alert image
  • The DHS S&T BAA Portal website will be undergoing scheduled maintenance and will not be available on the following dates and times:
    • 11:00 PM Saturday, November 23, 2019 EDT - 06:00 AM, Sunday, November 24, 2019 EDT
    We apologize for any inconvenience. If you need assistance, please contact the help desk at dhsbaa@reisystems.com

Past Solicitations
DHSST-LRBAA14-02
2014 DHS S&T LRBAA

This is a Broad Agency Announcement (BAA) as comtemplated in the Federal Acquisition Regulation (FAR) 6.102(d)(2) and FAR 35.016. A separate Request for Proposals (RFP) or other Solicitation document will not be issued. The Department of Homeland Security (DHS), Science and Technology (S&T) Directorate will not issue paper copies of this Announcement. DHS S& T reserves the right to select and fund all, some, or none of the Full Proposals submitted under this Announcement. Multiple awards are anticipated to be issued under this Announcement. No funding for direct reimbursement of proposal development costs will be allowed. Proposal materials submitted under this Announcement will not be returned. Depending on proposal Markings, DHS S&T will adhere to FAR policy on handling proprietary information. It is the policy of DHS S&T to treat all submissions as "Source Selection Information" and "For Official Use Only". This is a five year announcement and will remain open until December 31, 2018, 11:59PM, Eastern Standard Time. White Papers are due by this response date; thus, if you are encouraged to submit a Full Proposal based on your White Paper submission, please be advised that the due date of the full proposal will be the date that is specified in the notification letter; and not the response date by December 31, 2018, 11:59PM, EST. However, if an offeror's proposal is not encouraged based on their White Paper submission, and the offeror still opts to submit a full proposal, they may do so within 60 days of the notification letter; and not the response date by December 31, 2018, 11:59PM, EST.

Topics

BMD 1.10 - Unmanned Aircraft Systems Mitigation

Unmanned Aircraft Systems Mitigation: Technologies and methods to detect, track, classify, and mitigate the threat of a UAS in a city environment. Proposals can be submitted to test existing systems or to develop an advanced capability.

BMD 1.3 - Small Sensors for Real-time Automated Detection, Identification, Classification, Tracking, and Alerting of Watercraft Navigating Inland Waterways and Shorelines

Sensors for all-season detection and tracking of watercraft day and night. Low-power with battery and / or renewable energy lifetimes of a minimum of 6 months. Communications built-in to sensor systems to provide reliable method of data exfiltration. Low false/nuisance alarm rates and affordability - low procurement costs versus area coverage - are important considerations.

BMD 1.4 - Small sensors for real-time automated detection, identification, classification, tracking, and alerting of persons and ground vehicles transiting densely wooded environments

Low-observable sensors for all-season detection and tracking of persons and ground vehicles day and night. Low-power with battery and/or renewable energy lifetimes of a minimum of 6 months. Communications built-in to sensor systems to provide reliable method of data exfiltration. Low false/nuisance alarm rates and affordability - low procurement costs versus area coverage - are important considerations.

BMD 1.9 - Unmanned Aircraft Systems (UAS) Detection, Tracking, and Classification

Unmanned Aircraft Systems (UAS) Detection, Tracking, and Classification: Unmanned Aircraft Systems can represent a threat to people, critical infrastructure, and border alike. Technologies and methods to detect, track, and classify UAS's in complex environments, including the determination of intent. Technologies to detect, track, and locate the pilot controller of a UAS vehicle. Proposals can be submitted to test existing systems or to develop an advanced capability.

BMD 2.1 - Improved visualization and tools

Improved visualization and tools - enhancements to industry standard OzoneWidget Framework (OWF), common operating picture and toolset to incorporate new capabilities and provide better cross-domain support.

BMD 2.2 - Improved situational awareness by automated or assisted behavior analysis and alerting

Improved situational awareness by automated or assisted behavior analysis and alerting - tracking small boat activity, detecting anomalous and/or illegal behavior, and providing timely and actionable information in support of law enforcement and port security efforts.

BMD 2.3 - Improved quality of data, via sensor performance or near real-time processing

Improved quality of data, via sensor performance or near real-time processing to enable improved detection and tracking of small and large vessels by overcoming environmental clutter issues within the port/harbor as well as coastal environments.

BMD 2.4 - Concepts, methodologies, and/or technologies that utilize public as well as private databases

Concepts, methodologies, and/or technologies that utilize public as well as private databases, data sets, data collection devices, or sensors of opportunity to increase detection/tracking accuracy and/or the field of regard surrounding inland waterways, ports, harbors, and coastal regions.

BMD 2.5 - Improved communication devices or methods to enable simplified sharing

Improved communication devices or methods to enable simplified sharing of selected radar, video, and other information to tactical commanders.

BMD 2.6 - Concepts or methodologies to leverage publically available social media sources

Concepts or methodologies to leverage publically available social media sources; development or use of novel social media applications to provide privacy-respected situational awareness of commercial and private boating and recreational traffic in the maritime border environment. Maritime border environment includes sea-facing shorelines, inland waterways, lakes, rivers & streams, U.S. island land masses & cays, etc.

BMD 3.1 - People Screening

People Screening: Analyze current operations, and implement technologies and process enhancements to existing airport operations, to increase CBP's capability to expedite screening of travelers. Develop recommended approaches and implement improvements in processes and/or technologies for cost- effective and integrated biometric, biographic, behavioral, or other capabilities to support transformation of the inspection process and facilitate increased travel and tourism. This will include, but is not limited to, traveler queuing optimization, enhanced/improved screening tactics/techniques/procedures, next-generation Federal Inspection Service inspections, development of inspection metrics and analytics, integrated customs and agriculture baggage inspection, and evaluations of officer-systems performance.

CSD.01 - Internet Infrastructure Security

Internet Infrastructure Security - Efforts to promote the deployment of security enhancements for the core protocols on which the Internet depends. Areas of interest include security for Internet naming (Domain Name System), Internet routing (Border Gateway Protocol), and other core services such as Internet time (Network Time Protocol).

CSD.02 - National Research Infrastructure for Cyber Security Experimentation

Effective, strongly grounded experimental research forms a key element of CSD's strategy to address the nation's critical cyber security challenges. To catalyze and support such research, CSD seeks to develop advanced experimental research tools, technologies, methodologies and infrastructures as broadly available national resources. Key to the success of this program objective will be the realization of experimental research infrastructures, capabilities, and approaches that reach beyond today's state of the art. These infrastructures, together with similar broad-based objectives that transform discovery, validation, and ongoing analysis in an increasingly complex and challenging domain must provide, as examples: (a)Support for multi-disciplinary, complex, and extreme scale experimentation; (b)Support for emerging research areas such as specialized cyber-physical systems and cybersecurity relevant human behavior; (c) The creation and capture of advances in scientific methodologies, experimental processes, and education; and (d) Strategies for dynamic and flexible experimentation across user communities and infrastructure facilities.

CSD.03 - Homeland Open Security Technology

Security enhancements to widely used Open Source Tools and Technologies as well as Open Source Security Technology that enables implementation and deployment of open source security technologies in Federal, State, and Local environments.

CSD.04 - Forensics Support to Law Enforcement

Forensics support to law enforcement including the research and development of tools and technologies that will allow investigators to visualize, analyze, share and present data derived from cell phones, GPS devices, computer hard drives, networks, and other digital media.

CSD.05 - Identity Management (IdM)

Seeking architectures, technical approaches, studies, processes, technologies, tools and other efforts to improve the security and determine and mitigate the vulnerabilities of: (a) Authentication of people and non-person entities - Authentication and identification technologies as applied to people and non-person entities (b) Risk based confirmation of identity that leads to trust - Novel approaches to implement analytics and compensating controls to mitigate risk in identity resolution, validation and verification (c) Data and application security at rest and in transit - Ensuring integrity and confidentiality of data as it traverses multiple environments such as mobile, cloud, internet and enterprise networks (d) Access control at the point of need - Access control and authorization technologies to manage access to data and resources (e) User experience that incorporates security and privacy.

