alert image
  • The DHS S&T BAA Portal website will be undergoing scheduled maintenance and will not be available on the following dates and times:
    • 11:00 PM Saturday, October 26, 2019 EDT - 06:00 AM, Sunday, October 27, 2019 EDT
    We apologize for any inconvenience. If you need assistance, please contact the help desk at dhsbaa@reisystems.com.

Past Solicitations
DHSST-LRBAA 18-01
Long Range Broad Agency Announcement (LRBAA) 18-01

This is a Broad Agency Announcement (BAA) in accordance with Federal Acquisition Regulation (FAR) 6.102 (d)(2) and FAR 35.016. A separate Request for Proposals (RFP) or other solicitation document will not be issued. The Department of Homeland Security (DHS), Office of Procurement Operations (OPO) in support of the Science and Technology (S&T) Directorate will not issue paper copies of this Announcement. DHS S&T reserves the right to select and fund all, some, or none of the Full Proposals submitted under this Announcement. Multiple awards are anticipated to be issued under this Announcement. No funding for direct reimbursement of proposal development costs shall be allowed. Industry Engagement and proposal materials submitted under this Announcement shall not be returned. Depending on proposal markings, DHS will adhere to FAR 3.104 on handling proprietary information. It is the policy of DHS to treat all submissions as "Source Selection Information" and "For Official Use Only".

Topics

MGMT 02-01 - Resilient Position Navigation and Timing (PNT) (Research)

The ability to enhance or protect the reliability and integrity of PNT services for end-users against disruptions. Topic seeks technologies that result in improvements to PNT services for end-users to include:

1. disruption alerting and mitigation technologies;
2. technologies that will enable end-users to continue normal operations through PNT disruption events; and
3. technologies that provide novel PNT capabilities.

MGMT 02-02 - Resilient Position Navigation and Timing (PNT) (Unique Prototype)

The ability to enhance or protect the reliability and integrity of PNT services for end-users against disruptions. Topic seeks technologies that result in improvements to PNT services for end-users to include:

1. disruption alerting and mitigation technologies;
2. technologies that will enable end-users to continue normal operations through PNT disruption events; and
3. technologies that provide novel PNT capabilities.

MGMT 02-03 - Resilient Position Navigation and Timing (PNT) (Mature technology for modification and experimentation)

The ability to enhance or protect the reliability and integrity of PNT services for end-users against disruptions. Topic seeks technologies that result in improvements to PNT services for end-users to include

1. disruption alerting and mitigation technologies;
2. technologies that will enable end-users to continue normal operations through PNT disruption events; and
3. technologies that provide novel PNT capabilities.

MGMT 02-04 - Development of Hybrid (LMR/LTE) Technologies leverage existing wireless technologies to deliver mission critical voice and data applications

Currently, Customs and Border Protection (CBP) primarily relies on existing land mobile radio (LMR) services for mission critical voice communications. CBP is seeking innovative solutions to accelerate deployment of data services including mission critical voice, full motion video, sensor data, still-images, biometric information, and location-based situational awareness.
Research concept materials should:

  • Effectively leverage existing coverage from both public safety (LMR, FirstNet) and commercial wireless service providers though the use of LMR/LTE hybrid solutions (Solutions should address varying levels of available coverage from wilderness areas with poor and non-existent coverage to urban centers with excellent coverage.)
  • Utilize standards-based technology interfaces, promoting standards-based solutions rather than proprietary ones
  • Reduce life-cycle costs (acquisition, operations & maintenance, and refresh)

MGMT 02-05 - Low-cost tactical communication devices for information sharing in remote environments (Border Security Technology Solution)

Low-cost tactical communication devices that interface with modern smartphones to enable secure sharing of position location information (PLI) and text messages in remote environments for increased situational awareness.

MGMT 02-06 - Test processes and procedures for compliance to standards and evaluation and analysis of existing and evolving standards.

