Funding Opportunities
FUNDING TOPICS:

FILTER BY: action icon action icon
YEAR










DIVISION










TECHNICAL AREAS








































Research Topics:
Research Area
  • Securing Aviation
  • Protecting from Terrorist Attacks
  • Securing Borders
  • Securing Cyberspace
  • Preventing Terrorism
  • Managing Incidents
  • Securing Critical Infrastructure
Priority R&D Need
  • High-Throughput Cargo Screening
  • Cost-effective Electronic Imaging for Bulk Air Cargo
  • Passenger Identification and Vetting
  • Rapid Detection and Alarming of Explosives
  • Distinguishing Threats from Non-threats on Passengers
  • Efficient and Accurate Detection of Complex Threat Concealment on Passengers and Carried Property
  • Personal Protective Equipment for all CBRNE Hazards
  • Modeling and Predictive Analytics for Decision Making
  • Disease and Biological Threat Detection, Identification, and Classification in Field Operational Environments
  • Biological Attack Verification
  • Cross-border Tunnel Detection, Surveillance, and Forensics
  • Infrastructure Tunnel Surveillance
  • Integrated and Improved Sensors, Systems, and Data
  • Actionable Intelligence Gathering and Sharing
  • Dark Aircraft and Vessel Detection, Tracking, and Interdiction
  • Expedited People Screening
  • Maritime Surveillance and Communications in Remote Environments
  • Distributed Cloud-based Communications and Monitoring - Associated/Related Efforts
  • Human Aspects of Cybersecurity-Associated/Related Efforts
  • Network and Systems Security-Associated/Related Efforts
  • Mobile Security-Associated/Related Efforts
  • Critical Infrastructure - Associated/Related Efforts
  • Software Assurance - Associated/Related Efforts
  • Cyber Security Outreach - Associated/Related Efforts
  • Cybersecurity for Law Enforcement-Associated/Related Efforts
  • Cyber Enabled Networked Physical Systems Security
  • Organic Explosive Compound and Homemade Explosives Detection
  • Improvised Explosive Device-related Anomaly Detection
  • Automated Machine Learning
  • Prevention
  • Advanced Analytics
  • Situational Awareness
  • Communications
  • Command, Control, Communications
  • Training and Exercises
  • Responder Health, Safety, Performance
  • Logistics and Resource Management
  • Casualty Management
  • Risk Assessment and Planning
  • Intelligence and Investigation
  • Dependency and Interdependency Analysis
  • Risk-Informed Prioritization
Topic Keywords
  • Agricultural Pathogen
  • Algorithms
  • All-Hazard
  • Analysis
  • Big Data
  • Biometrics
  • Border Protection
  • Canine
  • Cargo
  • Checked Baggage
  • Child Exploitation
  • Classify
  • Communications
  • Contraband
  • Critical Infrastructure
  • Crowdsourcing
  • Cyber
  • Data
  • Data Analytics
  • Denial of Service
  • Detection
  • Diagnostics
  • Disaster
  • Explosives
  • Flood
  • Forensics
  • Human Trafficking
  • Identity
  • Incident Management
  • Infrastructure
  • Interdiction
  • Internet
  • Internet of Things
  • LMR
  • LTE
  • Locate
  • Managing Incidents
  • Mission Critical Voice
  • Mitigation
  • Mobile
  • Modeling & Simulation
  • Narcotics
  • Network
  • Opioids
  • P25
  • Physical Security
  • Policy
  • Position Navigation & Timing
  • Preventing Terrorism
  • Prevention
  • Privacy
  • Protection-Terrorist Attacks
  • Recognition
  • Resilience
  • Risk
  • Screening
  • Securing Aviation
  • Securing Borders
  • Securing Cyber
  • Security
  • Sensor
  • Situational Awareness
  • Social Media
  • Software
  • Terrorism
  • Test & Evaluation
  • Track
  • Training
  • UAS
  • Vaccine
  • Video
  • Virus
LRBAA TOPIC SEARCH RESULTS
Research Area:   Securing Aviation (SEC AVN)
Priority R&D Need:  Cost-effective Electronic Imaging for Bulk Air Cargo
Topic Number:  SEC AVN 02-01
Topic Title:  Detect Explosives and Contraband in Air Cargo- Detect explosives and other contraband in Cargo skids and pallets
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Air cargo screening is challenging because of the diversity in the commerce transported and the complexity of the supply chain. Some air cargo is transported on dedicated cargo aircraft, but a significant amount is transported on passenger aircraft. Cargo diversity presents screening challenges because systems must be capable of screening a variety of items from organic material such as flowers, fresh or frozen meats, to metal parts or metal drums containing liquids. Sk ... more
Air cargo screening is challenging because of the diversity in the commerce transported and the complexity of the supply chain. Some air cargo is transported on dedicated cargo aircraft, but a significant amount is transported on passenger aircraft. Cargo diversity presents screening challenges because systems must be capable of screening a variety of items from organic material such as flowers, fresh or frozen meats, to metal parts or metal drums containing liquids. Skids of cargo may be homogeneous, or could contain tens of small parcels or boxes from multiple vendors. Cargo screening is performed by private companies, so cost effective solutions are essential and software tools to assist the system operators to better detect anomalies in the cargo are important. Submitters must provide their development plan to produce mature systems which can scan full-size air cargo skids (48" x 48" x 65") at operational speed (at least 24 skids per hour), and ultimately cost under $500,000 as production units once development is completed. Proposed scanners must be able to cope with the wide varieties of air cargo, as described above. Standards for screening air cargo require updating and additional definition based on the diversity or types of air cargo. Submitters must provide a plan to develop appropriate test standards for testing cargo screening equipment. less
Topic Research Type:  Type II, Type III
End Objective:

Develop low cost screening systems that can detect explosives and other contraband in air cargo skids and pallets.

TRL Sought:  3-4
TRL at Conclusion:  6-7
Background Information and S&T Challenges:

Non-availability of a low cost 3D skid scanning systems; Increasing volume of goods due to e-commerce that necessitate faster screening without losing detection ability; Poor environmental factors for location of screening equipment; and Extended operational hours, need for high MTBF and low MTTR factors

Transition Opportunities:

Air cargo screening solutions must complete Operational Test and Evaluation (OT&E) at Government facilities. Systems that pass TSA tests will be added to their Air Cargo Screening Technology List (ACSTL). Private Air Cargo screening companies are only allowed to use systems on the ACSTL.

Research Area:   Securing Aviation (SEC AVN)
Priority R&D Need:  Cost-effective Electronic Imaging for Bulk Air Cargo
Topic Number:  SEC AVN 02-02
Topic Title:  Detect Explosives and Contraband in Air Cargo- High Penetration Screening Capability for Dense (consolidated) Air Cargo Skids
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Air cargo screening is challenging because of the diversity in the commerce transported and the complexity of the supply chain. Some air cargo is transported on both dedicated cargo aircraft, but a significant amount is also transported on passenger aircraft. Cargo diversity presents screening challenges because systems must be capable of screening a variety of items from organic material such as flowers, fresh or frozen meats, to metal parts or metal drums of liquids. S ... more
Air cargo screening is challenging because of the diversity in the commerce transported and the complexity of the supply chain. Some air cargo is transported on both dedicated cargo aircraft, but a significant amount is also transported on passenger aircraft. Cargo diversity presents screening challenges because systems must be capable of screening a variety of items from organic material such as flowers, fresh or frozen meats, to metal parts or metal drums of liquids. Skids of cargo may be homogeneous, or could contain tens of small parcels or boxes from multiple vendors. Cargo screening is performed by private companies, so cost effective solutions are essential and software tools to assist the system operators to better detect anomalies in the cargo are important. Submitters must provide their development plan to produce systems which can scan full-size air cargo skids (48" x 48" x 65") at speeds exceeding 24 skids per hour and which will provide imaging of dense cargo. Proposed scanners must be able to cope with the wide varieties of air cargo as described above. Proposals for automated explosive threat recognition algorithms to be hosted on these cargo skid scanners are also invited. less
Topic Research Type:  Type II, Type III
End Objective:

Air cargo skid screening solutions which are less than $500,000.00 (US) in production quantities.

TRL Sought:  3-4
TRL at Conclusion:  6-7
Background Information and S&T Challenges:

Non-availability of a low cost 3D skid scanning systems; Increasing volume of goods due to e-commerce that necessitate faster screening without losing detection ability; Poor environmental factors for location of screening equipment; Extended operational hours, need for high MTBF and low MTTR factors

Transition Opportunities:

Air cargo screening solutions must complete Operational Test and Evaluation (OT&E) at Government facilities. Systems that pass TSA tests will be added to their Air Cargo Screening Technology List (ACSTL). Private Air Cargo screening companies are only allowed to use systems on the ACSTL..

division icon
Securing Aviation
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Aviation (SEC AVN)
Priority R&D Need:  Cost-effective Electronic Imaging for Bulk Air Cargo
Topic Number:  SEC AVN 02-03
Topic Title:  Detect Explosives and Contraband in Air Cargo- Algorithms and Detection Systems
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Air cargo screening is challenging because of the diversity in the commerce transported and the complexity of the supply chain. Some air cargo is transported on both dedicated cargo aircraft, but a significant amount is also transported on passenger aircraft. Cargo diversity presents screening challenges because systems must be capable of screening a variety of items from organic material such as flowers, fresh or frozen meats, to metal parts or metal drums of liquids. S ... more
Air cargo screening is challenging because of the diversity in the commerce transported and the complexity of the supply chain. Some air cargo is transported on both dedicated cargo aircraft, but a significant amount is also transported on passenger aircraft. Cargo diversity presents screening challenges because systems must be capable of screening a variety of items from organic material such as flowers, fresh or frozen meats, to metal parts or metal drums of liquids. Skids of cargo may be homogeneous, or could contain tens of small parcels or boxes from multiple vendors. Cargo screening is performed by private companies, so cost effective solutions are essential and software tools to assist the system operators to better detect anomalies in the cargo are important. Submitters must provide their development plan to produce systems which can scan full-size air cargo skids (48" x 48" x 65") at speeds exceeding 24 skids per hour and which will provide imaging of dense cargo. In addition to explosives, there is a growing interest in detecting contraband such as opioids which may be hidden in air cargo. The government is interested in developing dual-use systems which may detect both explosives and illicit cargo. Proposals for automated explosive threat recognition algorithms to be hosted on these cargo skid scanners are also invited. less
Topic Research Type:  Type II, Type III
End Objective:

High penetration screening capability for dense (consolidated) air cargo skids.

TRL Sought:  3-4
TRL at Conclusion:  6-7
Background Information and S&T Challenges:

Non-availability of a low cost 3D skid scanning systems; Increasing volume of goods due to e-commerce that necessitate faster screening without losing detection ability; Poor environmental factors for location of screening equipment; Extended operational hours, need for high MTBF and low MTTR factors>

Transition Opportunities:

Air cargo screening solutions must complete Operational Test and Evaluation (OT&E) at Government facilities. Systems that pass TSA tests will be added to their Air Cargo Screening Technology List (ACSTL). Private Air Cargo screening companies are only allowed to use systems on the ACSTL.

division icon
Securing Aviation
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Aviation (SEC AVN)
Priority R&D Need:  Passenger Identification and Vetting
Topic Number:  SEC AVN 03-01
Topic Title:  Screening at Speed- Passenger Screening Technologies
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 

The Apex Screening at Speed Program is pursuing transformative R&D activities that support a future vision for increasing security effectiveness while dramatically reducing wait times and improving the passenger experience. These future capabilities will be interconnected through non-proprietary interfaces in a system of systems that is more secure, efficient, flexible, and adaptable than currently deployed sensors.

S&T seeks hardware and software technologies ... more

The Apex Screening at Speed Program is pursuing transformative R&D activities that support a future vision for increasing security effectiveness while dramatically reducing wait times and improving the passenger experience. These future capabilities will be interconnected through non-proprietary interfaces in a system of systems that is more secure, efficient, flexible, and adaptable than currently deployed sensors.

S&T seeks hardware and software technologies that assist in screening three hundred or more passengers per hour with minimal need for divestiture of headwear, footwear or personal items. Technologies shall contribute to a system of systems that provides detection at TSA's highest security detection standards. Technologies would ideally be capable of adapting or upgrading quickly to respond to emerging threats. Of highest interest are technologies that contribute to a system of systems that can adapt dynamically to TSA-provided individual risk assessments. Technologies shall be networkable and support cybersecurity best practices.

less
Topic Research Type:  Type II, Type III
End Objective:

The checkpoint of the future seeks to improve the passenger experience while enhancing detection capabilities. While the primary focus of the portfolio is on aviation security, technologies that also apply to other checkpoint scenarios (other modes of transportation, special events, etc.) are of interest as well. S&T understands that 'silver bullet' technologies that solve all possible threat scenarios are unlikely, and welcomes unique research materials regarding new capabilities that address specific threats within a broader system-of-systems security architecture.

TRL Sought:  4-7
TRL at Conclusion:  7-8
Transition Customer or Program:

Transportation Security Administration (TSA)

Background Information and S&T Challenges:

S&T is especially interested in technology that minimizes the Government's lifecycle costs and facilitates integration in a modular fashion. As such, S&T may prioritize the development of technology that better leverages open architectures, interfaces, and standards, or has additional utility in other markets that drive more favorable economies of scale. Technology that can readily adapt to multiple concepts of operations (e.g., to different threat environments, requirements for throughput, passenger risk assessments, etc.) is of special interest.

Transition Opportunities:

Systems that meet or exceed TSA's demanding security standards for aviation may be acquired through TSA's Passenger Screening Program. These systems may also be candidates for venues such as critical buildings, stadiums, and other modes of transportation. Additionally, TSA-qualified screening systems may adapt with minimal modification to aviation security needs in other nations.

division icon
Securing Aviation
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Aviation (SEC AVN)
Priority R&D Need:  Rapid Detection and Alarming of Explosives
Topic Number:  SEC AVN 04-01
Topic Title:  Canine R&D Structure and Function
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Canine R&D Structure and Function, part of the program focusing on the more basic understanding of canine behavior, genetics, olfaction, and cognition of this detector to improve operational efficiencies and training methods.
Canine R&D Structure and Function, part of the program focusing on the more basic understanding of canine behavior, genetics, olfaction, and cognition of this detector to improve operational efficiencies and training methods. less
Topic Research Type:  Type I
End Objective:

S&T goals are to provide our customer base - TSA and the Homeland Security Enterprise (HSE) - with the tools, techniques, and knowledge to better understand, train, and utilize the detection canine, and improve proficiency of the DHS/HSE detection canine teams. Provide an enduring research and development capability to the Homeland Security Enterprise with a unique focal point and knowledge base for detection canines by establishing a scientifically rigorous, statistically significant approach for the detection canine community that is currently absent in the industry.

TRL Sought:  4
TRL at Conclusion:  7
Transition Customer or Program:

Operating components within the DHS and State and Local Law Enforcement within the Homeland Security Enterprise who maintain detection canines for the execution of their appointed missions

Background Information and S&T Challenges:

Detection focus not limited to explosive threats, but to include all detection canine threat vectors including narcotics, firearms detection, human detection, cadaver detection, infectious disease detection, and currency, for example. Operational efficacy, safety and cost are major metrics of success.

Transition Opportunities:

The potential exists for licensing and commercialization of tools and knowledge products that may serve the over 16,000 detection canine teams nationwide across all threat disciplines. Knowledge products and methodologies have been successful in receiving patents and facilitated various levels of commercialized products

division icon
Securing Aviation
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Aviation (SEC AVN)
Priority R&D Need:  Rapid Detection and Alarming of Explosives
Topic Number:  SEC AVN 04-02
Topic Title:  Development and Testing of Canine Training Aids
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Development and Testing of Canine Training Aids, specifically targeting the creation of low cost, non-hazardous emerging threat and conventional explosive training aids, with state-of-the-art laboratory technology for odor validation to the level of canine detection. The program is also interested in odor generalization analysis studies to reduce requisite numbers of trained odors.
Development and Testing of Canine Training Aids, specifically targeting the creation of low cost, non-hazardous emerging threat and conventional explosive training aids, with state-of-the-art laboratory technology for odor validation to the level of canine detection. The program is also interested in odor generalization analysis studies to reduce requisite numbers of trained odors. less
Topic Research Type:  Type II
End Objective:

S&T goals are to provide our customer base - TSA and the Homeland Security Enterprise (HSE) - with the tools, techniques, and knowledge to better understand, train, and utilize the detection canine and improve proficiency of the DHS/HSE detection canine teams. Provide an enduring research and development capability to the Homeland Security Enterprise with a unique focal point and knowledge base for detection canines by establishing a scientifically rigorous, statistically significant approach for the detection canine community that is currently absent in the industry.

TRL Sought:  4
TRL at Conclusion:  7
Transition Customer or Program:

Operating components within the DHS and State and Local Law Enforcement within the Homeland Security Enterprise who maintain detection canines for the execution of their appointed missions.

Background Information and S&T Challenges:

Detection focus not limited to explosive threats, but to include all detection canine threat vectors including narcotics, firearms detection, human detection, cadaver detection, infectious disease detection, and currency, for example. Operational efficacy, safety, and cost are major metrics of success.

Transition Opportunities:

The potential exists for licensing and commercialization of tools and knowledge products that may serve the over 16,000 detection canine teams nationwide across all threat disciplines. Knowledge products and methodologies have been successful in receiving patents and facilitated various levels of commercialized products.

division icon
Securing Aviation
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Aviation (SEC AVN)
Priority R&D Need:  Rapid Detection and Alarming of Explosives
Topic Number:  SEC AVN 04-03
Topic Title:  Independent Operational Test and Evaluation for Technologies and Methodologies That Advance Detection Canine Performance
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Technologies and methodologies that advance detection canine performance in controlled and operational environments representative of the Homeland Security Enterprise at the federal, state, and local level and facilitate scientifically significant data capture through independent operational test and evaluation.
Technologies and methodologies that advance detection canine performance in controlled and operational environments representative of the Homeland Security Enterprise at the federal, state, and local level and facilitate scientifically significant data capture through independent operational test and evaluation. less
Topic Research Type:  Type III
End Objective:

S&T's goals are to provide our customer base - TSA and the Homeland Security Enterprise (HSE) - with the tools, techniques, and knowledge to better understand, train, and utilize the detection canine, and improve proficiency of the DHS/HSE detection canine teams. Provide an enduring research and development capability to the Homeland Security Enterprise with a unique focal point and knowledge base for detection canines by establishing a scientifically rigorous, statistically significant approach for the detection canine community that is currently absent in the industry.

TRL Sought:  5
TRL at Conclusion:  7
Transition Customer or Program:

Operating components within the DHS and State and Local Law Enforcement within the Homeland Security Enterprise who maintain detection canines for the execution of their appointed missions.

Background Information and S&T Challenges:

Detection focus not limited to explosive threats, but to include all detection canine threat vectors including narcotics, firearms detection, human detection, cadaver detection, infectious disease detection, and currency, for example. Operational efficacy, safety and cost are major metrics of success.

Transition Opportunities:

The potential exists for licensing and commercialization of tools and knowledge products that may serve the over 16,000 detection canine teams nationwide across all threat disciplines. Knowledge products and methodologies have been successful in receiving patents and facilitated various levels of commercialized products

division icon
Securing Aviation
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Aviation (SEC AVN)
Priority R&D Need:  Rapid Detection and Alarming of Explosives
Topic Number:  SEC AVN 04-04
Topic Title:  Explosive Detection in Checked Baggage- Advanced Algorithms and System Integration
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Development and maturation of threat detection and false alarm reduction algorithms, for explosives, their precursors, and/or other prohibited items; the integration of these algorithms into operational or prototype systems; and demonstration of these algorithms in real time operation. The algorithms should be deployable to improve performance of existing or future EDS systems.
Development and maturation of threat detection and false alarm reduction algorithms, for explosives, their precursors, and/or other prohibited items; the integration of these algorithms into operational or prototype systems; and demonstration of these algorithms in real time operation. The algorithms should be deployable to improve performance of existing or future EDS systems. less
Topic Research Type:  Type I, Type II
End Objective:

The Checked Baggage Program seeks to improve detection capabilities of currently deployed EDS systems as well as create novel approaches to solve explosive detection. While the primary focus of the portfolio is on aviation security, technologies that also apply to other checked baggage scenarios (check point scenarios, other modes of transportation, special events, etc.) are of interest as well. S&T understands that 'silver bullet' technologies that solve all possible threat scenarios are unlikely, and welcomes unique research materials regarding new capabilities that address specific threats within a broader system-of-systems security architecture.

TRL Sought:  3-4
TRL at Conclusion:  6-7
Background Information and S&T Challenges:

S&T is especially interested in technology that minimizes the Government's lifecycle costs and facilitates integration in a modular fashion. As such, S&T may prioritize the development of technology that better leverages open architectures, interfaces, and standards, or has additional utility in other markets that drive more favorable economies of scale. In particular, reductions in false alarm rate are a huge opportunity for operational cost savings. Technology that can readily adapt to multiple concepts of operations (to different threat environments, requirements for throughput, passenger risk assessments, etc.) is of special interest.