CSD.06 - Data Privacy Technologies

Seeking architectures, technical approaches, studies, processes, technologies, tools and other efforts to: (a) Automate control of personal data to minimize cognitive overload and privacy risk; (b) Address privacy concerns with connected devices, mobile computing, and sensor platforms; (c) Address privacy concerns with big data and algorithms; (d) Manage personally identifiable information or information deemed sensitive while protecting individual privacy; (e) Implement privacy respecting anomaly detection and counter-fraud technologies with population scale applicability.

CSD.07 - Software Assurance

The CSD objective in the area of Software Assurance is to develop and improve Software Analysis technologies, tools, and techniques to reduce the exposures and vulnerabilities in software. To address this objective, CSD is seeking research in areas such as: software analysis techniques for vetting untrustworthy software to address Software Supply Chain Risk Management; secure coding techniques to assist developers with software development activities to improve coding practices; mobile app vetting capabilities; binary analysis capabilities; and formal methods used for specification, development, and verification of software systems.

CSD.08 - Cyber Security Education

Objective is to develop, demonstrate and transition substantive and adaptive cyber security education models that impact organizations and infrastructures/sectors for the better. These models should address key dimensions of the challenge, such as multiple age levels, cyber security across multiple operational domains, and different kinds of threats. An overarching objective of this work is to support development of "learning organization" capabilities across all kinds of organizations and infrastructures/sectors. The models and associated technologies need to support cyber security competitions, education and curriculum development, and workforce training and development needs. To address this objective, CSD anticipates cyber security research in areas such as: (a) the coupling of operations with education and training; (b) abstract learning versus learning with context; (c) Bayesian learning (prior knowledge) and where and how it might be applicable. (d)Incident response feedback systems, that drive subsequent training/learning directions; (e)Regional education and learning models coordinating efforts across different kinds of organizations.

CSD.09 - Cyber-Physical Systems Security and Security for the Internet of Things Security

This is a critical time in the design and deployment of Cyber Physical Systems (CPS) and the Internet of Things (IoT). Advances in networking, computing, sensing, and control systems have enabled a broad range of new devices. These systems are being designed and deployed now, but unfortunately security is often left as an additional feature that will be bolted on later. Industry is driven by functional requirements and fast moving markets. The design choices being made today will directly impact next several decades in transportation, emergency response, energy, medical devices, and so forth. To address these challenges, CSD is engaging in efforts to build security into the design of these critical systems.

CSD.10 - Internet Measurement and Attack Modeling Techniques

Security focused measurement and attack modeling for all aspects of cyberspace. This includes the Internet (e.g., ASNs, routers) as well as other devices (e.g. medical devices) or networks (e.g. ICS) that may connect to the Internet, via a static or dynamic (possibly intermittent) connection. Security focused measurement includes but is not limited to algorithms, tools, techniques, data and analysis for enabling security, from global scale to the individual user. Attack modeling includes not only models of various attacks, but models of how to secure a system from attacks, either internal or external, at scales that may include individuals, enterprises, or the entire Internet. There is also interest in models of attacks on systems that intermittently connect the Internet and how to secure such systems. The security focus of models is broadly interpreted, to include such topics as attack attribution, secure composition of systems, and other related topics.

CSD.11 - Securing the Mobile Workforce

Securing the mobile workforce. Technologies to support flexible client-side security, including secure protocols to protect data flow to, within and out of the cloud; data integrity; user privacy constraints; forensics analysis to preserve digital evidence; and measurement systems to identify unauthorized activity.

CSD.12 - Insider Threat

Insider Threat. Research in the areas of understanding and identifying threats and potential risks, development of trustworthy systems with specific policies to hinder insider misuse, and remediation when insider misuse is detected but not prevented.

CSD.13 - Experiments and Pilots

Experiments and Pilots. Technologies developed through federally funded research requiring test and evaluation in experimental operational environments to facilitate transition.

CSD.14 - Cyber Security Economics

Cyber Security Economics - methodologies, tools and technologies in the following areas: (A) The economics of cybersecurity investment incentives: Current patterns of investment in cybersecurity; Business models for cybersecurity investment; the impact of market forces on cybersecurity investment and behavior at firms; (B) Individual Incentives & Behavior: Information and asset stewards; the role of trust in cybersecurity behavior; (C) Organizational Incentives & Behavior: Drivers of organizational cybersecurity behavior, including economic, policy, and regulatory interactions in the promulgation and implementation of cybersecurity measures; (D) Attacker Incentives & Behavior: Cybercriminal behavior & incentives; and (E) Cyber insurance and Cyber Liability

CSD.15 - Data Analytics

Data Analytics. The exponential increase in the volume of data created and transmitted worldwide over interconnected and interdependent cyberinfrastructures creates new challenges for cyber security. S&T is interested in technologies and tools to support the analysis of datasets whose size and complexity are beyond the ability of commonly used software tools to capture, manage, process, and interpret. These include but are not limited to: (a) Threat discovery (b)Automated or real time analysis techniques (c)Machine and self-learning algorithms (d)Data visualization (e)Resilience of physical and societal infrastructures to cyber threats

CSD.16 - Predictive Analysis

Predictive Analysis-- Predictive Analysis, as applied to cyber security, is the ability to identify potential cyber threat vectors and determine the probable course of action for each threat. These findings should be presented automatically, with human-in-the-loop if desired, but not required. Presentation should be in an easily understandable format, to allow resource management to address threats as they evolve. Predictive Analysis may be applied at any phase or stage, from fully protected to compromise and recovery. All types of cyber threats may be considered.

CSD.17 - Distributed Denial of Service Defense

Distributed Denial of Service Defense. Denial of service attacks are pervasive and have the potential to disrupt critical network infrastructure. Topics of interest include: (a) Efforts that leverage existing policies and practices to mitigate DDoS attacks, (b) Techniques that adopt existing technologies for near term DDoS protection, and c) Novel approaches for understanding and mitigating new forms of DDoS.

CSD.18 - Cloud Computing Security

Research and Development to build upon security in cloud based systems - including secure protocols to protect data flow to, within and out of the cloud; data integrity; user privacy constraints; forensics analysis to preserve digital evidence; and measurement systems to identify unauthorized activity.

CSD.19 - Next Generation Cyber Infrastructure

Next Generation Cyber Infrastructure. CSD's Apex project is focused on capabilities for use in Finance Sector environments, but they can be applicable across multiple sectors. CSD requires capabilities in the following areas: (a)Advanced Sensing Technologies, to include technologies which verify the presence or absence of unauthorized modifications to endpoints and behavioral modeling (b)Situation Understanding, to include technologies to correlate sensor alerts and human inputs and present relevant observations for improved human understanding and characterize networks and network topologies (c)Response and Recover technologies, to include those that enable rapid, policy-based execution of situation-specific responses (e.g. reconfiguring a sensor grid to clarify a situation) (d)Advanced Network control planes, to include secure dynamic enclaves, secure routing, browsing and network essential services

CSD.20 - Anonymous Networks and Currencies

Tools and techniques to aid law enforcement in the investigation of cyber crimes committed using friend-to-friend networks, anonymous networks and/or cryptocurrencies.

CSD.21 - Cyber Situational Understanding

Research and development of operational technologies to provide situational understanding. Situational understanding is more than reputation or situational awareness. Many individual tools are available that provide information or metrics that contribute to situational awareness. To achieve situational understanding, a broad view needs to be developed that incorporates many of these individual metrics, tools, or information items, and blends together data from many sources into very few, (possibly only one) tool or metric. When items of interest are identified, a drill-down capability will allow various actors in the cyber security field to gain the specific knowledge needed for actionable intelligence. In some ways this can be viewed as an integration task, to identify, correlate and blend data from various sources to make it understandable and usable not only to cyber security professionals, but to others(from management and decision makers to consumers) affected by cyber security incidents.

