Accessibility Information

Users of assistive technologies such as screen readers should use the following link to activate Accessibility Mode before continuing: Learn more and Activate accessibility mode.


Solicitation Number: BAAJIEDDO-09-01
Location: Joint Improvised Explosive Device (IED) Organization
  • Print


There have been modifications to this notice. To view the most recent modification/amendment, click here
Added: Feb 27, 2009 11:28 am Modified: Mar 03, 2009 2:26 pmTrack Changes

The Joint Improvised Explosives Device Defeat Organization (JIEDDO) Broad Agency Announcement (BAA), which is issued under the provisions of paragraph 6.102(d)(2) of the Federal Acquisition Regulation (FAR), provides the vehicle for the competitive selection of basic and applied research, and that part of development not related to the development of a specific system or hardware procurement. Contracts based on responses to this BAA are considered to be the result of full and open competition and in full compliance with the provisions of Public Law (PL) 98-369, “The Competition in Contracting Act of 1984.” As the issuing agency, JIEDDO will not issue paper copies of this announcement. Any proposal documents or other materials submitted in response to this BAA will not be returned. It is the policy of JIEDDO and its contracting agencies to treat all proposals as sensitive competitive information and to disclose their contents only for the purposes of evaluation.

Awards for submissions under this BAA are planned in Fiscal Years 2009 and 2010. However, funds may not be available for all requirements under this BAA. No contract awards will be made until appropriated funds are available from which payment for contract purposes can be made. JIEDDO reserves the right to select for award all, some, or none of the proposals in response to this BAA. JIEDDO will not provide funding for direct reimbursement of proposal development costs.

This BAA will remain open for no less than 180 days from the publication date. Proposals may be submitted at any time during that period. At the conclusion of that period, JIEDDO will either extend the submission deadline or publish a new BAA. See Section I for more detailed information.


JIEDDO will use a two-phased proposal selection process for this solicitation to minimize cost and effort of prospective offerors. Phase 1 will solicit and evaluate proposal quad charts and white papers. Section VII, below, provides detailed guidance on Phase 1 proposal preparation. Section VIII provides information on the Phase 1 evaluation process. Proposals found to have technical and operational merit during Phase 1 will be selected for Phase 2. Submitters will be contacted with specific instructions for Phase 2, which will consist of technical meetings as well as more detailed presentations and submissions to the JIEDDO acquisition management process. Subsequent to funding approval, full technical proposals may be requested.

HBCU/MI and Small Business Set Aside

The Government encourages nonprofit organizations, educational institutions, small businesses, small disadvantaged businesses (SDB), historically black colleges and universities (HBCU), minority institutions (MI), women-owned businesses, and historically underutilized business (HUB) zone enterprises as well as large businesses and Government agencies to submit proposals for consideration or to join others in submitting proposals. However, no portion of the BAA will be set-aside for these special entities because of the impracticality of reserving discrete or severable areas of research and development in any specific requirement area. The final determination will be made based on the relevance of the proposal to JIEDDO requirements, individual technical merits of the proposal, and budget constraints within the mission priorities. To ensure full consideration in these programs, registration in the BAA Information Delivery System (BIDS), described later in this document, requires the appropriate business type selection as well as accurate up-to-date information.

Limitation of Funds

The Government may incrementally fund contracts awarded from this BAA as provided by FAR 52.232-22, “Limitation of Funds.” Contracts awarded to proposals submitted under this BAA are anticipated to be 6 to 18 months in duration. To facilitate incremental funding, submissions shall include the cost and schedule by a task-phased structure organized by fiscal year (October through September) with clear exit criteria, and shall be inclusive of all work to complete the effort including any options. It is anticipated that the entire effort will be negotiated with the initial contract award.

Technical Evaluation Support

JIEDDO will use contractor support personnel in the review, evaluation, and administration of all submissions to this BAA. All individuals that have access to any proprietary data shall certify that they will not disclose any information pertaining to this solicitation including any submission, the identity of any submitters, or any other information relative to this BAA. They shall also certify that they have no financial interest in any submissions evaluated. Submissions and information received in response to this BAA constitute permission to disclose that information to certified evaluators under these conditions.


