Past Solicitations
DHSS-TLRBAA12-07
DHS S&T Long Range Broad Agency Announcement

This is a Broad Agency Announcement (BAA) as contemplated in the Federal Acquisition Regulation (FAR) 6.102(d)(2) and 35.016. A separate Request for Proposals (RFP) or other Solicitation document will not be issued. The Department of Homeland Security (DHS), Science & Technology (S&T) Directorate will not issue paper copies of this Announcement. DHS S&T reserves the right to select for award and fund all, some, or none of the Full Proposals submitted under this Announcement. Multiple awards are anticipated to be issued under this Announcement. No funding for direct reimbursement of proposal development costs will be allowed. Proposal materials submitted under this Announcement will not be returned. Depending on proposal Markings, DHS S&T will adhere to FAR policy on handling proprietary information. It is the policy of DHS S&T to treat all submissions as "Source Selection Information" and "For Official Use Only".

Topics

BMD.01 - Land Border Security

Detection of, tracking of, classifying of, and responding to all threats along the terrestrial and maritime border - specifically, technologies that can perform one of the following functions: 1) Classify humans versus animals in rugged terrain, concealing foliage, water obstacles, mountains, and other environmental constraints a) Lower false alarm rate (Pfa) with raised probability of detection (Pd); Pd should be at least 90% b) Operate at low power consumption levels (2-year battery life) c) Sensor hardware must be covert 2) Ground based sensors that are a covert and can detect the presence of and track human targets in remote (no grid power) heavily forested areas 3) Cost-effective airborne sensors for better land border security to assist in locating illicit activities, materials, or their means of conveyances, including: a) Runway-agnostic unmanned aerial systems that could be evaluated on their ability to provide ground operators with situational awareness and airborne imagery of areas of interest; and b) Next-generation sensor payloads for small unmanned aerial systems

BMD.02 - Maritime Border Security

Improved situational awareness by tracking small boat activity(including semi- and fully-submersible) activity, detecting anomalous and/or illegal behavior, and providing timely and actionable information in support of law enforcement and port security efforts; in particular, new information sources that utilize publically available databases, data sets, data collection devices, or sensors of opportunity to increase detection/tracking accuracy and/or the field of regard surrounding inland waterways, ports, harbors, and coastal regions.

CBD.01 - CBD.01

New or improved algorithms for DNA sequence analysis that significantly reduces the time required to identify that a threat signature is present in a complex mixture.

CBD.02 - CBD.02

New or improved rapid diagnostic tests that facilitate public health and/or disease outbreak surveillance, response, and recovery. Use cases include continuous health surveillance and mass triage scenarios (1) New laboratory-based high throughput, molecular-based detection platforms with improved sensitivity and time to answer (2) New field deployable/point of need diagnostic tests with improved sensitivity and time to answer (3) Non-culture based diagnostic tests to determine exposure or early symptomatic infection

CBD.05 - CBD.05

Facility protection: Integration of sensors into building systems (e.g. HVAC, Security) and development of associated Concepts of Operations to enable rapid and adaptive responses to chemical and biological releases in order to protect occupants and mitigate the impact of the release.

CBD.07 - CBD.07

CBRN Threat Characterization Program: Supports research and development of next generation and novel methodological approaches to terrorism risk analysis, intentional attack analysis, scenario modeling and simulation to support the following needs: 1) Risk Management; 2) Cost Benefit Analysis and Resource Allocation; 3) Development and evaluation of deterrence, preparedness, response and mitigation strategies; 4) Behavioral modeling of adversary intentions and public response to CBRN terrorism events.

CSD.01 - CSD.01

The Cyber Security Division focuses on research for advanced cyber security and information assurance solutions to secure the Nation's current and future cyber and critical infrastructures against persistent threats and dynamic attacks. This research is guided by the President's National Strategy to Secure Cyberspace and Comprehensive National Cybersecurity Initiative. These solutions include secure protocols, end system security, user identity and data privacy technologies, research infrastructure, law enforcement forensic capabilities, competitions, and education.

CSD.02 - CSD.02

Internet Infrastructure Security - including Secure internet protocols including Domain Name System Security (DNSSEC) and Secure Protocols for Routing Infrastructure (RPKI and BGPSEC).

CSD.03 - CSD.03

National Research Infrastructure - mimicking real-life conditions, systems and infrastructure, to enable the cyber security research community to discover, test, and analyze state-of-the-art tools, technologies and software in a scientifically rigorous and ethical manner.

CSD.04 - CSD.04

Homeland Open Security Technology - Open Source Security Technology to enable implementation and deployment of open source security technologies in Federal, State, and Local environments.

CSD.05 - CSD.05

Forensics support to law enforcement - including the research and development of tools and technologies that will allow investigators to visualize, analyze, share and present data derived from cell phones, GPS devices, computer hard drives, networks, and other digital media.

CSD.06 - CSD.06

Identity Management (IdM) - seeking tools, technologies, credential vulnerability studies, and other efforts that improve the security of access control in both cyber and physical environments. The mission of the IdM research projects is to develop, test, and evaluate interoperable tools, technologies, standards, and protocols for the purpose of controlling user access within and outside of organizational boundaries. The foundational goal is to increase security and productivity while decreasing cost and security risks.

CSD.07 - CSD.07

Data Privacy Technologies - seeking to develop a set of technologies and associated business processes, which help organizations responsibly manage personally identifiable information (PII) in a manner that protects individual privacy consistent with applicable law, policy, and mission. Data Privacy tools that inherently provide privacy are critical enablers of information sharing as they automate control of privacy data and foster confidence that personal information is being used appropriately while minimizing privacy risk. Data Privacy projects support the application of technologies to the transfer, management, and accountability of privacy data for federal, state, local, and critical infrastructure and key resource information sharing missions by exploring, refining and integrating technologies and techniques, and piloting the results.