CSD.22 - Research Data Marketplace

CSD seeks to develop, enhance, and coordinate advanced data, analytics and information sharing tools, technologies, models, methodologies and infrastructure to support global cyber risk research. These data sharing components are intended to be broadly available as national and international resources to support the three-way partnership among cybersecurity researchers, technology developers and policymakers in academia, industry and the government. A primary goal is to bridge the gap between producers and consumers of cyber-risk-relevant data, tools and analytics to inform policy and analysis of cyber-risk and trust by: (a) Creating deeper and broader networks of information sharing; (b) Fostering the development and adoption of automated mechanisms for information sharing; (c) Accelerating the understanding of cyber-risk issues and the design, production, and evaluation of solutions; and (d) Driving advances in responsible and trusted R&D and innovation

CSD.23 - Protections for Mobile Application Malware and Threats

Tools and techniques to protect mobile apps, mobile app markets, and enterprise IT infrastructures that become exposed through the addition of mobile technology. Specifically, capabilities to protect, detect, and remediation against mobile malware should enable a common operating picture for enterprise organizations. Methods and capabilities to integrate security throughout the lifecycle management of mobile apps should support continuous monitoring of mobile hardware and software asset management and promote the development of secure mobile applications for mission use.

DAE.01 - Advanced Analytics for Next Generation Homeland Security Missions

DAE is interested in innovative approaches and emerging technologies to enable next generation data-driven analytics solution architectures that include: Data Wrangling and Preparation, Enterprise Self-Service Data Services, Distributed Storage Architectures, Advanced Computational Concepts, Artificial Intelligence, Machine Learning, Deep Learning, Analytics and Visualization, Human Centered Systems, Decision Support and Business Processes, Smart Cities Analytics, Real-time Analytics for Multi-latency, Multiparty, Metro-scale Networks (RAMMMNets), Privacy, Security, Analytics for the Internet of Things and Embedded Systems. The DAE is specifically interested in innovative ideas that significantly improve the utilization of real-time and enterprise data sets for cross mission applications, large scale social media analytics for screening and vetting applications, block chain applications for homeland security, privacy protecting information sharing and analytics, and adaptive analytics environments for multiparty/multi-scale and multi-latency internet of things architectures, infrastructure protection, emergency management and situational awareness. DA-E is also interested in methods for measuring the maturity levels of individuals and organizations relative to data curation, analytics and decision making practices. We are also interested in learning more about governance concepts and policy frameworks for autonomous systems support to high consequence human decision making.

EXD.01 - Standoff Detection of Explosives

Technologies for the standoff detection of explosives and explosive devices related to PBIEDs and VBIEDs. The ideal system would detect diverse explosive signatures, including commercially available explosives, military explosives, and HMEs. Standoff Detection implies that both the detection equipment and operator are located at some distance (1 m up to tens of meters) away from the subject or object under interrogation. Subtopics include integration of both multimodal and multispectral technologies for improved detection and/or imaging and automated detection and/or identification capabilities associated with both imaging and spectroscopy.

EXD.02 - Trace Detection of Explosives

This includes detecting the broadest possible range of trace particle and vapor signatures in aviation security, facility protection, and mass transit security operations. Specific interests include handheld and benchtop explosives trace detection (ETD) systems, optical methods for quickly and quantitatively measuring trace contamination on a range of surfaces, advanced ETD system concepts, and technologies that improve sampling from passengers (e.g., hand swipes), clothing, baggage, and personal items such as electronic devices.

EXD.03 - Air Cargo Security

This portfolio covers next generation products for the cost effective screening of Air Cargo. This includes, but is not limited to technologies which enable CT or CT-like systems, enhanced AT systems, Advanced hand held Trace Detection Systems such as high sensitivity portable ETDs, Intelligent "Operator Assist" software tools and DICOS-2 compatible GUI interfaces. Since Air Cargo screening equipment is purchased by private screeners cost is an important consideration in all proposed technical solutions. The current focus areas are: (a) Reduced cost, less than $500,000.00 (US) in production quantities, CT-like 3D X-Ray imaging of skids (48"x 48"x 65") (b) Automated operator screening assist tools (c) High penetration screening capability for dense (consolidated) air cargo skids (d) Enhanced ETD screening technologies such as hand held ETD's and (e) Conduct studies of the environmental persistence of residues of selected conventional explosives and Home Made Explosives (HMEs) in air cargo environments CT-like and high penetration scanners would have to meet checked baggage explosive detection standards. Other technologies such as Neutron/X-Ray combinations and Ultrasonic systems are also of interest. In addition innovative augmentation of current screening system capabilities (improved detection, decreased false-alarms, lower lifecycle costs, increased throughput) will also be considered.

EXD.04 - Data Fusion and Automated Detection

Data Fusion and Automated Detection for aviation cargo, checked baggage, carry-on baggage, personal check points and all surface intermodal concerns. Algorithms and techniques are particularly desired for detection fusion and automated alerting that combines a variety of detection modalities, including but not limited to X-ray, trace chemical detection, computed tomography (CT), and Advanced Imaging Technology (AIT) for the screening of passengers. Automated Target Recognition algorithms suited for analyzing real-time inputs from video-rate data (video, AIT, or other sources) are of particular interest.

EXD.05 - Advanced Detection Technologies

Development of robust, enhanced explosives detection methods to improve selectivity and sensitivity capabilities. Detection methods should be easily deployed, low cost, and require minimum training to operate. Technologies that provide orthogonal, secondary screening to resolve alarms in checked baggage or checkpoint scenarios are of special interest.

EXD.05.1 - Checked Baggage Program

EXD invites white papers on Advanced Algorithms which expand upon the ability to develop new detection and classification methodologies and verify performance capabilities using real life collected data sets. Of particular use is the use lessons learned from information theoretic analysis of signature and clutter data to apply fundamental limit discoveries and refine strategies for measurement that will lead to the develop software algorithm tool kits and automated decision aid algorithms to assist technology transition.

EXD.05.2 - Checked Baggage Program

EXD invites white papers on System Demonstrators which use novel technologies to improve upon the current screening limitations. Of particular interest are EDS systems that are TRL 4-5.

EXD.06 - Risk-Based Screening

Proof-of-concept demonstrations of hardware and/or software-based methods that can intelligently adjust parameters such as alarm thresholds in response to a change in threat level. Of particular interest are methods that could integrate screening data from multiple systems to reach an integrated threat decision.

EXD.07 - Improved X-Ray System Components

This subtopic includes but is not limited to superior X-Ray sources, collimation methods, other optical components, detectors, and any software or algorithms required to operate and interpret the data produced. Techniques that extract additional information (data regarding multiple energies, diffraction, phase, etc.) during X-Ray screening are of special interest.

EXD.07.1 - Checked Baggage Program

EXD invites white papers on Advanced X-ray System Components. Of particular interest are low-cost high resolution detectors which are more efficient than the currently available models without the requirement of a high energy source. Smaller focal spots and higher energy resolution would be beneficial as well.

EXD.08 - Canine Explosive Detection Technologies

Canine Explosive Detection Technologies: Development of non-hazardous HME and conventional explosive training aids with a specific focus on pure odor materials, not pseudo scents or tagged odors. Operational efficacy, safety and cost are major metrics of success. Technologies and methodologies that advance the capture of canine performance in controlled and operational environments representative of the expanse of the Homeland Security Enterprise at the federal, state and local level and facilitate scientifically significant data capture through independent operational test and evaluation. Specific focus on protocols that facilitate the reduction in the number of trained odors required for comprehensive canine explosive detection proficiency. Canine R&D structure and function that includes a more basic understanding of canine behavioral, genetic, olfaction and cognition of the detector to improve operational efficiencies and training methods.