This topic invites proposals for assuring and maintaining interoperability through Project 25 and related standards (e.g., LTE, LMR/LTE Interworking, 3GPP MCPTT) projects by researching existing testing processes and procedures currently in use for P25 and related public safety communications standards and; (1) developing new and maintaining existing testing processes for compliance to the standards, (2) evaluating proposed changes and proposing new changes to the standards to promote interoperability, compatibility and improved market competitiveness, (3) assessing and analyzing test results to ensure that systems are interoperable and identifying issues with standards and testing. The proposed solution may also include conducting outreach to both the industry and user communities through meetings to identify P25 issues that impact interoperability and concern public safety communications and development of supporting knowledge products and training to assist public communications and interoperability.

MGMT 08-01 - Community Resilience to Disasters

The ability to use behavior-based methods, models, trainings and technologies to enhance community resilience in the face of human- or nature-caused catastrophes. Improvements in this capability can include:

  1. Better understanding of risk perception;
  2. Improved risk communication by emergency responders and public officials;
  3. Pre-event education and training methods; and
  4. Applied theoretical and empirical research into the properties of resilient social networks and communities to include elements of social media and crowd sourcing.

MGMT 08-02 - Flood Forecasting and Modeling

The ability to monitor the level of precipitation, runoff, and river water levels and flow rates for simulation and a minimum of five day flood forecasting, with daily update capability, and more frequently during actual floods. Improvements in this capability can: (1) Integrate new modeling methodology and/or very low cost sensors; (2) Localize water forecasts to specific geographies/known flood prone areas; (3) Integrate with the National Response Framework; (4) Work for both flood and drought; and (5) Integrate with FEMA's Integrated Public Alert and Warning System (IPAWS) or other Public Statewide or local alerting systems.

PREV 01-01 - Identification of Novel Non-detonable Fertilizer

A major challenge for policy makers has been how to keep precursor materials, some of which are also vital agricultural fertilizers, out of the hands of terrorists. This topic seeks to identify an effective high yield fertilizer that cannot be used by adversaries as an explosive precursor.

PREV 04-01 - Targeted Violence Prevention

The ability to prevent terrorism and other targeted violent attacks through the application of social science methods can include:

1. Research and development to improve the detection, analysis, understanding, and mitigation of the threats posed by violent individuals;
2. Knowledge, tools and technologies to determine when individuals, groups, and movements are likely to engage in violence; and
3. What ideological, organizational, and contextual factors may influence violent action and target selection.

PREV 05-01 - Advanced Analytics for Next Generation Homeland Security Missions

Advanced Analytics for Next Generation Homeland Security Missions: DAE is interested in innovative approaches and emerging technologies to enable next generation data-driven analytics solution architectures that include: Data Wrangling and Preparation, Distributed Storage Architectures, Advanced Computational Concepts. Analytics and Visualization, Human Centered Systems, Decision Support and Business Processes, Privacy and Security and Analytics for the Internet of Things and Embedded Systems. The DAE is specifically interested in innovative ideas that significantly improve the utilization of enterprise data sets for cross mission applications, large scale social media analytics for screening and vetting applications, block chain applications for privacy protecting information sharing and analytics, and adaptive analytics environments for multi-party/multi-scale and multi-latency internet of things architectures, infrastructure protection, emergency management and situational awareness.

PROT 03-01 - Foreign Animal Disease Vaccines and Diagnostics.

Apply biological-based, pathogen agnostic medical countermeasure vaccine and diagnostic platforms to develop foreign animal and emerging zoonotic livestock disease vaccines and diagnostic assays candidates for testing and evaluation. Provide conceptual design and implementation strategies for modeling and analysis of foreign animal and emerging zoonotic livestock disease pathogens (at regional and national scales). Product candidates are strongly recommended to have industry involvement, and meet USDA CVB, National Veterinary Stockpile and/or National Animal Health Laboratory Network requirements (as applicable).