1. BAA Issuing Agency Name: JIEDDO

2. Contracting Agency Name: Any United States Government contracting organization may serve as the contracting agency for this BAA.

3. Sponsoring Agency Name: JIEDDO

4. Program Name: Rapid Development of Counter-IED Capabilities

5. Research Opportunity Number: BAA JIEDDO-09-01

6. Response Date: Offerors responding to this BAA may begin submitting responses on 28 February 2009. Final submissions for all proposals to this BAA are due by 1600 hours Eastern Standard Time on 28 August 2009.

7. Definitions:

a. An Improvised Explosive Device (IED) is defined as a device placed or fabricated in an improvised manner incorporating destructive, lethal, noxious, pyrotechnic, or incendiary chemicals and designed to destroy, incapacitate, harass, or distract. It may incorporate military supplies, but is normally devised from non-military components.

b. Counter-IED (C-IED) is defined as the collective efforts at all levels to defeat the IED system in order to reduce or eliminate the effects of all forms of IEDs used against friendly forces and non-combatants according to the mission. It includes offensive and defensive measures taken to predict, prevent, detect, neutralize, and mitigate the IED threat, as well as train our forces to counter it. It also includes operations to predict and prevent the IED network.

c. The PREDICT functional capability is the foretelling of activities associated with the IED manufacture and emplacement, to include: recruitment, information operations, financial transactions, transportation, manufacturing processes, and identification of the people associated with these activities.

d. The PREVENT functional capability is the targeting, interdiction, and elimination of enemy personnel (operators and bomb makers) and the associated infrastructure (facilities and supplies) that precludes employment of IEDs against military and civilian personnel.

e. The DETECT functional capability is the extraction of information from objects and activities associated with IEDs (fabrication, transportation, and employment) or components of IEDs and in sufficient time to achieve a favorable outcome.

f. The NEUTRALIZE functional capability is to provide the means to disable, disrupt or pre-detonate IEDs or their sub-components.

g. The MITIGATE functional capability is to lessen or minimize the severity of IED-related events through enhancement of protection. New capabilities will enhance the protection of military personnel vehicles by mitigating the blast effects of IEDs.

8. Description of Opportunity: The Department of Defense (DoD) solicits proposals for the development of innovative capabilities to defeat IEDs employed against U.S. and coalition forces anywhere in the world, but especially in Iraq and Afghanistan. JIEDDO is seeking innovative counter-IED capabilities that can be rapidly developed, demonstrated, and deployed within 12 to 24 months from award. However, JIEDDO is willing to entertain less mature systems with a potentially high payoff. Proposals must address one of the following five solicitation areas:

a) Detect, neutralize or mitigate person-borne IEDs (Section II).

b) Detect, neutralize or mitigate buried IEDs or pressure initiation devices (Section III).

c) Provide stand-off detection and confirmation of explosives or chemical compounds associated with explosives (Section IV).

d) Detect, neutralize or mitigate explosively formed penetrators (Section V).

e) Any additional technology, information, or recommendations that would enhance existing counter-IED systems.


The most important and difficult aspect of the person-borne IED (PBIED) detection problem is reliable, verifiable interrogation of all individuals in an unstructured crowd at a large public event (e.g. a crowded market square). JIEDDO is also interested in the more manageable problem of interrogation at controlled access points, with individuals queued up for interrogation by portal or other fixed-site technologies in a one-at-a-time scenario (e.g. an election polling station). However, it should be emphasized that this is a subset of the larger problem of the unstructured crowd, and does not represent a full solution. Queues represent targets of opportunity for bombers; therefore JIEDDO is primarily interested in solutions that address the crowd problem without requiring the cooperation or even knowledge of the individual being interrogated.

Due to the issues of occlusion, look angle, and the potentially large number of individuals present, no single sensor can provide adequate coverage. Therefore, JIEDDO would prefer a multi-sensor, system-of-systems approach in order to eliminate PBIEDs as a weapon system of strategic influence. However, single sensor solutions that provide a desired capability will also be considered.

Vendors’ counter-PBIED proposals should specifically address one or more of the following focus areas:

a) Multi-sensor architecture

(i) Proposals addressing multi-sensor architectures should describe a software network backbone which: enables straight-forward addition of new sensors and computing resources to the system; is capable of auto-discovery of those sensors and computing resources; assigns computational tasks to available computing resources.

