust: The integrity of computers and computer networks is dependent on the integrity of the host hardware and host root account. This area of research investigates modeled hardware root of trust that imparts immunity from an adversary with root access to the underlying host. Innovative ways to achieve a secure root of trust on a host are sought. Also sought are ways to achieve a network root of trust. Questions regarding this focus area can be directed to: Joe Carozzoni (315) 330-7796 Joe.Carozzoni@rl.af.mil FY 11 & FY12 SPECIFIC FOCUS AREA: FIGHT THROUGH & SURVIVE WITH MISSION ASSURANCE Background: The DoD has a critical need for information systems that adapt and/or gracefully degrade when unexpected events occur. These systems are subjected to constant change such as overload, component failure, cyber attacks, evolving operational requirements, and/or a dynamic operational environment. A system should adapt to these changes by reconfiguring its resources to provide a different, though acceptable, level of service and security to assure mission essential functions. Without adaptation many important activities receive fewer resources than needed while less important activities waste resources by receiving more resources than necessary. Most existing systems either do not adapt or have ad hoc hardwired mechanisms to accommodate only a small, predefined, set of changes. There are no standard methodologies or common tools to assist application developers in managing this sort of dynamic adaptation. Objective: The vision for this focus area is "survive with mission assurance". This focus area is concerned with runtime assessment and management of resources/assets to ensure mission essential functions and conveying trustworthiness. Research Concentration Areas: The "Fight Through & Survive with Mission Assurance" focus area explores the research challenges below, but other approaches that achieve the stated objectives will be considered: (1) Cyber Defense Metrics - Identify low-level observable properties and measurable quantities that contribute to the mission based assessment. (2) Mission Aware Adaptive Tradeoffs - Integration of QoS (Functionality) and QoIA (Security) management. There is a need to understand tradeoff policy and de-confliction of QoS and QoIA based on the mission. There is a need to develop fine-grained tunable IA mechanisms and controls. (3) Survivability Architecture- Compose a survivability architecture that supports and enforces service delivery and information assurance requirements based on mission priorities. Funding for this focus area is not available in FY12. Questions regarding this focus area can be directed to: Pat Hurley (315) 330-3624 Patrick.Hurley@rl.af.mil FY 11 & 12 SPECIFIC FOCUS AREA: SELF-REGENERATIVE INCORRUPTIBLE ENTERPRISE THAT DYNAMICALLY RECOVERS WITH IMMUNITY Background: Existing approaches to information system security and survivability consist of preventing, detecting and containing unintentional errors and/or cyber attacks. The problem with this approach is that regardless of how well systems are protected or how well they tolerate errors and/or attacks; they will eventually fail over time unless they have the ability to self-regenerate. Once a successful cyber attack is discovered the adversary can quickly use the same attack over and over again to cause the same negative effect on our mission. Existing systems are currently taken offline and out of the fight for hours to days to be repaired and there is no guarantee that the repair is immune to the attack or variants of the attack. What are needed are information systems that are able to dynamically recover with immunity in mission time without human intervention in response to unforeseen errors and/or previously unknown cyber attacks. Objective: The vision for this focus area is "recover with immunity". This focus area is concerned with recovering with immunity from errors and/or cyber attacks to ensure mission critical systems stay in the fight. Research Concentration Areas: The "Self Regenerative, Incorruptible Enterprise" focus area explores the research challenges below, but other approaches that achieve the stated objectives will be considered: (1) Persistent applications (data & state) - The goal of this technology area is to make applications hard to corrupt, disable or remove (like malware). When an attack is successful these applications find a way to keep performing the mission. (2) Machine Generated Reconstitution - The goal of this technology area is to automatically machine-generate repairs to recover with immunity from errors/cyber attacks. (3) Reconstitution of Data and State - The goal of this technology area is mission continuation by automatically repairing corrupted data & state to remove residue from errors/cyber attacks. (4) Understanding Synthetic Diversity or other technology used to recover