SEC AVN 02-01 - Detect Explosives and Contraband in Air Cargo- Detect explosives and other contraband in Cargo skids and pallets

Air cargo screening is challenging because of the diversity in the commerce transported and the complexity of the supply chain. Some air cargo is transported on dedicated cargo aircraft, but a significant amount is transported on passenger aircraft. Cargo diversity presents screening challenges because systems must be capable of screening a variety of items from organic material such as flowers, fresh or frozen meats, to metal parts or metal drums containing liquids. Skids of cargo may be homogeneous, or could contain tens of small parcels or boxes from multiple vendors. Cargo screening is performed by private companies, so cost effective solutions are essential and software tools to assist the system operators to better detect anomalies in the cargo are important. Submitters must provide their development plan to produce mature systems which can scan full-size air cargo skids (48" x 48" x 65") at operational speed (at least 24 skids per hour), and ultimately cost under $500,000 as production units once development is completed. Proposed scanners must be able to cope with the wide varieties of air cargo, as described above. Standards for screening air cargo require updating and additional definition based on the diversity or types of air cargo. Submitters must provide a plan to develop appropriate test standards for testing cargo screening equipment.

SEC AVN 02-02 - Detect Explosives and Contraband in Air Cargo- High Penetration Screening Capability for Dense (consolidated) Air Cargo Skids

Air cargo screening is challenging because of the diversity in the commerce transported and the complexity of the supply chain. Some air cargo is transported on both dedicated cargo aircraft, but a significant amount is also transported on passenger aircraft. Cargo diversity presents screening challenges because systems must be capable of screening a variety of items from organic material such as flowers, fresh or frozen meats, to metal parts or metal drums of liquids. Skids of cargo may be homogeneous, or could contain tens of small parcels or boxes from multiple vendors. Cargo screening is performed by private companies, so cost effective solutions are essential and software tools to assist the system operators to better detect anomalies in the cargo are important. Submitters must provide their development plan to produce systems which can scan full-size air cargo skids (48" x 48" x 65") at speeds exceeding 24 skids per hour and which will provide imaging of dense cargo. Proposed scanners must be able to cope with the wide varieties of air cargo as described above. Proposals for automated explosive threat recognition algorithms to be hosted on these cargo skid scanners are also invited.

SEC AVN 02-03 - Detect Explosives and Contraband in Air Cargo- Algorithms and Detection Systems

Air cargo screening is challenging because of the diversity in the commerce transported and the complexity of the supply chain. Some air cargo is transported on both dedicated cargo aircraft, but a significant amount is also transported on passenger aircraft. Cargo diversity presents screening challenges because systems must be capable of screening a variety of items from organic material such as flowers, fresh or frozen meats, to metal parts or metal drums of liquids. Skids of cargo may be homogeneous, or could contain tens of small parcels or boxes from multiple vendors. Cargo screening is performed by private companies, so cost effective solutions are essential and software tools to assist the system operators to better detect anomalies in the cargo are important. Submitters must provide their development plan to produce systems which can scan full-size air cargo skids (48" x 48" x 65") at speeds exceeding 24 skids per hour and which will provide imaging of dense cargo. In addition to explosives, there is a growing interest in detecting contraband such as opioids which may be hidden in air cargo. The government is interested in developing dual-use systems which may detect both explosives and illicit cargo. Proposals for automated explosive threat recognition algorithms to be hosted on these cargo skid scanners are also invited.

SEC AVN 03-01 - Screening at Speed- Passenger Screening Technologies

The Apex Screening at Speed Program is pursuing transformative R&D activities that support a future vision for increasing security effectiveness while dramatically reducing wait times and improving the passenger experience. These future capabilities will be interconnected through non-proprietary interfaces in a system of systems that is more secure, efficient, flexible, and adaptable than currently deployed sensors.

