Loren Data's SAM Daily™

fbodaily.com
Home Today's SAM Search Archives Numbered Notes CBD Archives Subscribe
FBO DAILY ISSUE OF NOVEMBER 21, 2010 FBO #3284
SOURCES SOUGHT

63 -- United States Park Police Replacement Security System - Request for Informatoin

Notice Date
11/19/2010
 
Notice Type
Sources Sought
 
Contracting Office
NBC - Acquisition Services Directorate 381 Elden Street, Suite 4000 Herndon VA 20170
 
ZIP Code
20170
 
Solicitation Number
D11PS18829
 
Response Due
12/10/2010
 
Archive Date
11/19/2011
 
Point of Contact
Corey Gerst Contract Specialist 7039643620 corey.gerst@aqd.nbc.gov;
 
E-Mail Address
Point of Contact above, or if none listed, contact the IDEAS EC HELP DESK for assistance
(EC_helpdesk@NBC.GOV)
 
Small Business Set-Aside
N/A
 
Description
This Request for Information (RFI) is being posted on GSA eBuy and via FedBizOpps, under the Franchise Authority of the Department of the Interior, National Business Center, Acquisition Services Directorate (AQD) for the Department of the Interior, United States Park Police (USPP). AQD is conducting market research on a new, integrated security system to gain an understanding of security equipment capabilities, functionality, and applicability to current operations. Based on the results of this RFI, AQD will evaluate a future Request for Quote for procurement of security system equipment and installation services.. This RFI is for information and planning purposes only and shall not be construed as a solicitation or as an obligation on the part of the Government. The purpose of this RFI is to identify potential sources that are interested in and capable of providing the security equipment services described herein. The North American Industry Classification System Code (NAICS) for this requirement would be 561621, Security Systems Services (except Locksmiths). The intent of this RFI is to gain awareness of the security system equipment services being utilized by industry that can accommodate the United States Park Police. The capabilities and technical characteristics presented in this RFI shall be considered as guidance only. Firms are invited to indicate their interests and capabilities by providing specifications, brochures, manuals, information pertaining to experience on previous projects, and any other specific and pertinent information as it pertains to this particular area of procurement that would enhance the Governments consideration and evaluation of the information submitted. To better assist firms with identifying possible solutions, an overview of the USPP current operations and current equipment resources are illustrated below: 1.Project Objectives The specific objectives of this first phase of this modernization program are to: A.Provide a robust, state-of-the-art host monitoring and administrative platform for the USPPCC and the USPP Physical Security Office; B.Repair, convert and connect existing Access Control (ACS) and Intrusion Detection (IDS) systems at the USPP Anacostia Operations Facility (AOF) and the District Two Substation (D-2) to this new host system. This host system capability is referred to hereinafter as the Integrated Security and Access Control System (ISACS). This system capability may be provided as a complete on-site host computer system at the USPPCC or outsourced through a local, full service UL Listed central station provider of similar systems. 1.2Project Options A.Option 1: Provide a redundant ISACS capability at the NPS National Capital Region Communications Center (NCRCC) in Hagerstown, MD. B.Option 2: Integrate existing intrusion and fire systems at other USPP and NPS facilities to the ISACS system, to replace the existing central station computer system used at the USPPCC and NCRCC. 1.3Long Term Program Objectives A.Provide a consolidated, centralized security system with a common graphical user interface (GUI) for all operational, monitoring, and administrative activities, and common, standardized user credentials, controls and procedures at the protected remote facilities.B.P rovide and integrate central station monitoring and control of closed circuit television (CCTV) systems and intercom systems at the remote sites with the ISACS system.C.Design and installation of ACS and IDS electronic interfaces, controllers, processors, wiring and infrastructure to integrate with existing intrusion detectors, card readers, electric locks, exit devices and related equipment at two (2) USPP facilities. D.Provide the ISACS central station capabilities, either through the installation and set up of a new central station host computer system with multiple operator consoles/workstations at the USPPCC, or through outsourcing these capabilities to a local full service UL Listed central station provider with the requisite systems and monitoring capabilities. 