The Air Force Life Cycle Management Center, AF TENCAP program office is announcing to business and academia its intent to solicit proposals under this Broad Agency Announcement (BAA) with CALLs
Department of the Air Force, Air Force Materiel Command | Published February 23, 2017
If applicable the cost share ratio will be specified under each CALL for proposals. Offerors may also propose cost share arrangements within their proposal.
•3. Federally Funded Research and Development Centers:
The following guidance is provided for Federally Funded Research and Development Centers (FFRDCs) contemplating submitting a proposal, as either a prime or subcontractor, against this BAA. FAR 35.017-1(c) (4) prohibits an FFRDC from competing with any non-FFRDC concern in response to a Federal agency request for proposal for other than the operation of an FFRDC (with exceptions stated in DFARS 235.017-1(c)(4)). There is no regulation prohibiting an FFRDC from responding to a solicitation. However, the FFRDC's sponsoring agency must first make a determination that the effort being proposed falls within the purpose, mission, general scope of effort, or special competency of the FFRDC, and that determination must be included in the FFRDC's proposal. In addition, the non-sponsoring agency (in this case AFLCMC) must make a determination that the work proposed would not place the FFRDC in direct competition with domestic private industry. Only after these determinations are made would a determination be made concerning the FFRDC's eligibility to receive an award.
•a. Notice to Foreign-Owned Firms: Such firms are asked to immediately notify the Contracting POC cited in each CALL for proposals issued under this BAA before deciding to respond to a CALL for proposals. Foreign contractors should be aware that restrictions apply which could preclude their participation in a program. If no restrictions apply, it will be stated in the CALL.
•b. Offerors may be required to access militarily critical data in support of a program. If applicable, it will be stated in the CALL for each solicitation topic. Only contractors who are registered and certified with the Defense Logistics Agency (DLA) and have a legitimate business purpose may participate in this solicitation. Contact the Defense Logistics Agency, 74 Washington Avenue N., Battle Creek, Michigan 40917-3084 (1-800-352-3572) for further information on the certification process. You must submit a copy of your approved DD Form 2345, Militarily Critical Technical Data Agreement, with your proposal.
•c. You may be ineligible for award if all requirements of this solicitation are not met on the proposal due date as identified in each CALL for proposals.
IV. FOCUS AREAS
•1. Focus Area 1: Geolocation and Tagging, Tracking, Locating
The ability to have instant and accurate knowledge of the status and location of friendly and enemy forces and assets is a vital factor in determining the victor of the conflict. This ability becomes even more critical in today's environment of non-linear warfare. Areas of interest within this focus area include:
•· Emerging precision geolocation techniques. These techniques may combine air and space assets by fusing the data sources to improve overall accuracy.
•· Innovative methods of correlating and deconflicting Joint Blue Force Situational Awareness (JBFSA) information using the latest technologies (e.g., artificial intelligence, fuzzy logic, self-learning applications) to enhance situational awareness (SA).
•· Tools to provide JBFSA location data to crews in aircraft cockpits, tanks, artillery, etc. in real-time. Current dissemination architectures may be modified to get pertinent real-time JBFSA data to shooters. Methods of routing digital information with minimal man-in-the-loop operations, across various interfaces, formats and mediums are needed.
•· New and emerging technologies to tag and track blue, coalition or red forces. These technologies should be non-intrusive, covert, easily applied and sustained, and can be easily integrated into existing architectures, devices and operations concepts.
•· Populating and improving Common Operational Pictures (COPs) and exchanging data.
•· Alternative navigation methods less reliant on Global Positioning System (GPS) or innovative methods of augmenting GPS to make it less vulnerable.
•· Exploitation of emerging wireless network capabilities.
•2. Focus Area 2: Sensor, Data Fusion and Dissemination
This focus area is interested in exploiting existing or planned space-based IR sensors or other sensors whose primary mission is not battlespace awareness. These additional sensors may include the integration of commercial and civil (NASA, NOAA) systems. The emphasis is on deriving data or information for the BA/TI missions in real or near real-time, and easily fusing or correlating these products with the products from systems designed specifically for the BA/TI missions. For the purpose of this focus area, the Battlespace is on the ground. Respondees should describe how and to what extent their concept addresses one or more of the following issues:
•· How do the proposed systems or algorithms improve our ability to identify known IR emitters/emissions?
•· How do the proposed systems or algorithms improve our ability to identify and/or characterize moving targets?
•· How do the proposed systems or algorithms help in extracting new targets of interest?
•· How do the proposed systems help in geolocation of IR emitters/emissions?
•· How do the proposed systems help in differentiation of closely spaced IR emitters/emissions?
•· How do the proposed systems help in characterizing the target signatures beyond what is available from existing IR-based systems?
•· How do we implement time-dominant cloud computing architecture to facilitate data sharing and fusion among data providers and customers?