Transition Opportunities:

Successfully developed algorithms and software that meet or exceed TSA's demanding security standards for aviation may be candidates for usage at over 5,000 airports, scanning over 1.3 million pieces of checked luggage daily, across the country. As even small improvements in false alarm rates can save TSA millions of dollars annually, transition of successful developments is well-motivated. Transition would be to TSA's Office of Requirements and Capabilities Analysis (ORCA) or other appropriate office. Additionally, TSA-qualified screening systems may adapt with minimal modification to aviation security needs in other nations. Screening solutions must complete Operational Test and Evaluation (OT&E) at Government facilities.

division icon
Securing Aviation
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Aviation (SEC AVN)
Priority R&D Need:  Rapid Detection and Alarming of Explosives
Topic Number:  SEC AVN 04-05
Topic Title:  Explosive Detection in Checked Baggage- Development and Maturation of System Components and Subsystems
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Development and maturation of system components (such as X-ray Sources and Detectors) with performance and advanced characteristics necessary to evolve laboratory and experimental prototypes into full up X-ray system designs able to meet the Advanced X-ray Systems requirements. This includes multi-energy and spectroscopic array-capable detectors, sources which support adaptive and diffractive imaging, and general improvements in efficiency and resolution. Components ma ... more
Development and maturation of system components (such as X-ray Sources and Detectors) with performance and advanced characteristics necessary to evolve laboratory and experimental prototypes into full up X-ray system designs able to meet the Advanced X-ray Systems requirements. This includes multi-energy and spectroscopic array-capable detectors, sources which support adaptive and diffractive imaging, and general improvements in efficiency and resolution. Components may be used upgrade existing systems or serve as key elements of novel system design. less
Topic Research Type:  Type I, Type II
End Objective:

The Checked Baggage Program seeks to improve detection capabilities of currently deployed EDS systems as well as create novel approaches to solve explosive detection. While the primary focus of the portfolio is on aviation security, technologies that also apply to other checked baggage scenarios (check point scenarios, other modes of transportation, special events, etc.) are of interest as well. S&T understands that 'silver bullet' technologies that solve all possible threat scenarios are unlikely, and welcomes unique research materials regarding new capabilities that address specific threats within a broader system-of-systems security architecture.

TRL Sought:  3-4
TRL at Conclusion:  6-7
Transition Customer or Program:

Transportation Security Administration (TSA)

Background Information and S&T Challenges:

S&T is especially interested in system components which minimize the Government's lifecycle costs and facilitates integration in a modular fashion. As such, S&T may prioritize the development of technology that better leverages open architectures, interfaces, and standards, or has additional utility in other markets that drive more favorable economies of scale. Technology that can readily adapt to multiple concepts of operations (e.g., to different threat environments, requirements for throughput, passenger risk assessments, etc.) is of special interest.

Transition Opportunities:

System components that meet or exceed TSA's demanding security standards for aviation may be candidates for inclusion in systems at over 5,000 airports, scanning over 1.3 million pieces of checked luggage daily, across the country. As even small improvements in false alarm rates can save TSA millions of dollars annually, transition of successful developments is well-motivated. Transition would be to TSA's Office of Requirements and Capabilities Analysis (ORCA) or other appropriate office. Additionally, TSA-qualified screening systems may adapt with minimal modification to aviation security needs in other nations. Screening solutions must complete Operational Test and Evaluation (OT&E) at Government facilities.

division icon
Securing Aviation
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Aviation (SEC AVN)
Priority R&D Need:  Rapid Detection and Alarming of Explosives
Topic Number:  SEC AVN 04-06
Topic Title:  Explosive Detection in Checked Baggage- Advanced X-Ray System Development
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Development and testing of full up system engineering design models (EDMs) (TRL 6-7 level of maturity). The goal is to achieve a significantly enhanced capability to robustly detect explosive threats, reduce primary baggage screening false alarm rates on all explosive threat classes, and increase passenger baggage screening throughput under real life operating conditions. The government seeks novel system concepts or novel improvements to existing system designs which w ... more
Development and testing of full up system engineering design models (EDMs) (TRL 6-7 level of maturity). The goal is to achieve a significantly enhanced capability to robustly detect explosive threats, reduce primary baggage screening false alarm rates on all explosive threat classes, and increase passenger baggage screening throughput under real life operating conditions. The government seeks novel system concepts or novel improvements to existing system designs which will deliver enhanced operational performance. less
Topic Research Type:  Type I, Type II
End Objective:

The Checked Baggage Program seeks to improve detection capabilities of currently deployed systems as well as create novel approaches to solve explosive detection. While the primary focus of the portfolio is on aviation security, technologies that also apply to other checked baggage scenarios (check point scenarios, other modes of transportation, special events, etc.) are of interest as well. S&T understands that 'silver bullet' technologies that solve all possible threat scenarios are unlikely, and welcomes unique research materials regarding new capabilities that address specific threats within a broader system-of-systems security architecture.

TRL Sought:  3-4
TRL at Conclusion:  6-7
Transition Customer or Program:

Transportation Security Administration (TSA)

Background Information and S&T Challenges:

S&T is especially interested in technology that minimizes the Government's lifecycle costs and facilitates integration in a modular fashion. As such, S&T may prioritize the development of technology that better leverages open architectures, interfaces, and standards, or has additional utility in other markets that drive more favorable economies of scale. Technology that can readily adapt to multiple concepts of operations (e.g., to different threat environments, requirements for throughput, passenger risk assessments, etc.) is of special interest.

Transition Opportunities:

Systems that meet or exceed TSA's demanding security standards for aviation may be candidates for airport usage across the country. Additionally, TSA-qualified screening systems may adapt with minimal modification to aviation security needs in other nations. Screening solutions must complete Operational Test and Evaluation (OT&E) at Government facilities.

division icon
Securing Aviation
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Aviation (SEC AVN)
Priority R&D Need:  Rapid Detection and Alarming of Explosives
Topic Number:  SEC AVN 04-07
Topic Title:  Explosive Detection in Checked Baggage- Test and Evaluation
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Third-party test and evaluation capabilities relevant to aviation security and similar environments. Test articles which provide meaningful simulation of the checked baggage explosive detection environment. Analytical capabilities which will allow rapid, meaningful determination of system performance and provide direction for future system development. Specialized modeling and simulation capabilities that inform and support testing and evaluation activities are also of ... more
Third-party test and evaluation capabilities relevant to aviation security and similar environments. Test articles which provide meaningful simulation of the checked baggage explosive detection environment. Analytical capabilities which will allow rapid, meaningful determination of system performance and provide direction for future system development. Specialized modeling and simulation capabilities that inform and support testing and evaluation activities are also of interest. less
Topic Research Type:  Type III
End Objective:

The Checked Baggage Program seeks to improve detection capabilities of currently deployed EDS systems as well as create novel approaches to solve explosive detection. While the primary focus of the portfolio is on aviation security, technologies that also apply to other checked baggage scenarios (check point scenarios, other modes of transportation, special events, etc.) are of interest as well. S&T understands that 'silver bullet' technologies that solve all possible threat scenarios are unlikely, and welcomes unique research materials regarding new capabilities that address specific threats within a broader system-of-systems security architecture.

TRL Sought:  9
TRL at Conclusion:  9
Transition Customer or Program:

Transportation Security Administration (TSA)

Background Information and S&T Challenges:

S&T routinely performs feasibility analysis and developmental testing at a small number of locations. As these locations have to prioritize operational evaluation of equipment as directed by TSA, testing availability for S&T projects and vendors is sometimes limited. S&T is interested in technological developments that expands third-party testing opportunities in a regular and standardized fashion. S&T may prioritize the development of technology that better leverages open architectures, interfaces, and standards, or has additional utility in other markets that drive more favorable economies of scale. Technology that can readily adapt to the testing of multiple concepts of operations (e.g., to different threat environments, requirements for throughput, passenger risk assessments, etc.) is of special interest.

Transition Opportunities:

Systems or test articles that allowing meaningful testing to occur may transition to TSL or be used by the government on a routine recurring basis consistent with program development cycles and test opportunities. Additionally, qualified test articles and system may adapt with minimal modification to aviation security development needs in other nations. Solutions must complete Operational Test and Evaluation (OT&E) at Government facilities.

division icon
Securing Aviation
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Aviation (SEC AVN)
Priority R&D Need:  Distinguishing Threats from Non-threats on Passengers
Topic Number:  SEC AVN 05-01
Topic Title:  Screening at Speed- Passenger Analysis
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
The Apex Screening at Speed Program is pursuing transformative R&D activities that support a future vision for increasing security effectiveness while dramatically reducing wait times and improving the passenger experience. These future capabilities will be interconnected through non-proprietary interfaces in a system of systems that is more secure, efficient, flexible, and adaptable than currently deployed sensors.

S&T seeks hardware and software technologies t ... more
The Apex Screening at Speed Program is pursuing transformative R&D activities that support a future vision for increasing security effectiveness while dramatically reducing wait times and improving the passenger experience. These future capabilities will be interconnected through non-proprietary interfaces in a system of systems that is more secure, efficient, flexible, and adaptable than currently deployed sensors.

S&T seeks hardware and software technologies that identify and assess the security risk presented by passengers at the aviation checkpoint. These technologies may be intended for deployment within the immediate checkpoint, or in a more distributed fashion throughout an airport or similar venue. All systems should conform to cybersecurity best practices and support capabilities to enable risk-based screening as well as TSA's Security Technology Integration Program (STIP). less
Topic Research Type:  Type II, Type III
End Objective:

The checkpoint of the future seeks to improve the passenger experience while enhancing detection capabilities. While the primary focus of the portfolio is on aviation security, technologies that also apply to other checkpoint scenarios (other modes of transportation, special events, etc.) are of interest as well. S&T understands that 'silver bullet' technologies that solve all possible threat scenarios are unlikely, and welcomes proposals regarding new capabilities that address specific threats within a broader system-of-systems security architecture.

TRL Sought:  4-7
TRL at Conclusion:  7-8
Transition Customer or Program:

Transportation Security Administration (TSA)

Background Information and S&T Challenges:

S&T is especially interested in technology that minimizes the Government's lifecycle costs and facilitates integration in a modular fashion. As such, S&T may prioritize the development of technology that better leverages open architectures, interfaces, and standards, or has additional utility in other markets that drive more favorable economies of scale. Technology that can readily adapt to multiple concepts of operations (e.g., to different threat environments, requirements for throughput, passenger risk assessments, etc.) is of special interest.

Transition Opportunities:

Systems that meet or exceed TSA's demanding security standards for aviation may also be candidates for venues such as critical buildings, stadiums, and other modes of transportation. Additionally, TSA-qualified screening systems may adapt with minimal modification to aviation security needs in other nations.

division icon
Securing Aviation
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Aviation (SEC AVN)
Priority R&D Need:  Efficient and Accurate Detection of Complex Threat Concealment on Passengers and Carried Property
Topic Number:  SEC AVN 06-01
Topic Title:  Screening at Speed- Accessible Property Screening
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
The Apex Screening at Speed Program is pursuing transformative R&D activities that support a future vision for increasing security effectiveness while dramatically reducing wait times and improving the passenger experience. These future capabilities will be interconnected through non-proprietary interfaces in a system of systems that is more secure, efficient, flexible, and adaptable than currently deployed sensors.

S&T seeks hardware and software technologies t ... more
The Apex Screening at Speed Program is pursuing transformative R&D activities that support a future vision for increasing security effectiveness while dramatically reducing wait times and improving the passenger experience. These future capabilities will be interconnected through non-proprietary interfaces in a system of systems that is more secure, efficient, flexible, and adaptable than currently deployed sensors.

S&T seeks hardware and software technologies that screen the accessible property of three hundred or more passengers per hour with minimal need for the separation of liquids, aerosols, gels, or electronics from baggage. Technologies shall contribute to a system of systems that provides detection at TSA's highest security detection standards. These technologies would be able to be certified to TSA's Accessible Property Screening System standards standalone or when integrated with other systems. Technologies would ideally be capable of adapting or upgrading quickly to respond to emerging threats. Of highest interest are technologies that contribute to a system of systems that can adapt dynamically to TSA-provided individual risk assessments. All systems should conform to cybersecurity best practices and support capabilities to enable risk-based screening as well as TSA's Security Technology Integration Program (STIP). less
Topic Research Type:  Type II, Type III
End Objective:

S&T seeks systems that can meet or exceed TSA's Accessible Property Screening System security standards, and significantly accelerate the overall throughput of accessible property. This acceleration may come from a reduction in the current need to divest certain items (electronics, liquids, aerosols, gels, etc.) from bags, a reduction of false alarms, faster processing, improved human-systems integration with Transportation Security Officers, or other means. While the primary focus of the portfolio is on aviation security, technologies that also apply to other checkpoint scenarios (other modes of transportation, special events, etc.) are of interest as well. S&T understands that 'silver bullet' technologies that solve all possible threat scenarios are unlikely, and welcomes unique research materials regarding new capabilities that address specific threats within a broader system-of-systems security architecture.

TRL Sought:  4-7
TRL at Conclusion:  7-8
Transition Customer or Program:

Transportation Security Administration (TSA)

Background Information and S&T Challenges:

S&T is especially interested in technology that minimizes the Government's lifecycle costs and facilitates integration in a modular fashion. As such, S&T may prioritize the development of technology that better leverages open architectures, interfaces, and standards, or has additional utility in other markets that drive more favorable economies of scale. Technology that can readily adapt to multiple concepts of operations (e.g., to different threat environments, requirements for throughput, passenger risk assessments, etc.) is of special interest.

Transition Opportunities:

Systems that meet or exceed TSA's demanding security standards for aviation may also be candidates for venues such as critical buildings, stadiums, and other modes of transportation. Additionally, TSA-qualified screening systems may adapt with minimal modification to aviation security needs in other nations.

division icon
Securing Aviation
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Aviation (SEC AVN)
Priority R&D Need:  Efficient and Accurate Detection of Complex Threat Concealment on Passengers and Carried Property
Topic Number:  SEC AVN 06-02
Topic Title:  Screening at Speed- Enabling Capabilities
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
The Apex Screening at Speed Program is pursuing transformative R&D activities that support a future vision for increasing security effectiveness while dramatically reducing wait times and improving the passenger experience. These future capabilities will be interconnected through non-proprietary interfaces in a system of systems that is more secure, efficient, flexible, and adaptable than currently deployed sensors.

S&T seeks component technologies that improve ... more
The Apex Screening at Speed Program is pursuing transformative R&D activities that support a future vision for increasing security effectiveness while dramatically reducing wait times and improving the passenger experience. These future capabilities will be interconnected through non-proprietary interfaces in a system of systems that is more secure, efficient, flexible, and adaptable than currently deployed sensors.

S&T seeks component technologies that improve the overall capabilities of traditional checkpoint systems and their operators. These upgrades, complements, or add-ons to systems may bolster an existing capability (such as passenger screening systems or accessible property screening systems), add a new and orthogonal capability, or improve the passenger or operator experience while maintaining current security capabilities. Unique research materials to alter existing security systems should be bolstered by engagement and support with the appropriate vendors. All systems should conform to cybersecurity best practices and support capabilities to enable risk-based screening as well as TSA's Security Technology Integration Program (STIP). less
Topic Research Type:  Type II, Type III
End Objective:

The checkpoint of the future seeks to improve the passenger experience while enhancing detection capabilities. While the primary focus of the portfolio is on aviation security, technologies that also apply to other checkpoint scenarios (other modes of transportation, special events, etc.) are of interest as well. S&T understands that 'silver bullet' technologies that solve all possible threat scenarios are unlikely, and welcomes unique research materials regarding new capabilities that address specific threats within a broader system-of-systems security architecture.

TRL Sought:  4-7
TRL at Conclusion:  7-8
Transition Customer or Program:

Transportation Security Administration (TSA)

Background Information and S&T Challenges:

S&T is especially interested in technology that minimizes the Government's lifecycle costs and facilitates integration in a modular fashion. S&T's challenge is to deliver systems that can be maintained, adapted, and upgraded in an efficient manner. As such, S&T may prioritize the development of technology that better leverages open architectures, interfaces, and standards, or has additional utility in other markets that drive more favorable economies of scale. Technology that can readily adapt to multiple concepts of operations (e.g., to different threat environments, requirements for throughput, passenger risk assessments, etc.) is of special interest.

Transition Opportunities:

Systems that meet or exceed TSA's demanding security standards for aviation may also be candidates for venues such as critical buildings, stadiums, and other modes of transportation. Additionally, TSA-qualified screening systems may adapt with minimal modification to aviation security needs in other nations.

division icon
Securing Aviation
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Aviation (SEC AVN)
Priority R&D Need:  Efficient and Accurate Detection of Complex Threat Concealment on Passengers and Carried Property
Topic Number:  SEC AVN 06-03
Topic Title:  Screening at Speed- Security Architecture
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
The Apex Screening at Speed Program is pursuing transformative R&D activities that support a future vision for increasing security effectiveness while dramatically reducing wait times and improving the passenger experience. These future capabilities will be interconnected through non-proprietary interfaces in a system of systems that is more secure, efficient, flexible, and adaptable than currently deployed sensors.

Current checkpoints consist of sensors (X-ray ... more
The Apex Screening at Speed Program is pursuing transformative R&D activities that support a future vision for increasing security effectiveness while dramatically reducing wait times and improving the passenger experience. These future capabilities will be interconnected through non-proprietary interfaces in a system of systems that is more secure, efficient, flexible, and adaptable than currently deployed sensors.

Current checkpoints consist of sensors (X-ray systems, bottled liquid scanners, passenger screening systems, explosive trace detection systems, etc.) that operate relatively independently. S&T seeks designs and implementation plans for gaining improved performance by integrating existing or future security capabilities into a system of systems. Proposed architectures may have creative means to combine layouts, primary screening modalities, secondary screening and alarm resolution capabilities, distributed sensors, analytics, data from beyond the traditional checkpoint, and other parameters that improve the overall security posture. Performance upgrades may encompass improved security, throughput, passenger experience, reliability, or other factors. All components should conform to cybersecurity best practices and support capabilities to enable risk-based screening as well as TSA's Security Technology Integration Program (STIP). less
Topic Research Type:  Type II, Type III
End Objective:

The checkpoint of the future seeks to improve the passenger experience while enhancing detection capabilities. While the primary focus of the portfolio is on aviation security, technologies that also apply to other checkpoint scenarios (other modes of transportation, special events, etc.) are of interest as well. S&T understands that 'silver bullet' technologies that solve all possible threat scenarios are unlikely, and welcomes unique research materials regarding new capabilities that address specific threats within a broader system-of-systems security architecture. The end objective includes systems that are interconnected to collect and utilize security data more effectively to meet TSA's highest security standards at throughputs of 300+ passengers per lane, per hour. The systems will also more efficiently occupy space at the checkpoint to optimize value per square foot.

TRL Sought:  4-7
TRL at Conclusion:  7-8
Transition Customer or Program:

Transportation Security Administration (TSA)

Background Information and S&T Challenges:

S&T is challenged to move from the current "standalone" architecture employed at the checkpoint to a more efficient, integrated concept. To meet the challenge, S&T needs to maintain data integrity, cybersecurity, and effective analytics in modular configurations that can be adapted, upgraded, and reconfigured based on evolving operational requirements. S&T is especially interested in technology that minimizes the Government's lifecycle costs and facilitates integration in a modular fashion. As such, S&T may prioritize the development of technology that better leverages open architectures, interfaces, and standards, or has additional utility in other markets that drive more favorable economies of scale. Technology that can readily adapt to multiple concepts of operations (e.g., to different threat environments, requirements for throughput, passenger risk assessments, etc.) is of special interest.

Transition Opportunities:

Systems that meet or exceed TSA's demanding security standards for aviation may also be candidates for venues such as critical buildings, stadiums, and other modes of transportation. Additionally, TSA-qualified screening systems may adapt with minimal modification to aviation security needs in other nations.

division icon
Securing Aviation
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Aviation (SEC AVN)
Priority R&D Need:  Efficient and Accurate Detection of Complex Threat Concealment on Passengers and Carried Property
Topic Number:  SEC AVN 06-04
Topic Title:  Screening at Speed- Test and Evaluation
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 

The Apex Screening at Speed Program is pursuing transformative R&D activities that support a future vision for increasing security effectiveness while dramatically reducing wait times and improving the passenger experience. These future capabilities will be interconnected through non-proprietary interfaces in a system of systems that is more secure, efficient, flexible, and adaptable than currently deployed sensors.

S&T seeks third-party test and evaluati ... more

The Apex Screening at Speed Program is pursuing transformative R&D activities that support a future vision for increasing security effectiveness while dramatically reducing wait times and improving the passenger experience. These future capabilities will be interconnected through non-proprietary interfaces in a system of systems that is more secure, efficient, flexible, and adaptable than currently deployed sensors.