(ii) Software developer kit (SDK): Proposals addressing multi-sensor architectures should include a SDK to allow plug-and-play addition of sensors by enabling sensor developers to rapidly complete a software control interface for new sensors.

(iii) Proposed solutions should provide a graphical user interface (GUI) which enables command, control, and interface with sensors, computing resources, communications systems, operators and interdictors, as well as intelligent, simultaneous display of multiple sensor inputs and threat status for system area of coverage.

b) Single- and multi-sensor algorithms for aided or automated threat detection

(i) Proposals addressing detection algorithms should describe methods for exploiting sensor data to extract threat features in an automated or operator-aided fashion. Reduction of the operators’ decision cycle is of primary importance.

(ii) Solutions may include single- and multi-sensor detection techniques, and therefore should also address combined use of disparate sensor data to enhance probability of detection (Pd) and minimize false alarm rate (FAR).

(iii) Proposed solutions should address data transformation for multi-sensor algorithms. For example, imagery captured by sensors at different look angles to the individual being interrogated need to be transformed to correct for parallax and perspective differences to enable direct image comparison.

c) Personnel tracking software and sensors

(i) Proposals addressing personnel tracking software and sensors should describe sensors to be used, and software for location and tracking of individuals in the area of coverage.

(ii) Algorithms to enable situational awareness and tracking of all individuals in the area of coverage as well as hand off of individuals’ tracks from one sensor to another.

(iii) Video analytics software for analysis and prediction of individuals’ behavior and detection of suspicious inanimate objects, e.g., bags, backpacks, and boxes left by individuals.

d) Threat-detection sensor technologies

(i) Metal detection sensors

(ii) Active or passive, imaging or non-imaging, millimeter wave (MMW) and terahertz (THz). Preference will be given to those proposed sensor technologies which operate in the 10-1200 GHz (0.01 to 1.2 THz) frequency range where clothing transmissivity is significant.

(iii) Active or passive, imaging or non-imaging, infrared (IR) sensors

(iv) Electronics sensors for non-linear junction (diode) detection

Vendors’ counter-PBIED proposals should specifically address their methodology to provide early stand-off detection of potential suicide attackers without providing undue alert to the attacker. Where appropriate, the detection proposal should include:

a) Description of key detection signatures or observables, and why the vendor believes those key signatures to be unique and reliable. In all cases, information or empirical data on solution’s dependence upon environmental conditions and clothing types will greatly assist JIEDDO in assessing the value of proposed solutions.

b) Description of potential false alarm sources especially in high-clutter environments and how those false alarm sources will be mitigated.

c) Description of expected probability of detection and false alarm rate, and their dependence upon range, environmental conditions and variations due to the body types of those being interrogated. For existing technologies, proposers are encouraged to provide test data in support of the expected performance of the proposed detection system.

d) A clear statement of the current and end-state technical maturity of the primary detection methods.

Vendors should address interoperability, collateral effects, and any other issue relevant to the integration of the proposed system into a military operating environment.


Detection of Buried IEDs

Buried IEDs are emplaced underground with the intent to detonate beneath vehicles and personnel. They are used on roadways, thoroughfares and choke points where intended victims are likely to pass over them. Emplacements vary widely, but burial depth often corresponds with the net explosive weight of the device (i.e. larger devices can be placed more deeply). Devices are frequently emplaced in locations that provide little visual evidence of their burial, such as previously existing or repaired holes and culverts.

Initiation devices for buried IEDs vary, but the most common are pressure switches and command wires. Pressure switches close a contact when compressed under a wheel or foot and may be armed by command wire or RC device.

Detecting buried IEDs is a significant challenge. JIEDDO’s investments to meet this challenge will encompass technologies intended to directly detect the device in situ and technologies intended to detect signs of emplacement, either by coherent change detection or by identifying the characteristic signatures of disturbed earth and other artifacts. System platforms may include ground vehicles as well as manned and unmanned aircraft.

