Loren Data's SAM Daily™

fbodaily.com
Home Today's SAM Search Archives Numbered Notes CBD Archives Subscribe
FBO DAILY ISSUE OF MAY 02, 2010 FBO #3081
SOLICITATION NOTICE

B -- The objective is to identify TIC/TIM risk /vulnerability assessment attributed to threats, assess and recommend corrections.

Notice Date
4/30/2010
 
Notice Type
Combined Synopsis/Solicitation
 
NAICS
541990 — All Other Professional, Scientific, and Technical Services
 
Contracting Office
USPFO for Maryland, State Military Reservation, 301 Old Bay Lane, Havre de Grace, MD 21078-4094
 
ZIP Code
21078-4094
 
Solicitation Number
W912K610T0006
 
Response Due
5/19/2010
 
Archive Date
7/18/2010
 
Point of Contact
Michael Dombkiewicz, 4109186218
 
E-Mail Address
USPFO for Maryland
(michael.dombkiewicz@ang.af.mil)
 
Small Business Set-Aside
Total Small Business
 
Description
This is a combined synopsis/solicitation for commercial items prepared in accordance with the format in Subpart 12.6, as supplemented with additional information included in this notice. This announcement constitutes the only solicitation; proposals are being requested and a written solicitation will not be issued. STATEMENT OF WORK Toxic Industrial Chemicals/Toxic Industrial Materials (TIC/TIM) Risk Vulnerability Assessment (VA) 1.0 DESCRIPTION OF WORK 1.1 Introduction The objective of this effort is to identify TIC/TIM vulnerabilities attributed to both intentional and non-intentional threats, assess the risk for each finding, and recommend practical control/mitigation options that enable risk managers to determine the best allocation of limited resources to protect people and mission-critical systems and services. Although not a formal inspection, the effort also assists installations by identifying Anti-Terrorism (AT)/Force Protection (FP) vulnerabilities with other installation VAs and for inclusion into the Core Vulnerability Assessment Management Program (CVAMP). 1.2 Background AFI 41-106, Medical Readiness Planning and Training requires the installation Bioenvironmental Engineer to conduct an annual assessment of local industrial facilities (on and off base) that may be of consequence to base operations if toxic TIC/TIM are released and report results to the MRSF and Wing Force Protection Working Group. AFTTP 3-42.2 requires medics to conduct TIC/TIM VAs in a deployed environment. DoD Instruction 2000.16, DoD Antiterrorism Standards, requires AT VAs provide a vulnerability-based analysis of an activity's AT program. The assessment identifies, for the commander, vulnerabilities that may be exploited by terrorists and suggests options that may eliminate or mitigate those vulnerabilities. Additionally, ASTM standard E2413-04, Standard Guide for Hospital Preparedness and Response, recommends healthcare facilities conduct a hazard vulnerability analysis to ensure proper planning for a variety of incidents. 1.3 Scope The objective of this work is to conduct a TIC/TIM VA and training at Warfield AFB, MD. The project will include threat identification and assessment, effects-based modeling and hazard projections, determination of probability of events that could present the threat, and determination of risk from each threat. The most up-to-date guidance shall be used in completing the effort IAW AFI 10-2501 and AFI 48-106. Major planning, data gathering, and information processing tasks associated with the TIC/TIM VA are outlined in Section 3.0, Technical Requirements. To minimize stakeholder interruptions and optimize efficiencies, information requests, interviews, and other activities will be consolidated where appropriate during the combined effort. Reports will be completed for the TIC/TIM VA are outlined in Section 4.2, Technical Reporting Requirements. The TIC/TIM VA is an assessment required by AFI 41-106 and compliments the installation-level VA required annually by AFI 10-245. This VA can serve as a baseline assessment for subsequent updates on an annual basis until the need for a new baseline is determined by the presiding installation Bioenvironmental Engineer or Anti Terrorism Officer. 