EXD.09 - New and Emerging Technological Capabilities

New and Emerging Technological Capabilities. Develop technological capabilities pertaining to explosives that may be of interest to DHS S&T, but were not otherwise specifically requested, and are not commercially available. Subject areas may include but are not limited to: Secondary screening enhancements, such as, pat-down tools; enhanced physical security for infrastructure protection against explosive threats, novel delivery techniques, or other personnel screening; personal protective equipment; decision support tools; methods for attribution; training technologies; human performance improvement solutions to enhance functioning for operations, law enforcement, or first responders; mobile learning and performance support capabilities, to include augmented reality; training delivery architectures; training aids, devices, and simulations; verification and validation testing technologies; wearable technology for use in the training and exercise environment; analysis, research, and/or evaluation of training technology. Medical applications will not be considered. This Topic is for proposing unique innovations pertaining to explosives that have not yet been identified by DHS S&T. If DHS S&T evaluators determine an unspecified requirement submission is sufficiently promising to merit pursuing, funds may be identified at that point. Because proposed technologies from the unspecified requirements will be competing against proposed technologies for identified and prioritized requirements, DHS S&T may not make any awards against the unspecified requirements. Proposed technologies, models, architectures, software, hardware, tools, and other applications not directed toward a need pertaining to explosives are not desired and will be rejected without consideration or comment.

EXD.10 - Apex Screening at Speed

This portfolio covers the screening of passengers, their personal items, their carryon bags and associated secondary screening for an airport security checkpoint of the future. The checkpoint of the future, planned to be deployable in five years, seeks to improve passenger experience while enhancing detection capabilities.

EXD.10.1 - Checkpoint Passenger Screening

EXD invites white papers on technologies that allow for screening three hundred or more passengers per hour with minimal need for divestiture of headwear, footwear or personal items while providing detection up to the Transportation Security Administration's (TSA) Tier IV security detection standards. The systems should be capable of being able to adapt, or upgrade, quickly to respond to emerging threats.

EXD.10.2 - Checkpoint Baggage Screening

Checkpoint Baggage Screening: EXD invites white papers on technologies that allow the processing of up to 600 bags per hour, without the need to divest laptops, liquids, aerosols, or gels from the bag being screened. Systems will have to meet TSA's Tier IV detection standards.

EXD.10.3 - Special Purpose Screening

Special Purpose Screening: EXD also invites white papers on screening technologies that address niche detection requirements or secondary screening of passengers or their articles. Such technologies might include nuclear quadrupole resonance (NQR), non-contact or automated trace detection, and technologies that support the screening of items and people that alarm during the primary screening process.

EXD.10.4 - Algorithms & Software

EXD invites submissions pertaining to algorithms and software that will allow integration of sensors such as application programming interfaces (API's), vendor independent detection algorithms, and test beds that can be used to evaluate compliance with Digital Imaging and Communications in Security (DICOS V02) and similar standards. The Technologies developed under EXD.10.1 through EXD.10.4 should be compatible with standards and protocols in common use in aviation security, including but not limited to DICOS V02, TSA's Security Technology Integrated Program (STIP), and TSA's Dynamic Aviation Risk Management System (DARMS) initiatives. Offerors should include provisions for providing a prototype of the associated hardware to a Government laboratory chosen by EXD for test and evaluation.

FRG.01 - Trend and Pattern Identification

The ability to identify trends, patterns, and important content from large volumes of information from multiple sources (including non-traditional sources) to support incident decision-making. Improvements in this Capability can: (1) Prevent incident command and general staff from being overloaded with unmanageable amounts of incident data; (2) Allow incident commanders to synthesize and analyze information to make informed operational decisions. Capability Requirements: (1) Tools to analyze incoming incident data in real-time to identify trends, patterns and anomalies; (2) Policies and standards to utilize such information to inform and improve decision making.

FRG.08 - Flood Forecasting/Modeling

The ability to monitor the level of precipitation, runoff, and river water levels and flow rates for simulation and a minimum of five day flood forecasting, with daily update capability, and more frequently during actual floods. Improvements in this capability can: (1) Integrate new modeling methodology and/or very low cost sensors; (2) Localize water forecasts to specific geographies/known flood prone areas; (3) Integrate with the National Response Framework; (4) Work for both flood and drought; and (5) Integrate with FEMA's Integrated Public Alert and Warning System (IPAWS) or other Public Statewide or local alerting systems.

FRG.09 - Community Resilience

The ability to use behavior-based methods, models, trainings and technologies to enhance community resilience in the face of human- or nature-caused catastrophes. Improvements in this capability can include: (1) Better understanding of risk perception; (2) Improved risk communication by emergency responders and public officials; (3) Pre-event education and training methods; and (4) Applied theoretical and empirical research into the properties of resilient social networks and communities to include elements of social media and crowd sourcing

FRG.10 - Violent Extremism

The ability to counter violent extremism improvements can include: (1) Research and development to improve the detection, analysis, understanding, and mitigation of the threats posed by violent extremists; (2) Knowledge, tools and technologies to determine when individuals, groups, and movements are likely to engage in violence; and (3) What ideological, organizational, and contextual factors may influence violent action.

FRG.13 - Improvement in biometrics

Improvements in biometrics, including real-time positive verification of individual identity using multiple biometrics; mobile biometrics screening capabilities, high-fidelity ten print capture, non-cooperative biometric technologies for identification and the development of standards and test/evaluation protocols.

FRG.16 - Assured End-User PNT and Communications

The ability to enhance or protect the reliability and integrity of PNT and communications services for end-users against disruptions. Accurate position, navigation, and timing (PNT)information is necessary for the functioning of many critical infrastructure sectors, including communications and emergency services. Disruption of PNT services can hamper the operational capabilities of first responders as they rely on PNT information for location-based services such as blue force tracking as well as navigation of remote technologies used during emergency response. Disruption of PNT services can also hamper critical infrastructure operations that rely on precise timing, such as communications. Disruption of communications can provide significant impact to the safety of First Responders, the public, and national security. Topic seeks technologies that result in improvements to PNT and communications services for end-users to include: (1) Disruption alerting and mitigation technologies; (2) Technologies that will enable end-users to continue normal operations through PNT and communications disruption events.

FRG.17 - Next Generation First Responder (NGFR) Technology Guidance/Prototype

FRG's Next Generation First Responder (NGFR) program has developed a reference architecture and associated interface control document (ICD) to guide the integration of wearable computing and sensing technologies and diverse communications by first responder communities and solution providers. This topic invites proposals for the development and delivery of; 1-A prototype solution. The prototype must address and include the following primary architectural components: SmartHub Communications Hub, I/O Module, Sensor Module, and Power Hub. 2-Provide an approach for integrating the architecture, open standards and overall guidance into the DHS S&T NGFR approach (See additional information about the NGFR program at https://www.dhs.gov/science-and-technology/ngfr 3-Provide an approach that will help guide and encourage first responder organizations to use or adapt commercial off-the-shelf internet of things or products into the prototype system. The approach should enable first responder organizations to duplicate the prototype and place it into operational use. Offerors should submit white papers discussing their methodology for completing the identified deliverables and addressing the challenges described above. Successful white paper submitters will be provided the reference architecture and ICD documents to use in the development of their full proposal.