2. Background and Systems Description USPP Access Control Systems 2.1Siemens System 2.1.1Access Control The security systems were installed approximately 6 years ago as part of an Infographics system provided by Siemens Building Services. Reports in real time to an Infographics host computer system ("Cymphany") via local reader interface modules (Remote Reader Electronics) and Infographics Access Control Units (ACU) over a dedicated LAN. The host computer and a backup are installed in the Physical Security Office at AOF. The system at D-2 connects to the LAN and reports to this host over a T-1 line. 2.1.2Intrusion Detection In addition to the Siemens, a few internal spaces at these facilities are protected with keypad-controlled intrusion systems that interface with the Siemens Access Control Units. In some instances, access to these spaces is controlled with the mechanical door key, with authorized personnel using a personal identification number (4 digit code) at the Siemens keypad to disarm the intrusion system prior to entrance. The keypad acts only as an alarm control device used to disarm alarm sensors when the space is occupied and re-arm the sensors when the space becomes unoccupied. In other cases, the keypad is used at a few internal spaces in conjunction with a card reader, such that the reader controls the door lock while the keypad not only control additional intrusion sensors within the space but also provides supervisory control over access control to the space. The card reader will not provide access unless the space has first been disarmed by an authorized PIN at the keypad. This system ensures that authorized cardholders cannot access the space unless supervisory personnel are present (or have at least disarmed the system). These buildings are single user facilities, housing only USPP operations, but some non-USPP personnel have access cards for the facilities. Internal intrusion systems are operational at all times and are disarmed by users only when a space is occupied. 2.1.3Other Systems Both facilities utilize Closed Circuit Television (CCTV) systems extensively to support the ACS. These systems are used for general area surveillance in addition to supporting visitor (non-cardholder) entry at perimeter doors. The visitor entry system includes both intercom-based remote controls and stand-alone manual controls to unlock perimeter doors upon visitor request. Telecor intercom desk sets are used at AOF and D-2 locations to unlock doors upon request from a visitor using the intercom unit located at a perimeter door. Additionally, there are customized manual door controls located at both facilities which allow guard and receptionist personnel to unlock various internal and perimeter doors momentarily or for extended periods. These controls include LED indicators, momentary door release buttons and toggle switches for extended unlocking. These visitor systems rely on CCTV cameras at the perimeter doors for visual identification of the visitor. The CCTV system is not interfaced with or connected in any way to the Cymphany system. The intercom and manuals door releases remove power from the door locks but are not interfaced with or monitored by the Cymphany system. 2.1.4Design Considerations and Installation Constraints The Government wishes to replace this host system in its entirety and configure it to the existing card readers and door control hardware through new intelligent on-site processors and reader interface modules, using as much of the existing power supplies, wiring, conduit, boxes, enclosures and infrastructure as possible. A.Utilization of Existing Equipment. The Government wishes to retain as much of the current devices, hardware and wiring as practicable to reduce the cost of this project. However, the current location of the Infographics ACU in the plenum instead of accessible closets makes the use of those enclosures and associated wiring impractical, except as junction box locations. The Government believes that existing card readers, electric door locks, exit devices, and intrusion sensors can be used in place, with little or no modification. The Infographics ACU, Remote Reader Electronics, intrusion keypads and other equipment believed to be proprietary to the Infographics system probably cannot be used. The keypads produce a Wiegand output like the HID card readers but have been troublesome and may not be compatible with other systems B.HSPD-12 Compliance. At this time it is believed that compliance with Homeland Security Presidential Directive 12 (HSPD-12) will NOT apply to the access control systems for these facilities. All current USPP employees will be enrolled in and required to carry the DOI-Access card (the HSPD-12 smartcard) but that card will not be used at any doors currently controlled by the HID readers. The Contractor may propose a host system that can support reading the facility access control data from the DOI-access card, provided that the card conforms to the requirements in HSPD-12 and FIPS 201. C.Visitor Systems Interface. The door release systems described in paragraph 2.1.3 above remove power from the respective door locks for visitor entry. The Contractor will have to take these controls into consideration, such that an unlocked door status resulting from visitor control action can be differentiated from failure of a door to lock caused by a power failure or door/sensor misalignment. D.Conversion in an Operating Environment. AOF (which houses the D-5 Substation in addition to other operations) and the D-2 Substation are operating police stations and use the access control and intrusion systems 24 hours a day. Some areas will require special consideration. For example, a prisoner holding area exists at each substation, featuring an interlock at a mantrap to each holding area. There are card readers with keypads on each side of the two doors to the mantrap, for entry into and exit out of the mantrap, and only one door can be opened at a time. Also, the holding area