Detection of a buried IED from a ground vehicle must be completed before the vehicle enters the blast area or detonates the device. The minimum safe detection range (stand-off distance) will vary with the type of operation being performed by the vehicle. Explosive ordnance disposal (EOD) operations are performed when a possible IED location has already been identified. The EOD team interrogates the location to confirm the presence of an IED and removes or disables it. EOD teams can loiter at the threat location for an extended period. They may direct a detection system at the likely IED, potentially on a robot or interrogation arm. EOD operations require that a system have a high probability of detection (Pd), but the detection range can be short and determination of a threat can be left to the operator.

Route Clearance operations are intended to find and remove threats on frequently travelled routes. While advancing along the route, the route clearance team can direct its full attention to discovering threats, and may proceed at a slow pace near likely threat locations. Detection systems intended for route clearance require that threats be automatically nominated with high Pd in time for the operator to stop, and that the false alarm rate (FAR) be low enough to permit reasonable forward progress as determined by the mission and operators.

Tactical and convoy operations require higher speeds and demand more of the operator’s attention, so a detection system will need to automatically find and identify threats independent of the operator at a distance that accommodates the vehicle speed. Tactical and convoy scenarios may require a forward looking or closely linked airborne system. A lower Pd may be tolerated.

Detection of Buried IEDs from air platforms benefits all ground forces regardless of mission, but success of an airborne system depends on meeting the size, weight and power requirements of the proposed platform, availability of the platform, rapid communication of IED nominations to ground forces, and viability of the required search CONOPs.

JIEDDO’s near term goal is to provide buried IED detection capability that is effective in EOD and route clearance scenarios in both theaters. Our ultimate goal is to provide buried IED detection capabilities that are effective in convoy and tactical scenarios. To accomplish our goals, JIEDDO will field a suite of systems that can provide buried IED detection capability to units in most operational scenarios.

The technical issues associated with the various operational profiles are different, and solutions that address any part of the problem will be pursued. All viable solutions will exploit signatures that are robust, distinct and persistent. The technical challenges include:

• Penetration through air, pavement, and soil

• Identification of target signatures in clutter (natural or man-made)

• Identification of a wide variety of targets, including non metallic

• Automated threat classification

• Variations in sensor perspective and environment on consecutive searches

• Timely and clear communication of target location to ground forces

• Interoperability of sensor systems with other systems used in the operating environment

• Mitigation of collateral effects on friendly forces, civilians, and electronic infrastructure

Detection of Pressure Initiation Devices

Pressure initiators are often associated with buried IEDs emplaced on roadways, traffic choke points and other thoroughfares. Common pressure actuators are fabricated from lightweight metal components and buried under thin overburden in the path of an intended victim. Although they can be fabricated from most any metal component, they commonly use items like saw blades, dual conductor wires and commercial pressure switches. Technical approaches should address situations where the metal content of the actuator is deliberately minimized. Other components associated with pressure switches include batteries, command arming wires and radio control arming devices.

Although detection of pressure initiation devices and detection of buried IEDs are different capabilities, frequent association of the devices in theater and similarities in detection technologies necessitate a strategy that encompasses both.

JIEDDO must field systems to detect pressure plates in a variety of operational circumstances. For route clearance and EOD operations, a high Pd is required, but a slower rate of advance may be tolerated. For operations that require higher speeds, a forward looking or closely linked airborne system may be required, and a lower Pd may be tolerated.

The technical challenges include:

• Identification of targets in clutter (natural or man-made)

• Identification of a wide variety of targets

• Automated threat identification and classification

• Mitigation of collateral effects on friendly forces, civilians, and electronic infrastructure

• Interoperability of sensor systems with other systems used in the operating environment


Stand-off explosives detection is different and more challenging than stand-off explosives confirmation. Explosives detection is defined as the ability to find explosives associated with a threat when there is no prior evidence of the presence of a target material or other cueing indicator. Explosives confirmation is the ability to determine the composition of a material at a suspicious location. Stand-off means that the explosives detection and confirmation should be performed at a distance far enough away from the suspect device that the operator or valued assets are protected should the device detonate. The specific stand-off distance will vary depending on the specific scenario, but the main objective is to develop the capability to interrogate rapidly and accurately from a safe distance. In terms of the JIEDDO mission, the most challenging aspects of this problem are the requirements to have a high probability of detection and a low probability of false alarms at relatively large stand-off distances in an environment that is contaminated with explosives.