•· How do we develop and implement data standardization and harmonization across the range of sensors?
•3. Focus Area 3: Unconventional/Asymmetric Warfare/Support to Special Operations
Unconventional/Asymmetric warfare is unique mission set with unique requirements. Special Operations Forces (SOF) are integrated with all service branches in support of the Joint fight to include paramilitary forces in support of Homeland Security. The new relationships between military, non-traditional civilian, and/or coalition forces will often require the sharing of releasable versions of classified capabilities or products. Tools and architectures used to achieve this ability must be capable of rapid data transfer; and they must be interoperable with a variety of other systems, including conventional and unconventional military, paramilitary, and civilian systems.
The high mobility of these forces and the variety of mission types involved in such warfare mandate that devices used in such operations have small footprints, low weights, are easy to use, and have multifunctional operation to support these missions. Most of these systems must be human transportable. If devices have a user interface, consideration should be given to making the interface available in foreign languages. These forces depend on robust communication architectures and accurate, timely information flow. That information exchange must be scalable and tailored to the specific mission. Regardless of the information being relayed, the issue is how to disseminate this time sensitive data from US and/or Coalition forces throughout a multinational coalition group. Areas of interest within this focus area include:
•· Cyber effects to enable irregular warfare.
•· Space force enhancement (e.g., SATCOM, PNT, space weather).
•· Tools to detect Improvised Explosive Devices (IEDs) with sufficient timeliness and standoff range to allow safe disarming or avoidance.
•· Tools to fuse behavioral models and/or historical data with current ISR capabilities to accurately predict future IED events or geographical areas for concern.
•· Tools to detect, target, and track weapons of mass destruction.
•· Methods to link local area data networks via satellite to a COP.
•· Commercially available device(s)/application(s) that can be used to merge military and civilian capabilities. Technology solutions should consider classification/releasability of data, size and weight issues, and compatibility with current and future systems. Emphasis should be placed on achieving a relatively high data rate to "disadvantaged" users such as SOF, to enable the timely receipt of actionable data.
•· Tools, equipment, and software to support Special Operations Forces.
•· Tools and equipment that enable wide-band, low profile communications in man-pack portable configurations to include LPI/LPD/LPX capabilities.
•· Communication encryption software that has the potential to meet TYPE I standards.
•· Commercial foreign-releasable tools for imagery analysis and download, situational awareness, mission planning, and force tracking.
•· Multi-role Antenna arrays needed for aircraft with roll-on, roll-off installation without requiring aircraft modification.
•· Tools to enhance Building Partnership Capacities and coalition partners' mission capabilities and effectiveness.
•4. Focus Area 4: Situational Awareness
Persistence can be achieved with long loitering assets or with sophisticated exploitation techniques (e.g., change detection). Persistent SA leverages capabilities of both national reconnaissance assets and theater assets to provide decision makers needed information at the time and in the format needed and feeds tools that provide comprehensive battlespace awareness. Persistent SA provides "the means to find, fix and finish combat operations against new and elusive foes:" dynamic targeting, all-weather precision, restrictive rules of engagement, collateral damage control and security access issues. AF TENCAP is looking for innovative ideas/concepts that leverage both our national systems capabilities and leading-edge technologies, to provide a significant enhancement to our Persistent SA capability. Specific areas of interest include:
•· Timely, all weather detection, identification and location of hard and buried targets.
•· Near-real-time detection, location and identification of Personal Communications Systems.
•· Indications and warnings of imminent or potential threats and activities of interest.
•· Detection, location and identification of targets employing advanced camouflage, concealment and deception tactics (camouflage, foliage obscuration, co-located with civilians).
•· Detecting, identifying and locating difficult to detect and LPI/LPD/LPX signals such as short up-time/blinking emitters, frequency hopping and spread-spectrum signals, and low power signals/jammers, etc..
•· Timely detection, characterization and location of intentional and unintentional electromagnetic interference affecting military or commercial SATCOM.
•· Detection, characterization, and geolocation of the source of attacks against our space assets.
•· Automated, multi-INT data mining, data fusion, exploitation, and analysis systems/tools that leverage multi-sensor/multi-platform data to provide reliable, scalable, contacting and time dominant intel and reporting.
•· Automated exploitation systems that include effective multi-intelligence data mining capabilities and/or automated target recognition capabilities.
•· Effective Specific Emitter Identification (SEI)/Specific Emitter Tracking (SET) capabilities that address multiple targets, across all of the electromagnetic spectrum, moving or stationary, real or decoy.
•· Remote chemical/biological agent detection and identification. Due to high false alarm rates using existing passive sensors, explore active sensing technology to increase sensitivity and reduce false alarms over current deployed systems. In addition, dissemination of accurate chemical/biological detection identification and characterization via existing battlefield architectures as well as population of common operating pictures for a more complete battlefield status is desired.