with immunity - There is a need to better understand the use of synthetic diversity or other technology used to ensure complete attack space coverage and/or understand the effectiveness against various classes of cyber attack. Funding for the Self-Regenerative Incorruptible Enterprise focus area in FY12 will focus on persistent applications (data & state). Questions regarding this focus area can be directed to: Pat Hurley (315) 330-3624 Patrick.Hurley@rl.af.mil FY 11 & FY12 FOCUS AREA: CYBER MISSION ASSURANCE Background: This focus is on novel approaches to assure critical Air Force mission essential functions (MEF) in a contested cyber environment. Mission assurance seeks to codify a top-down approach for mapping MEF dependence on cyberspace across the information lifecycle (information generation, processing, storage, transmission, consumption and destruction), identifying cyber vulnerabilities, developing metrics to assess the risk from cyber vulnerabilities on MEF, and developing strategies to mitigate the vulnerabilities. We view mission assurance in the context of preventing and avoiding threats by deterring potential threats through increased costs and reduced benefits. We seek a scientific basis for mission assurance, including the development of mathematical models to represent MEF dependence on cyber, an exploration of the fractal nature of mission mapping, and the development of metrics for the cost of vulnerability mitigation in proportion to the increased cost to potential threats. These will in turn enable the development of more rigorous approaches to situational understanding as well as command and control. Research into cloud computing technologies could provide potential solutions to the mission assurance research area by increasing the availability and redundancy of continuous or contingency operations. We invite novel techniques for secure data storage, processing and communication practices within a cloud architecture. We seek solutions that utilize the dynamic characteristics of cloud computing technology to prevent and avoid threats. Under the establishment of an internal center of excellence in cloud computing, there is a need for further research within AFRL and the DoD community. The center of excellence should provide opportunities for this research through collaboration and related internships. Objectives: • Create a scientific basis for mission assurance. • Provide novel techniques for secure data storage, processing and communication practices within a cloud architecture. • Construct appropriate research opportunities within the DoD community. • Support other S&T initiatives in the areas of situational understanding and command and control Questions regarding this focus area can be directed to: Dr. Sarah Muccio (315) 330-4016 Sarah.Muccio@rl.af.mil or Mr. Brian Kropa (315) 330-1544 Brian.Kropa@rl.af.mil The scope of this BAA is not limited to the aforementioned focus areas. Other applicable areas of technology include, but are not limited to, Rapid/Live Forensics, Botnet Detection & Mitigation, Attack Attribution, Insider Threat Detection & Mitigation, Range Development, and Cyber Modeling, Simulation, Metrics, and Measurements. The work could include 'Abnormality ID and Remediation' and might also include 'Cyber Economic Incentives' which would entail a look at the concept of 'Amortization of R & D' (that is, a look at quantification of how long to pay back R & D resources used for an operational improvement before the R & D/Ops improvement becomes obsolete). Also, Data Mining application under Visualization Support would be applicable. II. AWARD INFORMATION: Total funding for this BAA is approximately $49M. The anticipated funding to be obligated under this BAA is broken out by fiscal year as follows: FY 11 - $4M; FY 12 - $12M; FY 13- $12M; FY 14 - $12M; FY 15 - $9M. Individual awards will not normally exceed 36 months with dollar amounts ranging between $100K and $1M per year. There is also the potential to make awards up to any dollar value. Awards of efforts as a result of this announcement will be in the form of contracts, grants, cooperative agreements, or other transactions depending upon the nature of the proposed work. III. ELIGIBILITY INFORMATION: 1. ELIGIBLE APPLICANTS: All potential applicants are eligible. Foreign or foreign-owned offerors are advised that their participation is subject to foreign disclosure review procedures. Foreign or foreign-owned offerors should immediately contact the contracting office focal point, Lynn G. White, Contracting Officer, telephone (315) 330-4996 or e-mail Lynn.White@rl.af.mil for information if they contemplate responding. The e-mail must reference the title and BAA 11-01-RIKA. 2. COST SHARING OR MATCHING: Cost sharing is not a requirement. 