Stand-off detection of explosives is challenging. A key consideration to meeting this capability gap is that stand-off explosives detection is required for a wide variety of situations, including but not limited to personnel and vehicle borne IEDs in complex environments such as marketplaces, buried or hidden IEDs, and assembly and production facilities. Ideal solutions should encompass detection of all potential explosives, both in the detection and confirmation mode. However, the following categories are of particular interest: bulk home-made explosives, and enclosed or hidden military grade explosives

Stand-off confirmation of explosives is not a standalone capability. Cueing from another system or an observable is usually required. In this context, cueing involves indicators that an explosive threat may be present and the need to perform stand-off explosives confirmation. In general, this capability should provide wide area scanning capability and a preliminary indication of where the confirmation sensor should interrogate. Cueing may be from the explosive itself, or other indicators (e.g. disturbed earth, etc.).

Comprehensive solutions to address the stand-off explosives confirmation gap should include consideration of the following components:

• Sampling protocol: when, where, and how often to interrogate in order to confirm the presence of an explosive threat.

• Discrimination: the ability to link the presence of a chemical species to the presence of an explosive threat

• Selectivity and sensitivity: the ability to detect the presence of an explosive threat in an environment already contaminated with explosives

As stand-off explosives detection and confirmation advances as a capability there will be a continuing need to increase the speed, accuracy, and automation of the detection process. Solutions could include:

• Improved algorithms:

•Aided or automated detection

•Cooperative use of multiple sensors and data cueing

• Hardware improvements:

•Increased range

•Increased resolution and selectivity

•Reduced size, up to and including handheld sensors for dismounted operations

• Novel approaches using new technologies. Examples include, but are not limited to:

•Capacitance Trans-Impedance Array (CTIA) detector based technologies

•Nanotechnology-based sensors that show promise for more sensitive IR and laser systems

•Effective sensors that are small, inexpensive and could be used for wide area surveillance by dispersal over an area of interest may be useful, but sensing of this type has the potential for unintended consequences such as environmental contamination, health effects, or other unforeseen outcomes that must be addressed.


An explosively formed penetrator (EFP) is a class of IED designed to fire a shaped warhead that effectively penetrates armor at stand-off distances. An EFP system has four major components:

a) Arming Switch. This component arms or disarms the EFP. More sophisticated EFPs use a radio-controlled (RC) device (e.g. cell phone or long range cordless telephone) to transmit a control signal.

b) Trigger Switch. This component triggers the explosive device. More sophisticated EFPs use a victim operated trigger. Less sophisticated EFPs use command operated trigger.

c) Explosive Device. The explosive device consists of four elements: a concave metal liner (the penetrator), case, base plate, and explosive charge (propellant). The case is generally cylindrical and fabricated from commonly available materials (e.g. PVC pipe, steel pipe, etc.). The forward end of the case is closed by a concave copper or steel disk-shaped liner, which forms the penetrator. Generally military grade explosives are loaded behind the metal liner to fill the casing. A blasting cap initiator is placed though a hole in the base plate. The penetrator can reach speeds well over one kilometer per second with kinetic energy on the order of mega joules, depending on the design and type of explosive used.

d) Camouflage. This component conceals the EFP system.

JIEDDO’s requirement is to detect an EFP system from a moving vehicle while performing route clearance operations. Detection of the EFP must occur in time to provide a safe stand-off-distance for the vehicle’s crew to react. JIEDDO’s goal is to detect multiple EFP components to increase the probability of detection and reduce the false alarm rate.

To meet these goals, JIEDDO is looking for:

• Solutions that detect exploitable features on more than one of the EFP components.

• Phenomenology studies that identify exploitable features for detecting the EFP System. A list of previous phenomenology studies is available in the JIEDDO reading room.

JIEDDO is interested in technologies that can:

• Detect or neutralize arming switches, focusing on RC devices and the associated electronics

• Detect or neutralize triggering switches and the associated electronics

• Detect the EFP explosive device using radar techniques

• Detect the EFP explosive device using acoustic techniques

• Detect the wires associated with a command wire triggered EFP

• Concurrently detect and defeat EFP as a weapon

To enhance the detection of the EFP system, solutions should combine multiple detection and interrogation techniques on EFP components to increase the probability of detection and reduce the false alarm rate.