•5. Focus Area 5: Space Situational Awareness
Many space systems have been developed for specific purposes and are used only for their primary intended missions. This interest area includes exploiting planned and existing space and ground based sensors for SSA missions which may not be the primary or intended purpose of the sensors. The goal is to use these sensors to map/track or improve mapping/tracking of space objects. The products developed under this focus area need to be used eventually on a Common Operating Environment (COE) platform and integrated with a visualization tool; however, development of the COE is not the goal of this focus area.
•· How do we develop and implement data standardization and harmonization across the range of sensors contributing to SSA?
•· How do we perform IR multi-stage correlation, sensor cross-cueing in the Space Surveillance Network, and multi-source fusion of space tracks using IR and radar?
•· How do we develop software to determine space systems ops status, and sensor coverage of space?
•· How do we provide the capability to correlate and fuse imagery, optical, and other INTs, both of space objects and from space sensors, with IR and radar?
•· What capabilities exist to integrate space systems C2 with Space & Terrestrial sensor status and configuration?
•· How do we create an interface for an enhanced visualization tool to feed a space COP display?
•· How do we leverage multiple phenomenologies (e.g., polarimetry, spectral data, RF emissions) from existing systems to better satisfy our satellite intelligence needs?
•· How do we use existing or planned sensors, including those with a non-SSA mission, to manually or automatically track space objects?
•· How do we implement a real-time cloud computing architecture to facilitate data sharing and fusion among data providers and customers?
•· How do we enhance, integrate or improve applicable "walker" capabilities?
•6. Focus Area 6: Cyber and Spectrum Warfare Operations
AF TENCAP seeks to leverage innovative cyber and/or RF-enabled capabilities in each of the areas defined below to enhance joint warfighting posture for situational awareness (SA), enhanced intelligence, surveillance, and reconnaissance (ISR), operational preparation of the environment (OPE), battle damage assessment (BDA) and offensive cyber purposes. Primary interest is in the development of capabilities which integrate across warfighting domains.
Desired capabilities/techniques exclude enterprise IT infrastructure, systems and applications. Specific areas of interest include, but are not limited to, the following:
•· Capabilities/techniques for RF-enabled capabilities:
•o Rapid integration of relatively mature RF-enabled cyber capabilities with tactical airframes or special mission platforms.
•o Rapid development and integration of cyber with software-defined radios.
•o Rapid development of highly sophisticated EW techniques and/or technologies.
•· Risk reduction prototyping of next-generation, tactical cyber and/or EW capabilities.
•· Offensive capabilities/techniques against data confidentiality, integrity and availability and active defense (e.g., penetration testing) capabilities.
•· Cyber and/or EW capabilities that provide obfuscated communications and/or techniques for tactical warfighter platforms to achieve global reach and access.
•· Capabilities /techniques that protect tactical warfighter assets against spectrum or electromagnetic interference (EMI) threats
•o Capabilities/and or techniques that provide indications and warnings (I&W), situational awareness (SA) and/or automated force protection countermeasures.
•· Capabilities and/or techniques that support cyber and/or EW operational preparation of the environment (OPE), enhanced ISR, measures of effectiveness/performance (MOE/MOP), and /or battle damage assessments (BDA).
•· End to end command and control (C2) infrastructure specifically tailored to the projection of full-spectrum tactical cyber capabilities.
•7. Focus Area 7: Air Superiority
Achieving Air Superiority encompasses a broad range of capabilities in many mission areas spanning air, space and cyber domains. In order to fully characterize the relevant Science and Technology (S&T) trends that will shape future capabilities required for Air Superiority. Tools should be developed in critical mission areas of persistent battlespace awareness including sensors/sensor suites, robust, net-centric operations, offensive and proactive defensive cyber capabilities and rapid global mobility. The technologies will come primarily from non-material solutions and should be developed to enhance the core tenants of Air Superiority and ensure a streamlined approach to further enhance campaign planning in an A2/AD environment.
•· Survivable and secure netted tools and technologies that attain or enhance robust, survivable, and flexible LPI/LPD high-bandwidth communications and datalink architectures to effectively execute command and control in an A2/AD environment.
•· Survivable, interoperable, multi-platform, full-spectrum, state-of-the-art offensive and defensive electronic warfare (EW) capabilities--electronic Attack (EA), electronic protect (EP), and electronic support (ES).
•· Integrate off-board sources (space-based, government and commercial) to improve organic precision direction-finding (DF) and geolocation of threat systems and enhance situational awareness.
•· Tools to expand the capabilities of aircraft to carry additional and/or standoff weapons loads in different configurations.