S&T seeks third-party test and evaluation checkpoint capabilities relevant to aviation security and similar environments to accelerate the certification and deployment of checkpoint screening systems under TSA's Passenger Screening Program and Electronic Baggage Screening Program. Specialized modeling and simulation capabilities that inform, accelerate, develop and support testing and evaluation activities are also of interest.

less
Topic Research Type:  Type II, Type III
End Objective:

The checkpoint of the future seeks to improve the passenger experience while enhancing detection capabilities. While the primary focus of the portfolio is on aviation security, technologies that also apply to other checkpoint scenarios (other modes of transportation, special events, etc.) are of interest as well. S&T understands that 'silver bullet' technologies that solve all possible threat scenarios are unlikely, and welcomes unique research materials regarding new capabilities that address specific threats within a broader system-of-systems security architecture.

TRL Sought:  4-7
TRL at Conclusion:  7-8
Transition Customer or Program:

Transportation Security Administration (TSA)

Background Information and S&T Challenges:

S&T is especially interested in technology that minimizes the Government's lifecycle costs and facilitates integration in a modular fashion. As such, S&T may prioritize the development of technology that better leverages open architectures, interfaces, and standards, or has additional utility in other markets that drive more favorable economies of scale. Technology that can readily adapt to multiple concepts of operations (e.g., to different threat environments, requirements for throughput, passenger risk assessments, etc.) is of special interest.

Transition Opportunities:

Systems that meet or exceed TSA's demanding security standards for aviation may also be candidates for venues such as critical buildings, stadiums, and other modes of transportation. Additionally, TSA-qualified screening systems may adapt with minimal modification to aviation security needs in other nations.

division icon
Securing Aviation
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Protecting from Terrorist Attacks (PROT)
Priority R&D Need:  Disease and Biological Threat Detection, Identification, and Classification in Field Operational Environments
Topic Number:  PROT 03-01
Topic Title:  Foreign Animal Disease Vaccines and Diagnostics.
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Apply biological-based, pathogen agnostic medical countermeasure vaccine and diagnostic platforms to develop foreign animal and emerging zoonotic livestock disease vaccines and diagnostic assays candidates for testing and evaluation. Provide conceptual design and implementation strategies for modeling and analysis of foreign animal and emerging zoonotic livestock disease pathogens (at regional and national scales). Product candidates are strongly recommended to have indu ... more
Apply biological-based, pathogen agnostic medical countermeasure vaccine and diagnostic platforms to develop foreign animal and emerging zoonotic livestock disease vaccines and diagnostic assays candidates for testing and evaluation. Provide conceptual design and implementation strategies for modeling and analysis of foreign animal and emerging zoonotic livestock disease pathogens (at regional and national scales). Product candidates are strongly recommended to have industry involvement, and meet USDA CVB, National Veterinary Stockpile and/or National Animal Health Laboratory Network requirements (as applicable). less
Topic Research Type:  Type I
End Objective:

Expanding countermeasure discovery and development of new and emerging animal and zoonotic infectious diseases using cutting edge broad spectrum vaccines, and metaphylactic and biotherapeutic technologies. Developing end-user friendly, rapid diagnostic platforms for agricultural pathogens.

TRL Sought:  3-5
TRL at Conclusion:  6-7
Transition Customer or Program:

PIADC-USDA-DHS, APHIS, NBAF

Background Information and S&T Challenges:

New and improved animal pathogen vaccine platforms expressing multiple antigenic determinants to reduce the scope and number of individual vaccines (i.e., covering multiple serotypes to reduce the necessary number of vaccines that are needed for agricultural linked diseases. Improved and end-user friendly, portable and hand-held rapid detection and surveillance platforms and devices are also needed to provide front-line personnel the ability to screen and detect various viral diseases in livestock. S&T Challenges and Capability Gaps include few or no efforts to develop countermeasures on new and emerging animal and zoonotic diseases, or efforts on other veterinary species of agricultural importance with respect to transboundary animal diseases (e.g., ovine, caprine, avian). There are few or no efforts to develop veterinary adjuvant, and there is a lack of robust, next-generation adjuvant development programs for lead vaccine platforms. There is also a lack of countermeasure development projects focused on lead optimization, broad spectrum metaphylactic or biotherapeutic candidates for animal diseases. Finally, there is a requirement for end-user-friendly, rapid diagnostics and detection and surveillance methods and platforms for foreign animal diseases and zoonoses.

Transition Opportunities:

Transition opportunities include multiple Federal and State agencies with responsibilities for the monitoring, protection (vaccinations and countermeasures), detection and surveillance against foreign animal diseases. DHS-PIADC-USDA, NBAF, APHIS, State Agricultural Agencies.

Supporting Information and Links:

division icon
Protecting from Terrorist Attacks
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Borders (SEC BORD)
Priority R&D Need:  Integrated and Improved Sensors, Systems, and Data
Topic Number:  SEC BORD 03-01
Topic Title:  Unmanned Aircraft Systems (UAS) Detection, Tracking and Classification-Test and Evaluation
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Unmanned Aircraft Systems (UAS) Detection, Tracking, and Classification: Unmanned Aircraft Systems can represent a threat to people, critical infrastructure, and border alike. Technologies and methods to detect, track, and classify UAS's in complex environments, including the determination of intent. Unique research material for test and evaluation of technologies to detect, track, and locate the pilot controller of a UAS vehicle.
Unmanned Aircraft Systems (UAS) Detection, Tracking, and Classification: Unmanned Aircraft Systems can represent a threat to people, critical infrastructure, and border alike. Technologies and methods to detect, track, and classify UAS's in complex environments, including the determination of intent. Unique research material for test and evaluation of technologies to detect, track, and locate the pilot controller of a UAS vehicle. less
Topic Research Type:  Type II, Type III
End Objective:

The end objective of this effort is develop and demonstrate innovative, reliable, easy-to-use, and easy-to-deploy technologies that allow the Department of Homeland Security Components to accurately and consistently detect, track, classify, and conduct threat assessments of Unmanned Aerial Systems in variable and complex environments.

TRL Sought:  5-6
TRL at Conclusion:  7
Transition Customer or Program:

Customs and Border Protection / United States Coast Guard

Background Information and S&T Challenges:

DHS S&T is working to facilitate the development of technologies that allow the DHS Component to accurately and consistently detect, track, classify, and conduct threat assessments of Unmanned Aerial Systems in variable and complex environments. As such, it is open to any potentially viable technique, methodology, or approach that fulfills the aforementioned requirements. The primary challenge is target discrimination as birds, debris, insects, and other airborne objects appear as valid UAS to many sensors. Other challenges include interference with and damage of other systems using the same wave bands (including visual bands in the case of high-power laser systems), high noise levels such as the use of acoustics sensors in urban environments, and excessive target-sensor stand-off distances. Technologies should address, but not be limited to, the following requirements:

1. Easy-to-Use
2. Easy-to-Deploy
3. Work in variable weather conditions
4. Work at variable altitudes
5. Work in densely populated urban centers or sparsely populated rural areas
6. Should not interfere with customer component standard operations
7. Should not cause disruptions of civilian services
8. Have a low false alarm rate in the areas of detection, tracking, and classification
9. Capable of being configured or converted for portable operations
10. Provide users with real-time analysis and after-action reports
11. Capable of being networked incorporating robust cybersecurity attributes

Transition Opportunities:

Selected industry participants will have their technologies exposed to DHS Component acquisition and operations personnel during development and demonstration.

Supporting Information and Links:

division icon
Securing Borders
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Borders (SEC BORD)
Priority R&D Need:  Integrated and Improved Sensors, Systems, and Data
Topic Number:  SEC BORD 03-02
Topic Title:  Unmanned Aircraft Systems (UAS) Detection, Tracking and Classification-Develop Advanced Technology
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Unmanned Aircraft Systems (UAS) Detection, Tracking, and Classification: Unmanned Aircraft Systems can represent a threat to people, critical infrastructure, and border alike. Technologies and methods to detect, track, and classify UAS's in complex environments, including the determination of intent. Unique research material for developing advanced technologies to detect, track, and locate the pilot controller of a UAS vehicle.
Unmanned Aircraft Systems (UAS) Detection, Tracking, and Classification: Unmanned Aircraft Systems can represent a threat to people, critical infrastructure, and border alike. Technologies and methods to detect, track, and classify UAS's in complex environments, including the determination of intent. Unique research material for developing advanced technologies to detect, track, and locate the pilot controller of a UAS vehicle. less
Topic Research Type:  Type II, Type III
End Objective:

The end objective of this effort is to collect unique research material that address and explore the development and deployment of innovative, reliable, easy-to-use, and easy-to-deploy technologies that allow the component customers of the Department of Homeland Security's Science and Technology Directorate to accurately and consistently detect, track, classify, and conduct a cursory threat assessment of Unmanned Aircraft Systems in variable and complex environments.

TRL Sought:  5-6
TRL at Conclusion:  7
Transition Customer or Program:

Customs and Border Protection, US Border Patrol

Background Information and S&T Challenges:

DHS S&T is working to facilitate the development of technologies that allow the component customers of the Department of Homeland Security's Science and Technology Directorate to accurately and consistently detect, track, classify, and conduct a cursory threat assessment of Unmanned Aircraft Systems in variable and complex environments. As such, it is open to any potentially viable technique, methodology, or approach that fulfills the aforementioned requirements on behalf of our component customers. Proposed systems should fulfill, but not be limited to, the following requirements:

1. Easy-to-Use
2. Easy-to-Deploy
3. Work in variable weather conditions
4. Work at variable altitudes
5. Work in densely populated urban centers or sparsely populated communities
6. Should not interfere with customer component standard operations
7. Should not cause disruptions of civilian services
8. Have a low false alarm rate in the areas of detection, tracking, and classification
9. Have a smaller portable version
10. Provide users with real-time analysis and after-action reports
11. Should have networking capabilities
12. Should have high-level cybersecurity capabilities

Transition Opportunities:

Industry participants chosen to take part in DHS S&T UAS Detection, Tracking, and Classification Programs will carry out projects whose ultimate objective and mission will fulfill key requirements defined by DHS S&T component customers. DHS S&T funded projects will have clearly defined transition requirements consistent with the needs of DHS S&T component customers.

Supporting Information and Links:

division icon
Securing Borders
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Borders (SEC BORD)
Priority R&D Need:  Integrated and Improved Sensors, Systems, and Data
Topic Number:  SEC BORD 03-03
Topic Title:  Unmanned Aircraft Systems Mitigation-Test and Evaluation
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Unmanned Aerial Systems (UAS) Mitigation: Unmanned Aerial Systems can represent a threat to people, critical infrastructure, and borders alike. Technologies and methods to mitigate either the UAS aircraft, communications links, or the controllers in environments which may be complex and/or urban. Modifications or adjuncts to existing systems that extent their capabilities to include mitigation also fall under this topic.
Unmanned Aerial Systems (UAS) Mitigation: Unmanned Aerial Systems can represent a threat to people, critical infrastructure, and borders alike. Technologies and methods to mitigate either the UAS aircraft, communications links, or the controllers in environments which may be complex and/or urban. Modifications or adjuncts to existing systems that extent their capabilities to include mitigation also fall under this topic. less
Topic Research Type:  Type II, Type III
End Objective:

The end objective of this effort the development and deployment of innovative, reliable, easy-to-use, and easy-to-deploy technologies that allow DHS Components to accurately and consistently mitigate Unmanned Aerial Systems in variable and complex environments.

TRL Sought:  5-6
TRL at Conclusion:  7
Transition Customer or Program:

Customs and Border Protection

Background Information and S&T Challenges:

DHS S&T is working to facilitate the development of technologies that allow the component customers of the Department of Homeland Security's Science and Technology Directorate to accurately and consistently mitigate Unmanned Aircraft Systems as a threat in variable and complex environments. As such, the Directorate is open to any potentially viable technique, methodology, or approach that fulfills the aforementioned requirements on behalf of our component customers. Proposed systems should fulfill, but not be limited to, the following requirements:

 1. Innovative Approaches in the following areas should be considered:
        a. Directional RF/GNSS Jamming
        b. Omni-Directional RF/GNSS Jamming
        c. Spoofing (cyber attacking)
        d. Kinetic Attacks
 2. Easy-to-Use
 3. Easy-to-Deploy
 4. Work in variable weather conditions
 5. Work at variable altitudes
 6. Work in densely populated urban centers or sparsely populated communities
 7. Should not interfere with customer component standard operations
 8. Should not cause disruptions of civilian services
 9. Be effective at variable distances
10. Have a smaller portable version
11. Provide users with real-time analysis and after-action reports
12. Should have networking capabilities
13. Should have integrated cybersecurity protections

Transition Opportunities:

Industry participants chosen to take part in DHS S&T UAS Threat Mitigation Programs will carry out projects whose ultimate objective and mission will fulfill key requirements defined by DHS S&T component customers. DHS S&T funded projects will have clearly defined transition requirements consistent with the needs of DHS S&T component customers.

Supporting Information and Links:

division icon
Securing Borders
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Borders (SEC BORD)
Priority R&D Need:  Integrated and Improved Sensors, Systems, and Data
Topic Number:  SEC BORD 03-04
Topic Title:  Unmanned Aircraft Systems Mitigation-Develop New or Advanced Capability
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Unmanned Aerial Systems (UAS) Mitigation: Unmanned Aerial Systems can represent a threat to people, critical infrastructure, and borders alike. Technologies and methods to mitigate either the UAS aircraft, communications links, or the controllers in environments which may be complex and/or urban. Modifications or adjuncts to existing systems that extent their capabilities to include mitigation also fall under this topic.
Unmanned Aerial Systems (UAS) Mitigation: Unmanned Aerial Systems can represent a threat to people, critical infrastructure, and borders alike. Technologies and methods to mitigate either the UAS aircraft, communications links, or the controllers in environments which may be complex and/or urban. Modifications or adjuncts to existing systems that extent their capabilities to include mitigation also fall under this topic. less
Topic Research Type:  Type II, Type III
End Objective:

The end objective of this effort the development and deployment of innovative, reliable, easy-to-use, and easy-to-deploy technologies that allow DHS Components to accurately and consistently mitigate Unmanned Aerial Systems in variable and complex environments.

TRL Sought:  5-6
TRL at Conclusion:  7
Transition Customer or Program:

Customs and Border Protection

Background Information and S&T Challenges:

DHS S&T is working to facilitate the development of technologies that allow the component customers of the Department of Homeland Security's Science and Technology Directorate to accurately and consistently mitigate Unmanned Aircraft Systems as a threat in variable and complex environments. As such, the Directorate is open to any potentially viable technique, methodology, or approach that fulfills the aforementioned requirements on behalf of our component customers. Proposed systems should fulfill, but not be limited to, the following requirements:

 1. Innovative Approaches in the following areas should be considered:
        a. Directional RF/GNSS Jamming
        b. Omni-Directional RF/GNSS Jamming
        c. Spoofing (cyber attacking)
        d. Kinetic Attacks
 2. Easy-to-Use
 3. Easy-to-Deploy
 4. Work in variable weather conditions
 5. Work at variable altitudes
 6. Work in densely populated urban centers or sparsely populated communities
 7. Should not interfere with customer component standard operations
 8. Should not cause disruptions of civilian services
 9. Be effective at variable distances
10. Have a smaller portable version
11. Provide users with real-time analysis and after-action reports
12. Should have networking capabilities
13. Should have integrated cybersecurity protections

Transition Opportunities:

Industry participants chosen to take part in DHS S&T UAS Threat Mitigation Programs will carry out projects whose ultimate objective and mission will fulfill key requirements defined by DHS S&T component customers. DHS S&T funded projects will have clearly defined transition requirements consistent with the needs of DHS S&T component customers.

Supporting Information and Links:

division icon
Securing Borders
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Borders (SEC BORD)
Priority R&D Need:  Actionable Intelligence Gathering and Sharing
Topic Number:  SEC BORD 04-01
Topic Title:  Human Trafficking and Modern Slavery
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Improvements in this capability can include: (1)Research, development, tools, and technologies to improve the detection, analysis, and understanding of human trafficking, including contextual factors that may influence incidences and patterns of human trafficking; (2)knowledge to better understand human trafficking as a process and its impacts on individuals, communities, the United States, and the systems within; and (3)gap analysis to identify aspects of human traffic ... more
Improvements in this capability can include: (1)Research, development, tools, and technologies to improve the detection, analysis, and understanding of human trafficking, including contextual factors that may influence incidences and patterns of human trafficking; (2)knowledge to better understand human trafficking as a process and its impacts on individuals, communities, the United States, and the systems within; and (3)gap analysis to identify aspects of human trafficking (victims or perpetrators) in greatest need of empirical research. less
Topic Research Type:  Type I
End Objective:

Advance operationally-relevant, end-user focused applied social and behavioral science research that will enable decision makers, inform policy makers, and assist operational partners in mitigating the human and monetary costs of human trafficking.

TRL Sought:  1-3
TRL at Conclusion:  3
Transition Customer or Program:

DHS Blue Campaign, Immigrations and Customs Enforcement, Customs and Border Protection, DHS Policy/Trade Policy

Background Information and S&T Challenges:

The Human Trafficking and Modern Slavery program will pursue evidence-based research to address the growing phenomenon of human trafficking. Worldwide there are an estimated 20.9 million victims of human trafficking, comprising an industry worth more than $150 billion in illegal profits. Given the scale, evolving nature, and complexity of human trafficking, combatting the problem poses a significant challenge, particularly for those on the front lines.

Transition Opportunities:

Opportunities for higher return on investment include leveraging and integrating findings and lessons learned to improve efficiency of operational components.

Supporting Information and Links:

division icon
Securing Borders
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Borders (SEC BORD)
Priority R&D Need:  Actionable Intelligence Gathering and Sharing
Topic Number:  SEC BORD 04-02
Topic Title:  Non-Intrusive Screening to Detect Synthetic Opioids and Other Illicit Drugs
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Illicit drugs, such as fentanyl and other synthetic opioids, are entering the US at alarming rates. DHS requires the ability to non-intrusively screen bulk packaged materials (individual parcels/packages, mail bags, cargo, or containers) to detect synthetic opioids and other illicit drugs being smuggled into the United States at International Mail Facilities (IMFs), Express Consignment Centers (ECCs), and Border Ports of Entry (BPE). Topic seeks technologies that result ... more
Illicit drugs, such as fentanyl and other synthetic opioids, are entering the US at alarming rates. DHS requires the ability to non-intrusively screen bulk packaged materials (individual parcels/packages, mail bags, cargo, or containers) to detect synthetic opioids and other illicit drugs being smuggled into the United States at International Mail Facilities (IMFs), Express Consignment Centers (ECCs), and Border Ports of Entry (BPE). Topic seeks technologies that result in improvements to screening capabilities for end-users to include (1) advanced technologies that offer novel improvements or approaches to three-dimensional imaging; (2) algorithms or other analytical approaches to assist in operators in anomaly detection and reduce false alarms; and (3) technologies that will enable end-users to discriminate illicit materials from lawful materials to resolve alarms. Technologies are sought that enable end-users to conduct rapid, high-throughput inspection operations with minimal disruption to the flow of commerce and can be readily integrated into current Customs and Border Protection (CBP) field inspection operations. less
Topic Research Type:  Type III
End Objective:

A technology that improves non-intrusive screening capabilities to detect and interdict illicit drugs with minimal disruption to the flow of commerce, is likely to be adopted by end users, and has a path to transition and/or commercialization.

TRL Sought:  5-7
TRL at Conclusion:  7-9
Transition Customer or Program:

Customs and Border Protection Office of Field Operations

Background Information and S&T Challenges:

The President's Commission on Combating Drug Addiction and the Opioid Crisis final report recommended that DHS use additional technologies to detect and intercept synthetic opioids, like fentanyl, and other illicit drugs. The magnitude and urgency of the opioid crisis demands that S&T take an innovative approach to develop near-term deployable solutions that impact the supply of opioids entering the United States.

With the tightened controls on the legal acquisition of fentanyl and other medical opioids, the problem of controlling the illegal supply has only been made more pressing to solve. Illegal synthetic opioids are largely being provided to users and criminal elements from overseas and are entering the US via the mail (USPS) and express consignment (Fed Ex, DHL,UPS). Customs and Border Protection (CBP) Office of Field Operations (OFO) has the mission to inspect items entering the US for illegal material, to include illegal drugs.

The chemical and physical nature of synthetic opioids impose significant limitations to non-intrusive detection and identification of these substances in packaged mail and parcels, and other vessels for illegal smuggling. This topic seeks technologies that can improve the ability for end-users to rapidly screen bulk packaged materials (e.g., packages/parcels, containers, cargo) to detect synthetic opioids and other drugs, to include: (1) advanced technologies that offer three-dimensional imaging; (2) technologies that will enable end-users to discriminate illicit materials from lawful materials; and (3) technologies that enable end-users to continue normal operations with minimal disruption to flow of commerce. Such technology is critical to increasing seizures and thereby taking illegal drugs off the street.

Offerors should consider the operational environment of DHS end-users at BPE and IMFs and factors that would facilitate successful transition/adoption. These factors include, but are not limited to, training and usability, ease of integration into existing operational environments, lifecycle costs, and reliability. These considerations should be part of an Offeror's transition strategy.