FRG.18 - Smart City Internet of Things (IoT) Interoperable Sensors and Standards

The increasing availability of Internet of Things (IoT) sensors and their impact on the development of Smart Cities infrastructure has significant impact to the First Responder communities and commercial industry. S&T wishes to advance the interoperable integration of IoT sensors using open standards to facilitate commercial development and First Responder adoption of capabilities to ensure responders are protected, connected and fully aware. Developing Smart City infrastructure so that IoT sensors interoperate, are discoverable, accessible, interchangeable and cost effective for the First Responder community while promoting rapid commercial development is the core function of this portfolio. Portfolio solutions for areas of interest may include; (1) Develop suite of IoT sensors for Intelligent Building Infrastructure that use open-standards, provide secure identity and access management, and align to existing, emerging or proposed commercial building codes; (2) Use of Unmanned Aerial Systems (UAS) as platforms for the development and delivery of IoT sensor payloads to autonomously locate and display capabilities such as, but not limited to; Wi-Fi signals, thermal imagery, 3-dimensional renderings, heat concentrations, motion detection, imagery in no-light or obscured visibility, etc.; (3) Emergency Medical Services (EMS) IoT sensor triage capability that allows for the use and customization of commercial-off-the-shelf or the development of new technology for physiological sensor monitoring technologies (e.g. patches, cuffs, bandages, etc.) that allows EMS responders to perform, monitor and modify and transmit patient triage status; and the (4) Use of recognized Smart City Architecture Framework(s) for the interoperable integration, evaluation and demonstration of the previous categories of IoT sensor development into a test and evaluation environment.

FRG.19 - Human Trafficking: The Ability to Combat Human Trafficking

Improvements in this capability can include: (1) Research, development, tools, and technologies to improve the detection, analysis, and understanding of human trafficking, including contextual factors that may influence incidences and patterns of human trafficking; (2) knowledge to better understand human trafficking as a process and its impacts on individuals, communities, the United States, and the systems within; and (3) gap analysis to identify aspects of human trafficking (victims or perpetrators) in greatest need of empirical research.

FRG.20 - Child Exploitation: The Ability to Combat Child Exploitation

Improvements in this capability can include: (1) Research, development, tools, and technologies to improve the detection, analysis, and understanding of victims and perpetrators of child exploitation; and (2) gap analysis to identify aspects of child exploitation in greatest need of empirical research.

FRG.21 - Public Safety Advanced Communications, Interoperability and Compatibility Improvements

Communications interoperability and compatibility using advanced technologies across public safety functions to enhance community resilience in the face of human- or nature-caused catastrophes. Improvements in this capability can include: (1) the ability to provide lessons learned for operationalizing the use of advanced communication technologies across public safety functions; (2) associated governance and support model required to facilitate effective adoption of mobile apps, wearables, and other Internet of Things; (3) technologies for discrete functional areas that will provide essential interoperability for multi-agency/multi-jurisdictional operations and incident response; (4) public safety communications in times of stressed demand for priority preemption and priority services access.

FRG.22 - Land Mobile Radio Standards and Interoperability

Communications interoperability and compatibility is essential for safety of First Responders and their ability to complete their mission. Project 25 (P25) and related public safety standards (e.g., LTE) have been created to improve interoperability and compatibility for first responders. Existing testing processes and procedures for assuring interoperability and compatibility across different vendor solutions are inadequate and evolving technologies may also necessitate the need for updating the standards and the existing testing program. This topic invites proposals for assuring and maintaining interoperability through Project 25 and related public safety standards (e.g., LTE) projects by researching existing testing processes and procedures currently in use for P25 and related public safety communications standards and; (1) developing and maintaining a new testing processes for compliance to the standards, (2) evaluating proposed changes and proposing new changes to the standards to promote interoperability, compatibility and improved market competitiveness, (3) assessing and analyzing test results to ensure that systems are interoperable and identifying issues with standards and testing. The proposed solution may also include conducting outreach to both the industry and user communities through meetings to identify P25 issues that impact interoperability and concern public safety communications and development of supporting knowledge products and training to assist public communications and interoperability. ((See additional information about P25 at https://www.dhs.gov/science-andtechnology/p25-cap)-

FRG.23 - Research, Assessment and Development of Counter IED Technologies

This topic seeks studies and analysis of current and future public safety bomb squad operational capabilities (tools), concepts and procedures with an emphasis on ensuring compatibility with existing and future equipment. The resulting study should identify capability gaps and develop one or more prototype tools (TRL-6/7) in support of public safety bomb technicians while focusing on operational efficacy, safety and cost. Potential offerors should possess expertise and training in Counter IED technologies.

Discontinued

BMD 1.1 - Noninvasive, minimally disruptive sensors and systems

Noninvasive, minimally disruptive sensors and systems that can detect and locate clandestine, unknown subterranean threats (tunnels and other objects of interest to law enforcement) within varied geologies of the southwest border.

BMD 1.11 - Enhance security while expediting the flow of legitimate trade and travel

This program develops technologies to enhance security while expediting the flow of legitimate trade and travel. The program will work to reduce the risk of terrorists and transnational criminal organizations from exploiting lawful international travel, cargo and conveyances for illegal smuggling of people and contraband. The program will also take a cost effective approach to implementing technologies and capabilities to ensure the security and expediency of travelers entering and exiting the U.S.

BMD 1.12 - Expedite screening of travelers

Analyze current operations, and implement technologies and process enhancements to existing airport operations, to increase CBP's capability to expedite screening of travelers. Develop recommended approaches and implement improvements in processes and/or technologies for cost-effective and integrated biometric, biographic, behavioral, or other capabilities to support transformation of the inspection process and facilitate increased travel and tourism. This will include, but is not limited to, traveler queuing optimization, enhanced/improved screening tactics/techniques/procedures, next-generation Federal Inspection Service inspections, development of inspection metrics and analytics, integrated customs and agriculture baggage inspection, and evaluations of officer-systems performance.

BMD 1.2 - Cost-effective airborne sensors for better land border security

Cost-effective small unmanned aircraft sensors for better land border security to assist in detecting, tracking, classifying, and identifying illicit border threats.

BMD 1.5 - Border Illegal Flow Pattern Recognition

Border Illegal Flow Pattern Recognition: Technology which accesses multiple data sets and applies an algorithm to identify existing patterns of border illegal flows, along with the confidence index of the correlation. An example of stimuli and outcomes could be there is a 90 percent correlation of decreased violence along the land border with increased interdiction rates. This would enable DHS to understand the threat landscape and potential use it has a basis for predictive analytics.

BMD 1.6 - Border Illegal Flow Prediction

Border Illegal Flow Prediction: Technology which accesses multiple data sets and applies an algorithm to predict where border illegal flows will shift under different circumstances, along with the confidence index of the prediction. An example of stimuli and outcomes could be there is a 95 percent confidence level increased enforcement action at ports of entry resulting in illegal flows shifting to the land between ports of entry in the immediate vicinity. This would enable DHS to ensure that resources between ports of entry are increased in the vicinity whenever increased enforcement actions at ports of entry are occurring.

BMD 1.7 - Border Illegal Flow Risk Assessment

Border Illegal Flow Risk Assessment: Technology which accesses multiple data sets and applies an algorithm or suite of algorithms to analyze the vulnerabilities for border illegal flows based on force structure, along with the confidence index of the prediction. An example is exploring the resource allocation of agent patrols vs. technology surveillance assets for patrolling various zones, based on their detect/identify/track capabilities along with the need to execute interdiction actions. This would enable DHS to analyze multiple force laydowns in response to various threat environments and determining optimal resource allocation that would drive current deployment along with strategic planning.

BMD 1.8 - Forensic Analysis Tools

Forensic Analysis Tools: Technologies and methods to efficiently collect, analyze, and identify forensic properties such as pollen, material types, fingerprint, DNA, and others.

CBD.02 - New or improved Rapid Diagnostic Tests

New or improved rapid diagnostic tests that facilitate public health and/or disease outbreak surveillance, response, and recovery. Use cases include continuous health surveillance and mass triage scenarios (1) New laboratory-based high throughput, molecular-based detection platforms with improved sensitivity and time to answer (2) New field deployable and point of need diagnostic tests with improved sensitivity and time to answer (3) Non-culture based diagnostic tests to determine exposure or early symptomatic infection

CBD.03 - Facility Protection

Facility protection: Integration of sensors into building systems e.g. HVAC, Security, and development of associated Concepts of Operations to enable rapid and adaptive responses to chemical and biological releases in order to protect occupants and mitigate the impact of the release.