S&T seeks hardware and software technologies that assist in screening three hundred or more passengers per hour with minimal need for divestiture of headwear, footwear or personal items. Technologies shall contribute to a system of systems that provides detection at TSA's highest security detection standards. Technologies would ideally be capable of adapting or upgrading quickly to respond to emerging threats. Of highest interest are technologies that contribute to a system of systems that can adapt dynamically to TSA-provided individual risk assessments. Technologies shall be networkable and support cybersecurity best practices.

SEC AVN 04-01 - Detection Canines- Canine Structure and Function

Canine R&D Structure and Function, part of the program focusing on the more basic understanding of canine behavior, genetics, olfaction and cognition of this detector to improve operational efficiencies and training methods.

SEC AVN 04-02 - Detection Canines- Development and Testing of Canine Training Aids

Development and Testing of Canine Training Aids, specifically targeting the creation of low cost, non-hazardous emerging threat and conventional explosive training aids, with state-of-the-art laboratory technology for odor validation to the level of canine detection. The program is also interested in odor generalization analysis studies to reduce requisite numbers of trained odors.

SEC AVN 04-03 - Detection Canines- Canine Test and Evaluation

Development and Testing of Canine Training Aids, specifically targeting the creation of low cost, non-hazardous emerging threat and conventional explosive training aids, with state-of-the-art laboratory technology for odor validation to the level of canine detection. The Program is also interested in odor generalization analysis studies to reduce requisite numbers of trained odors.

SEC AVN 04-04 - Explosive Detection in Checked Baggage- Advanced Algorithms and System Integration

Development and maturation of threat detection and false alarm reduction algorithms, for explosives, their precursors, and/or other prohibited items; the integration of these algorithms into operational or prototype systems; and demonstration of these algorithms in real time operation. The algorithms should be deployable to improve performance of existing or future EDS systems.

SEC AVN 04-05 - Explosive Detection in Checked Baggage- Development and Maturation of System Components and Subsystems

Development and maturation of system components (such as X-ray Sources and Detectors) with performance and advanced characteristics necessary to evolve laboratory and experimental prototypes into full up X-ray system designs able to meet the Advanced X-ray Systems requirements. This includes multi-energy and spectroscopic array-capable detectors, sources which support adaptive and diffractive imaging, and general improvements in efficiency and resolution. Components may be used upgrade existing systems or serve as key elements of novel system design.

SEC AVN 04-06 - Explosive Detection in Checked Baggage- Advanced X-Ray System Development

Development and testing of full up system engineering design models (EDMs) (TRL 6-7 level of maturity). The goal is to achieve a significantly enhanced capability to robustly detect explosive threats, reduce primary baggage screening false alarm rates on all explosive threat classes, and increase passenger baggage screening throughput under real life operating conditions. The government seeks novel system concepts or novel improvements to existing system designs which will deliver enhanced operational performance.

SEC AVN 04-07 - Explosive Detection in Checked Baggage- Test and Evaluation

Third-party test and evaluation capabilities relevant to aviation security and similar environments. Test articles which provide meaningful simulation of the checked baggage explosive detection environment. Analytical capabilities which will allow rapid, meaningful determination of system performance and provide direction for future system development. Specialized modeling and simulation capabilities that inform and support testing and evaluation activities are also of interest.

SEC AVN 05-01 - Screening at Speed- Passenger Analysis

The Apex Screening at Speed Program is pursuing transformative R&D activities that support a future vision for increasing security effectiveness while dramatically reducing wait times and improving the passenger experience. These future capabilities will be interconnected through non-proprietary interfaces in a system of systems that is more secure, efficient, flexible, and adaptable than currently deployed sensors.

S&T seeks hardware and software technologies that identify and assess the security risk presented by passengers at the aviation checkpoint. These technologies may be intended for deployment within the immediate checkpoint, or in a more distributed fashion throughout an airport or similar venue. All systems should conform to cybersecurity best practices and support capabilities to enable risk-based screening as well as TSA's Security Technology Integration Program (STIP).