Transition Opportunities:

Opportunities for higher return on investment include patents and licenses and/or commercialization.

Supporting Information and Links:

division icon
Securing Borders
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Borders (SEC BORD)
Priority R&D Need:  Dark Aircraft and Vessel Detection, Tracking, and Interdiction
Topic Number:  SEC BORD 05-01
Topic Title:  Sensors for Unmanned Maritime Systems
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
DHS Science & Technology seeks innovative, capable, and reliable sensors to mount on small, commercially available unmanned maritime sensor platforms. The sensors are envisioned to be suitable for the size of the platform, require minimal power (less than 1,000 KVA), capable of functioning above and/or below the surface (as appropriate for the sensor type), and able to be integrated with the platform's communication system using non-proprietary data formats. Sensors are ... more
DHS Science & Technology seeks innovative, capable, and reliable sensors to mount on small, commercially available unmanned maritime sensor platforms. The sensors are envisioned to be suitable for the size of the platform, require minimal power (less than 1,000 KVA), capable of functioning above and/or below the surface (as appropriate for the sensor type), and able to be integrated with the platform's communication system using non-proprietary data formats. Sensors are expected to surveil the surface and/or subsurface for a variety of threats (i.e. fast boats, chemical spills, subsurface vehicles, obstacles, etc.). Sensors are also required to classify the detected object. Sensor system need to be less than 3 kg and marinized for ocean environments. less
Topic Research Type:  Type III
End Objective:

DHS S&T seeks TRL 7-9 technologies to provide sensor capability to existing unmanned maritime system platforms. In the end state, sensors and sensors platforms are envisioned to integrate with existing government command and control systems to aid in the detection, classification, and resolution of maritime threats.

TRL Sought:  7-9
TRL at Conclusion:  8-9
Transition Customer or Program:

United States Coast Guard, Customs and Border Protection

Background Information and S&T Challenges:

One of the key challenges for U.S. homeland security is achieving awareness of the nation's vast maritime domain, which is roughly as large as the nation's land area and extends from New England to Guam. These waters are vital to our nation's prosperity as routes for trade, sources of food, and sources of energy; they also play an important economic role in providing recreation. However, the nation's vast maritime area also imposes requirements on DHS and other agencies. These agencies seek to protect people and property from damage by the sea, the nation from illicit movements via the maritime environment that threaten its security, and the maritime environment itself from both pollution and illicit fishing. To do so, they need to achieve maritime domain awareness (MDA) across diverse regions, as well as the ability to rapidly communicate, integrate, and analyze this information to facilitate effective and appropriate actions. Increasing MDA can contribute to numerous DHS mission sets, including counter drug, migrant interdiction, critical infrastructure surveillance, port and coastal surveillance, environmental monitoring, spill monitoring, fisheries enforcement, and security zone enforcement, and enforcement of laws and treaties.

The goal of this project is to research and integrate technologies that will enable the USCG to conduct more effective operations in support of any of their eleven statutory missions:

  • Port & Waterway Security
  • Drug Interdiction
  • Aids to Navigation
  • Search & Rescue
  • Living Marine Resources
  • Marine Safety
  • Defense Readiness
  • Migrant Interdiction
  • Marine Environmental Protection
  • Ice Operations
  • Law Enforcement

This program will concentrate on Intelligence, Surveillance, Reconnaissance (ISR) missions to provide situation awareness and critical law enforcement information using unmanned maritime systems (UMS).

Transition Opportunities:

The potential exists for commercialization of sensors across a broad spectrum of UMS platforms in the federal space. Potential also exists for the use of adapted sensors on platforms other than UMS.

Supporting Information and Links:

division icon
Securing Borders
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Cyberspace (SEC CYB)
Priority R&D Need:  Distributed Cloud-based Communications and Monitoring - Associated/Related Efforts
Topic Number:  SEC CYB 01-01
Topic Title:  Cyber Enabled Networked Physical Systems
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
This is a critical time in the design and deployment of Cyber Enabled Networked Physical Systems (CNPS). Advances in networking, computing, sensing, and control systems have enabled a broad range of new devices. These systems are being designed and deployed now, but unfortunately security is often left as an additional feature that will be bolted on later. Industry is driven by functional requirements and fast moving markets. The design choices being made today will dire ... more
This is a critical time in the design and deployment of Cyber Enabled Networked Physical Systems (CNPS). Advances in networking, computing, sensing, and control systems have enabled a broad range of new devices. These systems are being designed and deployed now, but unfortunately security is often left as an additional feature that will be bolted on later. Industry is driven by functional requirements and fast moving markets. The design choices being made today will directly impact next several decades in transportation, emergency response, medical devices, and so forth. To address these challenges, CSD is engaging in efforts to build security into the design of these critical systems. less
Topic Research Type:  Type II, Type III
End Objective:

Results of this topic should provide new and novel capabilities and solutions to assist DHS, Operations, and Law Enforcement components to improve the understanding and confidence of DHS and the Homeland Security Enterprise (HSE) on how CNPS leverage network environments (trusted and untrusted), devices, and sensors to compute and communicate processes and the security risks and challenges associated with the appropriate level of automation, Machine-to-Machine (M2M), communications, learning, and intelligence.

TRL Sought: 
TRL at Conclusion: 
Transition Customer or Program:

DHS Components, Operations, and Law Enforcement Components

Background Information and S&T Challenges:

This topic is seeking to address various challenges faced by DHS, Operations, and Law Enforcement. CNPS builds upon the CPSSEC Strategy and the nine key strategic drivers identified in the 2015 NITRD CPS Vision Statement. CNPS are being designed and scaled to autonomously compute, communicate, and execute processes from data collected from networks, devices and sensors, and other intelligent systems. As CNPS system design becomes more complex, automated, intelligent, and integrated with legacy networks and systems - Cybersecurity risks and challenges will only increase.

Transition Opportunities:

Developed solutions should transition to federal and law enforcement end-users. Solutions may be brand new capabilities not currently available on the market or current solutions that can be modified to address specific needs.

division icon
Securing Cyberspace
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Cyberspace (SEC CYB)
Priority R&D Need:  Distributed Cloud-based Communications and Monitoring - Associated/Related Efforts
Topic Number:  SEC CYB 01-02
Topic Title:  Internet of Things (IoT) Security (IoTSEC)
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
The research and development of tools and techniques to aid DHS mission and operations components, law enforcement entities, and Critical Infrastructure (CI) asset owners and operators (to include IT and Internet Infrastructures) in addressing the security gaps between existing traditional IT networks and the broad range of new IoT devices being designed and deployed without security considerations.
The research and development of tools and techniques to aid DHS mission and operations components, law enforcement entities, and Critical Infrastructure (CI) asset owners and operators (to include IT and Internet Infrastructures) in addressing the security gaps between existing traditional IT networks and the broad range of new IoT devices being designed and deployed without security considerations. less
Topic Research Type:  Type II, Type III
End Objective:

Results of this topic should provide new and novel capabilities and solutions to assist DHS mission, operations, and law enforcement components to securely leverage, integrate, and interact with IoT systems that affect their operations and assets. Objectives include Detecting, Authenticating, and Updating IoT devices, sensors, and systems to gain comprehensive and near continuous knowledge of an IoT environment.

TRL Sought: 
TRL at Conclusion: 
Transition Customer or Program:

DHS Mission, Operations, and Law Enforcement Components

Background Information and S&T Challenges:

This topic is seeking to address various challenges faced by DHS Mission, Operations, and Law Enforcement components in securing the interactions between existing networks and IoT Devices. The IoT continues to expand and disrupt the nation's CI/IT infrastructure. This expansion has resulted in numerous advancements but has also increased the attack surface for malicious actors.

Transition Opportunities:

Developed solutions should transition to federal and law enforcement end-users. Solutions may be brand new capabilities not currently available on the market or current solutions that can be modified to address specific needs.

division icon
Securing Cyberspace
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Cyberspace (SEC CYB)
Priority R&D Need:  Distributed Cloud-based Communications and Monitoring - Associated/Related Efforts
Topic Number:  SEC CYB 01-03
Topic Title:  National Research Infrastructure of Cyber Security Experimentation
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
The results of this topic will catalyze and support the research, and development of advanced experimental research tools, technologies and methodologies as broadly available national resources. Indicators of the success of this program objective will be the realization of experimental research capabilities, and approaches that reach beyond today's state of the art.
The results of this topic will catalyze and support the research, and development of advanced experimental research tools, technologies and methodologies as broadly available national resources. Indicators of the success of this program objective will be the realization of experimental research capabilities, and approaches that reach beyond today's state of the art. less
Topic Research Type:  Type III
End Objective:

The Cybersecurity Experimentation of the Future (CEF) Testbed will provide cybersecurity researchers with the ability to run experiments on an unclassified secure "virtual internet," through contained environments that can safely test advanced defense mechanisms against live threats without endangering operational networks.The CEF Testbed will provide the cybersecurity research community with a complex test capability and infrastructure (networks, tools, methodologies, tech support) to support national-scale testing of advanced cybersecurity technologies in an open, non-proprietary environment. CEF will enable the applied/research community to share complex cybersecurity experiments, designs, lab setups, software, tools, procedures and data; this allows rapid validation of complex technical findings and avoiding redundant experimental effort.

TRL Sought:  2-3
TRL at Conclusion:  3
Transition Customer or Program:

Transition customers include cybersecurity researchers, instructors and students.

Background Information and S&T Challenges:

Realization of experimental research infrastructures, capabilities, and approaches that reach beyond today's state of the art are needed. These infrastructures, together with similar broad-based objectives that transform discovery, validation, and ongoing analysis in an increasingly complex and challenging domain must provide, as examples:

  • Support for multi-disciplinary, complex, and extreme scale experimentation;
  • Support for emerging research areas such as specialized cyber-physical systems and cybersecurity relevant human behavior;
  • The creation and capture of advances in scientific methodologies, experimental processes, and education; and
  • Strategies for dynamic and flexible experimentation across user communities and infrastructure facilities.

Transition Opportunities:

Developed solutions should transition to federal, state and academic cybersecurity testbeds. Solutions may be brand new capabilities not currently on the market or current solutions that can be modified to address specific requirements.

Supporting Information and Links:
division icon
Securing Cyberspace
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Cyberspace (SEC CYB)
Priority R&D Need:  Distributed Cloud-based Communications and Monitoring - Associated/Related Efforts
Topic Number:  SEC CYB 01-04
Topic Title:  Smart Cities
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
DHS S&T is working closely with National Institute of Standards and Technology (NIST)on NIST's 2017-2018 Global Cities Team Challenge (GCTC) to reach out and raise awareness of the need for cybersecurity in emerging "Smart Cities." The new DHS S&T-NIST Smart and Secure Cities and Communities Challenge (SC3) program is encouraging GCTC participants to adopt designed-in cybersecurity for "smart city" systems that are more secure, reliable, resilient and protective of priva ... more
DHS S&T is working closely with National Institute of Standards and Technology (NIST)on NIST's 2017-2018 Global Cities Team Challenge (GCTC) to reach out and raise awareness of the need for cybersecurity in emerging "Smart Cities." The new DHS S&T-NIST Smart and Secure Cities and Communities Challenge (SC3) program is encouraging GCTC participants to adopt designed-in cybersecurity for "smart city" systems that are more secure, reliable, resilient and protective of privacy. Through SC3, DHS S&T CSD is promoting the development, adoption and implementation of cybersecurity protections within smart-city environments and helping DHS S&T-funded programs and performers bring their solutions into the GCTC. DHS S&T is also calling on innovators from the cybersecurity industry and research community to teach cities, communities and GCTC teams about cyber challenges, cyber physical systems and internet-of-things devices to help address cybersecurity and privacy objectives. less
Topic Research Type:  Type II, Type III
End Objective:

To establish and demonstrate replicable, scalable, and sustainable models for incubation and deployment of interoperable, secure, standard-based solutions using advanced technologies such as Internet of Things (IoT) and Cyber-Physical Systems (CPS) and demonstrate their measurable benefits in cities and communities

TRL Sought:  4-7
TRL at Conclusion:  5-8
Transition Customer or Program:

Homeland Security Enterprise, DHS Components

Background Information and S&T Challenges:

There are numerous organizations across the United States and internationally, including local governments, nonprofit organizations, academic institutions, technologists, and corporations working to enhance and improve life in cities and communities. These projects have primarily focused on enabling IoT devices and applications to interact and improve processes across a range of domains. The challenge is that many of these projects have not focused on the privacy and security aspects of IoT enabled devices.

Transition Opportunities:

Developed solutions should transition to primarily local Smart City communities, but may be applied to a broader range of organizations.

division icon
Securing Cyberspace
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Cyberspace (SEC CYB)
Priority R&D Need:  Human Aspects of Cybersecurity-Associated/Related Efforts
Topic Number:  SEC CYB 02-01
Topic Title:  Identity Management
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Research and development of architectures, technologies and processes needed to enhance the security and trustworthiness of systems and services.
Research and development of architectures, technologies and processes needed to enhance the security and trustworthiness of systems and services. less
Topic Research Type:  Type I, Type II, Type III
End Objective:

Architectures, technologies and processes needed to enhance the security and trustworthiness of systems and services.

TRL Sought: 
TRL at Conclusion: 
Transition Customer or Program:

DHS Components, Homeland Security Enterprise

Background Information and S&T Challenges:

This topic is seeking to address challenges faced by organizations across the following identity management components:

  • User Sign-In covering issuance, authentication, revocation and derivation to ensure that an individual is present and that digital interactions can be attributed to this same individual.
  • Verified Person covering identity establishment, resolution, validation and verification to ensure that the individual is a real person with a real, not synthetic or fabricated, record.
  • Authorization covering consent, enrollment, delegation and authorization to ensure that the individual has provided contextually relevant consent and entitlement information to enable authorization or to appropriately delegate authorization.
  • Digital Identity covering user experience, user notification, session risk and transaction risk to enable an electronic representation of an individual that can be relied on for high value interactions taking into account user experience and ongoing risk management.
  • Trusted Infrastructure covering crosscutting capabilities to ensure that identity management services mitigate fraud, ensure privacy, and assure security while remaining scalable, resilient and interoperable.

Transition Opportunities:

Developed solutions should transition to provide availability to commercial and government end-users. Solutions may be brand new capabilities not currently available on the market or current solutions that can be modified to address specific needs.

Supporting Information and Links:
division icon
Securing Cyberspace
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Cyberspace (SEC CYB)
Priority R&D Need:  Human Aspects of Cybersecurity-Associated/Related Efforts
Topic Number:  SEC CYB 02-02
Topic Title:  Data Privacy
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Develops, tests and evaluates technical and knowledge solutions for the management of privacy threats and vulnerabilities that arise from socio- and technical policies and operations. The project's R&D focuses on privacy risks related to:

  • Connected sensor devices, mobile computing and sensor platforms
  • Automation and autonomous systems
  • The delivery of digital services
Develops, tests and evaluates technical and knowledge solutions for the management of privacy threats and vulnerabilities that arise from socio- and technical policies and operations. The project's R&D focuses on privacy risks related to:

  • Connected sensor devices, mobile computing and sensor platforms
  • Automation and autonomous systems
  • The delivery of digital services
less
Topic Research Type:  Type I, Type II, Type III
End Objective:

The purpose of the Data Privacy Program is to help society realize the benefits of information technologies in the three stated contexts (connected devices and sensors, automation and autonomous systems, and digital services delivery) while minimizing their negative societal impact. Strategies for minimizing potential risks to privacy must consider a range of opportunities, from minimizing data collections to proper safeguarding of data once collected to controlling how data is used. To achieve this objective, Data Privacy calls for applied research and advanced development along a continuum of challenges, from how people understand privacy in different situations and how their privacy needs can be formally specified, to how these needs can be respected and how mitigation and remediation can be accomplished should privacy expectations and interests be violated. Finally, Data Privacy emphasizes the need to transition research results that address governmental and commercial stakeholder's needs so that they can improve practice as necessary and appropriate.

TRL Sought:  2-5
TRL at Conclusion:  6
Background Information and S&T Challenges:

Cyber-threats are rapidly shifting and privacy-related breaches are increasing in frequency and impact. The Data Privacy project is aligned with National Privacy and Cyber Security Research and Development strategic initiatives to develop a targeted set of research priorities to ensure that cyberspace is safe, trustworthy and prosperous. Specifically, the project provides the R&D community expertise and resources to prevent, mitigate and recover from adverse effects of privacy threats and intrusions on privacy that arise from information system policies and processing. This work includes mitigation of risks by engineering privacy-protecting systems, educating the public, and understanding behavioral, social, organizational and policy dimensions of privacy. The Data Privacy Program is working to develop innovative solutions that ensure trusted innovation by helping to ensure that the protection of individual privacy is consistent with applicable law, policy and mission.

Transition Opportunities:

Data Privacy supports the development and operationalization of technical and knowledge solutions to help the Transition Customer address data privacy capability gaps.

Supporting Information and Links:
division icon
Securing Cyberspace
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Cyberspace (SEC CYB)
Priority R&D Need:  Human Aspects of Cybersecurity-Associated/Related Efforts
Topic Number:  SEC CYB 02-03
Topic Title:  Cyber Risk Economics (CYRIE)
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Cybersecurity is a multidimensional problem that demands interdisciplinary attention. The CYRIE program supports research into the business, legal, technical, and behavioral aspects of the economics of cyber threats, vulnerabilities, and controls. CYRIE R&D emphasizes empirically based measurement, modeling, and evaluation of:
  • Investment into cybersecurity controls (technology, regulatory, and legal) by private-sector, government, and private actors
  • ... more
Cybersecurity is a multidimensional problem that demands interdisciplinary attention. The CYRIE program supports research into the business, legal, technical, and behavioral aspects of the economics of cyber threats, vulnerabilities, and controls. CYRIE R&D emphasizes empirically based measurement, modeling, and evaluation of:
  • Investment into cybersecurity controls (technology, regulatory, and legal) by private-sector, government, and private actors
  • Impact of investment on the probability, severity, and consequences of actual risks and resulting cost and harm
  • Value of the correlation between business performance measures and evaluations of cybersecurity investments and impacts
  • Incentives to optimize the investments, impacts and value basis of cyber risk management
less
Topic Research Type:  Type III
End Objective:

Priority R&D needs for this program are analytics and metrics for cybersecurity effectiveness, severity, and comparison. The CYRIE program endeavors to improve value-based decision making by those who own, operate, protect, and regulate the nation's vital data assets and critical infrastructure. As such, the program looks beyond the traditional economics view of incentives for cybersecurity, where individuals are assumed to be rational actors who know how to maximize their well-being, and considers a broader array of factors that include business, legal, technical, and behavioral factors. In this way, CYRIE R&D can more effectively address strategy and tactics for cyber risk avoidance, acceptance, mitigation, and transfer.

TRL Sought:  2-5
TRL at Conclusion:  6
Transition Customer or Program:

Application to Cyber Security Operations, Critical Infrastructure Operations, Law Enforcement, Incident and Disaster Response, and Businesses of all sizes

Background Information and S&T Challenges:

In 2013, two Executive actions were issued, aimed at enhancing the capability of owners and operators of the nation's critical infrastructure to protect their networks and systems against cyber attacks (Executive Order 13636, Improving Critical Infrastructure Cybersecurity, and Presidential Policy Directive 21, Critical Infrastructure Security and Resilience). These policy documents gave DHS a coordinating role in pursing the cybersecurity objectives outlined in each document and directed National Institute of Science and Technology (NIST) to develop a voluntary framework that owner/operators could use to improve their cybersecurity posture. DHS led an interagency working group focused on cyber economic incentives, and together, with the Departments of Commerce and Treasury, prepared an analysis of federal policy options for incentivizing adoption of the NIST framework. DHS S&T continues to maintain active engagement in the effort to understand and develop stronger cyber economic incentives through its R&D efforts and portfolio.

The working group and resulting analysis focused primarily on policy and incentives from a microeconomic-based view of marginal costs and benefits of adoption. While this analysis provided a solid start for the study of incentives in cybersecurity, a more holistic approach to research in the area of cyber risk economics is clearly needed that incorporates perspectives on security decisions and behavior from a wide range of social and behavioral sciences.

Recognizing the importance of data sharing to building capacity across the four dimensions (investment, impact, value, incentives), CYRIE supports the sharing of cybersecurity best practices, investments, incidents, and outcomes among diverse stakeholders. More collective information is needed to enable value-based risk management of the shared ecosystem. Effective information sharing can help mitigate against the often siloed view of risk, create positive network effects, and foster "RoS"(return on sharing) as an element of cyber risk management.

Transition Opportunities:

CYRIE supports the development and operationalization of technical and knowledge solutions to help the Transition Customer address capability gaps along any of the program's stated dimensions. The program also aims to inform the government about how it can reduce cyber risk levels through development and enforcement of policy and regulation, convening and coordination of stakeholders, adoption of technology, promulgation of standards, and facilitation of research and development.