Offerors possessing any additional technology, information, or recommendations that would enhance the detection, identification, or defeat of IEDs or their supporting manufacturing, transportation, emplacement or personnel networks are also encouraged to submit proposals to this BAA.

Identify what aspects of the IED problem as a weapon system of strategic influence your proposal addresses and how your proposed solution would mitigate the effectiveness of the IED weapon system.

Ensure your proposal otherwise follows the preparation instructions listed in Section VII of this document.


This section provides information and instructions for the preparation and submission of all proposals under this BAA. All submissions must meet these requirements including format, content, and structure, and must include all specified information to avoid disqualification, submission rejection, or delays in evaluation.

1. Submission Process: All proposals must be submitted electronically to the BAA Information Delivery System (BIDS) website at: This secure website is used to collect all unclassified proposals, and to collect placeholder records for classified submissions. DO NOT UPLOAD CLASSIFIED DOCUMENTS TO THE BIDS WEBSITE; see paragraph 10 below for instructions on classified submissions. BIDS also provides submission progress tracking, evaluation comment collection, and results notification back to the submitter.

2. The BIDS web site will not allow proposals to be uploaded or modified, or classified placeholders to be entered, after the closing date and time. Any proposal submitted by any other means, or that is late will not be considered by the government.

3. Submitter Registration: Submitters must register on the BIDS website to respond to this BAA. Existing BIDS accounts are acceptable for a new BAA; offerors should make sure that the company contact information is current. A unique username is created by the offeror and is used for BIDS login and submission tracking. Registration acceptance for submitters is automatic, but takes several seconds to be recognized by BIDS. A success email will be sent to indicate that the username and account were accepted. BIDS is email dependent and uses the registration email as the single point of contact for all notifications associated with the BAA. It is very important to keep BIDS registration contact information updated, especially contact e-mail address, since all BIDS notifications will be sent via e-mail to that address.

4. User Accounts and Password Resets: Registration account information such as the point of contact (POC), e-mail, and password can be updated after login. The “Forgot My Password” link on the BIDS homepage allows registered users with a valid e-mail address to automatically reset a password. The system will verify the account name and e-mail to send a new password to that e-mail.

5. Registration and Account Help: BIDS help requests can be emailed to the BIDS administrator at the “Help Request” link located on the BIDS homepage.

6. BIDS Security and Access Control: All data uploaded to BIDS is secure from public viewing. All submissions will be considered proprietary and source selection sensitive, and protected accordingly. The documents can only be reviewed by the registrant and authorized Government and contractor representatives with no conflict of interest. (See paragraph 10 below for instructions on classified submissions).

7. Proposal Format: It is mandatory that offers provide both a quad chart and white paper that meet the format requirements provided below. Acceptable file formats are Microsoft Word, Microsoft PowerPoint and Adobe Acrobat.

a) Quad Chart Content: A quad chart conveys the essence of the proposed solution on a single page. When preparing a submission, the offeror shall ensure that the specific criteria of the requirement are addressed, the solution is clear, and can be accomplished with the proposed technology, cost, and schedule. The quad chart includes a document header and four quadrants. The quad chart format and sample are provided at the BIDS website under “Reference Materials”.

i) Header information shall include the BAA announcement number and the proposal title. The date and company name should be included along with the appropriate document markings.

ii) The top left quadrant is a graphical depiction, photograph, or artist’s concept of the proposed solution or prototype. Include labels or brief descriptive text as needed for clarification. Ideally, this will convey the system concept, use, capability, and any relevant size or weight.

iii) The top right quadrant contains a summary of operational and performance capabilities.

iv) The bottom left quadrant contains a summary of the technical approach. Specifically, describe the technology involved, how it will be used to solve the problem, actions done to date, and any related on-going efforts. Briefly describe the tasks to be performed for each phase if applicable. Bullet lists are acceptable.