CSD.08 - CSD.08

Software Assurance - The CSD objective in the area of Software Assurance is to develop and improve Software Analysis technologies, tools, and techniques to reduce the exposures and vulnerabilities in software. The nation's critical infrastructure (energy, transportation, telecommunications, banking and finance, and others), businesses, and services are extensively and increasingly controlled and enabled by software. Vulnerabilities in software put the nation's critical resources at risk. To address this objective, CSD is seeking research in areas such as: a) The integration of Static Application Security Testing (SAST) with Dynamic Application Security Testing (DAST) tools and techniques to create a hybrid approach to reduce exposures and vulnerabilities in the software environments. b) Vulnerability correlation engine to reduce false-positives and improve detection capabilities for false-negatives. c) Comprehensive remediation workflow analysis d) Vulnerability mapping and correlation (DISA STIGS, NIST, CWE, OWASP and PCI). e) Integration and support with DHS Software Assurance Market Place (SWAMP) f) Threat and attack model simulations to cover areas such as business logic flaws, system environment, OS related exposures

CSD.09 - CSD.09

The CSD objective in the area of cyber security education is to develop, demonstrate and help implement comprehensive and dynamic cyber security education models that impact our homeland and national cyber security education condition for the better. These models and associated technologies need to support cyber security competitions and education and curriculum development. To address this objective, CSD anticipates cyber security research in areas such as: a) the coupling of operations with education and training; b) abstract learning versus learning with context; c) Bayesian learning (prior knowledge) and where and how it might be applicable.

CSD.10 - CSD.10

Cyber-physical control and Critical Infrastructure Systems and Security - The intersections of cyber security and critical infrastructure is a growing vulnerability for the American homeland, characterized by tight coupling, coordination, and interconnections among sensing, communications, computational, control, information and physical resources. Their interconnections in particular form a complex system of systems, and the complexity of these systems and interconnections will continue to grow. The complexity of systems poses challenges in resiliency, vulnerability, threat, and recovery assessment. To address this area, CSD is interested in applied research addressing areas such as: a) Models, theories, methods, and tools to fully address the cybersecurity of cyber-physical systems, in a unified and integrated way; b) Analysis, understanding and control approaches at the intersection of security analysis and operations analysis, i.e. possible overlaps between control and critical infrastructure systems and their cyber security, industrial security and operations security capabilities; c) The interplay of control, business and consumer-facing systems, and the interplay between different critical infrastructure systems; d) Security architectures, in particular how different security approaches might best work to protect critical infrastructure systems.

CSD.11 - CSD.11

Internet Measurement and Attack Modeling Techniques: Security focused measurement and attack modeling for all aspects of cyberspace. This includes the Internet (e.g., ASNs, routers) as well as other devices (e.g. medical devices) or networks (e.g. ICS) that may connect to the Internet, via a static or dynamic (possibly intermittent) connection.

CSD.12 - CSD.12

Securing the mobile workforce: technologies to support flexible client side security.

CSD.13 - CSD.13

Security in cloud based systems - including secure protocols to protect data flow to, within and out of the cloud; data integrity; user privacy constraints; forensics analysis to preserve digital evidence; and measurement systems to identify unauthorized activity.

CSD.14 - CSD.14

Experiments and Pilots - Technologies developed through federally funded research requiring test and evaluation in experimental operational environments to facilitate transition.

CSD.15 - CSD.15

Research Data Repository - Cyber security datasets of interest to the research community.

CSD.16 - CSD.16

Cybersecurity Economic Incentives - Research into the areas of: a) Cyber insurance and insurability, b) Defining the boundaries between service provider empowerment and law enforcement involvement, within the context of their global legal abilities and partnerships, and c) The legal and technical issues and barriers involved in data sharing among service providers, both domestic and global, and developing improved models for domestic and international collaboration and cybersecurity data sharing.

CSD.17 - CSD.17

Data Analytics - The exponential increase in the volume of data created daily worldwide creates new challenges for cyber security. S&T is interested in technologies and tools to support the analysis of datasets whose size is beyond the ability of commonly used software tools to capture, manage and process. These include but are not limited to: a) Data discovery, b) automated analysis techniques, c) machine and self-learning algorithms and d) data visualization.

CSD.18 - CSD.18

Tailored Trustworthy Spaces - Technologies and tools supporting the concepts of tailored trustworthy spaces, including but not limited to: a) trust negotiation tools and data trust models to support negotiation of policy, b) Type-safe languages and application verification, and tools for establishment of identity or authentication as specified by the policy, and c) Support for application-aware anonymity to allow for anonymous web access, and platform security mechanisms and trust-in-platform.

EXD.01 - EXD.01

Explosives Countermeasures include the detection, mitigation, and response to explosive threats including: all modes of transportation within the Transportation Systems Sector (Aviation, Maritime, Mass Transit, Highway, Freight Rail, and Pipeline); in checked and carry-on baggage; Home Made Explosives (HME); improvised explosive devices (IEDs), vehicle borne (VBIED) and person borne (PBIED); and response and defeat technologies.

EXD.02 - EXD.02

Standoff Detection of Explosives: Technologies for the standoff detection of explosives and explosive devices related to Person and Vehicle Borne Improvised Explosive Devices. Explosives of interest include commercially available explosives (i.e. Ammonium Nitrate based), conventional military explosives (i.e. Composition C-4 and Semtex A/H) and homemade explosives (i.e., peroxide base). Standoff Detection implies that both the detection equipment and operator be located at some distance (greater than 1 m up to tens of meters) away from the subject or object under interrogation. Subtopics include: 1) Integration of both multimodal and multispectral technologies for improved detection and/or imaging metrics. 2) Development of automated detection and/or identification capabilities associated with both imaging and spectroscopy based technologies.

EXD.03 - EXD.03

Trace Detection of Explosives: Technologies for the detection of explosives trace particle and vapor signatures in aviation security, facilities protection, and mass transit security operations. Specific interests include handheld and benchtop explosives trace detection (ETD) systems, optical methods for quickly and quantitatively measuring trace contamination on a range of surfaces, and advanced explosives trace detection system concepts.

EXD.04 - EXD.04

Cargo Security includes detecting intrusion or unauthorized access, positively identify cargo, and provide timely response - in particular, in containerized, palletized, parcel, or bulk/break-bulk maritime, air cargo, and freight rail.

EXD.05 - EXD.05

Test and Evaluation Expertise and Facilities for Counter-IED detection technologies. Standoff, Remote, and Checkpoint based explosives detection systems, to be evaluated, most often require real explosives and local storage of said explosives. Facilities must be able to store, on-site, small amounts (less than 1 pound) of various solid explosives, while achieving clean, uncontaminated facilities for equipment testing. Facilities must be able to accommodate non-eye safe laser ranges, x-ray based screening equipment, and neutron-based screening equipment. Facilities must also be able to accommodate, in certain cases, large, outdoor vehicle borne IED screening equipment.

EXD.06 - EXD.06

Data Fusion and Automated Detection for aviation cargo, checked baggage, carry-on baggage, personal check points and all surface intermodal concerns. Algorithms and techniques for detection fusion and automated alerting that combines a variety of detection modalities, including but not limited to X-ray, trace chemical detection, computed tomography (CT) and video.