CBD.04 - CBRN Threat Characterization

CBRN Threat Characterization: Supports research and development of next generation and novel methodological approaches to terrorism risk analysis, intentional attack analysis, scenario modeling and simulation to support the following needs: 1. Risk Management 2. Cost Benefit Analysis and Resource Allocation; 3. Development and evaluation of deterrence, preparedness, response and mitigation strategies; 4. Behavioral modeling of adversary intentions and public response to CBRN terrorism events.

CBD.13 - New, cost-effective, biological-based countermeasures for Foreign Animal Disease (FAD)

New, cost-effective, biological-based countermeasures for foreign animal disease (FAD), and zoonotic pathogens affecting major domestic livestock species. Specific areas of interest are cattle and swine product candidates based on molecular vaccine platforms previously shown to be safe and effective against other infectious or human biodefense disease targets, and novel biological-derived agents with an established immune-based mechanism of action. Influenza countermeasure proposals will not be considered: (1) New, molecular-based vaccine candidates that improve the onset of immunity and can differentiate infected from vaccinated animals. (2) Novel immunostimulants, adjuvants, or agents with an immune-based mechanism of action that can improve vaccine efficacy and/or vaccine potency. (3) New vaccines that can increase spectrum of cross-protection against related strains. (4) New vaccines based on novel state-of-the-art technologies e.g., nanovaccines, VLPs. (5) New biological-based anti-viral therapeutics (small molecule drugs excluded) that can be used in combination with vaccines.

CBD.15 - New and Rapid Methods to Collect and Analyze Statistically Relevant Livestock

Apply new and rapid methods to collect and analyze statistically relevant livestock premises, movement networks, and population datasets from local, state, and private industry sources to support development and validation of Foreign Animal Disease models at the local regional and national scale. Priority livestock data of interest includes cattle, domestic swine, sheep, and poultry.

CDS.01 - Capability Development Support

Conduct and accelerate the research, development, test, evaluation, validation and integration of consensus standards in the areas of, but not limited to, Digital Imaging and Communication Security, Emergency Response Robots, First Responder, and Biometric standards. This includes researching and identifying standards gaps and developing road-maps and integration plans. Develop technologies and infrastructures that promote and make it easier to apply standards to DHS programs.

FRG.02 - Remote Video

The ability to share video from incident scene in a remote location to medical services personnel in a remote location. Improvements in this Capability can: (1) Gather EMS color requirements for compressed video; (2) result in improved compression for video streaming in order to transmit it over the limited available wireless bandwidth. Capability Requirements: (1) applications must retain color truth throughout the video system.

FRG.03 - Video System Analysis and Performance of Transport Component

The ability to analyze the performance of a video system transport component. Improvements in this Capability can: (1) use different types of cameras (e.g., high definition, low definition) to identify the limits of camera use for streaming video (with or without compression) on a given network; (2) help define network bandwidth requirements for a video applications. Capability Requirements: (1) efficient use of bandwidth for a specific video application on a given device.

FRG.04 - Analysis of Public Response

The ability of local responders to respond to and recovery from a radiological/nuclear incident. Improvements in this capability can: (1) Assist local responders in managing the complexity of the response; (2) Allow for complete characterization of the incident, including hazard identification; (3) Provide capability to protect citizens, families, and responders in the initial response; (4) Provide initial medical care for survivors; (5) Provide long-term care for incident casualties and evacuees; (6) Allow for stabilization and control of the impacted area and infrastructure;

FRG.05 - Ability to monitor airborne radioactive fallout particles

The ability to monitor airborne radioactive fallout particles that have been released into the atmosphere, identifies the fallout composition/half-life, and accurately track its path and dispersion. Improvements in this Capability can (1) Provide real-time information for decision makers responsible for ordering evacuations and protective actions; (2) Allow for a rapid response coordination by identifying safe areas for resource staging and operations; (3) Provide citizens information about how to best protect themselves and their family; Capability Requirements (1) tracking information must be available for access by local decision makers (2) information must have the ability to update in a reasonable timeframe to influence decisions being made.

FRG.06 - Radiological and Nuclear Incident Response

The ability of local responders to respond to and recovery from a radiological/nuclear incident. Improvements in this capability can: (1) Assist local responders in managing the complexity of the response; (2) Allow for complete characterization of the incident, including hazard identification; (3) Provide capability to protect citizens, families, and responders in the initial response; (4) Provide initial medical care for survivors; (5) Provide long-term care for incident casualties and evacuees; (6) Allow for stabilization and control of the impacted area and infrastructure; and (7) Manage long term radiological clean-up and restoration of essential functions.

FRG.07 - Monitoring of Airborne Radioactive Fallout Particles

The ability to monitor airborne radioactive fallout particles that have been released into the atmosphere, identifies the fallout composition/half-life, and accurately track its path and dispersion. Improvements in this Capability can: (1) Provide real-time information for decision makers responsibly for ordering evacuations and protective actions; (2) Allow for a rapid response coordination by identifying safe areas for resource staging and operations; (3) Provide citizens information about how to best protect themselves and their family; Capability Requirements (1) tracking information must be available for access by local decision makers (2) information must have the ability update in a reasonable time frame to influence decisions being made.

FRG.11 - Resilient and Sustainable Infrastructure

The ability to enhance security, resilience, and recovery of the 18 critical infrastructure sectors for retrofit applications. Developing infrastructure that is resilient and sustainable means thinking differently about how we build, what we build, and whether we build at all. It means designing and maintaining infrastructures that are both highly efficient and all-hazard-resistant. Additionally, this portfolio addresses solutions that offer innovative risk/threat/consequence analysis processes, and methodologies to support the evaluation of national resilience against all hazard events. Improvements in this this area include: (1) Develop key critical infrastructure components that can easily transition to user application, are affordable (in acquisition as well as operations and maintenance), highly transportable, and offer robust solutions for use during manmade and natural disruptions; (2) Integrate infrastructure protection design with sustainable technologies and methodologies; reducing the consumption of energy, promote clean water, decrease pollutant emissions, and aiming to conserve resources over the life of the component; (3) Key critical infrastructure component design that use high-performance green materials that are self-monitoring, self-healing, provide greater longevity than current materials; and should resist blast, earthquake, floods, and wind.

FRG.12 - Methods for identifying indicators of deceptive and suspicious behavior

Methods for non-invasively identifying deceptive and suspicious behavior within a time constrained, low-base rate, screening environment, and methods for identifying interactive strategies optimal for eliciting disguise-resistant indicators of deceptive and suspicious behavior, including technologies that automate or aid in such identification. Protocols and technologies to minimize insider threats and to identify insider threat behavior when it occurs, especially in settings like transportation security or at a border are of interest as well.

FRG.14 - Modeling, Simulation and Gaming technologies

Concepts, techniques, methodologies, algorithms, and innovative tools and applications to significantly enhance the quality of system analysis and reduce the time/cost of conducting system analyses. Develop modeling tools for a wide range of decision makers, from local law enforcement to governors to the White House, to evaluate alternative policies and actions to deal with emergencies and anticipate cascading effects across interdependent systems. Tools for real-time decision support in emergencies capable of integrating and assimilating multiple types of information, processing that information, and presenting it in a manner useful to decision makers. Capabilities sought include the following: Simulation Based Exercise, Training, Education in both real time and non-real time Dynamic, on-Demand, and Real-time Information Processing and Visualization; Innovative model integration technologies and standards Simulation Based Response Doctrine, Policy/Guidance Analysis, Exercise, and Training; Mobile, Light-weight, and portable device integration into Modeling and Simulation Environments

FRG.15 - Training and Performance Optimization Technologies

Concepts, techniques,methodologies, and Innovative tools and applications to significantly enhance end user performance of first responders and those DHS components on the front lines of national security. Research and development efforts post transition will increase the effectiveness and/or efficiency (reduce the time/cost) in conducting operations. Improved training tools, materials, and methods for maximizing the performance of individuals involved in response to disasters, critical infrastructure protection and law enforcement such as emergency managers, first responders as well as the general public. Capabilities sought will leverage innovative technologies that complement or enhance traditional training methods, tools and techniques allowing end users to focus on each mission critical part and/or whole task, develop associated skills, and maximize operational performance. Technologies, tools methods developed for performance enhancement, measurement, modeling, simulation or gaming should increase operational capabilities in the field and result in more efficient and effective response by DHS end users, federal, state and local stakeholders, and public. Capabilities sought address needs associated with primary tasks of first responders and end users that are common across the Homeland Security Enterprise. Technologies tools and methods will optimize performance and correlate to increased preparedness, robustness, and adaptability resulting in more resilient first responders and a more effective and efficient homeland security enterprise.