Supporting Information and Links:
division icon
Securing Cyberspace
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Cyberspace (SEC CYB)
Priority R&D Need:  Network and Systems Security-Associated/Related Efforts
Topic Number:  SEC CYB 03-02
Topic Title:  Federated Enterprise Environments (formerly Cloud Computing Security)
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Research and Development to build upon security in Federated Enterprise Environments including secure protocols to protect data flow to, within and out of the federated environment; command and control (C2) infrastructure for federated environments; incorporation of adaptive defenses into federated environments; preserving data integrity; privacy constraints; privacy-preserving computation/contract generation; and systems to identify unauthorized activity.
Research and Development to build upon security in Federated Enterprise Environments including secure protocols to protect data flow to, within and out of the federated environment; command and control (C2) infrastructure for federated environments; incorporation of adaptive defenses into federated environments; preserving data integrity; privacy constraints; privacy-preserving computation/contract generation; and systems to identify unauthorized activity. less
Topic Research Type:  Type III
End Objective:

Research and development results of this topic should provide innovative technologies, techniques, and processes towards the creation, operation, and maintenance of federated enterprise environments and the related C2 infrastructure. Objectives include enabling local decision making given global knowledge and the seamless incorporation of various cybersecurity technologies and techniques (Moving Target/Dynamic/Adaptive Defenses, privacy preserving and multi-party computing, deception, etc.) into federated enterprise environments. Results are also sought to protect any cloud-based infrastructure that enables federated enterprise environments.

TRL Sought:  4-7
TRL at Conclusion:  8
Transition Customer or Program:

Cybersecurity and Infrastructure Security Agency (CISA), Homeland Security Enterprise, DHS and Components with need for federated environments

Background Information and S&T Challenges:

This topic is seeking to address various challenges faced by Federal government entities and the Homeland Security Enterprise in the creation, operation, and maintenance of federated enterprise environments. Coordinating mechanisms are needed in order to provide reliable defenses that do not adversely affect usability or limit privacy protections. Additionally, a robust command and control capability is needed to coordinate defenses and make management of processes easier, faster, more reliable, and secure.

Transition Opportunities:

Developed solutions should transition to DHS Components, Federal, State and Local Government Agencies; the Homeland Security Enterprise Solutions may be brand new capabilities not currently available on the market or current solutions that can be modified to address specific needs. Some projects, such as those protecting 911 voice systems, have a cross-over market in-call center protection that is sustainable commercially.

division icon
Securing Cyberspace
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Cyberspace (SEC CYB)
Priority R&D Need:  Network and Systems Security-Associated/Related Efforts
Topic Number:  SEC CYB 03-03
Topic Title:  Application for Network Measurement Science (ANMS)
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Security focused measurement and analysis for all aspects of cyberspace. This includes the Internet (e.g., Autonomous Systems, routers) or other networks (e.g. Industrial Control Systems (ICS)) that may connect to the Internet, via a static or dynamic (possibly intermittent) connection. Security focused measurement includes but is not limited to algorithms, tools, techniques, data and analysis for enabling security, from global scale to the individual user. A particular ... more
Security focused measurement and analysis for all aspects of cyberspace. This includes the Internet (e.g., Autonomous Systems, routers) or other networks (e.g. Industrial Control Systems (ICS)) that may connect to the Internet, via a static or dynamic (possibly intermittent) connection. Security focused measurement includes but is not limited to algorithms, tools, techniques, data and analysis for enabling security, from global scale to the individual user. A particular application area is SEAC: Small Enterprise Assistance for Cyber (pronounced seek), which has the goal of providing a system or method for small enterprises with limited resources to improve their security posture. This is a broader effort to develop systems or provide access to tools and/or analysts for identification and remediation of cyber incidents. less
Topic Research Type:  Type I, Type II, Type III
End Objective:

Results of this topic should provide new and novel capabilities and solutions to assist federal, state, and local agencies to improve their security posture.

TRL Sought: 
TRL at Conclusion: 
Transition Customer or Program:

DHS Components, Federal, State and Local Government Agencies

Background Information and S&T Challenges:

This topic is seeking to address various challenges faced by DHS Components, Federal, State and Local Government Agencies, the Homeland Security Enterprise for situational awareness and to improve their security posture.

Transition Opportunities:

Developed solutions should transition to DHS Components, Federal, State and Local Government Agencies, the Homeland Security Enterprise Solutions may be brand new capabilities not currently available on the market or current solutions that can be modified to address specific needs.

Supporting Information and Links:
division icon
Securing Cyberspace
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Cyberspace (SEC CYB)
Priority R&D Need:  Network and Systems Security-Associated/Related Efforts
Topic Number:  SEC CYB 03-05
Topic Title:  Information Marketplace for Policy and Analysis of Cyber-risk & Trust
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
The Information Marketplace for Policy and Analysis of Cyber-risk & Trust (IMPACT) project supports the global cyber risk research community by coordinating and developing real world data and information sharing capability tools, models, and methodologies. To accelerate solutions around cyber risk issues and infrastructure security, the IMPACT project enables empirical data and information sharing between and among the global cybersecurity research and development (R&D) ... more
The Information Marketplace for Policy and Analysis of Cyber-risk & Trust (IMPACT) project supports the global cyber risk research community by coordinating and developing real world data and information sharing capability tools, models, and methodologies. To accelerate solutions around cyber risk issues and infrastructure security, the IMPACT project enables empirical data and information sharing between and among the global cybersecurity research and development (R&D) community in academia, industry, and government. Importantly, IMPACT also addresses the cybersecurity decision-analytic needs of Homeland Security Enterprise (HSE) customers in the face of high volume, high-velocity, high-variety and/or high-value data through its network of Decision Analytics-as-a-Service Providers (DASP). These resources are a service technology or tool capable of supporting the following types of analytics: descriptive (what happened), diagnostic (why it happened), predictive (what will happen) and prescriptive (what should happen). less
Topic Research Type:  Type III
End Objective:

The Department of Homeland Security (DHS) Science and Technology Directorate's (S&T) Office of Mission Capability Support (MCS) Physical and Cyber Security (PCS) Division seeks to coordinate, enhance, and develop advanced data and information sharing tools, datasets, technologies, models, methodologies, and infrastructure to strengthen the capabilities of national and international cyber risk R&D. These data sharing components are intended to be broadly available as national and international resources to bridge the gap between producers of cyber risk-relevant ground truth data, academic and industrial researchers, cybersecurity technology developers, and decision makers to inform their analysis of and policymaking on cyber risk and trust issues.

TRL Sought:  2-5
TRL at Conclusion:  6
Transition Customer or Program:

Application to Cyber Security Operations, Critical Infrastructure Operations, Law Enforcement, Incident and Disaster Response, and Day-To-Day Business, Public and Private Cyber Security Researchers

Background Information and S&T Challenges:

Cybersecurity R&D requires real world data to develop advanced knowledge, test products and technologies, and prove the utility of research in large scale network environments. IMPACT is the only publicly available, legally collected, distributed repository of large scale datasets containing real network and system traffic that could be used to advance state-of-the-art cybersecurity R&D. The centralized brokering and distributed provisioning between the data providers, data hosts, and researchers addresses the operational, trust, and administrative costs and challenges that impede sustainable and scalable data sharing. IMPACT continually adds new data that is responsive to cyber risk management (e.g. attacks and measurements) to provide the R&D community timely, high-value information to enhance research innovation and quality. The IMPACT model also serves as a laboratory for testing various data sharing models, including batch transfers, newer Data Analytics as a Service (DaaS), and visualization techniques.

Transition Opportunities:

Transition data, decision analytics, and capabilities outputs to the cybersecurity research community.

division icon
Securing Cyberspace
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Cyberspace (SEC CYB)
Priority R&D Need:  Network and Systems Security-Associated/Related Efforts
Topic Number:  SEC CYB 03-06
Topic Title:  National Research Infrastructure of Cyber Security Experimentation
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
When new or updated tools and techniques are developed, the first step is to test them in a restricted environment. Testing always reveals subtleties in the environment that mandate changes to any new tool or technique. The DETER is such an environment and is required for testing, especially for Distributed Denial of Service tools and techniques as they are developed.
When new or updated tools and techniques are developed, the first step is to test them in a restricted environment. Testing always reveals subtleties in the environment that mandate changes to any new tool or technique. The DETER is such an environment and is required for testing, especially for Distributed Denial of Service tools and techniques as they are developed. less
Topic Research Type:  Type III
End Objective:

The primary objective is to have a mature testbed that can be used to test and validate claims from various projects, in particular the DDoSD projects.

The results of this topic will catalyze and support the research and development of advanced experimental research tools, technologies, and methodologies as broadly available national resources. Indicators of the success of this program objective will be the realization of experimental research capabilities and approaches that reach beyond today's state of the art.

TRL Sought:  8-9
TRL at Conclusion:  9
Transition Customer or Program:

Distributed Denial of Service (DDoSD) projects

Background Information and S&T Challenges:

Extensive testing and evaluation is required before any new tool or technique goes "live" on a real network. This testing generally starts in a testbed environment where conditions can be tightly controlled, then progresses to more realistic environments. The first step in testing is required for any project to get out of the development stage and into operations.

Transition Opportunities:

The DETER testbed is used not only by DHS projects to test and validate results, but also to train new cyber professionals in a controlled environment, where mistakes do not have operational consequences.

division icon
Securing Cyberspace
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Cyberspace (SEC CYB)
Priority R&D Need:  Network and Systems Security-Associated/Related Efforts
Topic Number:  SEC CYB 03-06
Topic Title:  National Research Infrastructure of Cyber Security Experimentation
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
The results of this topic will catalyze and support the research, and development of advanced experimental research tools, technologies and methodologies as broadly available national resources. Indicators of the success of this program objective will be the realization of experimental research capabilities, and approaches that reach beyond today's state of the art.
The results of this topic will catalyze and support the research, and development of advanced experimental research tools, technologies and methodologies as broadly available national resources. Indicators of the success of this program objective will be the realization of experimental research capabilities, and approaches that reach beyond today's state of the art. less
Topic Research Type:  Type III
End Objective:

The Cybersecurity Experimentation of the Future (CEF) Testbed will provide cybersecurity researchers with the ability to run experiments on an unclassified secure "virtual internet," through contained environments that can safely test advanced defense mechanisms against live threats without endangering operational networks. The CEF Testbed will provide the cybersecurity research community with a complex test capability and infrastructure (networks, tools, methodologies, tech support) to support national-scale testing of advanced cybersecurity technologies in an open, non-proprietary environment. CEF will enable the applied/research community to share complex cybersecurity experiments, designs, lab setups, software, tools, procedures and data; this allows rapid validation of complex technical findings and avoiding redundant experimental effort.

TRL Sought:  2-3
TRL at Conclusion:  3
Transition Customer or Program:

Transition customers include cybersecurity researchers, instructors and students.

Background Information and S&T Challenges:

Realization of experimental research infrastructures, capabilities, and approaches that reach beyond today's state of the art are needed. These infrastructures, together with similar broad-based objectives that transform discovery, validation, and ongoing analysis in an increasingly complex and challenging domain must provide, as examples:

  • Support for multi-disciplinary, complex, and extreme scale experimentation;
  • Support for emerging research areas such as specialized cyber-physical systems and cybersecurity relevant human behavior;
  • The creation and capture of advances in scientific methodologies, experimental processes, and education; and
  • Strategies for dynamic and flexible experimentation across user communities and infrastructure facilities.

Transition Opportunities:

Developed solutions should transition to federal, state and academic cybersecurity testbeds. Solutions may be brand new capabilities not currently on the market or current solutions that can be modified to address specific requirements.

Supporting Information and Links:
division icon
Securing Cyberspace
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Cyberspace (SEC CYB)
Priority R&D Need:  Network and Systems Security-Associated/Related Efforts
Topic Number:  SEC CYB 03-07
Topic Title:  IMPACT Data Catalogue
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
The Information Marketplace for Policy and Analysis of Cyber-risk & Trust (IMPACT) is a data catalogue with access protections.
The Information Marketplace for Policy and Analysis of Cyber-risk & Trust (IMPACT) is a data catalogue with access protections. less
Topic Research Type:  Type III
End Objective:

The end objective is to have data available for research, development, testing and training. The data shall be managed for access and to meet all data provider requirements.

The Information Marketplace for Policy and Analysis of Cyber-risk & Trust (IMPACT) project supports the global cyber-risk research community by coordinating and developing real world data and information sharing capabilities, tools, models, and methodologies. To accelerate solutions around cyber-risk issues and infrastructure security, the IMPACT project enables empirical data and information sharing between and among the global cybersecurity research and development (R&D) community in academia, industry, and government. Importantly, IMPACT also addresses the cybersecurity decision-analytic needs of Homeland Security Enterprise (HSE) customers in the face of high volume, high velocity, high variety, and/or high value data through its network of Decision Analytics-as-a-Service Providers (DASP). These resources are a service technology or tool capable of supporting the following types of analytics: descriptive (what happened), diagnostic (why it happened), predictive (what will happen), and prescriptive (what should happen).

TRL Sought:  8-9
TRL at Conclusion:  9
Transition Customer or Program:

Application to Cyber Security Operations, Critical Infrastructure Operations, Law Enforcement, Incident and Disaster Response, and Day-To-Day Business, Public and Private Cyber Security Researchers

Background Information and S&T Challenges:

Reproducibility of research results has been an issue for a long time for cybersecurity. The Internet is constantly changing, and running two experiments even a short time apart can lead to different results. Data sets collected for specific events, such as DDOS attack traffic, is required for research and development of tools and mitigation techniques.

Data sets are also used for training and planning purposes. In short, having good data available leads to good research, development, and tools that meet the needs of DHS.

Transition Opportunities:

Data sets are used at CISA and also by many academic and commercial researchers and developers.

division icon
Securing Cyberspace
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Cyberspace (SEC CYB)
Priority R&D Need:  Mobile Security-Associated/Related Efforts
Topic Number:  SEC CYB 04-01
Topic Title:  Mobile Ecosystem Security Research
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
The research and development of tools and techniques to enable the secure use of mobile ecosystem technologies in support of the DHS mission. Areas of interest include mobile device supply chain security analysis, mobile infrastructure resilience metrics, mobile communication security protocol analysis and security.
The research and development of tools and techniques to enable the secure use of mobile ecosystem technologies in support of the DHS mission. Areas of interest include mobile device supply chain security analysis, mobile infrastructure resilience metrics, mobile communication security protocol analysis and security. less
Topic Research Type:  Type II, Type III
End Objective:

Results of this topic should provide new and novel capabilities and solutions to support operational security requirements for mobile ecosystem technologies.

TRL Sought: 
TRL at Conclusion: 
Transition Customer or Program:

DHS Components, Civilian Federal Government and DoD

Background Information and S&T Challenges:

The DHS workforce is becoming increasingly mobile, and employees expect to use mobile devices to access data and deliver mission services wherever they may be located, and at any time. DHS mobile user groups cross all Components and Offices and include executives, managers, knowledge workers, immigration and law enforcement officials, case officers, and emergency responders.

The architecture, design, and use of mobile technologies to access systems, applications, and data and deliver government services is substantially different from the traditional desktop workstations and laptops used within a protected enterprise network. A new security approach is needed to protect DHS data and systems from the additional risk posed by use of consumer devices that may operate from anywhere in the world across any available network (cellular, Wi-Fi), possess features and capabilities beyond those available on desktops, and that may contain dozens of diverse mobile apps that can access data on the device.

Transition Opportunities:

The Mobile Security Research and Development (R&D) program is partnering with all DHS components and collaborating with several organizations to facilitate piloting, transition and adoption of the technologies developed under the program. This provides an opportunity to fine-tune requirements, align to and influence development of federal standards or criteria, and conduct pilots with real-world applications. The partners will provide support in developing requirements and use cases; providing information, insights, and access to information technology architecture; offering feedback and evaluation of CSD-developed R&D; and contributing in-kind resources associated with testing.

division icon
Securing Cyberspace
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Cyberspace (SEC CYB)
Priority R&D Need:  Critical Infrastructure - Associated/Related Efforts
Topic Number:  SEC CYB 05-01
Topic Title:  Next Generation Cyber Infrastructure (NGCI)
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
The Next Generation Cyber Infrastructure Apex program addresses the cybersecurity challenges facing our nation's critical infrastructure. Cyber Apex finds, tests and transfers proven solutions to these sectors to fill cybersecurity gaps and harden critical systems and networks.

Currently, Cyber Apex is working to harden the cyber-defenses of the financial services sector (FSS), which is a frequent target of cybercriminals. The Cyber Apex Review Team (CART), spo ... more
The Next Generation Cyber Infrastructure Apex program addresses the cybersecurity challenges facing our nation's critical infrastructure. Cyber Apex finds, tests and transfers proven solutions to these sectors to fill cybersecurity gaps and harden critical systems and networks.

Currently, Cyber Apex is working to harden the cyber-defenses of the financial services sector (FSS), which is a frequent target of cybercriminals. The Cyber Apex Review Team (CART), sponsored by CSD and made up of FSS institution and Treasury Department representatives, identifies gaps and evaluates solutions. While some identified gaps are solvable by mature technology, others needed novel ideas. This finding led Cyber Apex to establish two development paths: creating a consortium to test existing solutions and partnering with the DHS Silicon Valley Innovation Program (SVIP) for early-stage solutions.

The consortium focuses on operational testing of mature technologies to determine if they meet FSS needs. The program uses a consortium manager-Cyber Apex Solutions-to maintain an efficient process for foraging and building a consortium of technology owners.

SVIP focuses on finding novel solutions from startups whose technologies are not mature enough for rigorous operational testing and evaluation. Solutions with promise are piloted and evaluated. Cyber Apex solicitations under SVIP-the Financial Services Cyber Security Active Defense-seeks startups that have novel solutions in the areas of moving-target defense, isolation and containment and cyber-intrusion deception. less
Topic Research Type:  Type II, Type III
End Objective:

The results of this topic should produce new and novel technologies, techniques and approaches to help secure the nation's critical infrastructure sectors.

TRL Sought:  3-6
TRL at Conclusion:  5-8
Transition Customer or Program:

Homeland Security Enterprise, DHS Components, Critical Infrastructure organizations

Background Information and S&T Challenges:

The nation's critical infrastructure provides the essential services that underpin American society and serve as the backbone of our nation's economy, security, and health. The needs and cyber security maturity levels of the 16 sectors vary widely (e.g. different architectures, different regulatory and compliance factors), which make securing them a challenge for S&T.

Transition Opportunities:

Developed solutions should transition to federal and Homeland Security Enterprise end users.

Supporting Information and Links:
division icon
Securing Cyberspace
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Cyberspace (SEC CYB)
Priority R&D Need:  Critical Infrastructure - Associated/Related Efforts
Topic Number:  SEC CYB 05-02
Topic Title:  Government Networks (.gov)
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
The need for government departments and agencies to have a strong security posture is abundantly clear. DHS S&T is working closely with the National Protection and Programs Directorate, federal and state civilian departments and agencies, and industry to develop and transition modern and advanced prototyped cybersecurity capabilities. Specific R&D efforts are needed that can link major requirements of existing programs (e.g. National Cyber Protection System (NCPS), Conti ... more
The need for government departments and agencies to have a strong security posture is abundantly clear. DHS S&T is working closely with the National Protection and Programs Directorate, federal and state civilian departments and agencies, and industry to develop and transition modern and advanced prototyped cybersecurity capabilities. Specific R&D efforts are needed that can link major requirements of existing programs (e.g. National Cyber Protection System (NCPS), Continuous Diagnostics and Mitigation (CDM), Automated Information Sharing (AIS)) with new industry capabilities, normally through impactful demonstrations, experiments and pilots. Particular areas of interest include architectural elements such as fine-grained monitoring and control, whitelist-based security policies, automated cybersecurity decision loop and continuous risk analysis, and strengthening key human roles in these systems. We also seek capabilities to characterize current and evolving threats to help drive system requirements, to include technology considerations protecting cloud and mobile services, thereby ensuring newly developed or integrated cyber defense capabilities are relevant and effective against those threats. Ultimately, this work must result in key technology and guidance that can aid chief information and information security officers in securing department and agencies. less
Topic Research Type:  Type II, Type III
End Objective:

The results of this topic should produce new and novel technologies, techniques and approaches to secure government networks.

TRL Sought:  3-6
TRL at Conclusion:  5-8
Transition Customer or Program:

Homeland Security Enterprise, DHS Components

Background Information and S&T Challenges:

Securing government networks is a significant challenge for DHS. S&Ts challenges supporting this activity include: the customer set (e.g. large agencies to very small agencies) and the variety of architectural approaches that each agency has developed over time, suited to their mission needs.