SEC AVN 06-01 - Screening at Speed- Accessible Property Screening

The Apex Screening at Speed Program is pursuing transformative R&D activities that support a future vision for increasing security effectiveness while dramatically reducing wait times and improving the passenger experience. These future capabilities will be interconnected through non-proprietary interfaces in a system of systems that is more secure, efficient, flexible, and adaptable than currently deployed sensors.

S&T seeks hardware and software technologies that screen the accessible property of three hundred or more passengers per hour with minimal need for the separation of liquids, aerosols, gels, or electronics from baggage. Technologies shall contribute to a system of systems that provides detection at TSA's highest security detection standards. These technologies would be able to be certified to TSA's Accessible Property Screening System standards standalone or when integrated with other systems. Technologies would ideally be capable of adapting or upgrading quickly to respond to emerging threats. Of highest interest are technologies that contribute to a system of systems that can adapt dynamically to TSA-provided individual risk assessments. All systems should conform to cybersecurity best practices and support capabilities to enable risk-based screening as well as TSA's Security Technology Integration Program (STIP).

SEC AVN 06-02 - Screening at Speed- Enabling Capabilities

The Apex Screening at Speed Program is pursuing transformative R&D activities that support a future vision for increasing security effectiveness while dramatically reducing wait times and improving the passenger experience. These future capabilities will be interconnected through non-proprietary interfaces in a system of systems that is more secure, efficient, flexible, and adaptable than currently deployed sensors.

S&T seeks component technologies that improve the overall capabilities of traditional checkpoint systems and their operators. These upgrades, complements, or add-ons to systems may bolster an existing capability (such as passenger screening systems or accessible property screening systems), add a new and orthogonal capability, or improve the passenger or operator experience while maintaining current security capabilities. Unique research materials to alter existing security systems should be bolstered by engagement and support with the appropriate vendors. All systems should conform to cybersecurity best practices and support capabilities to enable risk-based screening as well as TSA's Security Technology Integration Program (STIP).

SEC AVN 06-03 - Screening at Speed- Security Architecture

The Apex Screening at Speed Program is pursuing transformative R&D activities that support a future vision for increasing security effectiveness while dramatically reducing wait times and improving the passenger experience. These future capabilities will be interconnected through non-proprietary interfaces in a system of systems that is more secure, efficient, flexible, and adaptable than currently deployed sensors.

Current checkpoints consist of sensors (X-ray systems, bottled liquid scanners, passenger screening systems, explosive trace detection systems, etc.) that operate relatively independently. S&T seeks designs and implementation plans for gaining improved performance by integrating existing or future security capabilities into a system of systems. Proposed architectures may have creative means to combine layouts, primary screening modalities, secondary screening and alarm resolution capabilities, distributed sensors, analytics, data from beyond the traditional checkpoint, and other parameters that improve the overall security posture. Performance upgrades may encompass improved security, throughput, passenger experience, reliability, or other factors. All components should conform to cybersecurity best practices and support capabilities to enable risk-based screening as well as TSA's Security Technology Integration Program (STIP).

SEC AVN 06-04 - Screening at Speed- Test and Evaluation

The Apex Screening at Speed Program is pursuing transformative R&D activities that support a future vision for increasing security effectiveness while dramatically reducing wait times and improving the passenger experience. These future capabilities will be interconnected through non-proprietary interfaces in a system of systems that is more secure, efficient, flexible, and adaptable than currently deployed sensors.

S&T seeks third-party test and evaluation checkpoint capabilities relevant to aviation security and similar environments to accelerate the certification and deployment of checkpoint screening systems under TSA's Passenger Screening Program and Electronic Baggage Screening Program. Specialized modeling and simulation capabilities that inform, accelerate, develop and support testing and evaluation activities are also of interest.