RSD 1.1 - Behavior-based methods, models, trainings and technologies to enhance community resilience

Behavior-based methods, models, trainings and technologies to enhance community resilience in the face of human- or nature-caused catastrophes through such means as better understanding of risk perception; improved risk communication by emergency responders and public officials; pre-event education and training; and applied theoretical and empirical research into the properties of resilient social networks and communities to include elements of social media and crowd sourcing.

RSD 1.2 - Research and development to improve the detection, analysis, understanding, and mitigation of the threats posed by violent extremists

Research and development to improve the detection, analysis, understanding, and mitigation of the threats posed by violent extremists. Knowledge, tools and technologies to determine when individuals, groups, and movements are likely to engage in violence, and what ideological, organizational, and contextual factors may influence violent action.

RSD 1.3 - Methods for non-invasively identifying deceptive and suspicious behavior

Methods for non-invasively identifying deceptive and suspicious behavior within a time constrained, low-base rate, screening environment, and methods for identifying interactive strategies optimal for eliciting disguise-resistant indicators of deceptive and suspicious behavior, including technologies that automate or aid in such identification. Protocols and technologies to minimize insider threats and to identify insider threat behavior when it occurs, especially in settings like transportation security or at a border are of interest as well.

RSD 1.4 - Improvements in Biometrics

Improvements in biometrics, including real-time positive verification of individual identity using multiple biometrics; mobile biometrics screening capabilities, high-fidelity ten print capture, non-cooperative biometric technologies for identification and the development of standards and test/evaluation protocols.

RSD 2.1 - Surveillance Systems

Surveillance Systems are of interest including video analytics, fusion algorithms, and intelligent filtering algorithms to identify, recognize, and track potential threatening events, behaviors, and individuals in a high density operational environment such as an aviation- or ground-based mass transit portal. These systems can also provide early detection and warning of earthquake, wild fire and other natural hazards to disaster management agencies, the general population and critical infrastructure owners/operators. Integrating multiple types of sensing technologies and intelligent algorithms and processing data will allow for more efficient acquisition and interpretation of data and move complex systems towards more efficient enterprise deployments.

RSD 2.2 - Resilient and Sustainable Infrastructure

Resilient and Sustainable Infrastructure: Enhance security, resilience, and recovery of the 18 critical infrastructure sectors for retrofit applications. Develop key critical infrastructure components that can easily transition to user application, are affordable (in acquisition as well as operations and maintenance), highly transportable, and offer robust solutions for use during manmade and natural disruptions. Integrate infrastructure protection design with sustainable technologies and methodologies; reducing the consumption of energy, promote clean water, decrease pollutant emissions, and aiming to conserve resources over the life of the component. Key critical infrastructure component design should consider use of high-performance green materials that are self-monitoring, self-healing should stand the test of time; and should resist blast, earthquake, floods, and wind. Developing infrastructure that is sustainable means thinking differently about how we build, what we build, and whether we build at all. It means designing and maintaining infrastructures that are both highly efficient and all-hazard resistant. Additionally, this portfolio addresses solutions that offer innovative risk/threat/consequence analysis processes, and methodologies to support the evaluation of national resilience against all hazard events.

RSD 3.1 - Agile Decision Aid Analytics

Agile Decision Aid Analytics to include mathematical methods, computational algorithms, and software/hardware architectures for discovering, comprehending, fusing and manipulating diverse, disparate data or information and applying the resulting knowledge to assess threats and consequences, anticipate terrorist incidents and natural or manmade catastrophic events, and guide response and recovery activities. Analytical capabilities that can operate on relatively small data sets to provide useable just-in-time response strategies (logistics, resource requirements) to improve resilience are of interest.

RSD 3.2 - Modeling, Simulation, and Gaming Technologies

Modeling, Simulation, and Gaming technologies: Concepts, techniques, methodologies, algorithms, and innovative tools and applications to significantly enhance the quality of system analysis and reduce the time/cost of conducting system analyses. Develop modeling tools for a wide range of decision makers, from local law enforcement to governors to the White House, to evaluate alternative policies and actions to deal with emergencies and anticipate cascading effects across interdependent systems. Tools for real time decision support in emergencies capable of integrating and assimilating multiple types of information, processing that information, and presenting it in a manner useful to decision makers. Capabilities sought include the following: Simulation Based Exercise, Training, Education in both real time and non-real time Dynamic, on-Demand, and Real-time Information Processing and Visualization; Innovative model integration technologies and standards Simulation Based Response Doctrine, Policy/Guidance Analysis, Exercise, and Training; Mobile, Light weight, and portable device integration into Modeling and Simulation Environments

RSD 3.3 - Geospatial and Remote Sensing

Geospatial and Remote Sensing: Geospatial technologies enhancing situational awareness for the disaster management and protection of critical infrastructure resulting in improved incident management at the Federal, State, and local and tribal levels. Develop image processing and spatial analytical techniques that exploit remote sensing measurements resulting in improving the detection of specific phenomena of interest to public safety and first responders. Using analytics and automation software that will allow for data integration, develop mathematical methods, computational algorithms, and hardware architectures for discovering, comprehending, and manipulating diverse, diffuse data or information and applying the resulting knowledge to develop baseline assessments, assess threats and consequences, anticipate terrorist incidents and natural or manmade catastrophic events, and guide response and recovery activities. Integrate capability into web services that improves analytical capability using cloud computing or distributive architectures to provide critical products to all levels of incident command.

RSD 3.4 - Emergency Management

Emergency Management: Advances to improve protection of or enhance performance of emergency responders as they carry out life-saving tasks. Develop technologies that will fully enable emergency managers and responders to effectively cope with multi-hazard emergencies technologies such as integrated advanced materials for protective clothing that report on the health of the first responder; decision support systems that provide real-time logistical tracking and management of emergency supplies, equipment, and personnel; advanced precision indoor/outdoor tracking technologies; integrated simulation-based incident planning and response capability to analyze all-hazard disaster response and recovery operations, tactics, techniques, plans, and procedures for use in a real-time environment for simulation-based training; advanced algorithms, tools, and infrastructures for sensor data fusion and visualization for improved situational awareness and emergency response to include wireless communications, both in secure and quasi-secure environments.

RSD 3.5 - Information Sharing

Information Sharing: Supports improved situational awareness and decision making across Federal, state, local, tribal and territorial public safety organizations, as well as non governmental agencies, private sector partners organizations and the public and communities. Seeks concepts, prototypes and technologies that improve the capability to collect, process, analyze, visualize, share, and protect information across the Homeland Security Enterprise.

STN 1.1 - Performance Specification Standards for Biological Detection Technologies

Development of performance specification standards for biological detection technologies according to capability (i.e., screening tools, autonomous monitors, portable and laboratory based PCR assays)

STN 1.2 - Proficiency Testing Protocols

Development of proficiency testing protocols in concert with users.

STN 1.3 - Standard Test Methods for Performance of Biological Detection Technologies

Development of standard test methods for performance of biological detection technologies, both in the laboratory and field operations.