Transition Opportunities:

Developed solutions should transition to federal and Homeland Security Enterprise end users.

division icon
Securing Cyberspace
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Cyberspace (SEC CYB)
Priority R&D Need:  Critical Infrastructure - Associated/Related Efforts
Topic Number:  SEC CYB 05-03
Topic Title:  Critical Infrastructure (CIDARS, CREDC, LOGIIC)
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
The Critical Infrastructure Design and Adaptive Resilient Systems project is an initiative focused on enhancing the security and resilience of critical infrastructure systems consistent with Presidential Policy Directive 21 and the National Critical Infrastructure Security and Resilience (CISR) Research and Development Plan. This project is examining innovative approaches to plan and design adaptive performance into critical infrastructure systems. The goal is to create ... more
The Critical Infrastructure Design and Adaptive Resilient Systems project is an initiative focused on enhancing the security and resilience of critical infrastructure systems consistent with Presidential Policy Directive 21 and the National Critical Infrastructure Security and Resilience (CISR) Research and Development Plan. This project is examining innovative approaches to plan and design adaptive performance into critical infrastructure systems. The goal is to create common capabilities and quantitative approaches to facilitate the development and implementation of integrated solutions that will enable secure and resilient service provisioning.

The nation's electric grid faces challenges from cyberattacks, natural disasters and accidental failures. To address these challenges, CSD and the Department of Energy (DOE) jointly fund the Cyber Resilient Energy Delivery Consortium (CREDC). The consortium is developing solutions through R&D, education and industry engagement. CREDC will generate research, evaluate the results and deploy solutions in the marketplace. The project's foci include cyber-protection technologies; cyber monitoring, metrics, and event detection; risk assessment of Energy Delivery Systems (EDS) technology; data analytics for cyber event detection; resilient EDS architectures and networks; and identifying the impact of disruptive technologies such as the Internet of Things and cloud computing on EDS resiliency.

The Linking the Oil and Gas Industry to Improve Cybersecurity (LOGIIC) project is an ongoing collaboration between DHS S&T and oil and natural gas companies. The collaborative program facilitates cooperative research, development, testing and evaluation procedures to improve cybersecurity in petroleum industry digital control systems. The project undertakes collaborative R&D projects to improve the level of cybersecurity in critical systems of interest to the oil and natural gas sector. The project objective is to develop sector capabilities while maintaining impartiality, the independence of the participants and vendor neutrality. less
Topic Research Type:  Type II, Type III
End Objective:

The result from this topic should provide new and novel approaches to help formulate risk-informed, integrated design solutions and management strategies that can incorporate proactive resilience remains a significant multi-domain challenge.

TRL Sought:  3-6
TRL at Conclusion:  5-8
Transition Customer or Program:

Homeland Security Enterprise, Critical Infrastructure Organizations

Background Information and S&T Challenges:

Critical infrastructure is vital to national and economic security, public health and well-being, and has become increasingly global, complex and susceptible to disruptions. S&T seeks solutions that provide improved awareness of potential disruptions and the ability to design in flexibility and resilience to mitigate the effects of such disruptions. S&T also seeks risk-assessment and management approaches that incorporate all relevant linkages such as sector interdependencies and cybersecurity risk factors.

Transition Opportunities:

Developed solutions should transition to federal and Homeland Security Enterprise end users.

division icon
Securing Cyberspace
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Cyberspace (SEC CYB)
Priority R&D Need:  Critical Infrastructure - Associated/Related Efforts
Topic Number:  SEC CYB 05-04
Topic Title:  Quantifying Mission Impacts of Cyber Disruptions to Information Technology (NPPD)
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Projects in support of this topic will develop homeland security decision makers' ability to assess and communicate the consequences--including cascading effects--to critical infrastructure systems, services, and data caused by cyber-attacks to information technology or operational technology systems. Projects will address one or more of the following objectives:

  • Strengthen DHS's ability to assess the impact of cyber-attacks and cyber disruptions on cr ... more
Projects in support of this topic will develop homeland security decision makers' ability to assess and communicate the consequences--including cascading effects--to critical infrastructure systems, services, and data caused by cyber-attacks to information technology or operational technology systems. Projects will address one or more of the following objectives:

  • Strengthen DHS's ability to assess the impact of cyber-attacks and cyber disruptions on critical infrastructure operations.
  • Develop methodologies to characterize the criticality of Federal networks and better estimate the consequences of their disruption.
  • Improve DHS's ability to anticipate emerging cyber risk by using innovative and advanced techniques to analyze evolving cyber threats, vulnerabilities, and trends.
  • less
Topic Research Type:  Type II, Type III
End Objective:

The end objective of this project is a model that discretely quantifies the mission impacts of cyber disruptions to information technology networks (e.g. a Federal agency loses the ability to execute a Mission Essential Function due to a disruption to a certain IT network).

TRL Sought:  3-5
TRL at Conclusion:  5-7
Background Information and S&T Challenges:

Models/tools developed must comply with DHS security standards. Models/tools should run on stand-alone commodity computing hardware (a single computer with, e.g. up to 32 cores, 128GB RAM, 1TB disk space). Models should provide a docker build script so they can easily be compiled and run anywhere.

Transition Opportunities:

Office of Cyber and Infrastructure Analysis, National Protection and Programs Directorate

Supporting Information and Links:

division icon
Securing Cyberspace
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Cyberspace (SEC CYB)
Priority R&D Need:  Cyber Security Outreach - Associated/Related Efforts
Topic Number:  SEC CYB 07-01
Topic Title:  Cyber Security Education
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Applied research in key education and training areas, to help ensure the nation has a highly skilled cybersecurity workforce is important to maintaining its systems and networks and combating future cyberattacks. Other areas of interest include:

  • The coupling of operations with education and training;
  • Abstract learning versus learning with context;
  • Bayesian learning (prior knowledge) and where and how it might be applicable;
  • more
Applied research in key education and training areas, to help ensure the nation has a highly skilled cybersecurity workforce is important to maintaining its systems and networks and combating future cyberattacks. Other areas of interest include:

  • The coupling of operations with education and training;
  • Abstract learning versus learning with context;
  • Bayesian learning (prior knowledge) and where and how it might be applicable;
  • Incident response feedback systems, that drive subsequent training/learning directions;
  • Regional education and learning models coordinating efforts across different kinds of organizations.
less
Topic Research Type:  Type II
End Objective:

The objective is to develop, demonstrate, and transition substantive and adaptive cyber security education models that impact organizations and infrastructures/sectors for the better. These models should address key dimensions of the challenge, such as multiple age levels, cyber security across multiple operational domains, and different kinds of threats. An overarching objective of this work is to support development of "learning organization" capabilities across all kinds of organizations and infrastructures/sectors. The models and associated technologies need to support cybersecurity competitions, education and curriculum development, and workforce training and development needs.

TRL Sought:  2-5
TRL at Conclusion:  6
Transition Customer or Program:

Cybersecurity and Infrastructure Security Agency (CISA), Homeland Security Enterprise, Other DHS Components

Background Information and S&T Challenges:

This topic is seeking to address various challenges faced by Federal government entities and the Homeland Security Enterprise in regards to addressing the Nation's shortage of skilled cybersecurity professionals.

Transition Opportunities:

Developed solutions should transition to federal and Homeland Security Enterprise end users.

division icon
Securing Cyberspace
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Cyberspace (SEC CYB)
Priority R&D Need:  Cybersecurity for Law Enforcement-Associated/Related Efforts
Topic Number:  SEC CYB 08-01
Topic Title:  Anonymous Networks and Currencies
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
The research and development of tools and techniques to aid law enforcement in the investigation of cybercrimes committed using friend-to-friend networks, anonymous networks and/or cryptocurrencies.
The research and development of tools and techniques to aid law enforcement in the investigation of cybercrimes committed using friend-to-friend networks, anonymous networks and/or cryptocurrencies. less
Topic Research Type:  Type II, Type III
End Objective:

Results of this topic should provide new and novel capabilities and solutions to assist federal, state, and local law enforcement investigating cybercrimes. Objectives include identifying illicit anonymous marketplaces and website users, as well as users facilitating illicit transactions.

TRL Sought: 
TRL at Conclusion: 
Transition Customer or Program:

DHS Law Enforcement Components, Federal, State and Local Law Enforcement Agencies

Background Information and S&T Challenges:

This topic is seeking to address various challenges faced by Law Enforcement (LE) investigating anonymous networks and currencies. Investigations are resource intensive, requiring significant man hours to investigate and prosecute. Criminals use these networks to exploit the anonymity and protections built into the encryption.

Transition Opportunities:

Developed solutions should transition to federal, state and local law enforcement end-users. Solutions may be brand new capabilities not currently available on the market or current solutions that can be modified to address specific needs.

Supporting Information and Links:
division icon
Securing Cyberspace
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Cyberspace (SEC CYB)
Priority R&D Need:  Cybersecurity for Law Enforcement-Associated/Related Efforts
Topic Number:  SEC CYB 08-02
Topic Title:  Digital Forensics Support to Law Enforcement
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
The research and development of tools and technologies that will allow investigators to visualize, analyze, share and present data derived from cell phones, GPS devices, computer hard drives, networks, and other digital media.
The research and development of tools and technologies that will allow investigators to visualize, analyze, share and present data derived from cell phones, GPS devices, computer hard drives, networks, and other digital media. less
Topic Research Type:  Type II, Type III
End Objective:

Results of this topic should provide new and novel capabilities and solutions to assist federal, state, and local law enforcement in the forensic acquisition and analysis of evidence from digital devices used in criminal activity.

TRL Sought: 
TRL at Conclusion: 
Transition Customer or Program:

DHS Law Enforcement Components, Federal, State and Local Law Enforcement Agencies

Background Information and S&T Challenges:

This topic is seeking to address three main challenges faced by law enforcement: lack of forensic tool testing standards and uniformity, high cost of forensics tools, and technology gaps between commercial technology advances and advances in acquiring data in support of investigations.

Transition Opportunities:

Developed solutions should transition to federal, state and local law enforcement end-users. Solutions may be brand new capabilities not currently available on the market or current solutions that can be modified to address specific needs.

division icon
Securing Cyberspace
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Cyberspace (SEC CYB)
Priority R&D Need:  Cybersecurity for Law Enforcement-Associated/Related Efforts
Topic Number:  SEC CYB 08-03
Topic Title:  Child Exploitation
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Identify the research areas of greatest need to combat child exploitation and assist victims.
Identify the research areas of greatest need to combat child exploitation and assist victims. less
Topic Research Type:  Type I
End Objective:

(1)Conduct research, develop tools, and technologies to improve the detection, analysis, and understanding of victims and perpetrators of child exploitation, and (2)conduct gap analysis to identify aspects of child exploitation in greatest need of empirical research.

TRL Sought:  1-3
TRL at Conclusion:  3
Transition Customer or Program:

Homeland Security Investigations (HSI), Internet Crimes Against Children Task Forces, National Center for Missing and Exploited Children (NCMEC)

Background Information and S&T Challenges:

An astonishing 16 million reports of child exploitation are submitted per year. Without an efficient way to prioritize tips and identify the most dangerous offenders, the current volume of incoming data is overwhelming law enforcement.

Transition Opportunities:

Opportunities for higher return on investment include leveraging and integrating findings and lessons learned to improve the efficiency of operational components.

Supporting Information and Links:

division icon
Securing Cyberspace
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Cyberspace (SEC CYB)
Priority R&D Need:  Cybersecurity for Law Enforcement-Associated/Related Efforts
Topic Number:  SEC CYB 08-04
Topic Title:  Digital Forensics for First Responder Applications
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Near real time and forensics capability improvements for first responder applications.
Near real time and forensics capability improvements for first responder applications. less
Topic Research Type:  Type III
End Objective:

Improvements in digital forensics, biometrics, and identity management, including real-time and forensics positive verification of individual identity using multiple biometrics; mobile biometrics screening capabilities; high-fidelity ten print capture; and non-cooperative biometric technologies for identification of adults and children.

TRL Sought:  5
TRL at Conclusion:  7
Transition Customer or Program:

First Responders (Federal, State and local)

Background Information and S&T Challenges:

Current systems used in identity management are limited by algorithm development, training and machine learning using limited data sets and end user capabilities.

Transition Opportunities:

Potential for higher return on investment for industry as a result of this research project.

Supporting Information and Links:

division icon
Securing Cyberspace
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Cyberspace (SEC CYB)
Priority R&D Need:  Cyber Enabled Networked Physical Systems Security
Topic Number:  SEC CYB 09-01
Topic Title:  Cyber Enabled Networked Physical Systems
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
This is a critical time in the design and deployment of Cyber Enabled Networked Physical Systems (CNPS). Advances in networking, computing, sensing, and control systems have enabled a broad range of new devices. These systems are being designed and deployed now, but unfortunately security is often left as an additional feature that will be bolted on later. Industry is driven by functional requirements and fast moving markets. The design choices being made today will dire ... more
This is a critical time in the design and deployment of Cyber Enabled Networked Physical Systems (CNPS). Advances in networking, computing, sensing, and control systems have enabled a broad range of new devices. These systems are being designed and deployed now, but unfortunately security is often left as an additional feature that will be bolted on later. Industry is driven by functional requirements and fast moving markets. The design choices being made today will directly impact next several decades in transportation, emergency response, medical devices, and so forth. To address these challenges, CSD is engaging in efforts to build security into the design of these critical systems. less
Topic Research Type:  Type II, Type III
End Objective:

Results of this topic should provide new and novel capabilities and solutions to assist DHS, Operations, and Law Enforcement components to improve the understanding and confidence of DHS and the Homeland Security Enterprise (HSE) on how CNPS leverage network environments (trusted and untrusted), devices, and sensors to compute and communicate processes and the security risks and challenges associated with the appropriate level of automation, Machine-to-Machine (M2M), communications, learning, and intelligence.

TRL Sought: 
TRL at Conclusion: 
Transition Customer or Program:

DHS Components, Operations, and Law Enforcement Components

Background Information and S&T Challenges:

This topic is seeking to address various challenges faced by DHS, Operations, and Law Enforcement. CNPS builds upon the CPSSEC Strategy and the nine key strategic drivers identified in the 2015 NITRD CPS Vision Statement. CNPS are being designed and scaled to autonomously compute, communicate, and execute processes from data collected from networks, devices and sensors, and other intelligent systems. As CNPS system design becomes more complex, automated, intelligent, and integrated with legacy networks and systems - Cybersecurity risks and challenges will only increase.

Transition Opportunities:

Developed solutions should transition to federal and law enforcement end-users. Solutions may be brand new capabilities not currently available on the market or current solutions that can be modified to address specific needs.

division icon
Securing Cyberspace
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Cyberspace (SEC CYB)
Priority R&D Need:  Cyber Enabled Networked Physical Systems Security
Topic Number:  SEC CYB 09-02
Topic Title:  Internet of Things (IoT) Security (IoTSEC)
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
The research and development of tools and techniques to aid DHS mission and operations components, law enforcement entities, and Critical Infrastructure (CI) asset owners and operators (to include IT and Internet Infrastructures) in addressing the security gaps between existing traditional IT networks and the broad range of new IoT devices being designed and deployed without security considerations.
The research and development of tools and techniques to aid DHS mission and operations components, law enforcement entities, and Critical Infrastructure (CI) asset owners and operators (to include IT and Internet Infrastructures) in addressing the security gaps between existing traditional IT networks and the broad range of new IoT devices being designed and deployed without security considerations. less
Topic Research Type:  Type II, Type III
End Objective:

Results of this topic should provide new and novel capabilities and solutions to assist DHS mission, operations, and law enforcement components to securely leverage, integrate, and interact with IoT systems that affect their operations and assets. Objectives include Detecting, Authenticating, and Updating IoT devices, sensors, and systems to gain comprehensive and near continuous knowledge of an IoT environment.

TRL Sought: 
TRL at Conclusion: 
Transition Customer or Program:

DHS Mission, Operations, and Law Enforcement Components

Background Information and S&T Challenges:

This topic is seeking to address various challenges faced by DHS Mission, Operations, and Law Enforcement components in securing the interactions between existing networks and IoT Devices. The IoT continues to expand and disrupt the nation's CI/IT infrastructure. This expansion has resulted in numerous advancements but has also increased the attack surface for malicious actors.

Transition Opportunities:

Developed solutions should transition to federal and law enforcement end-users. Solutions may be brand new capabilities not currently available on the market or current solutions that can be modified to address specific needs.

division icon
Securing Cyberspace
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Cyberspace (SEC CYB)
Priority R&D Need:  Cyber Enabled Networked Physical Systems Security
Topic Number:  SEC CYB 09-03
Topic Title:  Smart Cities
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
DHS S&T is working closely with National Institute of Standards and Technology (NIST) on NIST's 2017-2018 Global Cities Team Challenge (GCTC) to reach out and raise awareness of the need for cybersecurity in emerging "Smart Cities." The new DHS S&T-NIST Smart and Secure Cities and Communities Challenge (SC3) program is encouraging GCTC participants to adopt designed-in cybersecurity for "smart city" systems that are more secure, reliable, resilient and protective of priv ... more
DHS S&T is working closely with National Institute of Standards and Technology (NIST) on NIST's 2017-2018 Global Cities Team Challenge (GCTC) to reach out and raise awareness of the need for cybersecurity in emerging "Smart Cities." The new DHS S&T-NIST Smart and Secure Cities and Communities Challenge (SC3) program is encouraging GCTC participants to adopt designed-in cybersecurity for "smart city" systems that are more secure, reliable, resilient and protective of privacy. Through SC3, DHS S&T CSD is promoting the development, adoption and implementation of cybersecurity protections within smart-city environments and helping DHS S&T-funded programs and performers bring their solutions into the GCTC. DHS S&T is also calling on innovators from the cybersecurity industry and research community to teach cities, communities and GCTC teams about cyber challenges, cyber physical systems and internet-of-things devices to help address cybersecurity and privacy objectives. less
Topic Research Type:  Type II, Type III
End Objective:

To establish and demonstrate replicable, scalable, and sustainable models for incubation and deployment of interoperable, secure, standard-based solutions using advanced technologies such as Internet of Things (IoT) and Cyber-Physical Systems (CPS) and demonstrate their measurable benefits in cities and communities.

TRL Sought:  4-7
TRL at Conclusion:  5-8
Transition Customer or Program:

Transition customers include cybersecurity researchers, instructors and students.

Background Information and S&T Challenges:

Realization of experimental research infrastructures, capabilities, and approaches that reach beyond today's state of the art are needed. These infrastructures, together with similar broad-based objectives that transform discovery, validation, and ongoing analysis in an increasingly complex and challenging domain must provide, as examples:

  • Support for multi-disciplinary, complex, and extreme scale experimentation;
  • Support for emerging research areas such as specialized cyber-physical systems and cybersecurity relevant human behavior;
  • The creation and capture of advances in scientific methodologies, experimental processes, and education; and
  • Strategies for dynamic and flexible experimentation across user communities and infrastructure facilities.

Transition Opportunities:

Developed solutions should transition to federal, state and academic cybersecurity testbeds. Solutions may be brand new capabilities not currently on the market or current solutions that can be modified to address specific requirements.

Supporting Information and Links:
division icon
Securing Cyberspace
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Preventing Terrorism (PREV)
Priority R&D Need:  Organic Explosive Compound and Homemade Explosives Detection
Topic Number:  PREV 01-01
Topic Title:  Identification of Novel Non-detonable Fertilizer
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
A major challenge for policy makers has been how to keep precursor materials, some of which are also vital agricultural fertilizers, out of the hands of terrorists. This topic seeks to identify an effective high yield fertilizer that cannot be used by adversaries as an explosive precursor.
A major challenge for policy makers has been how to keep precursor materials, some of which are also vital agricultural fertilizers, out of the hands of terrorists. This topic seeks to identify an effective high yield fertilizer that cannot be used by adversaries as an explosive precursor. less
Topic Research Type:  Type I
End Objective:

To provide private industry with an alternative fertilizer to those that can be used as an explosive precursor. This will make it harder for adversaries to construct explosives devices while also allowing industry to continue providing the agricultural community with effective fertilizers. The product must be completely non-detonable, even if manipulated, mixed, or concentrated

TRL Sought:  3-5
TRL at Conclusion:  5
Transition Customer or Program:

The private sector agricultural industry.

Background Information and S&T Challenges:

Terrorists often utilize products with legitimate uses as precursors to construct homemade explosive devices. This is a threat not only to homeland soft-targets and critical infrastructure, but also to American personnel in-theatre. This effort would require buy-in from both the private industry and public agencies. This topic would complement the DHS NPPD Chemical Facilities Anti-Terrorism Standards program (CFATS

Transition Opportunities:

Supporting Information and Links:

division icon
Preventing Terrorism
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Preventing Terrorism (PREV)
Priority R&D Need:  Prevention
Topic Number:  PREV 04-01
Topic Title:  Targeted Violence Prevention
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
The ability to prevent terrorism and other targeted violent attacks through the application of social science methods can include:

1. Research and development to improve the detection, analysis, understanding, and mitigation of the threats posed by violent individuals;
2. Knowledge, tools and technologies to determine when individuals, groups, and movements are likely to engage in violence; and
3. What ideological, organizational, and contextual f ... more
The ability to prevent terrorism and other targeted violent attacks through the application of social science methods can include:

1. Research and development to improve the detection, analysis, understanding, and mitigation of the threats posed by violent individuals;
2. Knowledge, tools and technologies to determine when individuals, groups, and movements are likely to engage in violence; and
3. What ideological, organizational, and contextual factors may influence violent action and target selection. less
Topic Research Type:  Type I
End Objective:

A better understanding of how to prevent targeted violence or mitigate the effects of that violence through knowledge of evidence-based research and/or evaluation of existing or emerging programs addressing targeted violence

TRL Sought:  1-3
TRL at Conclusion:  3
Transition Customer or Program:

First Responders, NGOs, State/Local government.