itself cannot be accessed by the Contractor when prisoners are being processed. Although the Government does not anticipate significant delays or impediments to the Contractor's work because of these operating conditions, the Contractor must plan carefully around them. The Government is not aware of any conditions that will require the performance of any work outside normal business hours. E.Relocation of USPPCC to AOF. The USPP recently relocated its communications center from the USPP HQ at 1100 Ohio Drive, SW, to the current location at AOF. This AOF location features four operator consoles plus a management console, each of which includes capabilities to operate the radio dispatch system and other law enforcement support computer systems. There are 2 PCs at each console. The SIMS alarm computer system currently used to monitor USPP and NPS intrusion and fire systems at other remote sites is currently operational at only one of these consoles. Providing the ISACS functionality at each of the 4 operator consoles and the manager's console is a desired goal of this project. That functionality may be provided on an existing PC at each console or via a separate host computer and networked to each console. 3.Equipment Locations and Quantities There are approximately forty (40) card reader-controlled locations at AOF and twelve (12) at the D-2 substation. Additionally, there is a local intercom system currently in place at both facilities that allows a local attendant to unlock certain doors for visitors and other non-cardholders upon verification through voice intercom and a local CCTV system. ISACS should be sized to accommodate at least 200 card readers to allow for future expansion to other USPP and NPS sites. This number includes intelligent keypads which may be used for IDS control, or for ACS control in lieu of a card reader. There are approximately 800 authorized cardholders currently in the system. The system should be sized to accommodate at least 5,000 active cards. 3.1USPP Communications Center Multiple civilian dispatchers are on duty at all times at the USPPCC. These personnel are engaged in a variety of duties including police dispatch, alarm monitoring and telephone answering. Duties are shared among all operators as necessary. A single SIMS alarm console is currently utilized to process alarms for intrusion and fire systems installed at other NPS and USPP locations At a minimum, USPPCC shall be equipped with one operator console for any on-site ISACS system proposed. Optimally, the Government wishes to have ISACS alarm processing capability at all four (4) dispatcher/security monitor positions plus the manager's console, with a common user interface to access the various radio dispatch and security monitoring applications at each position The Government will also consider outsourcing some or all the ISACS capabilities, with no on-site host equipment to be provided under this SOW. Automated Access Control Systems (ACS) are currently installed at all five USPP district substations in Washington, DC, the USPP Headquarters Building, and the USPP Aviation Facility. All these facilities utilize proximity-type access cards and card readers from HID Corporation, along with a variety of electric locks, exit devices and door position sensors to control access. Some HID readers include an integral keypad in addition to the reader, requiring the use of a 4 digit personal identification number (PIN) in addition to the card to gain entry. 4.General Features The Government desires a central station system that is flexible, expandable and adaptable to a wide range of physical security needs, primarily in the areas of automated access control and intrusion detection system monitoring. The primary objectives at the central station are to provide operators with the degree of situational awareness necessary to perform correct actions promptly and efficiently, to minimize nuisance and false alarms, and to require operator awareness, acknowledgement, response and intervention only for activities that require it. From the user and consumer perspective, the objective is to provide access control and intrusion detection systems that require appropriate credentials but no special knowledge to gain access to a user's space. For the administrator, security manager and database maintainer, the goal is to provide a single user-friendly interface to a central database for card administration, database administration, event analysis and customer services. 5.Basic ISACS Operation ISACS will replace the current Cymphany system with a reliable, user-friendly interface that will facilitate both central station monitoring actions and administrative controls. The system will accept the existing USPP cardholder database (through manual data entry) and allow assigned cards to work at existing card readers according to reader location, time of day and day of week restrictions assigned by the Government. Routine access events may be logged to disk only, annunciated and/or displayed on the operator's console, printed to a system printer, or any combination of these, as programmed by the Government. 6.Event Processing 6.1Commonly Understood Event Terminology System events shall be recorded and presented to security monitors and consumers in easily understood English terminology, rather than technical jargon requiring references to technical manuals. 