2.0 APPLICABLE DOCUMENTS. In performance of the effort associated with this Statement of Work (SOW), the contractor shall apply all relevant criteria derived from Department of Defense (DoD), Air Force (AF), MAJCOM, Department of Justice (DOJ), and primacy agency policies, directives, and instructions. In some instances where definitive criteria is absent, best management practices derived from DoD, AF, DOJ, and industry guidance will be identified and applied. Reference documents include, but are not limited to, those outlined below: "AFI 10-211, Civil Engineer Contingency Response Planning. "AFI 10-245, Air Force Antiterrorism (AT) Standards "AFI 10-2501, Full Spectrum Threat Response (FSTR) Planning And Operations "AFI 32-2001, The Fire Protection Operations and Fire Prevention Program "AFI 41-106, Medical Readiness Planning and Training "AFI 48-119, Medical Service Environmental Quality Programs "AFI 90-901, Operational Risk Management "AFM 10-2602, Nuclear, Biological, Chemical, and Conventional (NBCC) Defense Operations and Standards "AFM 32-1071, Security Engineering, Vols 1-4 "AFP 90-902, Operational Risk Management (ORM) Guidelines and Tools "AFPD 10-8, Homeland Security "Department of Defense (DoD), Official CVAMP User Reference Guide, V2.1. "DoD 5200.1-R, Information Security Program "DoDD 5160.54, Critical Asset Assurance Program (CAAP) "DoDI 2000.16, DoD Antiterrorism Standards "DoDO 2000.12-H, DoD Antiterrorism Handbook "Defense Critical Infrastructure Program (DCIP) Security Classification Guide, May 07 "Defense Threat Reduction Agency (DTRA), Force Protection Security Classification Guide, Joint Staff Integrated Vulnerability Assessment Program "HQ AF Security Forces Center (AFSFC), Antiterrorism Vulnerability Assessment Team Guidelines "AFIOH, Risk Assessment Methodology for Chemical, Biological, and Radiological Preparedness and Planning (Draft) "DOJ, National Institute of Justice-Special Report, A Method to Assess the Vulnerability of U.S. Chemical Facilities, Nov 02 3.0 TECHNICAL REQUIREMENTS The following Tasks are to be completed at Warfield AFB provided: 3.1 Task 1 Assess DOJ and AFIOH assessment methods/processes for identifying and assessing TIC/TIM threats and determining probability and apply to determine severity and vulnerability of threats. 3.2 Task 2 Develop a TIC/TIM inventory to include industrial facilities, radioactive materials, and commodity flow information from railroads, ports, and other transportation entities for the surrounding 20 miles. 3.3 Task 3 Coordinate a pre-assessment and on-site workshop with Base name, conduct a kick-off meeting, and produce minutes of the telecon. 3.4 Task 4 Prior to visiting the installation, the contractor shall review local/area references and historical information, and coordinate with the base POC and other stakeholders as necessary concerning the schedule and other details. TIC/TIM worksheets/questionnaires shall be Unclassified until the information is compiled and the information then becomes Secret. 3.5 Task 5 Conduct and facilitate vulnerability analysis on-site with cross-functional team from the installation. Conduct an in-briefing to key stakeholders concerning the objectives of the overall effort, background information, schedule, and other information deemed appropriate. Interview key stakeholders (i.e. Fire Dept, OSI, Security Forces, CE Operations, AT Officer, etc.) responsible for programs and review relevant program records and documentation. 3.6 Task 6 Provide an out-briefing to key stakeholders detailing preliminary findings and control/mitigation options, deliverables and submittal dates, and to answer questions. The TIC/TIM out-brief must be classified as Secret briefing if it lists any specific location, specific vulnerability, LIMFAC, potential effect, and risk results. 3.8 Task 7 Process all assessment/survey data to delineate vulnerability findings, analyze risk and rank findings accordingly, and identify practical control recommendations. The TIC/TIM report must be classified as Secret if it lists any specific location, specific vulnerability, LIMFAC, potential effect, and risk results. 4.0 ADMINISTRATIVE AND TECHNICAL REPORTING REQUIREMENTS 4.1 Base Support shall be provided to the contractor by the installation to facilitate accomplishment of Tasks 3.1-3.7 consisting of the following: "Assign a primary point of contact (POC) to coordinate activities and serve as focal point for the contract assessment team "Facilitate scheduling of in- and out-briefings and support for PowerPoint presentations "Assist in facilitating assessment activities as necessary, including meeting or teleconference with Local Emergency Planning Committee members (when applicable) "Assist in requisitioning a temporary workspace, e.g., cubicle, office, conference area, etc., and intermittent access to copier capable to process documents/briefings up to Secret "Provide drawings and electronic copies of the installation infrastructure, main roadways, and buildings. "When applicable, pre-coordination/authorization for entry into secure areas and for taking digital photos of key access points and surrounding areas "Facilitate access to key program documents and records, and provide copies (hard or electronic) for selected documents/records 4.2 Technical Reporting Requirements 4.2.1 TIC/TIM VA Report The contractor shall produce a report in both draft and final version for each installation assessment. The report shall include the following sections: Executive Summary (ES), 1.0 