3. CCR Registration: Unless exempted by 2 CFR 25.110 all offerors must: (a) Be registered in the Central Contractor Registration (CCR) prior to submitting an application or proposal; (b) Maintain an active CCR registration with current information at all times during which it has an active Federal award or an application or proposal under consideration by an agency; and (c) Provide its DUNS number in each application or proposal it submits to the agency. 4. Executive Compensation and First-Tier Sub-contract/Sub-recipient Awards: Any contract award resulting from this announcement may contain the clause at FAR 52.204-10 - Reporting Executive Compensation and First-Tier Subcontract Awards. Any grant or agreement award resulting from this announcement may contain the award term set forth in 2 CFR, Appendix A to Part 25 http://ecfr.gpoaccess.gov/cgi/t/text/text-idx?c=ecfr&sid=c55a4687d6faa13b137a26d0eb436edb&rgn=div5&view=text&node=2:1.1.1.41&idno=2#2:1.1.1.4.1.2.1.1 IV. APPLICATION AND SUBMISSION INFORMATION: 1. APPLICATION PACKAGE: THIS ANNOUNCEMENT CONSTITUTES THE ONLY SOLICITATION. WE ARE SOLICITING WHITE PAPERS ONLY. DO NOT SUBMIT A FORMAL PROPOSAL AT THIS TIME. Those white papers found to be consistent with the intent of this BAA may be invited to submit a technical and cost proposal, see Section VI of this announcement for further details. For additional information, a copy of the AFRL/Rome Research Sites "Broad Agency Announcement (BAA): A Guide for Industry," April 2007, may be accessed at: http://www.fbo.gov/spg/USAF/AFMC/AFRLRRS/Reference%2DNumber%2DBAAGUIDE/listing.html 2. CONTENT AND FORM OF SUBMISSION: Offerors are required to submit 4 copies of a 4-5 page white paper AND 1 electronic copy on a CD summarizing their proposed approach/solution. All whitepaper/proposals shall be submitted in Microsoft Word or PDF format, single spaced, and have a font no smaller than 12 pitch with any figures, tables and charts easily legible. The purpose of the white paper is to preclude unwarranted effort on the part of an offeror whose proposed work is not of interest to the Government. The white paper will be formatted as follows: • Section A: Title, Period of Performance, Estimated Cost, Name/Address of Company, Technical and Contracting Points of Contact (phone, fax and email), and target technology area (e.g., Rapid Forensics) - (this section is NOT included in the page count); • Section B: Task Objective • Section C: Innovative Claims (How will this effort enhance or replace the state-of-the-art?); • Section D: Technical Approach (Why is this approach superior to alternatives or current practice?); • Section E: Biggest Technical Challenge (What are the major technical challenges in the approach? How will those challenges be mitigated?); • Section F: Schedule and Proposed Deliverables. Multiple white papers within the purview of this announcement may be submitted by each offeror. If the offeror wishes to restrict its white papers/proposals, they must be marked with the restrictive language stated in FAR 15.609(a) and (b). All white papers/proposals shall be double spaced with a font no smaller than 12 pitch. In addition, respondents are requested to provide their Commercial and Government Entity (CAGE) number, their Dun & Bradstreet (D&B) Data Universal Numbering System (DUNS) number, a fax number, an e-mail address, and reference BAA 11-01-RIKA with their submission. All responses to this announcement must be addressed to W. John Maxey (Technical POC), as discussed in paragraph seven of this section. 3. SUBMISSION DATES AND TIMES: It is recommended that white papers be received by the following dates to maximize the possibility of award: FY11 should be submitted by 15 March 2011; FY12 by 1 December 2011; FY13 by 1 December 2012; FY14 by 1 December 2013; and FY15 by 1 Dec 2014. White papers will be accepted anytime during the period that this BAA remains open, but it is less likely that funding will be available in each respective fiscal year after the dates cited. FORMAL PROPOSALS ARE NOT BEING REQUESTED AT THIS TIME. This BAA is open and effective until 2pm EST on 28 Sep 2015 unless cancelled at an earlier date. 4. FUNDING RESTRICTIONS: The cost of preparing white papers/proposals in response to this announcement is not considered an allowable direct charge to any resulting contract or any other contract, but may be an allowable expense to the normal bid and proposal indirect cost specified in FAR 31.205-18. Incurring pre-award costs for ASSISTANCE INSTRUMENTS ONLY, are regulated by the DoD Grant and Agreements Regulations (DODGARS). 