Background Information and S&T Challenges:

Given there is no one pathway to violent extremism and the ubiquity of social media in terrorist and extremist groups recruiting individuals, this is a field where the state of knowledge is always changing, and requires multi-disciplinary applications to the social science issues related to targeted violence.

Transition Opportunities:

Local stakeholders can tailor local solutions to targeted violence based on the translation of research knowledge/evaluation into practice.

Supporting Information and Links:

division icon
Preventing Terrorism
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Preventing Terrorism (PREV)
Priority R&D Need:  Advanced Analytics
Topic Number:  PREV 05-01
Topic Title:  Advanced Analytics for Next Generation Homeland Security Missions
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 

The Data Analytics Technology Center (DA-TC) invests in research, innovative solutions, and emerging technologies to enable advanced analytics for Next Generation Homeland Security Missions. Facilitating data driven solutions demands cross-cutting work on computation, data management, advanced analytics, technical architecture, and the underlying policy and for using enterprise data sets for cross mission applications.

Areas of interest to DA-TC that focus ... more

The Data Analytics Technology Center (DA-TC) invests in research, innovative solutions, and emerging technologies to enable advanced analytics for Next Generation Homeland Security Missions. Facilitating data driven solutions demands cross-cutting work on computation, data management, advanced analytics, technical architecture, and the underlying policy and for using enterprise data sets for cross mission applications.

Areas of interest to DA-TC that focus on technical architecture include distributed storage systems, block chain applications for privacy protecting information sharing and analytics, and secure multi-party computation. Effective data analytics requires reliable data, so that DA-TC is also focused on solutions to enable data wrangling and preparation as well as entity resolution.

DA-TC investigates the potential of advanced and emerging analytics capabilities to support the Homeland Security Mission, including advanced computational concepts, analytics and visualization, machine learning and deep learning, human centered systems, analytics for the Internet of Things (IOT), large-scale analytics on publicly available information including social media, real-time analytics for multi-party, multi-latency, metro-scale networks, human-centered systems, and quantum information science.

Nearly all DA-TC research and development undertakings also have important policy implications. A few of DA-TC's areas of interest highlight the cross-cutting nature of technical and policy considerations such as countering foreign influence, cyber security and cyber-physical security, election security, infrastructure protection, emergency management, and decision support and business processes, advanced privacy and security concepts, and adversarial machine learning.

less
Topic Research Type:  Type I
End Objective:

Develop capabilities that will increase the Department's ability to leverage data for decision-making.

TRL Sought:  1
TRL at Conclusion:  7
Transition Customer or Program:

Various customers throughout DHS, including the homeland security enterprise and supporting agencies.

Background Information and S&T Challenges:

The Data Analytics Technology Center (DA-TC) advises DHS and the larger Homeland Security Enterprise (HSE) on advanced data analytics tools, storage, and computational techniques that increase the effectiveness of the government's homeland security missions. DA-TC engages in rapid prototyping, independent assessments of emerging technologies, and strategic research and development.

Transition Opportunities:

Transition opportunities include DHS Components and partners in the homeland security enterprise.

Supporting Information and Links:

division icon
Preventing Terrorism
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Managing Incidents (MGMT)
Priority R&D Need:  Situational Awareness
Topic Number:  MGMT 01-01
Topic Title:  Alerts, Warnings, and Notifications Program Planning
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Research and development of Alerts, Warnings, and Notifications (AWN) tools, materials, and strategies for State, Local, Territorial, and Tribal (SLTT) alert originators that foster more effective AWN program planning and reduced alerting delays.
Research and development of Alerts, Warnings, and Notifications (AWN) tools, materials, and strategies for State, Local, Territorial, and Tribal (SLTT) alert originators that foster more effective AWN program planning and reduced alerting delays. less
Topic Research Type:  Type II
End Objective:

Conduct research and pilots; and develop Alerts, Warnings, and Notifications (AWN) program planning guidance on how to build an effective AWN Program (e.g., Standard Messaging Templates, Hazard Matrices, Training Standards, Metrics, and Advocacy Materials for key decision makers) with planning artifacts for State, Local, Territorial, and Tribal (SLTT) alert originators.

TRL Sought:  3-4
TRL at Conclusion:  7
Transition Customer or Program:

Department of Homeland Security (DHS) Federal Emergency Management Agency (FEMA) Integrated Public Alert and Warning System (IPAWS) Program Management Office (PMO)

Background Information and S&T Challenges:

S&Ts recently developed AWN program planning guidance:

  • The Report on Alerting Tactics provides recommendations on effective combinations of alerting tactics for various incident types based upon lessons learned from practitioners.
  • The Common Alerting Protocol (CAP) Assessment Guide examines the current version of the CAP standard and whether modifications are necessary for the standard to keep pace with the evolution of the alerts and warnings ecosystem.
  • Alerts, Warnings, and Notifications (AWN) Guidance Materials help agencies plan for enhanced AWN, providing both guidance for, and a measure of how to successfully address alerting issues in totality. These tools and solutions most closely align with the S&T emergency communications strategic program area.

Transition Opportunities:

Projects in support of this topic will empower FEMA to (1) increase the number of SLTT alerting authorities using the IPAWS system, and following its requirements; (2) support alert originator education and guidance on best practices for modern and accessible AWN to enhance emergency messaging; and (3) address ad-hoc public alerting procedures and processes to support standardized local, regional, or national AWN planning.

Supporting Information and Links:

division icon
Managing Incidents
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Managing Incidents (MGMT)
Priority R&D Need:  Communications
Topic Number:  MGMT 02-02
Topic Title:  Resilient Position Navigation and Timing (PNT) (Unique Prototype)
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
The ability to enhance or protect the reliability and integrity of PNT services for end-users against disruptions. Topic seeks technologies that result in improvements to PNT services for end-users to include:

1. disruption alerting and mitigation technologies;
2. technologies that will enable end-users to continue normal operations through PNT disruption events; and
3. technologies that provide novel PNT capabilities.
The ability to enhance or protect the reliability and integrity of PNT services for end-users against disruptions. Topic seeks technologies that result in improvements to PNT services for end-users to include:

1. disruption alerting and mitigation technologies;
2. technologies that will enable end-users to continue normal operations through PNT disruption events; and
3. technologies that provide novel PNT capabilities. less
Topic Research Type:  Type II
End Objective:

A technology that improves PNT resilience, is likely to be adopted by critical infrastructure PNT end-users, and has a path to transition and/or commercialization.

TRL Sought:  5-7
TRL at Conclusion:  7-9
Background Information and S&T Challenges:

Accurate position, navigation, and timing (PNT) information is important for the functioning of many critical infrastructure sectors. Disruption of PNT services can hamper the operational capabilities of critical infrastructure operations that rely on precision timing or positioning. This topic seeks technologies that can improve resilience for PNT end-users to include:

1. disruption alerting and mitigation technologies;
2. technologies that will enable end-users to continue normal operations through PNT disruption events; and
3. technologies that provide novel PNT capabilities.

Offerors should consider the operational environment of PNT end-users in critical infrastructure and factors that would facilitate successful transition/adoption. These factors include, but are not limited to, ease of integration into existing operational environments, price, and reliability. These considerations should be part of an Offeror's transition strategy.

Transition Opportunities:

Opportunities for higher return on investment include patents and licenses and/or commercialization.

Supporting Information and Links:

division icon
Managing Incidents
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Managing Incidents (MGMT)
Priority R&D Need:  Communications
Topic Number:  MGMT 02-03
Topic Title:  Resilient Position Navigation and Timing (PNT) (Mature technology for modification and experimentation)
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
The ability to enhance or protect the reliability and integrity of PNT services for end-users against disruptions. Topic seeks technologies that result in improvements to PNT services for end-users to include

1. disruption alerting and mitigation technologies;
2. technologies that will enable end-users to continue normal operations through PNT disruption events; and
3. technologies that provide novel PNT capabilities.
The ability to enhance or protect the reliability and integrity of PNT services for end-users against disruptions. Topic seeks technologies that result in improvements to PNT services for end-users to include

1. disruption alerting and mitigation technologies;
2. technologies that will enable end-users to continue normal operations through PNT disruption events; and
3. technologies that provide novel PNT capabilities. less
Topic Research Type:  Type III
End Objective:

A technology that improves PNT resilience, is likely to be adopted by critical infrastructure PNT end-users, and has a path to transition and/or commercialization

TRL Sought:  7-9
TRL at Conclusion:  8-9
Background Information and S&T Challenges:

Accurate position, navigation, and timing (PNT) information is important for the functioning of many critical infrastructure sectors. Disruption of PNT services can hamper the operational capabilities of critical infrastructure operations that rely on precision timing or positioning. This topic seeks technologies that can improve resilience for PNT end-users to include

1. disruption alerting and mitigation technologies;
2. technologies that will enable end-users to continue normal operations through PNT disruption events; and
3. technologies that provide novel PNT capabilities.

Offerors should consider the operational environment of PNT end-users in critical infrastructure and factors that would facilitate successful transition/adoption. These factors include, but are not limited to, ease of integration into existing operational environments, price, and reliability. These considerations should be part of an Offeror's transition strategy.

Transition Opportunities:

Opportunities for higher return on investment include patents and licenses and/or commercialization.

Supporting Information and Links:

division icon
Managing Incidents
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Managing Incidents (MGMT)
Priority R&D Need:  Communications
Topic Number:  MGMT 02-04
Topic Title:  Development of Hybrid (LMR/LTE) Technologies leverage existing wireless technologies to deliver mission critical voice and data applications
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Currently, Customs and Border Protection (CBP) primarily relies on existing land mobile radio (LMR) services for mission critical voice communications. CBP is seeking innovative solutions to accelerate deployment of data services including mission critical voice, full motion video, sensor data, still-images, biometric information, and location-based situational awareness.

Research concept materials should:
  • Effectively leverage existing coverage fro ... more
Currently, Customs and Border Protection (CBP) primarily relies on existing land mobile radio (LMR) services for mission critical voice communications. CBP is seeking innovative solutions to accelerate deployment of data services including mission critical voice, full motion video, sensor data, still-images, biometric information, and location-based situational awareness.

Research concept materials should:
  • Effectively leverage existing coverage from both public safety (LMR, FirstNet) and commercial wireless service providers though the use of LMR/LTE hybrid solutions (Solutions should address varying levels of available coverage from wilderness areas with poor and non-existent coverage to urban centers with excellent coverage.)
  • Utilize standards-based technology interfaces, promoting standards-based solutions rather than proprietary ones
  • Reduce life-cycle costs (acquisition, operations & maintenance, and refresh)
less
Topic Research Type:  Type III
End Objective:

A technology that enables CBP to deploy enterprise-wide data services within the next 12-18 months.

TRL Sought:  5-6
TRL at Conclusion:  7-9
Transition Customer or Program:

CBP with potential transition across DHS Components.

Background Information and S&T Challenges:

CBP is seeking solutions that would allow a seamless transition from existing voice-only services based on current LMR networks today to mixed-mode voice, data, and video services leveraging broadband capabilities from commercial and public safety networks. Data services should provide adequate bandwidth for situational awareness tools, image/file transfer, and video capabilities. Solutions and technologies should address ease of integration, use of non-proprietary open standards, price, reliability, and a deployment schedule of 12-18 months. Each Source's transition strategy should address these considerations.

Transition Opportunities:

Opportunities for higher return on investment include patents and licenses and/or commercialization.

Supporting Information and Links:

division icon
Managing Incidents
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Managing Incidents (MGMT)
Priority R&D Need:  Communications
Topic Number:  MGMT 02-06
Topic Title:  Test processes and procedures for compliance to standards and evaluation and analysis of existing and evolving standards.
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
This topic invites proposals for assuring and maintaining interoperability through Project 25 and related standards (e.g., LTE, LMR/LTE Interworking, 3GPP MCPTT) projects by researching existing testing processes and procedures currently in use for P25 and related public safety communications standards and; (1) developing new and maintaining existing testing processes for compliance to the standards, (2) evaluating proposed changes and proposing new changes to the standa ... more
This topic invites proposals for assuring and maintaining interoperability through Project 25 and related standards (e.g., LTE, LMR/LTE Interworking, 3GPP MCPTT) projects by researching existing testing processes and procedures currently in use for P25 and related public safety communications standards and; (1) developing new and maintaining existing testing processes for compliance to the standards, (2) evaluating proposed changes and proposing new changes to the standards to promote interoperability, compatibility and improved market competitiveness, (3) assessing and analyzing test results to ensure that systems are interoperable and identifying issues with standards and testing. The proposed solution may also include conducting outreach to both the industry and user communities through meetings to identify P25 issues that impact interoperability and concern public safety communications and development of supporting knowledge products and training to assist public communications and interoperability. less
Topic Research Type:  Type I
End Objective:

Improve interoperability and compatibility by ensuring that equipment are developed using existing standards and verified through a compliant testing program. Conduct gap analysis of standards and recommend new standards or changes to existing standards as necessary.

TRL Sought:  3
TRL at Conclusion:  8
Background Information and S&T Challenges:

Communications interoperability and compatibility is essential for safety of First Responders and their ability to complete their mission. Public safety standards (e.g., Project 25 (P25)) and related commercial standards (e.g., 3GPP LTE) are used to improve interoperability and compatibility for first responders. Within the P25 environment, existing testing processes and procedures for assuring interoperability and compatibility across different vendor solutions are inadequate and evolving technologies may also necessitate the need for updating the standards and subsequently the existing testing program.

Transition Opportunities:

Land Mobile Radio and LTE manufacturers can submit their equipment for compliance to standards through the procedures established by this proposal. Once achieved, the vendors could market their equipment more effectively to first responders highlighting its adherence to rigorous testing procedures.

division icon
Managing Incidents
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Managing Incidents (MGMT)
Priority R&D Need:  Communications
Topic Number:  MGMT 02-07
Topic Title:  Measuring Impact of Foreign Influence Operations and Resilience Efforts to Mitigate
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 

No methodology exists to measure the impact of foreign influence operations on Americans or the effectiveness of measures put in place to mitigate the risk of foreign influence. In order to design and implement effective resilience measures, a baseline understanding of how foreign influence operations impact citizens and a methodology to measure the effectiveness of programs is required.


Designing robust metrics requires analysis of foreign influence al ... more

No methodology exists to measure the impact of foreign influence operations on Americans or the effectiveness of measures put in place to mitigate the risk of foreign influence. In order to design and implement effective resilience measures, a baseline understanding of how foreign influence operations impact citizens and a methodology to measure the effectiveness of programs is required.


Designing robust metrics requires analysis of foreign influence along several dimensions, including both the physical and cyber. Given that much human activity today has both physical and cyber footprints, detecting bad activity would be harder if one focuses on one of the other only. Infrastructure Protection (IP) theft for example, typically involves both.

less
Topic Research Type:  Type I
End Objective:

These metrics would be used to identify the most effective methods for building national resilience to foreign influence operations. The information would be used to design and implement programs and communications to mitigate the risk of foreign influence operations. This is particularly important to DHS' emphasis on building National resilience through public awareness and education. Messaging, tactics, target audience, and outreach can all be guided by these metrics and methodology.

TRL Sought:  2
TRL at Conclusion:  5
Transition Customer or Program:

Cybersecurity and Infrastructure Security Agency (CISA), National Risk Management Center (NRMC) in support of the DHS Countering foreign influence subcommittee

Background Information and S&T Challenges:

Design an easily implemented methodology to measure the impact of foreign influence operations and the effectiveness of resilience building activities to mitigate the risk. Foreign influence can take on many different forms manifesting into the physical and cyber world, yet no methodology yet exists to identify foreign activities that specifically try to influence domestic population and economy.

Transition Opportunities:

Potential to benefit DHS and all The Committee on Foreign Investment in the United States (CFIUS) Departments and Agencies members including: Department of the Treasury, Department of Justice, Department of Commerce, Department of Defense, Department of State, Department of Energy, Office of the U.S. Trade Representative, Office of Science & Technology Policy

division icon
Managing Incidents
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Managing Incidents (MGMT)
Priority R&D Need:  Communications
Topic Number:  MGMT 02-08
Topic Title:  GMD and Nuclear EMP Critical Infrastructure Risk
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Duplicate Topic
Duplicate Topic less
Topic Research Type:  Type I
End Objective:

Any or all of the following:

  • Threat and Hazard Modeling-Severe geomagnetic disturbance (GMD) and nuclear electromagnetic pulse (EMP) are large-scale, high-impact, low-frequency (HILF) events where we have limited historical data and experience. The lack of experience creates a heavy reliance on models and simulations of these events to guide the protection of critical infrastructure (CI) and to estimate post-event responses for recovery and restoration.
  • Mapping of National Critical Functions to Critical Infrastructure Networks-National Critical Functions (NCF) provide a high level definitions of functions that need to be sustained to avoid serious disruption to national security and safety and economic activity.
  • Identification of Key Critical Infrastructure Assets and Vulnerability Assessments-The CI networks that support the NCFs are composed of many subsystems, devices and components.
  • Prediction of Critical Infrastructure Network Performance Under Extreme Conditions-The CI networks that support the NCFs often exhibit complex behavior governed by physics, control systems, and human operator intervention.
  • Design of Critical Infrastructure Network Vulnerability Mitigations To Ensure NCF Performance-Resources for hardening or sparing CI network subsystems, devices and components are often limited, and the effect of these mitigations on the CI network, especially as it pertains to NCF PEMP, are often not straightforward due to complex network behavior.

TRL Sought:  2
TRL at Conclusion:  5
Transition Customer or Program:

Cybersecurity and Infrastructure Security Agency (CISA) - National Risk Management Center, public and private sector owners, operators of critical infrastructure and manufacturers, distributors

Background Information and S&T Challenges:

  • Lack of historical experience and data-Infrequent natural occurrence or full-scale testing of these phenomena limits the available ground truth, system response data to baseline mitigation methods, and creates heavy reliance on modeling and simulation to guide decision making
  • Multi-physics-End-to-end modeling and simulating EMP and GMD requires integration of a vast range of physical phenomena including nuclear weapons outputs, space weather, particle scattering, electromagnetic propagation and coupling, and component and infrastructure network response
  • Wide range of spatial and temporal scales-The physics discussed above spans from sub nanosecond for nuclear physics and particle scattering to minutes for infrastructure response. Important spatial scales include CONUS-scale electromagnetic fields and infrastructure networks to 10-km electrical transmission lines to 1-meter conductors in an electrical substation
  • Multiple affected infrastructures-The widespread nature of these events leads to simultaneous impacts on multiple infrastructure, and the interconnectivity of modern infrastructure systems may lead to complex impacts
  • Complex mitigations-The widespread nature of the EMP and GMD hazards and the complexity of infrastructure network response to potential component failures. Hardening or other resilience mitigations in one part of a network may increase risk in other parts of the network complicating achieving overall infrastructure resilience.

DHS recently released its "Strategy for Protecting and Preparing the Homeland Against Threats of Electromagnetic Pulse and Geomagnetic Disturbances" (as required in 6 USC 121(d)) that defines a vision where the United States is prepared for extreme electromagnetic incidents and capable of quickly restoring critical infrastructure and supporting communities to fully recover. This strategy is aligned with the statutory direction to the Department in 6 USC 195(f) that current efforts must take further action to mitigate the impact of EMP and GMD on critical infrastructure. Action includes completing objective scientific analyses, identifying critical utilities and national security assets and infrastructure that are at risk from threats of EMP and GMD, and analysis of technology options available to improve the resiliency of critical infrastructure to threats of EMP and GMD.

Transition Opportunities:

Both GMD and EMP are low probability/high consequence scenarios that challenge effective policymaking. Science and technology advancements in the following topic areas will clarify our understanding the threat and impacts and improve our ability to mitigate the consequences.