Key Dates
Pre-Solicitation Open Date:
02/25/2014
Pre-Solicitation Close Date:
05/02/2018 11:59 PM ET
Solicitation Open Date:
02/25/2014
White Paper Registration Deadline:
05/02/2018 11:59 PM ET
White Paper Submission Deadline:
05/02/2018 11:59 PM ET
Submission Deadline:
See Notice on FedBizOpps


Amendments and Q&As
amendment icon Amendment # 19
Posted Date 5/1/18

( This is a five (5) year announcement and will remain open until May 2, 2018, 11:59PM, Eastern Stand ...)
(Read Full)

This is a five (5) year announcement and will remain open until May 2, 2018, 11:59PM, Eastern Standard Time (EST). White Papers and Non-Encouraged Full Proposals are due by this response date; thus, if you are encouraged to submit a Full Proposal based on your White Paper submission, please be advised that the due date of the full proposal will be the date that is specified in the notification letter; and not the response date by May 2, 2018, 11:59PM, EST.


amendment icon Amendment # 18
Posted Date 3/1/18

( The purpose of Amendment 00017 is to modify research topics BMD 1.3 and BMD 1.4; DELETE research to ...)
(Read Full)

The purpose of Amendment 00017 is to modify research topics BMD 1.3 and BMD 1.4; DELETE research topics BMD 1.5, BMD 1.6., and BMD 1.7; and add FRG.22 and FRG.23.


Amendment #17
Posted Date 1/25/18

( The purpose of this Amendment 00016 is to add research topic FRG.21 - Public Safety Advanced Commun ...)
(Read Full)

The purpose of this Amendment 00016 is to add research topic FRG.21 - Public Safety Advanced Communications, Interoperability and Compatibility Improvements. All other topics remain unchanged.


amendment icon Amendment # 16
Posted Date 6/1/17

( The purpose of this Amendment 00015 is to delete BMD 1.1, BMD 1.2, BMD 1.8, and FRG.15; Add FRG.19 ...)
(Read Full)

The purpose of this Amendment 00015 is to delete BMD 1.1, BMD 1.2, BMD 1.8, and FRG.15; Add FRG.19 and FRG.20; and revise DAE.01.


amendment icon Amendment # 15
Posted Date 2/14/17

( The purpose of this Amendment 00014 is to Remove any Resilient Systems Division (RSD) references; A ...)
(Read Full)

The purpose of this Amendment 00014 is to Remove any Resilient Systems Division (RSD) references; Add FRG.17 - NEXT Generation First Responder (NGFR) Technology Guidance/Prototype; Add FRG.18 - Smart City Internet of things (IoT) Interoperable Sensors and Standards; Revise EXD.03; and Revise DAE.01.


amendment icon Amendment # 14
Posted Date 9/8/16

( The purpose of this Amendment 00013 is to revise CYBER SECURITY DIVISION (CSD) research topic CSD. ...)
(Read Full)

The purpose of this Amendment 00013 is to revise CYBER SECURITY DIVISION (CSD) research topic CSD.14; revise EXPLOSIVES COUNTERMEASURES DIVISION (EXD) research topic EXD.03; remove FIRST RESPONDERS GROUP (FRG) research topics FRG.04, FRG.11, FRG.12, FRG.14; and add FRG.15 and FRG.16.


amendment icon Amendment # 13
Posted Date 5/17/16

( The purpose of this Amendment 00012 is to update the research topics under Border and Maritime Divi ...)
(Read Full)

The purpose of this Amendment 00012 is to update the research topics under Border and Maritime Division (BMD), Cyber Security Division (CSD), Explosives Countermeasures Division (EXD), and add topics under HSARPA Apex Technology Engines. All other topics remain unchanged.


amendment icon Amendment # 12
Posted Date 3/8/16

( The purpose of this AMENDMENT 00011-A is to cite the correct current AMENDMENT NUMBER in the Announ ...)
(Read Full)

The purpose of this AMENDMENT 00011-A is to cite the correct current AMENDMENT NUMBER in the Announcement. No other changes apply, and all other topics remain unchanged.


amendment icon Amendment # 11
Posted Date 3/8/16

( The purpose of this AMENDMENT 00011 is to add FRG.12, FRG.13 , and FRG.14. All other topics remain ...)
(Read Full)

The purpose of this AMENDMENT 00011 is to add FRG.12, FRG.13 , and FRG.14. All other topics remain unchanged.


amendment icon Amendment # 10
Posted Date 12/4/15

( The purpose of AMENDMENT 00010 is to add BMD 1.9 through 1.12; revise CSD.05 and CSD.06; add resear ...)
(Read Full)

The purpose of AMENDMENT 00010 is to add BMD 1.9 through 1.12; revise CSD.05 and CSD.06; add research topics CSD.20 through CSD.22; remove in its entirety FRG.02, FRG.03 and FRG.05; renumber FRG.06 to be FRG.08 and add FRG.09 through FRG.11. AMENDMENT 00009 POSTED ON DECEMBER 2, 2015 IS NO LONGER VALID. All other topics remain unchanged.


amendment icon Amendment # 9
Posted Date 12/2/15

( The purpose of this Amendment 00009 is to add research topic FIRST RESPONDERS GROUP (FRG) 06. All o ...)
(Read Full)

The purpose of this Amendment 00009 is to add research topic FIRST RESPONDERS GROUP (FRG) 06. All other research topics remain unchanged.


amendment icon Amendment # 8
Posted Date 10/15/15

( The purpose of this Amendment 00008 is to remove all research topics under the RESILIENT SYSTEMS DI ...)
(Read Full)

The purpose of this Amendment 00008 is to remove all research topics under the RESILIENT SYSTEMS DIVISION (RSD) in its entirety. All other topics remain unchanged.


amendment icon Amendment # 7
Posted Date 6/26/15

( The purpose of Amendment 00007 is to update the POINTS OF CONTACT, and to add new research topic fo ...)
(Read Full)

The purpose of Amendment 00007 is to update the POINTS OF CONTACT, and to add new research topic found under the CAPABILITY DEVELOPMENT SUPPORT (CDS) - OFFICE OF STANDARDS.


amendment icon Amendment # 6
Posted Date 5/21/15

( The purpose of this Amendment 00006 is to update research topics found under the EXPLOSIVES COUNTER ...)
(Read Full)

The purpose of this Amendment 00006 is to update research topics found under the EXPLOSIVES COUNTERMEASURES DIVISIONS (EXD). All other topics, and terms and conditions remain unchanged


amendment icon Amendment # 5
Posted Date 2/11/15

( The purpose of Amendment 00005 is update the listed research topics. All other terms and conditions ...)
(Read Full)

The purpose of Amendment 00005 is update the listed research topics. All other terms and conditions remain unchanged.


amendment icon Amendment # 4
Posted Date 8/4/14

( The purpose of this Amendment 00004 is to remove all toipics under the CHEMICAL AND BIOLOGICAL DEF ...)
(Read Full)

The purpose of this Amendment 00004 is to remove all toipics under the CHEMICAL AND BIOLOGICAL DEFENSE DIVISION (CBD) in its entirety. All other topics remain unchanged.


amendment icon Amendment # 3
Posted Date 4/11/14

( The purpose of this Amendment 00003 is to repost the research topics under the CYBER SECURITY DIVIS ...)
(Read Full)

The purpose of this Amendment 00003 is to repost the research topics under the CYBER SECURITY DIVISION (CSD) that was reflective in Amendment 00001, issued on March 11, 2014. Amendment 00002 that was issued on April 1, 2014 did not reflect the correct CSD research topics.


amendment icon Amendment # 2
Posted Date 4/1/14

( The purpose of this Amendment 00002 is to remove the OFFICE OF STANDARDS (STN) topics in its entire ...)
(Read Full)

The purpose of this Amendment 00002 is to remove the OFFICE OF STANDARDS (STN) topics in its entirety.


amendment icon Amendment # 1
Posted Date 3/11/14
The purpose of this Amendment 00001 is to update CYBER SECURITY DIVISION (CSD) topics.



Back to Past Solicitations List