RFI for Modeling and Simulation Software

Project ID: HDTRA1-26-MS-SW FederalOpportunitiesSources Sought
Overview
AgencyDefense Threat Reduction Agency
Deadline05/20/26
Posted05/14/26
Estimated ValueNot Provided
Set AsideNone
NAICS541715 - Research and Development in the Physical, Engineering, and Life Sciences (except Nanotechnology and Biotechnology)
PSC7A20 - IT And Telecom - Application Development Software (Perpetual License Software)
LocationVA 22060 United States
Description
Primary Latest Change

See attached "Request for Information".

Summary (Newest Update)

Background The Defense Threat Reduction Agency (DTRA) Nuclear Enterprise, Nuclear Surety Department (NE-NS) at Fort Belvoir, Virginia is seeking information from potential sources that can provide physical security modeling and simulation software tools. The goal is to evaluate physical security vulnerabilities, risks, and potential upgrades across Department of Defense (DoD) installations. DTRA is looking for vendors with specific capabilities to enhance their security assessments. Work Details DTRA requires a modeling and simulation software solution that has passed a validation, verification, and accreditation (VV&A) review and can perform the following functions: 1. Create or modify realistic and detailed 2D and 3D models of terrain and/or facilities with easily changeable parameters to incorporate various security system configurations, threats, and targets. 2. Generate roadmaps for remote-operated weapons, include advanced unmanned aerial surveillance, blast modeling, and probabilistic risk assessment. 3. Run numerous simulations to assess vulnerabilities using Monte Carlo methods allowing users to track changes in adversary resources/characteristics/attack plans; response team characteristics/response plans; barriers; sensors; construction; environmental conditions; locations and elevations; pathway tactics after combat begins; enhanced sniper behavior with target priority; concealment; insider threat scenarios; weapons pick-up from armory; advanced breaching techniques; cyber attacks; changes to guard response; rules of engagement for security forces and adversaries; defined interactions between agents/events; communications between users; serial or parallel/concurrent scenarios. 4. Automate the identification of vulnerable pathways of attack for defined threat configurations. 5. Identify and quantify vulnerabilities considering both installed security equipment performance and guard/protective force performance in an integrated solution. 6. Provide graphical and numerical output for detailed analysis of security systems, procedures, staffing, extensive reporting designs for different simulation scenarios/configurations, statistical or physics-based processing for analysis of physical security systems. 7. Determine current relative risks for each target based on selected threats, scenarios, and risk reduction measures. Place of Performance Fort Belvoir, Virginia.

Contacts
Contact nameElizabeth Booher
Contact emailelizabeth.a.booher.civ@mail.mil
Contact phoneNone
Secondary contact nameWesley Sawyer
Secondary contact emailwesley.m.sawyer3.civ@mail.mil
Secondary contact phoneNone
Same Region Opportunities