5. CLASSIFICATION GUIDANCE FOR WHITEPAPER SUBMISSIONS: AFRL/RIGA will accept classified responses to this BAA when the classification is mandated by classification guidance provided by an Original Classification Authority of the U.S. Government, or when the proposer believes the work, if successful, would merit classification. Security classification guidance in the form of a DD Form 254 (DoD Contract Security Classification Specification) will not be provided at this time since AFRL is soliciting ideas only. Proposers that intend to include classified information or data in their white paper submission or who are unsure about the appropriate classification of their white papers should contact the technical point of contact listed in Section VII for guidance and direction in advance of preparation. 6. All Proposers should review the NATIONAL INDUSTRIAL SECURITY PROGRAM OPERATING MANUAL, (NISPOM), dated February 28, 2006 as it provides baseline standards for the protection of classified information and prescribes the requirements concerning Contractor Developed Information under paragraph 4-105. Defense Security Service (DSS) Site for the NISPOM is: https://www.dss.mil/portal/ShowBinary/BEA%20Repository/new_dss_internet//isp/fac_clear/download_nispom.html 7. OTHER SUBMISSION REQUIREMENTS: DO NOT send white papers to the Contracting Officer. All unclassified responses to this announcement will be sent via U.S. Postal Service registered mail and addressed to AFRL/RIGA, 525 Brooks Road, Rome NY 13441-4505, and reference BAA-11-01-RIKA. Electronic submission is not authorized unless expressly permitted by the technical POC listed in Section VII. Questions can be directed to the technical POC listed in Section VII. CLASSIFIED SUBMISSIONS MUST BE SENT TO AFRL/RIGA SEPARATELY FROM UNCLASSIFIED PAPERS AS PER THE INSTRUCTIONS BELOW. Use classification and marking guidance provided by previously issued security classification guides, the Information Security Regulation (DoD 5200.1-R), and the National Industrial Security Program Operating Manual (DoD 5220.22-M) when marking and transmitting information previously classified by another original classification authority. Classified information at the Confidential and Secret level may be mailed via U.S. Postal Service (USPS) Registered Mail. For proposals of higher classification levels or for alternate submission mechanisms please contact the technical POC listed in Section VII. When mailing, ensure the response is appropriately marked, sealed, and mailed in accordance with the classified material handling procedures. The classified mailing address is: Ref: BAA-11-01-RIKA AFRL/RIGA 525 Brooks Road Rome NY 13441-4505 V. APPLICATION REVIEW INFORMATION: 1. CRITERIA: The following criteria, which are listed in descending order of importance, will be used to determine whether white papers and proposals submitted are consistent with the intent of this BAA and of interest to the Government: (1) Overall scientific and/or technical merit including technical feasibility, degree of innovation, and understanding of the technical and operational approach for employment of the technology; (2) The effort's potential contribution and relevance to the U. S. Air Force's mission assurance objectives; (3) The extent to which the offeror demonstrates relevant technology and domain knowledge, which may include testing of prototype capabilities and assessment against Information Assurance requirements; and (4) The reasonableness and realism of proposed costs, and fees (if any). No further evaluation criteria will be used in selecting white papers/proposals. Individual white paper/proposal evaluations will be evaluated against the evaluation criteria without regard to other white papers and proposals submitted under this BAA. White papers and proposals submitted will be evaluated as they are received. 2. REVIEW AND SELECTION PROCESS: Only Government employees will evaluate the white papers/proposals for selection. The Air Force Research Laboratory's Information Directorate has contracted for various business and staff support services, some of which require contractors to obtain administrative access to proprietary information submitted by other contractors. Administrative access is defined as "handling or having physical control over information for the sole purpose of accomplishing the administrative functions specified in the administrative support contract, which do not require the review, reading, or comprehension of the content of the information on the part of non-technical professionals assigned to accomplish the specified administrative tasks." These contractors have signed general non-disclosure agreements and organizational conflict of interest statements. The required administrative access will be granted to non-technical professionals. Examples of the administrative tasks performed include: a. Assembling and organizing information for R&D case files; b. Accessing library files for use by government personnel; and c. Handling and administration of proposals, contracts, contract funding and queries. Any objection to administrative access must be in writing to the Contracting Officer and shall include a detailed statement of the basis for the objection. VI. AWARD