EXD.07 - EXD.07

Advanced Detection Technologies: Development of robust, enhanced explosives detection methods such as fluorescence quenching materials, bio-inspired molecular recognition techniques and advanced sampling technologies to improve selectivity and sensitivity capabilities. Detection methods should be easily deployed, low cost and require minimum training to operate. Special attention should be paid to determining better sensing mechanisms and signal amplification mechanisms to apply to future detection improvements. Advanced image processing and data collection methods are of interest.

FRG.01 - FRG.01

The First Responder Group identifies, validates, and facilitates the fulfillment of First Responder capability gaps through the use of existing and emerging technologies, knowledge products, and the acceleration of standards. The FRG focuses on: 1) developing tools, technologies, methodologies, standards, protocols, and guidance to enable improved communications interoperability for First Responders; 2) providing First Responder solutions for high-priority capability gaps through rapid prototyping; 3) maintaining a Web portal that enables First Responders to easily access and leverage Federal web services; and 4) overseeing the National Urban Security Technology Laboratory, which provides a test and evaluation capability for DHS-developed technologies and systems.

FRG.14 - FRG.14

The ability to identify trends, patterns, and important content from large volumes of information from multiple sources (including non-traditional sources) to support incident decision-making. Improvements in this Capability can: (1) Prevent incident command and general staff from being overloaded with unmanageable amounts of incident data; (2) Allow incident commanders to synthesize and analyze information to make informed operational decisions. Capability Requirements: (1) Tools to analyze incoming incident data in real-time to identify trends, patterns and anomalies; (2) Policies and standards to utilize such information to inform and improve decision making.

FRG.17 - FRG.17

The ability to share video from incident scene to medical services personnel in a remote location. Improvements in this Capability can: (1) Gather EMS color requirements for compressed video; (2) result in improved compression for video streaming in order to transmit it over the limited available wireless bandwidth. Capability Requirements: (1) applications must retain color truth throughout the video system.

FRG.18 - FRG.18

The ability to analyze the performance of a video system's transport component. Improvements in this Capability can: (1) use different types of cameras (e.g., high definition, low definition) to identify the limits of camera use for streaming video (with or without compression) on a given network; (2) help define network bandwidth requirements for a video applications. Capability Requirements: (1) efficient use of bandwidth for a specific video application on a user's given device.

FRG.19 - FRG.19

The ability to better understand how the public will respond to alert and warning messages on mobile devices. Improvements in this Capability can: (1) Improve understanding of the public's response to alerts and warnings, including how to optimize message content, message frequency, education and training, communicating to special populations, message diffusion throughout the public, and trust and validation of messages; (2) Take into consideration current Commercial Mobile Alert Service (CMAS) regulations proposed by the CMSAAC and supported by the FCC, including enhanced geo-targeting features; (3) Understand the use of social media and public participation in origination and dissemination of alerts and warnings including research and testing in the areas of standardization, aggregation and analysis, behavioral response, best practices, and privacy. Capability Requirements: (1) Consideration of current CMAS regulations as proposed by the CMSAAC and supported by the FCC.

FRG.20 - FRG.20

The ability to better determine when more granular geo-targeting (i.e. below the County level as currently implemented) is appropriate as well as how broadly targeting should be extended from the point of incident. Improvements in this Capability can: (1) Accelerate geo-targeting standardization; (2) Enable the creation and establishment of best practices and standard operating procedures for adoption; (3) Focus on areas such as addressing messages across boundaries between targeted regions, differing coverage areas across multiple mobile carrier networks, the challenges of in-building geographies such as airports, and other enhancements to improve the geo-targeting of mobile alerts and warnings using cell broadcast. Capability Requirements: (1) Geo Targeting (i.e., below the County level as currently implemented)

HID.01 - HID.01

HSARPA is interested ideas for novel applications of new and emerging technology that can radically alter the mission space of the Department of Homeland Security as well as the extended homeland security enterprise. With rapid changes in technology come unanticipated opportunities for DHS to advance our capabilities. For example, a new lightweight material might be used to rapidly develop a new class of micro UAV's using a 3D printing process to improve border security. These technologies should be relatively new discoveries for which experimental knowledge has been sufficiently collected to support application concepts that can be realized with modern manufacturing processes. In this topic area, we are not looking for open ended research and development.

HID.02 - HID.02

Apex was recently launched to address specific and urgent S&T needs for the Department. Apex projects are focused on enhancing DHS Operational Component partner capabilities to secure the homeland. Apex projects: 1) Rapidly develop and deliver analyses and innovative technologies solutions to DHS components 2) Are closely collaborated with the DHS components throughout planning and execution 3) Use rigor to define the problem, needs and capabilities to enhance DHS Component's mission 4) Develop a complete system that includes system analysis 5) Deliver technologies that integrate in to the DHS component's operations 6) Use a multidisciplinary team to leverage the breadth of S&T knowledge 7) Are 24 months from project inception through operational testing

HID.03 - HID.03

The current Apex project has one technology goal: Implement new technologies to upgrade and increase the DHS Component's ability protect people and things. This includes emerging technologies that are lightweight, efficient, modular, and easily transportable. The technology solutions proposed must integrate with existing technologies used by the DHS Component, and be acceptable to the DHS Component.

HID.04 - HID.04

Information Resources: Develop, test, evaluate information systems and analytical tools to enhance preparation, facilitate decision making, and improve incident response capabilities. Develop, test, and evaluate software tools to more efficiently exploit intelligence and surveillance data.

HID.05 - HID.05

Communications, Surveillance and Reconnaissance: Develop, test, and evaluate surveillance and communication systems/sensors that enhance the protection of personnel and mitigate threats.

HID.06 - HID.06

Individual Protection: Develop, test, and evaluate enhancements to the protection of personnel during blast and ballistic events. Develop and test technologies that improve the performance of body armor by reducing weight and optimizing material performance.

HID.07 - HID.07

Mobile security: Enhance personnel protection during mobility (vehicular, etc.) operations.