•8. Focus Area 8: Command, Control and Spectrum Utilization
Effective command and control systems should provide commanders the means to synchronize action to achieve joint objectives in what will be a contested and degraded electromagnetic and information environment. They should be sufficiently robust, scalable, flexible, and rapidly deployable to enable commanders to fully exploit air, space, and cyberspace capabilities, and employ decision tools and displays that provide decision makers with full-spectrum all-source battlespace visibility. These demands will drive the need for universal, survivable, self-healing, adaptive, secure, jam-resistant, and interoperable networks connecting users from diverse organizations who operate across numerous security levels and in vastly different geographic, environmental, technological, and threat contexts. These capabilities maintain C2 presence while providing a balance between maximizing C2 ability to conduct distributed operations for maximum reachback and minimum forward footprint while mitigating the risk of relying on beyond-line-of-sight (BLOS) communications, links, and cyber linkages that could be lost or denied.
•· Tools to better integrate space assets and capabilities into both theater planning systems, command and control, and airborne support and execution platforms.
•· Technologies to generate comprehensive and accurate air, surface (land/ maritime), space, and cyberspace (to include enemy, friendly, and neutral force information) common operating pictures available to networked warfighters.
•· Ability to receive, fuse, and transmit data across multiple domains or multinational system architectures
•· Responsive and assured access to timely and relevant decision quality information.
•· Long-range, high-confidence real-time combat identification.
•· Planning tools and decision aids to fully integrate non-kinetic capabilities into campaign planning and execution.
•· Capabilities to counter offensive and defensive directed energy (DE), anti-satellite (ASAT), and EW advanced threats.
Technologies to enhance typical telecommunications to increase capability, such as full motion video (FMV), video telecommunication (VTC), or machine-to-machine data collaboration.
•9. Focus Area 9: Real-Time/Near Real Time Large Data Analytics and Virtualization
AF TENCAP has an existing prototype cloud computing architecture for information sharing and innovative association of data based on the NSA-developed "Ghost Machine" (GM) and DoD's "Red Disk" architecture. The AF TENCAP cloud architecture is one of the first JWICS nodes with an authority to operate (ATO) and is an operational "pathfinder" demonstrating operational capabilities to provide cost effective, enterprise-level tools and analytic services across the DoD and IC. The enterprise increases access and visibility of data to Warfighters and analysts through attribute-based access controls which enables accelerated analysis of the data to create information. The increased availability of information results and technology allow analysts to rapidly identify unique associations across multiple domains that were previously lost in the volume, velocity and variety of data.
U.S. Government agencies are slowly moving away from the use of relational and proprietary databases, which require matching proprietary hardware, software and licensing. The use of virtual technologies and implementation of "cloud" techniques greatly reduce these overhead costs while enabling diverse data elements to be stored in the same electromagnetic space without any predefined associations or relationships. Areas of interest within this focus area include:
•· Large data analytics for the analysis, correlation and/or association of data from all other AF TENCAP focus areas to operate in the cloud environment. In particular those working with NoSQL-type databases.
•· Tools/methods to expedite and/or automate data tagging, classification, indexing and ingestion of structured and unstructured data sets.
•· Visualization tools and techniques for multi-domain, object-based intelligence and information sets. Preferably Ozone Widget Framework compatible, and browser agnostic
•· Agile techniques to migrate/integrate existing "legacy" applications and relational data stores with "cloud" architecture while preserving system certification and accreditation.
•· Applications, analytic tools and techniques which ensure future integration with other "cloud" architectures.
V. White Paper or PROPOSAL REVIEW INFORMATION
•1. Right to Use a Two-step solicitation process:
The Air Force reserves the right to use a two-step solicitation process. If applicable, the CALL will specify and describe the two-step process, which will normally follow these general guidelines: FIRST STEP solicits a request for an abstract/white paper and a rough order of magnitude (ROM) cost. These will be evaluated by a government team that will determine which of the abstracts/white papers have the most promise of meeting AF TENCAP needs. Offerors will be notified of the disposition of their abstract/white paper. Those offerors submitting abstracts/white papers assessed as meeting AF TENCAP needs will be asked to submit a technical and cost proposal. The SECOND STEP consists of offerors submitting a technical and cost proposal within the number of specified days from proposal request within each individual CALL. After receipt, proposals will be evaluated in accordance with the award criteria in Section VIII below and/or as otherwise adjusted in each CALL for proposals. Proposals will be categorized and subsequently selected for negotiation. The two-step process will only be used if the CALL so specifies.
Intergovernmental Review: If applicable, to be specified in each CALL for proposals.
Funding Restrictions: If applicable, to be specified in each CALL for proposals.
Other Submission Requirements: Specified in each CALL for proposals, but generally through e-mail.
If by electronic submission: URL or e-mail address, whether a password is required and a point of contact that will be available to resolve technical difficulties will be specified in subsequent RFPs.
2. General Instructions for White Papers:
a. Responders' should apply the restrictive notice prescribed in the provision of FAR 52.215-1(e) Instructions to Offerors - Competitive Acquisition.