Introduction, 2.0 Background, 3.0 Method, 4.0 Overview of the TIC/TIM VA and AT-related Programs, 5.0 Identification of TIC/TIM, 6.0 Risk Assessment, 7.0 Analysis of Risk Control Measures and Recommendations, and 8.0 Conclusion. Appendices shall include: Glossary of References, Terms, and Acronyms and the TIC/TIM inventory. The ES, main body of the report, and Appendices will be classified and marked Secret. The classified report (including Appendices A and B) will be submitted on CD via Fedex or other government-approved carrier as identified in Section 4.2.4, Report Schedule. The base will have 21 days to provide review comments on the draft report. The contractor will provide a Final TIC/TIM VA Report 30 days after the contractor receives draft report comments from the installation. 4.2.2 CVAMP Data Report To assist the installation Anti-Terrorism Officer (ATO) for the Core Vulnerability Assessment Management Program (CVAMP), observations and supporting vulnerability and risk-related information will be presented in a format consistent with the AF Security Forces Center (AFSFC) Vulnerability Assessment Team Guidelines and the latest Official CVAMP User Reference Guide. Relevant data elements include observation description, appropriate benchmark category and code, deficiencies (discussion), recommended corrective actions and other vulnerability and risk-related information designed to meet CVAMP data input needs necessary for vulnerability prioritization and tracking purposes. The information will be presented in a format that allows the CVAMP administrator to cut and paste directly into CVAMP. 4.2.3Monthly Status Reports Monthly technical and cost status reports are due the fifth of each month. 4.2.4Report Schedule The schedule of deliverables is shown in Table 1. TABLE 1 Deliverables Schedule DeliverableSOW ParagraphSubmittalDateHard CopiesElectronic Copies Base TIC/TIM VA Report (Draft)4.2.145 days after data collection ceases 1 Base TIC/TIM VA Report (Final)4.2.130 days after contractor receives base draft report comments21 CVAMP Data Report4.2.2Included with Final TIC/TIM ReportIncluded in each reportIncluded in each report Monthly Status Reports4.2.35th of each month SGPB (1); ATO (1) 5.0 FINAL PRODUCT REQUIREMENTS "Must provide an off base TIC/TIM listing in the defined radius where it is applicable "Must provide an on base TIC/TIM listing to include unique military materials "Must provide a listing of notification process inbound and outbound of Warfield AB "Must provide sufficient on base capability listing to potential scenarios "Must provide sufficient off base support listing with capabilities "Must provide a listing of probability and severity of each identified hazard "Must provide historical weather patterns for each season of Warfield AB "Must provide on and off base flood plane "Must provide all sources used to include point of contacts, databases, agencies, documents, etc. A threat analysis must be conducted for each potential hazard/scenario (peacetime/wartime incidents and natural disasters) on and off Warfield AB to include all modes of transportation on water, air, and land. Each potential scenario will include a plume model with each type of release, persistency, mode travel, and geographical data. The threat analysis will also include the TIC/TIM impact to Warfield AB and the immediate surrounding areas. 6. QUALIFICATION REQUIREMENTS The contractor selected for the performance of this statement of work must have specific experience and expertise with conducting threat and vulnerability assessment in garrison and deployed environments, familiarity with casualty models and projection tools, understanding of risk assessment process, and understanding of available countermeasures and controls that can be recommended to address vulnerabilities. The consultant must have first-hand experience and knowledge regarding homeland defense relationships, capabilities, Mil-Civ interaction, threat environment, AF CONOPS, and emergency response management and execution. 6.0 SECURITY The contractor will meet the security requirements of the DD254. Contractors must have a current Secret security clearance.
 
Web Link
FBO.gov Permalink
(https://www.fbo.gov/spg/USA/NGB/DAHA18/W912K610T0006/listing.html)
 
Place of Performance
Address: Maryland Air National Guard 2701 Eastern Blvd Middle River MD
Zip Code: 21220
 
Record
SN02137973-W 20100502/100501000139-c54f4daaeafee1a31a502cf267d232a1 (fbodaily.com)
 
Source
FedBizOpps Link to This Notice
(may not be valid after Archive Date)

FSG Index  |  This Issue's Index  |  Today's FBO Daily Index Page |
ECGrid: EDI VAN Interconnect ECGridOS: EDI Web Services Interconnect API Government Data Publications CBDDisk Subscribers
 Privacy Policy  Jenny in Wanderland!  © 1994-2024, Loren Data Corp.