HID.08 - HID.08

With increasing data sets from a variety of expanding information sources, effective capabilities to store, retrieve, manage and analyze heterogeneous collections of data in the face of privacy and security constraints are sought. HSARPA's APEX program to address Big Data Architecture and Analytics is focused on discovering, understanding and assessing emerging technologies that can be used to create open platform solutions that enable the generation of homeland security analytics solutions and acquisitions to improve mission performance. Solutions should be robust and commercially supported with reasonably low licensing and lifecycle costs. There is little interest in solutions that become legacy systems with high switching costs, escalating licensing fees, or that require very rare technical skills. Current interests in Big Data capabilities include but are not limited to: 1) Emerging commercial open standard secure scalable distributed architectures and storage solutions; 2) Emerging hardware architectures for improving analytic response times to large data collections; 3) Easy to use bolt-on production analytics solutions that can be easily configured, tailored and maintained by operational components; a) High utility configurable text, tabular and visual interfaces for Big Data Analytics 4) Scalable cross-language text matching for short semi-structured text fields in multiple languages; 5) High accuracy entity resolution capabilities across cultures and languages; 6) Performance metrics, datasets, and evaluation methodologies for assessing Big Data Architectures and Analytics;

RSD 1.1 - RSD 1.1

Behavior-based methods, models, trainings and technologies to enhance community resilience in the face of human- or nature-caused catastrophes through such means as better understanding of risk perception; improved risk communication by emergency responders and public officials; pre-event education and training; and applied theoretical and empirical research into the properties of resilient social networks and communities to include elements of social media and crowd sourcing..

RSD 1.2 - RSD 1.2

Research and development to improve the detection, analysis, understanding, and mitigation of the threats posed by violent extremists. Knowledge, tools and technologies to determine when individuals, groups, and movements are likely to engage in violence, and what ideological, organizational, and contextual factors may influence violent action.

RSD 1.3 - RSD 1.3

Methods for non-invasively identifying deceptive and suspicious behavior within a time constrained, low-base rate, screening environment, and methods for identifying interactive strategies optimal for eliciting disguise-resistant indicators of deceptive and suspicious behavior, including technologies that automate or aid in such identification. Protocols and technologies to minimize insider threats and to identify insider threat behavior when it occurs, especially in settings like transportation security or at a border are of interest as well.

RSD 1.4 - RSD 1.4

Improvements in biometrics, including real-time positive verification of individual identity using multiple biometrics; mobile biometrics screening capabilities, high-fidelity ten print capture, non-cooperative biometric technologies for identification and the development of standards and test/evaluation protocols.

RSD 2.1 - RSD 2.1

Surveillance Systems are of interest including video analytics, fusion algorithms, and intelligent filtering algorithms to identify, recognize, and track potential threatening events, behaviors, and individuals in a high density operational environment such as an aviation- or ground-based mass transit portal. These systems can also provide early detection and warning of earthquake, wild fire and other natural hazards to disaster management agencies, the general population and critical infrastructure owners/operators. Integrating multiple types of sensing technologies and intelligent algorithms and processing data will allow for more efficient acquisition and interpretation of data and move complex systems towards more efficient enterprise deployments.

RSD 2.2 - RSD 2.2

Resilient and Sustainable Infrastructure: Enhance security, resilience, and recovery of the 18 critical infrastructure sectors for retrofit applications. Develop key critical infrastructure components that can easily transition to user application, are affordable (in acquisition as well as operations and maintenance), highly transportable, and offer robust solutions for use during manmade and natural disruptions. Integrate infrastructure protection design with sustainable technologies and methodologies; reducing the consumption of energy, promote clean water, decrease pollutant emissions, and aiming to conserve resources over the life of the component. Key critical infrastructure component design should consider use of high-performance green materials that are self-monitoring, self-healing should stand the test of time; and should resist blast, earthquake, floods, and wind. Developing infrastructure that is sustainable means thinking differently about how we build, what we build, and whether we build at all. It means designing and maintaining infrastructures that are both highly efficient and all-hazard-resistant. Additionally, this portfolio addresses solutions that offer innovative risk/threat/consequence analysis processes, and methodologies to support the evaluation of national resilience against all hazard events.

RSD 3.1 - RSD 3.1

Agile Decision Aid Analytics to include mathematical methods, computational algorithms, and software/hardware architectures for discovering, comprehending, fusing and manipulating diverse, disparate data or information and applying the resulting knowledge to assess threats and consequences, anticipate terrorist incidents and natural or manmade catastrophic events, and guide response and recovery activities. Analytical capabilities that can operate on relatively small data sets to provide useable just-in-time response strategies (logistics, resource requirements) to improve resilience are of interest.

RSD 3.2 - RSD 3.2

Modeling, Simulation, and Gaming technologies: Concepts, techniques, methodologies, algorithms, and innovative tools and applications to significantly enhance the quality of system analysis and reduce the time/cost of conducting system analyses. Develop modeling tools for a wide range of decision makers, from local law enforcement to governors to the White House, to evaluate alternative policies and actions to deal with emergencies and anticipate cascading effects across interdependent systems. Tools for real-time decision support in emergencies capable of integrating and assimilating multiple types of information, processing that information, and presenting it in a manner useful to decision makers. Capabilities sought include the following: (1) Simulation Based Exercise, Training, Education in both real time and non-real time (2) Dynamic, on-Demand, and Real-time Information Processing and Visualization; (3) Innovative model integration technologies and standards (4) Simulation Based Response Doctrine, Policy/Guidance Analysis, Exercise, and Training; (5) Mobile, Light-weight, and portable device integration into Modeling and Simulation Environments

RSD 3.3 - RSD 3.3

Geospatial and Remote Sensing: Geospatial technologies enhancing situational awareness for the disaster management and protection of critical infrastructure resulting in improved incident management at the Federal, State, and local and tribal levels. Develop image processing and spatial analytical techniques that exploit remote sensing measurements resulting in improving the detection of specific phenomena of interest to public safety and first responders. Using analytics and automation software that will allow for data integration, develop mathematical methods, computational algorithms, and hardware architectures for discovering, comprehending, and manipulating diverse, diffuse data or information and applying the resulting knowledge to develop baseline assessments, assess threats and consequences, anticipate terrorist incidents and natural or manmade catastrophic events, and guide response and recovery activities. Integrate capability into web services that improves analytical capability using cloud computing or distributive architectures to provide critical products to all levels of incident command.

RSD 3.4 - RSD 3.4

Emergency Management: Advances to improve protection of or enhance performance of emergency responders as they carry out life-saving tasks. Develop technologies that will fully enable emergency managers and responders to effectively cope with multi-hazard emergencies-technologies such as integrated advanced materials for protective clothing that report on the health of the first responder; decision support systems that provide real-time logistical tracking and management of emergency supplies, equipment, and personnel; advanced precision indoor/outdoor tracking technologies; integrated simulation-based incident planning and response capability to analyze all-hazard disaster response and recovery operations, tactics, techniques, plans, and procedures for use in a real-time environment for simulation-based training. Advanced algorithms, tools, and infrastructures for sensor data fusion and visualization for improved situational awareness and emergency response to include wireless communications, both in secure and quasi-secure environments.