6.2Records Retrieval Historical data shall be searchable and retrievable according to a wide variety of criteria, and printable to file or printer such that the end user/consumer can understand the data without requiring references to equipment lists and system manuals. 6.3Selective Event Processing The System shall have the capability to control the processing of selected events through hardware/firmware at the on-site location and/or software at the host. The host should receive and process device changes of state only when a record of the action is required or an operator action may be necessary. 6.4Nuisance Event Avoidance Device changes of state associated with an intrusion detector or any monitored equipment point should be configurable either through hardware or software so that multiple repetitive events do not annunciate and display unnecessarily at the operator's console. Operator acknowledgement and alarm processing as well as user corrective actions shall be recorded on disk and readily retrievable in an easily understandable chronological report format with the initiating alarm event. 6.5Flexible Event Message Creation and Operator Log Messages Event messages shall be user configurable to allow English descriptions of the situation that caused the event to occur as well as the "alarm advice" needed by the operator to respond appropriately to the event. The operator shall be able to input a log message associated with the event to describe in detail the actions that were taken in response to the alarm. Alarms that remain active after operator action shall remain observable in some type of queue or window so that follow up actions can be taken, until the alarm condition is corrected by an authorized user or operator. All operator actions and log messages shall be logged to disk and retrievable with the associated alarm events. 7.Events to be Monitored 7.1Events From Monitored Sites "Card accesses - by card number and cardholder name"Access denials - by card number, cardholder name, and reason for denial;"Door prop open conditions;"Failure of electric lock to lock;"Opening of a card reader controlled door without use of an authorized card of exit device;"Intrusion alarms by type, class, and priority;"Individual intrusion system arming and disarming, with user name (whether by card or PIN);"Equipment tamper alarms;"Power failures and low battery indications;"Wiring grounds and circuit faults;"Equipment trouble alarms and failures; 7.2ISACS Diagnostics ISACS shall be capable of detecting and reporting the following self-diagnostics, at a minimum: "System device failure - any hardware component in the computer system;"Communications failures of any kind;"Uninterruptable power supply failures. 8.Optional Capabilities 8.1Cardholder Photos, Facility Images and Maps USPP currently uses a stand-alone computerized photo badging system for its personnel. The photo badge is worn for identification purposes during the duty day by civilian and non-uniformed personnel. At this time it is believed that force-wide implementation of the HSPD-12 credential will not eliminate or otherwise impact this procedure. At present, the photos are stored in the badging computer but there is no electronic interface between that computer and the Cymphany system. RFI - Submission Requirements The Government does not intend to make an award on the basis of responses nor otherwise pay for the preparation of any information submitted in response to this RFI. Acknowledgment of receipt of responses will not be made. Respondents may be notified of the Government's acquisition method via an amendment to this notice or a new notice. Based on the review of the responses to this RFI, the Government reserves the right to conduct competition either via GSA Federal Supply Schedules or full and open. Interested organizations should submit a capability statement of approximately 5 pages that detail their firm's ability to provide solutions based the information specified above. All proprietary information should be marked as such. Responses will be reviewed by Government personnel and will be held in a confidential manner. Any and all information received will become the property of the Government and will not be returned. Your response must be delivered via email to the address identified herein. Response due date: no later than 2:00 p.m. Eastern Time on 26 November 2010 Attn: Mr. Corey Gerst, Contract SpecialistEmail: corey.gerst@aqd.nbc.govPhone: (703) 964-3620For any questions include with your full name, the RFI number & title (USPP Security System) your organization name, complete address, and phone and fax numbers. TELEPHONE INQUIRES WILL NOT BE ACCEPTED. The deadline for submission of questions regarding this notice is 2:00 p.m. Eastern Time on Friday, 10 December 2010 to the Contract Specialist noted herein.
 
Web Link
FBO.gov Permalink
(https://www.fbo.gov/notices/a19b5e796e9c6e79daaed0bcc2bca6b4)
 
Place of Performance
Address: Washington D.C.
Zip Code: 20242
 
Record
SN02330822-W 20101121/101119234118-a19b5e796e9c6e79daaed0bcc2bca6b4 (fbodaily.com)
 
Source
FedBizOpps Link to This Notice
(may not be valid after Archive Date)

FSG Index  |  This Issue's Index  |  Today's FBO Daily Index Page |
ECGrid: EDI VAN Interconnect ECGridOS: EDI Web Services Interconnect API Government Data Publications CBDDisk Subscribers
 Privacy Policy  Jenny in Wanderland!  © 1994-2024, Loren Data Corp.