On March 26, the United States Special Operations Command (USSOCOM) posted a sources sought notice for an Identity Intelligence Operations (I2O) Facility. Responses are due by 4:00 p.m. Eastern on April 9.
The objective of this contract is to provide a facility to support I2O services which include a forensic laboratory, forensic software developers, and a 24/7 data production floor. This task applies to the Intelligence Directorate and Headquarters United States Special Operations Command (USSOCOM).
This contract complements and must work in concert with five existing SOCOM contracts: (1) SOFEX for biometric and identity intelligence support
(2) TECHEX development and reporting
(3) DOMEX for forensic examination of documents and media
(4) IOMs consisting of Field Service Representatives and Exploitation Analysis Centers supporting future deployments and current operations world-wide
(5) I2EC that produces near real-time analytic responses to request for information on biometric and identity intelligence operations to Special Operations Forces world-wide
This covers the facility to support the USSOCOM enterprise, specifically to identity intelligence (i2)-related applications and subject areas as directed by the government. The contractor shall focus on providing a facility to meet the demands of the complete Identity Intelligence Operations and Exploitation Program.
The facility will be a large mission of implementing parts of an integrated suite of USSOCOM enterprise applications to include Non-Secure Internet Protocol Router Network (NIPRNet), Secret Internet Protocol Router Network (SIPRNet), the Joint Worldwide Intelligence Communications System (JWICS), the battlefield information collection & exploitation system (BICES/SOFEX.com/SOFEX-S managed-cloud service instances.
Additionally, the facility must provide architecture for KENNELNET (Dirty Network), a dedicated commercial network and an eventual mobile data environment. The contractor shall perform risk assessment and risk mitigation as part of their normal processes, integrated into their overall contract management strategy. Such risk management activities shall conform to standard and consistent technical and managerial practices and methods, subject to government approval.
Review the USSOCOM I2O sources sought.
Source: SAM
IC News brings you business opportunities like this one each week. If you find value in our work, please consider supporting IC News with a subscription.