RSD 3.5 - RSD 3.5

Information Sharing: Supports improved situational awareness and decision making across Federal, state, local, tribal and territorial public safety organizations, as well as non-governmental agencies, private sector partners organizations and the public and communities. Seeks concepts, prototypes and technologies that improve the capability to collect, process, analyze, visualize, share, and protect information across the Homeland Security Enterprise.

STN 1.1 - STN 1.1

Performance specification standards for biological detection technologies according to capability (i.e., screening tools, autonomous monitors, portable and laboratory based PCR assays)

STN 1.2 - STN 1.2

Development of proficiency testing protocols in concert with users.

STN 1.3 - STN 1.3

Development of standard test methods for performance of biological detection technologies - both in the laboratory and field operations.

STN 1.4 - STN 1.4

Development of standard operational guidance and training curricula

STN 1.5 - STN 1.5

Development of conformity assessment guidelines for validation of biological detection technologies.

STN 10.1 - STN 10.1

Performance specification standards for PPE technologies according to capability (i.e., Respiratory protection, thermal protection, communications)

STN 10.2 - STN 10.2

Development of standard test methods for performance of protection technologies - both in the laboratory and field operations.

STN 10.3 - STN 10.3

Development of operational guidance and training curricula

STN 10.4 - STN 10.4

Development of conformity assessment guidelines for validation of protection technologies.

STN 2.1 - STN 2.1

Performance specification standards for chemical detection technologies according to capability (i.e., screening tools, autonomous monitors, portable and laboratory based detectors)

STN 2.2 - STN 2.2

Development of proficiency testing protocols in concert with users.

STN 2.3 - STN 2.3

Development of standard test methods for performance of chemical detection technologies - both in the laboratory and field operations.

STN 2.4 - STN 2.4

Development of standard operational guidance and training curricula

STN 2.5 - STN 2.5

Development of conformity assessment guidelines for validation of chemical detection technologies.

STN 3.1 - STN 3.1

Standard calibration procedures and standards test materials for use by DHS components and partners. Standards optimize both the screening protocols and detection technology effectiveness.

STN 3.2 - STN 3.2

Standard test materials and standard test protocols for next generation deployed explosives detection equipment, including new and emerging explosive threats.

STN 3.3 - STN 3.3

Development of standard protocols for screening technology in the hands of users, development of standard training materials, training aids, stimulants and other support elements to optimize the use of technologies in the field by users.

STN 3.4 - STN 3.4

Radiation safety standards for the next generation of X-ray scanners for personnel, baggage, and cargo screening applications

STN 4.1 - STN 4.1

Standard test methods to evaluate and measure mobility of robots in various terrains.

STN 4.2 - STN 4.2

Standard test methods to evaluate and measure robot manipulation capabilities.

STN 4.3 - STN 4.3

Standard test methods to evaluate and measure robot sensors, communications, and mapping.

STN 4.4 - STN 4.4

Standard test methods to evaluate and measure human robot interfaces and operator proficiency.

STN 4.5 - STN 4.5

Standard test methods to measure and evaluate logistics and safety parameters

STN 5.1 - STN 5.1

Image standards for Biometric Technologies govern the characteristics of acceptable images (i.g. face, fingerprint, and iris images)

STN 5.2 - STN 5.2

Interchange/Exchange Standards for biometric Data, covering the sharing of biometric data between databases, agencies and systems. Security of biometric data and biometric systems is also included in this area.

STN 5.3 - STN 5.3

Standards for biometric services - technologies, systems and protocols for collection, distribution and sharing of biometric data.

STN 5.4 - STN 5.4

Standard protocols for the testing and evaluation of biometric technologies, processes and systems supporting a test and evaluation program.

STN 6.1 - STN 6.1

Performance and equipment standards for cargo security; including but not limited to physical characteristics standards, component or system level performance standards, standards for portable devices affixed to vehicles, reader devices or sensor systems deployed at cargo facilities.

STN 6.2 - STN 6.2

Data standards for the secure sharing of cargo security data between databases, agencies and systems. Security standards for data and systems are also included in this area.

STN 6.3 - STN 6.3

Standard test protocols for the evaluation of technologies, processes and systems for cargo security equipment. In general, these systems should support test and certification models like the Customs and Trade Partnership Against Terrorism (CT-PAT).

STN 7.1 - STN 7.1

Standards for planning, training and responding to emergencies; including but not limited to preparedness for organizations, buildings or facilities. All-hazards preparedness and resiliency are key elements in planning and training.

STN 7.2 - STN 7.2

Standards for physical security systems, standards for systems that estimate needs and costs related to physical security systems

STN 7.3 - STN 7.3

Response and recovery standards, which relate to the response by any level, beginning with a single event, scaling to larger needs for facility, city or regional planning. These standards should include an emphasis on the coordinated response by various federal, state and local assets. Training and exercise curricula and pilot projects for such training are also of interest.

STN 8.1 - STN 8.1

Sensor data standards, data interchange standards, data formatting standards and information exchange standards - including National Information Exchange Model conformance.

STN 8.2 - STN 8.2

Data interface standards - hardware or software based standards to support system interface requirements; Includes security of sensor systems, and security of data exchange processes.

STN 8.3 - STN 8.3

Standard protocols for the testing of sensor data systems, standard testbeds and testing systems testing protocols are of interest.

STN 9.1 - STN 9.1

standards for location based systems

Discontinued

CBD.03 - CBD.03

Sample Preparation: 1) Research that improves the ratio of analyte of interest to background contaminant (AoI:BC) for chemical and/or biological threats; and 2) Research that helps to improve and define the quality of samples that emerge from sample preparation in ways that are substantive to either instrumental or assay style analysis.

CBD.04 - CBD.04

Instruments and Detection: Development, prototyping, and improvement of products and systems which are capable of detecting chemical and biological weapons, agents, and/or toxic industrial chemicals in particulate, aerosol, or environmental matrices, to support the following needs: (1) Rapid detection and identification of an agent immediately after its release into the environment. (2) Characterization and detection of novel, engineered, and emerging biological agents. (3) Trace quantity detection of an agent to support decontamination efforts. (4) Identification of a concealed agent or dispersal device prior to its release.