ADMINISTRATION INFORMATION: 1. AWARD NOTICES: Those white papers found to be consistent with the intent of this BAA may be invited to submit a technical and cost proposal. Notification by email or letter will be sent by the technical POC. Such invitation does not assure that the submitting organizationwill be awarded a contract. Those white papers not selected to submit a proposal will be notified in the same manner. Prospective offerors are advised that only Contracting Officers are legally authorized to commit the Government. All offerors submitting white papers will be contacted by the technical POC, referenced in Section VII of this announcement. Offerors can email the technical POC for status of their white paper/proposal no earlier than 45 days after proposal submission. 2. ADMINISTRATIVE AND NATIONAL POLICY REQUIREMENTS: CLASSIFIED SUBMISSIONS: AFRL/RIGA will accept classified responses to this BAA when the classification is mandated by classification guidance provided by an Original Classification Authority of the U.S. Government, or when the proposer believes the work, if successful, would merit classification. Security classification guidance in the form of a DD Form 254 (DoD Contract Security Classification Specification) will not be provided at this time since AFRL is soliciting ideas only. After reviewing incoming proposals, if a determination is made that contract award may result in access to classified information a DD Form 254 will be issued upon contract award. Proposers that intend to include classified information or data in their submission or who are unsure about the appropriate classification of their white papers should contact the technical point of contact listed in Section VII for guidance and direction in advance of preparation. Depending on the work to be performed, the offeror may require a SECRET or TOP SECRET facility clearance and safeguarding capability; therefore, personnel identified for assignment to a classified effort must be cleared for access to SECRET or TOP SECRET information at the time of award. In addition, the offeror may be required to have, or have access to, a certified and Government-approved facility to support work under this BAA. Data subject to export control constraints may be involved and only firms holding certification under the US/Canada Joint Certification Program (JCP) (www.dlis.dla.mil/jcp) are allowed access to such data. 3. REPORTING: Once a proposal has been selected for award, offerors will be required to submit their reporting requirement through one of our web-based, reporting systems known as JIFFY or TFIMS. Prior to award, the offeror will be notified which reporting system they are to use, and will be given complete instructions regarding its use. Please note that use of the JIFFY or TFIMS application requires customers outside of the.mil domain to purchase an approved External Certificate Authority certificate to facilitate a secured log on process. It is necessary to obtain an ECA certificate BEFORE obtaining a JIFFY or TFIMS user account. Additional information on obtaining an ECA is available at: http://iase.disa.mil/pki/eca/index.html VII. AGENCY CONTACTS: Questions of a technical nature shall be directed to the cognizant technical point of contact, as specified below: TPOC Name: W. John Maxey Telephone: (315) 330-3617 Email: William.Maxey@rl.af.mil Questions of a contractual/business nature shall be directed to the cognizant contracting officer, as specified below: Lynn White Telephone (315) 330-4996 Email: Lynn.White@rl.af.mil The email must reference the solicitation (BAA) number and title of the acquisition. In accordance with AFFARS 5301.91, an Ombudsman has been appointed to hear and facilitate the resolution of concerns from offerors, potential offerors, and others for this acquisition announcement. Before consulting with an ombudsman, interested parties must first address their concerns, issues, disagreements, and/or recommendations to the contracting officer for resolution. AFFARS Clause 5352.201-9101 Ombudsman (Apr 2010) will be incorporated into all contracts awarded under this BAA. The AFRL Ombudsman is as follows: Susan Hunter Building 15, Room 225 1864 Fourth Street Wright-Patterson AFB OH 45433-7130 FAX: (937) 225-5036; Comm: (937) 904-4407 All responsible organizations may submit a white paper which shall be considered.
 
Web Link
FBO.gov Permalink
(https://www.fbo.gov/spg/USAF/AFMC/AFRLRRS/BAA-11-01-RIKA/listing.html)
 
Record
SN02343278-W 20101215/101213234022-229ea20373294ef2caf9c530c1e203e1 (fbodaily.com)
 
Source
FedBizOpps Link to This Notice
(may not be valid after Archive Date)

FSG Index  |  This Issue's Index  |  Today's FBO Daily Index Page |
ECGrid: EDI VAN Interconnect ECGridOS: EDI Web Services Interconnect API Government Data Publications CBDDisk Subscribers
 Privacy Policy  © 1994-2020, Loren Data Corp.