v) The bottom right quadrant contains the rough order of magnitude (ROM) cost, schedule, products and deliverables, and corporate contact information. The ROM and schedule shall be proposed in phases, and include the cost, period of performance (POP), and exit criteria for each phase. A total cost and POP that combines all phases shall also be included. Products and deliverables shall include, by phase, a list of all prototype hardware and software. Corporate contact information shall include the submitter’s company name, point of contact, phone number, and e-mail address. Include any significant teaming partner (contact information) relevant to the evaluation. Note that the contact information in the BIDS registration is used for all notices and contact purposes.

b) White Paper Content: Offerors shall prepare and upload a white paper detailing their proposed technical approach, schedule in phases, and ROM costs. Proposals are evaluated by a technical panel of subject matter experts (i.e. scientists and engineers with advance degrees in the subject area), as well as experienced operational personnel. The technical approach and concept of operations should be written with sufficient detail for the panel to make an informed decision. If available, a summary of modeling and simulation or test data should be provided to confirm performance claims. The white paper shall be no more than 12 pages plus a cover page; each page shall be 8 ½ by 11 inches with one inch margins. The text shall be double-spaced with fonts no smaller than 10 point. Each page of the submission shall contain the document identifier in the header. If the white paper contains more than 12 pages including tables, charts, and figures only the first 12 pages will be evaluated.

8. Status and Inquiries: Inquiries by phone concerning the submission status will not be accepted. Submitters can check the status of their submissions at the BIDS website under “My Submissions.” All submission will complete the Phase 1 evaluation process; the steps of that process correspond to the following BIDS website status levels:

a) Level 1: Initial Technical Reviews.

b) Level 2: Technical Evaluation Panel.

c) Level 3: Internal coordination and staffing of panel recommendation.

d) Level 4: Management review of panel recommendation.

e) Level 5: Vice Director approval of panel recommendation and release of notification to offeror.

9. Notification to Offeror: The Government will notify the offeror by email when their submission has completed Phase 1 evaluation.

10. Classified Proposal Submission Instructions: DO NOT UPLOAD CLASSIFIED DOCUMENTS TO THE BIDS WEBSITE. For any proposal related to current or previously funded Government work, the offeror should submit the proposal to the sponsor for classification review prior to submission to BIDS. If any submission contains classified information, the offeror shall upload an unclassified placeholder document in BIDS, and identify in the comments section of the submission record that the submittal cannot be uploaded due to classification. Classified proposals shall then be mailed or delivered to the following address:

Polk Building

2521 South Clarke Street

Suite 1900


Arlington, VA 22202

The BIDS document identifier must be clearly identified on the mailed submittal. Classified proposals (up to SECRET) must be appropriately and clearly marked (including all paragraphs and pages containing the subject data), packaged, and shipped in accordance with classified material handling procedures and security regulations pertaining to the level of classification.

11. Intellectual Property, Technical Data and Software: All anticipated intellectual property, technical data or software rights shall be disclosed.

12. Patents and Patent Applications: Identify any existing, applied for, or pending patents that will be used in the conduct of this effort. Provide patent number or application number and title. If no patents or patent applications are relevant; so state.

13. Identify any technical data and/or computer software that will be delivered with less than unlimited rights as prescribed in DFARS 252.227-7017 and DFARS 252.227-7028. If unlimited rights in technical data are proposed, state this.

14. Central Contract Registration (CCR): Prospective contractors must be registered in the DoD CCR database prior to award of an agreement. By submitting an offer to this BAA, the offeror acknowledges the requirement that they must be registered in the CCR database prior to award, during performance, and through final payment of any agreement resulting from this BAA. The CCR may be accessed at Assistance with registration is available by phone at 1-888-227-2423.


1. Proposals are evaluated as they are received, not at the conclusion of the BAA submission deadline. Upon receipt, proposals receive an administrative review for compliance with BAA Section VII, above, followed by an initial technical review. Proposals are then evaluated by the technical evaluation panel, which normally meets on a monthly basis. Proposals are not evaluated against each other. After any necessary staff coordination, a recommendation to either accept or reject the proposal for Phase 2 is staffed to the JIEDDO Vice Director for approval.