Supporting Information and Links:

Additional Transition Customers: retailers of energy system (i.e., electrical grid and natural gas and petroleum pipelines), communications, water and wastewater systems, and transportation equipment.

https://www.dhs.gov/publication/protecting-and-preparing-homeland-against-threats-electromagnetic-pulse-and-geomagnetic

division icon
Managing Incidents
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Managing Incidents (MGMT)
Priority R&D Need:  Communications
Topic Number:  MGMT 02-08
Topic Title:  GMD and Nuclear EMP Critical Infrastructure Risk
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Duplicate Topic
Duplicate Topic less
Topic Research Type:  Type I
End Objective:

Any or all of the following:

  • Threat and Hazard Modeling-Severe geomagnetic disturbance (GMD) and nuclear electromagnetic pulse (EMP) are large-scale, high-impact, low-frequency (HILF) events where we have limited historical data and experience. The lack of experience creates a heavy reliance on models and simulations of these events to guide the protection of critical infrastructure (CI) and to estimate post-event responses for recovery and restoration.
  • Mapping of National Critical Functions to Critical Infrastructure Networks-National Critical Functions (NCF) provide a high level definitions of functions that need to be sustained to avoid serious disruption to national security and safety and economic activity.
  • Identification of Key Critical Infrastructure Assets and Vulnerability Assessments-The CI networks that support the NCFs are composed of many subsystems, devices and components.
  • Prediction of Critical Infrastructure Network Performance Under Extreme Conditions-The CI networks that support the NCFs often exhibit complex behavior governed by physics, control systems, and human operator intervention.
  • Design of Critical Infrastructure Network Vulnerability Mitigations To Ensure NCF Performance-Resources for hardening or sparing CI network subsystems, devices and components are often limited, and the effect of these mitigations on the CI network, especially as it pertains to NCF PEMP, are often not straightforward due to complex network behavior.

TRL Sought:  2
TRL at Conclusion:  5
Transition Customer or Program:

CISA - NRMC, public and private sector owners, operators of critical infrastructure and manufacturers, distributors, and retailers of energy system (i.e., electrical grid and natural gas and petroleum pipelines), communications, water and wastewater syste

Background Information and S&T Challenges:

  • Lack of historical experience and data-Infrequent natural occurrence or full-scale testing of these phenomena limits the available ground truth, system response data to baseline mitigation methods, and creates heavy reliance on modeling and simulation to guide decision making
  • Multi-physics-End-to-end modeling and simulating EMP and GMD requires integration of a vast range of physical phenomena including nuclear weapons outputs, space weather, particle scattering, electromagnetic propagation and coupling, and component and infrastructure network response
  • Wide range of spatial and temporal scales-The physics discussed above spans from sub nanosecond for nuclear physics and particle scattering to minutes for infrastructure response. Important spatial scales include CONUS-scale electromagnetic fields and infrastructure networks to 10-km electrical transmission lines to 1-meter conductors in an electrical substation
  • Multiple affected infrastructures-The widespread nature of these events leads to simultaneous impacts on multiple infrastructure, and the interconnectivity of modern infrastructure systems may lead to complex impacts
  • Complex mitigations-The widespread nature of the EMP and GMD hazards and the complexity of infrastructure network response to potential component failures. Hardening or other resilience mitigations in one part of a network may increase risk in other parts of the network complicating achieving overall infrastructure resilience.

DHS recently released its "Strategy for Protecting and Preparing the Homeland Against Threats of Electromagnetic Pulse and Geomagnetic Disturbances" (as required in 6 USC 121(d)) that defines a vision where the United States is prepared for extreme electromagnetic incidents and capable of quickly restoring critical infrastructure and supporting communities to fully recover. This strategy is aligned with the statutory direction to the Department in 6 USC 195(f) that current efforts must take further action to mitigate the impact of EMP and GMD on critical infrastructure. Action includes completing objective scientific analyses, identifying critical utilities and national security assets and infrastructure that are at risk from threats of EMP and GMD, and analysis of technology options available to improve the resiliency of critical infrastructure to threats of EMP and GMD.

Transition Opportunities:

Both GMD and EMP are low probability/high consequence scenarios that challenge effective policymaking. Science and technology advancements in the following topic areas will clarify our understanding the threat and impacts and improve our ability to mitigate the consequences.

division icon
Managing Incidents
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Managing Incidents (MGMT)
Priority R&D Need:  Command, Control, Communications
Topic Number:  MGMT 03-01
Topic Title:  Enhanced Incident Management Services to Support Interoperable Rich-Data Information Integration and Exchange
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
S&T seeks R&D for standards-based, enhanced incident management solutions with an emphasis on data interoperability and seamless integration of next-generation, data-rich environments including, but not limited to, mobile data, sensors, IoT, voice, video, asset utilization and availability, and GIS data sources. Research concept materials should:
  • Use of cloud-based solutions to provide greater scalability and adaptability for future technological capab ... more
S&T seeks R&D for standards-based, enhanced incident management solutions with an emphasis on data interoperability and seamless integration of next-generation, data-rich environments including, but not limited to, mobile data, sensors, IoT, voice, video, asset utilization and availability, and GIS data sources. Research concept materials should:
  • Use of cloud-based solutions to provide greater scalability and adaptability for future technological capabilities
  • Platform that supports data interoperability and integration from diverse sources. Compatibility, where possible, with legacy and state-of-the-art edge network devices.
  • Adoption of data hierarchy concepts (i.e. "authoritative data" concept from CAD architectures) as an organizing principle;
  • Utilize standards-based technology interfaces, promoting standards-based solutions rather than proprietary ones;
  • Demonstrably reduce life-cycle costs (acquisition, operations & maintenance, and technology refresh);
  • Result in force-multiplier functionality for users across all public safety disciplines and at all jurisdictional levels.
less
Topic Research Type:  Type III
End Objective:

The successful demonstration of data interoperability and integration of cloud based solutions to support multi-agency dispatching, information sharing, and incident management. Solutions will result in enhanced functions for call taking, dispatch, resource management, situational awareness, intelligent data analytics, sensor integration, alerting, and provide common operating intelligence to streamline and expedite decisions while reducing response time and improving responder awareness and safety.

TRL Sought:  7
TRL at Conclusion:  8
Transition Customer or Program:

State and Local First Responder Agencies

Background Information and S&T Challenges:

I. Although NGFR's primary focus was on-body sensor devices, integrated situational awareness platforms that could give leadership a view of the incident scene provided first responders with the most operational impact II. During all NGFR integration experiments, edge device sensors pushed data through an intermediary broker in order to reach participating situational awareness platforms III. One Situational awareness platform that can provide cross agency interoperable functionality will allow all responders to focus on one system instead of many

Transition Opportunities:

Investment in this technology supports many tactical users within DHS components and the public safety community. The resulting solutions, models, and practices will provide a roadmap for agencies nationwide and across all levels of government to migrate from legacy systems to next-generation, secure, interoperable, integrated solutions while lowering operating costs and initial investments.

division icon
Managing Incidents
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Managing Incidents (MGMT)
Priority R&D Need:  Command, Control, Communications
Topic Number:  MGMT 03-02
Topic Title:  CAD-to-CAD Interoperability
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Critical data supporting incident response and resource management decisions is often not available to all organizations responding to an emergency because the various Computer-Aided-Dispatch (CAD) systems supporting each agency's mission and the systems they interact with on a daily base are unable to electronically exchange that information. Most CAD technology in use today by first responders was not developed to be interoperable with other systems and no communicatio ... more
Critical data supporting incident response and resource management decisions is often not available to all organizations responding to an emergency because the various Computer-Aided-Dispatch (CAD) systems supporting each agency's mission and the systems they interact with on a daily base are unable to electronically exchange that information. Most CAD technology in use today by first responders was not developed to be interoperable with other systems and no communication or data exchange standards are currently in widespread use. As a result, situational awareness may suffer, operational inefficiencies may be introduced that negatively impact the optimum response to an incident, and improvised interoperability is achieved by developing custom interfaces that can be very costly to develop and maintain. Therefore, there is a need to:
  • Understand the CAD interoperability landscape today including its challenges.
  • Define interoperability, associated requirements, and their specifications to encourage interoperability between different solutions in use within one or more public safety agencies and with other incident information management stakeholders.
  • Evaluate standards for use, aimed at the achievement of increased interoperability to support a full complement of inter-operable emergency incident data exchanges between a variety of public safety systems (CAD-to-CAD, CAD-to-records management system, CAD-to-mobile data, and others).
  • Determine conformance specifications, validating testing methodologies, and encourage agency inclusion of the specifications during the acquisition process to foster broader adoption.
  • Leverage existing national systems if feasible.
  • Make recommendations to other public safety organizations and/or committees. on actions and steps that need to be taken in a comprehensive report.
  • A phased approach that includes a proof of concept/operational prototypes.
  • less
Topic Research Type:  Type I
End Objective:

The end objective is to achieve a very resilient public safety Cad-to-Cad ecosystem that is very efficient, interoperable, and supports multi-discipline response to regional, multistate, or national events.

TRL Sought:  1-3
TRL at Conclusion:  8-9
Transition Customer or Program:

Leveraging a national system, such as the National Law Enforcement Telecommunications System (NLETS) should be considered.

Background Information and S&T Challenges:

Cad-to-Cad communications is key to interoperability and resilience between government agencies responding to emergencies. Public safety agencies have different CAD systems causing ineffective and costly interoperable communications. These systems in most cases do not efficiently share information during unified responses that include many public safety (Fire/Law Enforcement/EMS) disciplines. Advances in technology have nonetheless transformed challenges into opportunities and S&T can take this National interoperable need and provide leadership to develop a viable solution.

Transition Opportunities:

The seamless exchange of data that is technology agnostic and without geographic or agency response area boundaries is a core element of interoperability in the public safety environment. The costs savings and resiliency improvements that the Nation can achieve can be very substantial. The Government can also provide procurement language, implementation guidance documentation, outreach, and communications to facilitate understanding of issues, recommendations, and opportunities.

Supporting Information and Links:

A phased approach to achieve the end objective shall be established. Phase-I with TRLs 1 to 3 can be achieved through the items outlined on the topic description. Upon completion of Phase-I, research recommendations to the Government, public safety organizations and/or committees on actions and key steps that need to be taken should be provided in a comprehensive report. Phase-II shall look to achieve TRLs 4 to 7 extrapolating the best of ongoing or completed pilots in the recent past and use Phase-I findings. In addition, implement operational pilots and proofs of concepts based on Phase-I findings and new technology opportunities. Phase-III should layout a standard baseline for TRL 8 to 9 that would be scalable, duplicable, cost effective and commercially available.

TRLs Chart

TRL TRL Definition
1 Basic principles observed and reported.
2 Technology concept and/or application formulated.
3 Analytical and experimental critical function and/or characteristic proof-of-concept.
4 Component and/or breadboard validation in laboratory environment.
5 Component and/or breadboard validation in relevant environment.
6 System/subsystem model or prototype demonstration in a relevant environment.
7 System prototype demonstration in an operational environment.
8 Actual system completed and qualified through test and demonstration.
9 Actual system proven through successful mission operations.

At the conclusion of this project, we envision a standard's-based system that is scalable, duplicable, and ready to be commercialized.

National Capital Region - Communications Infrastructure
https://www.nist.gov/system/files/documents/2019/06/27/nist.ir_.8255.pdf
CAD-to-CAD Data Sharing: A Review of Recommended Standards, IJIS (February 2017).

division icon
Managing Incidents
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Managing Incidents (MGMT)
Priority R&D Need:  Risk Assessment and Planning
Topic Number:  MGMT 08-01
Topic Title:  Community Resilience Through Technology
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 

Supporting R&D through social media, crowdsourcing models, planning tools and templates, trainings, architectures, and technologies to enhance community preparation, resilience, response, and recovery in the face of all-hazards. Improvements in these capabilities can include:

1. Improved risk awareness, communications, and information-sharing between emergency responders and public officials;
2. Increased pre-event planning, tactical operations, and recover ... more

Supporting R&D through social media, crowdsourcing models, planning tools and templates, trainings, architectures, and technologies to enhance community preparation, resilience, response, and recovery in the face of all-hazards. Improvements in these capabilities can include:

1. Improved risk awareness, communications, and information-sharing between emergency responders and public officials;
2. Increased pre-event planning, tactical operations, and recovery through education and training methods to support the implementation of information-sharing tools and tactics (examples including but not limited to: social media and crowdsourcing technologies) during emergency response operations;
3. Applied theoretical and empirical research into the properties of resilient Smart Cities and communities less
Topic Research Type:  Type III
End Objective:

Planning tools and templates, trainings, architectures, and technologies to enhance community preparation, resilience, response, and recovery through new and novel application(s) of all-hazards mitigation strategies

TRL Sought:  3-4
TRL at Conclusion:  7
Transition Customer or Program:

First Responders, FEMA, CISA

Background Information and S&T Challenges:

For years, S&T has supported first responders in enhancing information-sharing and technology integration to improve community resilience. All efforts align to S&T's key mission areas in managing incidents and foster stakeholders' increased situational awareness, communications, and risk assessment and planning. Specific initiatives include:

The DHS S&T Social Media Emergency Management (SMEM) Guidance Tool - The DHS S&T SMEM Guidance tool provides emergency managers and public information officers with a simple, step-by-step line of questioning to create plans to improve their organization's SMEM operations.

Virtual Social Media Working Group (VSMWG) - The VSMWG provides recommendations to the emergency preparedness and response community on the safe and sustainable use of social media technologies before, during and after emergencies.

Smart Cities - Smart cities efforts range from piloting innovative new edge network devices, integration platforms, developing system architectures, and crafting best practices and lessons learned from rigorous scientific experimentation.

Transition Opportunities:

Projects in support of this topic will further DHS S&T's role as a force multiplier to its component customers. Successful technology integration and implementation will facilitate smooth transition to component customers through a variety of means. To FEMA the focus on community resilience is in alignment with their foundational strategy, and the fitment to their requirements ensures topical relevance to their needs. To first responders, developing capabilities and tools to serve their communities gives them enhanced planning, response, and recovery options not currently available.

division icon
Managing Incidents
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Managing Incidents (MGMT)
Priority R&D Need:  Risk Assessment and Planning
Topic Number:  MGMT 08-02
Topic Title:  Flood Forecasting and Modeling
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
The ability to monitor the level of precipitation, runoff, and river water levels and flow rates for simulation and a minimum of five day flood forecasting, with daily update capability, and more frequently during actual floods. Improvements in this capability can: (1) Integrate new modeling methodology and/or very low cost sensors; (2) Localize water forecasts to specific geographies/known flood prone areas; (3) Integrate with the National Response Framework; (4) Work f ... more
The ability to monitor the level of precipitation, runoff, and river water levels and flow rates for simulation and a minimum of five day flood forecasting, with daily update capability, and more frequently during actual floods. Improvements in this capability can: (1) Integrate new modeling methodology and/or very low cost sensors; (2) Localize water forecasts to specific geographies/known flood prone areas; (3) Integrate with the National Response Framework; (4) Work for both flood and drought; and (5) Integrate with FEMA's Integrated Public Alert and Warning System (IPAWS) or other Public Statewide or local alerting systems. less
Topic Research Type:  Type I, Type II, Type III
End Objective:

A technology that improves Flood Forecasting/Modeling to natural hazards and man-made events, that is likely to be adopted by end-users, and has a path to transition and/or commercialization.

TRL Sought:  1-4
TRL at Conclusion:  5-8
Transition Customer or Program:

FEMA, State, Local, Tribal and Territorial, or critical infrastructure partners

Background Information and S&T Challenges:

Over the last 30 years, floods have been the most frequent and presidentially declared disaster in the United States. Property losses from floods of all types have averaged $7.96 billion per year, with the loss trend increasing. The National Flood Insurance Program (NFIP) has 5.1 million policies in force, covers $1.2 trillion in property and collects $3.5 billion in insurance income annually. The National Flood Insurance Fund was over $23 billion in debt to the U.S. Treasury as of December 21, 2014. In addition, an average of 82 flood-related fatalities have occurred annually. Unlike other natural hazards, the number of fatalities from flood hazards is not declining. FEMA has established strategic goals to improve flood response, recovery and mitigation through increased uptake of flood insurance, additional investment in mitigation, advances in flood detection, warnings, notifications, and analysis, enhancements to flood sensor networks and monitoring capabilities.

Offerors should consider the below factors in their unique research material and what would facilitate successful transition/adoption by end users and key stakeholders. These factors include, but are not limited to, ease of integration into existing operational environments, price, and reliability. These considerations should be part of an Offeror's transition strategy.

Transition Opportunities:

Opportunities for higher return on investment include patents and licenses and/or commercialization.

Supporting Information and Links:

division icon
Managing Incidents
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Critical Infrastructure (SEC INFRA)
Priority R&D Need:  Dependency and Interdependency Analysis
Topic Number:  SEC INFRA 01-01
Topic Title:  Estimating Impacts of Emerging Man-Made Attack Vectors on Critical Supply Chains
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Projects in support of this topic will improve homeland security decision makers' ability to anticipate and communicate the cascade of all-hazards critical infrastructure disruptions--including supply chain disruptions--through dependent infrastructure systems and sectors and the impact of those cascading effects on lifeline services, critical functions, and regionally significant industrial clusters. Projects will address one or more of the following capabilities and ou ... more
Projects in support of this topic will improve homeland security decision makers' ability to anticipate and communicate the cascade of all-hazards critical infrastructure disruptions--including supply chain disruptions--through dependent infrastructure systems and sectors and the impact of those cascading effects on lifeline services, critical functions, and regionally significant industrial clusters. Projects will address one or more of the following capabilities and outcomes:
  • Establish a capability to identify or assign dependency relationships for assets supporting the critical infrastructure lifelines or other key functions, and use methods such as failure analysis to identify the links or nodes most critical to supporting those functions.
  • Improve DHS's ability to provide accurate and timely analysis of the impacts to services caused by all-hazards disruptions to the lifeline critical infrastructure systems, including integrated tools that provide end-to-end capabilities for key hazards.
  • Improve data, information, and heuristics related to infrastructure dependencies through techniques that may include machine learning, web-scraping, open source information, /field collection, case studies, and validation/verification activities.
  • Provide DHS analysts and field personnel with analytic tools to understand infrastructure dependencies during crisis events, exercises, and steady-state analysis
less
Topic Research Type:  Type II, Type III
End Objective:

The end objective of this project is to develop a methodology to estimate the impacts of emerging man-made attacks vectors (e.g. cyber; positioning, navigation, and timing (PNT); etc.) on life-saving commodity supply chains in a non-crisis or incident response context.

TRL Sought:  3-4
TRL at Conclusion:  5-7
Background Information and S&T Challenges:

Models/tools developed must comply with DHS security standards. Models/tools should run on stand-alone commodity computing hardware (a single computer with, e.g. up to 32 cores, 128GB RAM, 1TB disk space). Models should provide a docker build script so they can easily be compiled and run anywhere.

Transition Opportunities:

NPPD, Office of Cyber and Infrastructure Analysis, National Infrastructure Simulation and Analysis Center

Supporting Information and Links:

division icon
Securing Critical Infrastructure
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Critical Infrastructure (SEC INFRA)
Priority R&D Need:  Risk-Informed Prioritization
Topic Number:  SEC INFRA 02-01
Topic Title:  System Model of Major Critical Infrastructure Assets
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Projects in support of this topic will increase DHS's understanding and use of infrastructure risk information to determine strategic, operational, policy, and resource priorities and to inform risk management decisions by Federal, state, and local stakeholders. Projects will address one or more of the following objectives:
  • Implement an approach to use National Critical Functions to understand dependencies and the effects of all-hazards infrastructure disrup ... more
Projects in support of this topic will increase DHS's understanding and use of infrastructure risk information to determine strategic, operational, policy, and resource priorities and to inform risk management decisions by Federal, state, and local stakeholders. Projects will address one or more of the following objectives:
  • Implement an approach to use National Critical Functions to understand dependencies and the effects of all-hazards infrastructure disruptions on these functions.
  • Improve DHS's capacity to identify and communicate areas of greatest strategic infrastructure risk through the refinement and execution of an annual NPPD Mission Risk Register and other risk analyses.
  • Develop the capability to analyze and communicate nationally, regionally, and functionally significant systemic, all-hazards risks-including cyber risks-across and within infrastructure sectors and the attributes that may help detect and mitigate the risks.
  • Implement an ongoing futures analysis capability focused on identifying future drivers of all-hazards risk in the NPPD mission space and risk management strategies that are robust across multiple alternative futures.
  • Improve homeland security decision makers' understanding of how to apply risk-informed priorities to the development and management of strategy, plans, programs, and budgets.
less
Topic Research Type:  Type II, Type III
End Objective:

The end objectives of this project are 1.) A framework that will support sector and cross-sector modeling and simulation of critical infrastructure assets and systems, 2.) Implementation of the framework by building sector-level models of the DHS National Infrastructure Protection Plan Lifeline Sectors (Energy, Communications, Transportation, Water and Wastewater, Healthcare and Public Health), and 3.) Validation and verification that the framework can support single asset (n-1) and multiple asset (n-k) failures to identify sector-level and cross sector dependencies/interdependencies of infrastructure assets and systems.

TRL Sought:  3-4
TRL at Conclusion:  5-7
Background Information and S&T Challenges:

Models/tools developed must comply with DHS security standards. Models/tools should run on stand-alone commodity computing hardware (a single computer with, e.g. up to 32 cores, 128GB RAM, 1TB disk space). Models should provide a docker build script so they can easily be compiled and run anywhere.

Transition Opportunities:

NPPD, Office of Cyber and Infrastructure Analysis, National Infrastructure Simulation and Analysis Center

Supporting Information and Links:

division icon
Securing Critical Infrastructure
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Showing  to  of  topics