CBD.06 - CBD.06

Integrated Chem-Bio Rad Nuclear Explosives (ICBRNE) Program: Prototype and pilot demonstration applications related to sharing of WMD sensor data and related information at the state, local, and federal level utilizing open standards and protocols.

CBD.08 - CBD.08

New, cost-effective, biological-based countermeasures for foreign animal disease (FAD) and zoonotic pathogens affecting major domestic livestock species. Specific areas of interest are cattle and swine product candidates based on molecular vaccine platforms previously shown to be safe and effective against other infectious or human biodefense disease targets, and novel biological-derived agents with an established immune-based mechanism of action. Influenza countermeasure proposals will not be considered: 1) New, molecular-based vaccine candidates that improve the onset of immunity and can differentiate infected from vaccinated animals. 2) Novel immunostimulants, adjuvants, or agents with an immune-based mechanism of action that can improve vaccine efficacy and/or vaccine potency. 3) New vaccines that can increase spectrum of cross-protection against related strains. 4) New vaccines based on novel state-of-the-art technologies (e.g., nanovaccines, VLPs). 5) New biological-based anti-viral therapeutics (small molecule drugs excluded) that can be used in combination with vaccines.

CBD.09 - CBD.09

New or improved rapid diagnostic tests that facilitate foreign animal disease (FAD) outbreak surveillance, response, and recovery in livestock: 1) New laboratory-based high throughput, molecular-based antigen detection platforms with improved sensitivity and result time. 2) New field deployable/point of care antigen detection platforms with improved sensitivity and result time. 3) New tests that can detect FAD in clinical samples (milk, blood, oral/nasal fluids) prior to onset of clinical signs.

CBD.10 - CBD.10

Efforts that address the conceptual design and implementation strategies for a scalable architecture for modeling and analysis of foreign animal diseases for high priority pathogens (at regional and national scales); which is based on open source modular and reusable components; addresses limitations in data, theory, and capabilities required for infectious disease dynamics, livestock transportation networks, and geospatial data infrastructure; and demonstrates initial operating capabilities for selected functionality.

CBD.11 - CBD.11

New or improved mass animal depopulation methods; facility, personnel, equipment, and material decontamination protocols; and environmentally-sound disposal tools and techniques for animal disease outbreak response and recovery. 1) Develop or refine mass depopulation methods to improve speed, safety, cost and humane treatment. 2) Promote and increase the development and study of decontamination products and methods that are effective against FMD threats (e.g. disinfectants, their application techniques, and cleaning techniques) that are readily available and provide an adequate level of efficacy and safety to workers and the environment. 3) Adapt current technologies and develop new technologies (i.e., field deployable options) capable of handling mass animal carcass disposal in a manner that does not pose significant risks to human health and the environment.

CBD.12 - CBD.12

For additional details on this topic, please click the link at the top of the page titled "Notice on FedBizOpps". This link will bring you directly to the official Long Range Broad Agency Announcement (LRBAA). Detailed descriptions of the topics begin on page 6 of the LRBAA.

CBD.13 - CBD.13

For additional details on this topic, please click the link at the top of the page titled "Notice on FedBizOpps". This link will bring you directly to the official Long Range Broad Agency Announcement (LRBAA). Detailed descriptions of the topics begin on page 6 of the LRBAA.

CBD.14 - CBD.14

For additional details on this topic, please click the link at the top of the page titled "Notice on FedBizOpps". This link will bring you directly to the official Long Range Broad Agency Announcement (LRBAA). Detailed descriptions of the topics begin on page 6 of the LRBAA.

CBD.15 - CBD.15

For additional details on this topic, please click the link at the top of the page titled "Notice on FedBizOpps". This link will bring you directly to the official Long Range Broad Agency Announcement (LRBAA). Detailed descriptions of the topics begin on page 6 of the LRBAA.

CBD.16 - CBD.16

For additional details on this topic, please click the link at the top of the page titled "Notice on FedBizOpps". This link will bring you directly to the official Long Range Broad Agency Announcement (LRBAA). Detailed descriptions of the topics begin on page 6 of the LRBAA.

FRG.02 - FRG.02

Public Alerts and Warnings: Develops, evaluates, and establishes processes for the development of alert and warning systems to transfer a message from its origination point through the Federal government to the public on various devices. Tests and evaluates for development of a national capability to deliver relevant, timely, effective and targeted alert messages to mobile devices. Develops guidance to inform and engage the emergency response community in smart practices for utilizing social media capabilities, particularly on mobile devices, to alert and warn the public.

FRG.03 - FRG.03

Public Response to Alerts and Warnings: Research and development, as part of the Commercial Mobile Alert Service (CMAS) research, development, testing and evaluation (RDT&E) program to better understand how the public will respond to alert and warning messages on mobile devices. This research is intended to improve understanding of public response in order to allow for better crafting and sending of messages to the American public. Improved understanding of the public's response to CMAS messages should take into account the effect of geo-targeting and the 90-character limit proposed by the Commercial Mobile Service Alert Advisory Committee (CMSAAC) and supported by the Federal Communications Commission (FCC). The CMAS RDT&E Program is particularly interested in several areas, including: 1) Information Diffusion: Understanding how information diffuses and spreads across networks, technology platforms, and through both at-risk and general populations before, during, and after an CMAS message is issued, and understanding what effect this information has on public response to mobile alerts and warnings; 2) Public Response to CMAS Initiation: Understanding how the public responds to the introduction of a new mobile alert and warning system as part of the broader portfolio of early warning tools, how public awareness of CMAS and privacy concerns could impact response to alerts; 3) Message Content: Identifying what information must be included in a CMAS message to elicit the desired public response given the current 90 character limit, as well as how to incorporate potential future features, such as additional characters, maps, or hyperlinks; and 4) Message Frequency, Follow-up, and Source: Understanding how the public responds to information they receive from both official and unofficial information sources, and the implications of how often CMAS messages are sent and updated for the purpose of providing appropriate follow-up information.

FRG.04 - FRG.04

Diverse Populations: Research and development, as part of the Commercial Mobile Alert Service (CMAS) research, development, testing and evaluation (RDT&E) program, to better understand how to ensure the same timely and effective access to alerts and warnings for diverse populations. Diverse population groups include persons with access or functional needs, transients/tourists, elderly/older adults, isolated/rural populations, institutional populations, and non-English speaking (or English as a second language) populations. The CMAS RDT&E Program is interested in understanding and improving how different population groups are affected and served by mobile alerts and warnings and how message indicators, including vibration, cadence, tone, and display, can improve how population segments receive and interpret CMAS messages.