2. Technical review panels will use the following selection criteria, in descending order of importance, when conducting proposal evaluations:

a) Addresses one of the JIEDDO C-IED requirements published in this BAA.

b) Overall scientific and technical merits; to include potential for successful performance of intended functions in an actual operational environment. Proposals exhibiting technical or scientific innovation to solve a requirement are desired and, in such instances, a higher than average risk of initial failure may be allowable.

c) The proposed solution provides a significant enhancement in operational capability compared to existing fielded systems.

d) Offeror’s capabilities, experience, facilities, techniques or unique combinations of these which are integral factors for achieving the proposal objectives.

e) Proposed schedule to deliver a prototype that can be tested at a Government facility.

f) Proposed cost.

3. Each proposal will be evaluated on its own merit and relevance to the descriptions of opportunity requirements (at Sections II – VI) rather than against other proposals.

4. Proposal submissions may be rejected for the following reasons:

a) The submission does not comply with the guidelines listed in Section VII.

b) The proposed solution does not address a C-IED requirement;

c) The proposed solution includes development or acquisition of an aerial vehicle platform which is not within JIEDDO’s fielding authority.

d) The proposed solution does not provide a significant enhancement in operational capability compared to existing fielded systems.

5. Proposals submitted electronically to the BAA Information Delivery System (BIDS) website which are determined to contain classified information will be rejected and the potential breach of information security reported to the appropriate authority.

6. Proposal submissions that are determined to be offers of commercial items, as defined by FAR, 2.01 may be rejected from BIDS. The FAR prescribes policies and procedures unique to the acquisition of commercial items.

7. The socio-economic merits of each proposal seeking a procurement contract will be evaluated in the context of the requirements described in this announcement. The evaluation process will consider the extent of commitment in providing meaningful subcontracting opportunities for small businesses, HUB Zone small businesses, small disadvantaged businesses, woman-owned small business concerns, veteran-owned small businesses, historically black colleges and universities, and minority institutions. The North American Industry Classification System (NAICS) code for this solicitation, 334511 (which corresponds with the standard industrial classification code of 8731), specifies a small business size standard of 750 employees or less. A Small Business Subcontracting Plan prepared in accordance with FAR 52. 219-9 must accompany contract proposals that exceed $500,000 submitted by all but small businesses. Entities that must submit a Small Business Subcontracting Plan for contract proposals that exceed $500,000 include universities/colleges, nonprofits, and large businesses. Historically black colleges and universities (HBCU) and minority institutions (MI) are encouraged to submit proposals and/or join others in submitting proposals. However, no portion of this BAA will be set-aside for HBCU and MI participation due to the impracticality of reserving discrete or functionally separable areas of this technology for exclusive competition among these entities.

IX. OTHER BAA INFORMATION. This notice constitutes a BAA as contemplated by FAR 6.102(d)(2). Unless otherwise stated herein, no additional written information is available, nor will a formal RFP or other solicitation regarding this announcement be issued. Requests for the same will be disregarded. The Government reserves the right to select all, some, or none of the proposals received in response to this announcement. Interested parties are invited to respond to this synopsis. No hard copy version of this announcement will be made available. The Government intends to issue awards based on the optimum combination of proposals that offers the best overall value to the Government. One or more technology areas may receive no funding. Also, the Government reserves the right to select for award some portions of the proposals received in response to this BAA. In that event, the Government may select for negotiation all, or portions, of a given proposal. The Government may incrementally fund any award issued under this BAA. The Government will not pay for proposal preparation costs. The cost of preparing proposals in response to this BAA is not allowable as a direct charge to any contract resulting from this BAA or to any other Government contract. Offerors are advised that only Contracting Officers are legally authorized to contractually bind or otherwise commit the Government.

This synopsis is the announcement in its entirety. As the issuing agency, JIEDDO will not issue paper copies of this announcement. Digital copies may be downloaded however from the BAA Information Delivery System (BIDS) website at:

All proposals must be submitted electronically to the BAA Information Delivery System (BIDS) website at:

5000 Army Pentagon
Washington, District of Columbia 20310-5000

United States
Phone: 7036025476
Fax: 7036014690
LTC Mark J. Keller,
Intiative and Technology- Deputy Branch Chief
Phone: 7036015756
Fax: 7036014690