FRG.05 - FRG.05

Geo-targeting: Research, evaluation, and development of innovations in dynamic geo-targeting of CMAS messages, as part of the Commercial Mobile Alert Service (CMAS) research, development, testing, and evaluation (RDT&E) program, to enhance the capability of CMAS to reach intended recipients based on geographic location and proximity to an incident. The CMAS RDT&E Program is particularly interested in several research and development areas including: 1) Geo-Targeting in Border Areas: Understanding the possibility and effects of bleed-over of CMAS messages across city, county, state, and international jurisdictions and mitigating these effects through improved CMAS capabilities or other methods; 2) Geo-Targeting Granularity: Identifying and better understanding scenarios in which county or sub-county level (i.e., below the county level as currently implemented) geo-targeting is appropriate as well as how broadly to geo-target CMAS alert messages from the point of incident; 3) Public Response Considerations Specific to Geo-Targeting: Understanding how the public responds to messages targeted at different levels of granularity and geographic areas (e.g., public knowledge of the area targeted for a message); 4) Alternative Technologies to Improve Current and Future Geo-Targeting Capabilities: Improving current and future geographic targeting of CMAS messages, including technologies that could enhance Cell Broadcast's capabilities such as locations-based services, geo-fencing, GPS, Wi-Fi identification, tower triangulation, or phone-based applications. Other areas for consideration include addressing messages across boundaries between targeted regions, differing coverage areas across multiple mobile carrier networks, the challenges of in-building geographies such as airports, and other enhancements to improve the geo-targeting of mobile alerts and warnings.

FRG.06 - FRG.06

Alerts and Warnings in Social Media Guidance: Definition of requirements and facilitation of effective use of social media and public participation in origination and dissemination of alerts and warnings. This includes research and testing in the areas of standardization, aggregation and analysis, behavioral response, best practices, and privacy.

FRG.07 - FRG.07

Emergency Medical Services (EMS) Color Requirements for Compressed Video: Gather EMS color requirements for compressed video. More than in other public safety applications, video used for EMS applications must retain color truth throughout the video system. Any impairment of color information during the recording, transfer, and/or display of video could be life-threatening as the color of blood and skin is often used to make critical diagnoses. In particular, the transmission of video over mobile networks (e.g. from an ambulance in route) is problematic because of the compression which must be applied to the video stream in order to transmit it over the limited available wireless bandwidth.

FRG.08 - FRG.08

Video Quality Assessment for Recognition Tasks: Perform a video quality assessment for recognition task-based video. Recognition task-based video includes any applications in which users are concerned with the ability to recognize areas of interest in the video stream to specified levels of discrimination. Subjective experiments must be performed to develop accurate objective measurements for video quality assessment. The recognition can be either by human viewers or through automatic recognition systems. The recognition tasks could consist of fire detection, people counting, human monitoring, gait recognition, objective resolution measurements, object recognition, detecting objects and vehicles, characters, parking systems, license plate recognition, facial recognition, etc. The purpose is to advance the field of video quality assessment through the collaborative development of performance specifications and standards for task-based video.

FRG.09 - FRG.09

Simulation Testbed for Transport Components' Performance Analysis in a Video System: Design a simulation testbed for analyzing the transport components' performance in a video system. The testbed would be validated by using different types of cameras to identify the limits of camera use for streaming video (with or without compression) on a given network. The research result would be a web tool (or Application Programming Interface) that illustrates the use of a simulated testbed to define network bandwidth requirements for a video system.

FRG.10 - FRG.10

Conformance testing tools for Project 25 (P25) interfaces: Develop a commercially available conformance test tool for the P25 Common Air Interface (CAI). The tool needs to incorporate all of the P25 Compliance Assessment Program selected tests for the CAI including conventional and trunked operations for both subscriber units and base station/repeaters. The tool should incorporate a self-assessment capability to ensure proper operation, and should generate detailed reports.

FRG.11 - FRG.11

Information Sharing Across the Homeland Security Enterprise: Develops, evaluates, and establishes methodologies, processes, and systems for the integration of existing information sharing frameworks and technologies to enable situational awareness, collaboration, and decision support at the local, State, tribal, territorial, and Federal levels. This includes capability gap identification, requirements gathering, prototype capability development and piloting/demonstrations, and creation and establishment of best practices.

FRG.12 - FRG.12

Readily accessible, high-fidelity simulation tools to support training in incident management and response. Improvements in this Capability can: (1) Enable the simulation of complex operations in a cost effective manner; (2) Leverage technological adeptness of many responders; (3) Allow training to take place away from traditional fixed facilities; (4) Allow training on operational and realistic practices and equipment; (5) Enable cross-jurisdictional or cross-discipline training. Capability Requirements: (1) Platform commensurate with commercial video game quality and style. (2) The ability to accommodate many geographically disparate users.

FRG.13 - FRG.13

Protective clothing and equipment for all first responders that protects against multiple hazards. Improvements in this Capability can: (1) Ensure that PPE designed to protect for the hazards of greatest likelihood.; (2) Enable responder awareness of incident hazards at a large scale incident that require protection from multiple threats. (3) Allow the integration of all-hazards protection into everyday (or "station keeping") clothes. Capability Requirements: (1) Standards for multi-hazard PPE across all responder disciplines; (2) Affordable and effective multi-hazard PPE for all disciplines.

FRG.15 - FRG.15

The ability to remotely monitor the tactical actions and progress of all responders involved in the incident in real time. Improvements in this Capability can: (1) Enable monitoring of essential tactical actions across a wide area.; (2) Enable incident commanders to monitor actions and progress to ensure that resource allocation and mission assignments are adjusted in real-time to meet the requirements of the particular incident. Capability Requirements: (1) Systems and tools to monitor responder actions and progress; (2) Training and SOP's to integrate monitoring systems in operations.

FRG.16 - FRG.16

The ability to communicate with responders in any environmental conditions (including through barriers, inside buildings, and underground). Improvements in this Capability can: (1) Allow for the ability for existing land mobile radio technologies to communicate with broadband technologies; (2) Enable mission critical voice communications over broadband networks; (3) Provide advances in range, penetration, and clarity to enable effective voice communications in all incident conditions. Capability Requirements: (1) Compliance with standards for voice, video, and data communications across all responder disciplines; (2) Affordable and effective voice, video, and data communication solutions for all responder disciplines.

HFD.01 - HFD.01

Human Factors/Behavioral Sciences applies the social and behavioral sciences to improve detection, analysis, and understanding of threats posed by individuals, groups, and radical movements; develops novel technologies and tools to improve the recognition of individuals; supports the preparedness, response, and recovery of communities impacted by catastrophic events including support for first responders; and advances national security by integrating human factors and public perceptions data into homeland security technologies.

HFD.02 - HFD.02

Behavior-based methods, models and technologies to enhance community resilience in the face of human- or nature-caused catastrophes through such means as better understanding of risk perception, improved risk communication by emergency responders and public officials, programs of pre-event education and training and applied theoretical and empirical research into the properties of resilient social networks and communities, including more effective ways of mapping and linking emergency response, longer term recovery teams and other organizations within and across the public, faith-based, NGO and private commercial sectors.

HFD.03 - HFD.03

For additional details on this topic, please click the link at the top of the page titled "Notice on FedBizOpps". This link will bring you directly to the official Long Range Broad Agency Announcement (LRBAA). Detailed descriptions of the topics begin on page 6 of the LRBAA.

HFD.04 - HFD.04

For additional details on this topic, please click the link at the top of the page titled "Notice on FedBizOpps". This link will bring you directly to the official Long Range Broad Agency Announcement (LRBAA). Detailed descriptions of the topics begin on page 6 of the LRBAA.

HFD.05 - HFD.05

For additional details on this topic, please click the link at the top of the page titled "Notice on FedBizOpps". This link will bring you directly to the official Long Range Broad Agency Announcement (LRBAA). Detailed descriptions of the topics begin on page 6 of the LRBAA.

HFD.06 - HFD.06

For additional details on this topic, please click the link at the top of the page titled "Notice on FedBizOpps". This link will bring you directly to the official Long Range Broad Agency Announcement (LRBAA). Detailed descriptions of the topics begin on page 6 of the LRBAA.

HFD.07 - HFD.07

For additional details on this topic, please click the link at the top of the page titled "Notice on FedBizOpps". This link will bring you directly to the official Long Range Broad Agency Announcement (LRBAA). Detailed descriptions of the topics begin on page 6 of the LRBAA.

HFD.08 - HFD.08

For additional details on this topic, please click the link at the top of the page titled "Notice on FedBizOpps". This link will bring you directly to the official Long Range Broad Agency Announcement (LRBAA). Detailed descriptions of the topics begin on page 6 of the LRBAA.

HFD.09 - HFD.09

For additional details on this topic, please click the link at the top of the page titled "Notice on FedBizOpps". This link will bring you directly to the official Long Range Broad Agency Announcement (LRBAA). Detailed descriptions of the topics begin on page 6 of the LRBAA.

IDD.01 - IDD.01

For additional details on this topic, please click the link at the top of the page titled "Notice on FedBizOpps". This link will bring you directly to the official Long Range Broad Agency Announcement (LRBAA). Detailed descriptions of the topics begin on page 6 of the LRBAA.

IDD.02 - IDD.02

For additional details on this topic, please click the link at the top of the page titled "Notice on FedBizOpps". This link will bring you directly to the official Long Range Broad Agency Announcement (LRBAA). Detailed descriptions of the topics begin on page 6 of the LRBAA.

IDD.03 - IDD.03

For additional details on this topic, please click the link at the top of the page titled "Notice on FedBizOpps". This link will bring you directly to the official Long Range Broad Agency Announcement (LRBAA). Detailed descriptions of the topics begin on page 6 of the LRBAA.

IDD.04 - IDD.04

For additional details on this topic, please click the link at the top of the page titled "Notice on FedBizOpps". This link will bring you directly to the official Long Range Broad Agency Announcement (LRBAA). Detailed descriptions of the topics begin on page 6 of the LRBAA.

IDD.05 - IDD.05

For additional details on this topic, please click the link at the top of the page titled "Notice on FedBizOpps". This link will bring you directly to the official Long Range Broad Agency Announcement (LRBAA). Detailed descriptions of the topics begin on page 6 of the LRBAA.

IDD.06 - IDD.06

For additional details on this topic, please click the link at the top of the page titled "Notice on FedBizOpps". This link will bring you directly to the official Long Range Broad Agency Announcement (LRBAA). Detailed descriptions of the topics begin on page 6 of the LRBAA.

IDD.07 - IDD.07

For additional details on this topic, please click the link at the top of the page titled "Notice on FedBizOpps". This link will bring you directly to the official Long Range Broad Agency Announcement (LRBAA). Detailed descriptions of the topics begin on page 6 of the LRBAA.

IDD.08.1 - IDD.08.1

For additional details on this topic, please click the link at the top of the page titled "Notice on FedBizOpps". This link will bring you directly to the official Long Range Broad Agency Announcement (LRBAA). Detailed descriptions of the topics begin on page 6 of the LRBAA.

IDD.08.2 - IDD.08.2

For additional details on this topic, please click the link at the top of the page titled "Notice on FedBizOpps". This link will bring you directly to the official Long Range Broad Agency Announcement (LRBAA). Detailed descriptions of the topics begin on page 6 of the LRBAA.

IDD.09 - IDD.09

For additional details on this topic, please click the link at the top of the page titled "Notice on FedBizOpps". This link will bring you directly to the official Long Range Broad Agency Announcement (LRBAA). Detailed descriptions of the topics begin on page 6 of the LRBAA.

IDD.10 - IDD.10

For additional details on this topic, please click the link at the top of the page titled "Notice on FedBizOpps". This link will bring you directly to the official Long Range Broad Agency Announcement (LRBAA). Detailed descriptions of the topics begin on page 6 of the LRBAA.

Key Dates
Solicitation Open Date:
01/26/2012
White Paper Registration Deadline:
12/31/2013 11:59 PM ET
White Paper Submission Deadline:
12/31/2013 11:59 PM ET
Submission Deadline:
See Notice on FedBizOpps


Amendments and Q&As
amendment icon Amendment # 8
Posted Date 8/15/13

amendment icon Amendment # 7
Posted Date 8/15/13

amendment icon Amendment # 6
Posted Date 6/21/13

amendment icon Amendment # 5
Posted Date 6/21/13

amendment icon Amendment # 4
Posted Date 12/21/12

amendment icon Amendment # 3
Posted Date 5/1/12

amendment icon Amendment # 2
Posted Date 4/3/12

amendment icon Amendment # 1
Posted Date 1/26/12



Back to Past Solicitations List