SEC BORD 04-01 - Human Trafficking and Modern Slavery

Improvements in this capability can include: (1)Research, development, tools, and technologies to improve the detection, analysis, and understanding of human trafficking, including contextual factors that may influence incidences and patterns of human trafficking; (2)knowledge to better understand human trafficking as a process and its impacts on individuals, communities, the United States, and the systems within; and (3)gap analysis to identify aspects of human trafficking (victims or perpetrators) in greatest need of empirical research.

SEC BORD 04-02 - Non-Intrusive Screening of Cargo and Bulk Packages to Detect Synthetic Opioids and Other Illicit Drugs

The ability to non-intrusively screen cargo, containers, or bulk packaged materials to detect synthetic opioids and other illicit drugs being smuggled into the United States at Border Ports of Entry (BPE) and International Mail Facilities (IMFs). Topic seeks technologies that result in improvements to screening capabilities for end-users to include (1)advanced technologies that offer three-dimensional imaging; (2)technologies that will enable end-users to discriminate illicit materials from lawful materials; and (3)technologies that enable end-users to continue normal operations with minimal disruption to flow of commerce.

SEC CYB 02-01 - Identity Management

Research and development of architectures, technologies and processes needed to enhance the security and trustworthiness of systems and services.

SEC CYB 02-02 - Data Privacy

Develops, tests and evaluates technical and knowledge solutions for the management of privacy threats and vulnerabilities that arise from socio- and technical policies and operations. The project's R&D focuses on privacy risks related to:

  • Connected sensor devices, mobile computing and sensor platforms
  • Automation and autonomous systems
  • The delivery of digital services

SEC CYB 02-03 - Cyber Risk Economics (CYRIE)

Cybersecurity is a multidimensional problem that demands interdisciplinary attention. The CYRIE program supports research into the business, legal, technical and behavioral aspects of the economics of cyber-threats, vulnerabilities and controls. CYRIE R&D emphasizes empirically based measurement, modeling and evaluation of:

  • Investment into cybersecurity controls (technology, regulatory, and legal) by private-sector, government and private actors;
  • Impact of investment on the probability, severity and consequences of actual risks and resulting cost and harm;
  • Value of the correlation between business performance measures and evaluations of cybersecurity investments and impacts; and
  • Incentives to optimize the investments, impacts and value basis of cyber-risk management.

SEC CYB 03-01 - Distributed Denial of Service Defense (DDoSD)

Distributed Denial of Service Defense - Denial of service attacks are pervasive and have the potential to disrupt critical network infrastructure. Topics of interest include:

  • Efforts that leverage existing policies and practices to mitigate DDoS attacks;
  • Techniques that adopt existing technologies for near term DDoS protection; and
  • Novel approaches for understanding and mitigating new forms of DDoS.

SEC CYB 03-02 - Federated Enterprise Environments (formerly Cloud Computing Security)

Research and Development to build upon security in Federated Enterprise Environments-including secure protocols to protect data flow to, within and out of the federated environment; command and control (C2) infrastructure for federated environments; incorporation of adaptive defenses into federated environments; preserving data integrity; privacy constraints; privacy-preserving computation/contract generation; and systems to identify unauthorized activity.

SEC CYB 03-03 - Application for Network Measurement Science (ANMS)

Security focused measurement and analysis for all aspects of cyberspace. This includes the Internet (e.g., Autonomous Systems, routers) or other networks (e.g. Industrial Control Systems (ICS)) that may connect to the Internet, via a static or dynamic (possibly intermittent) connection. Security focused measurement includes but is not limited to algorithms, tools, techniques, data and analysis for enabling security, from global scale to the individual user. A particular application area is SEAC: Small Enterprise Assistance for Cyber (pronounced seek), which has the goal of providing a system or method for small enterprises with limited resources to improve their security posture. This is a broader effort to develop systems or provide access to tools and/or analysts for identification and remediation of cyber incidents.

SEC CYB 03-04 - Predictive Analytics

Predictive Analysis, as applied to cyber security, is the ability to identify potential cyber threat vectors and determine the probable course of action for each threat. These findings should be presented automatically, with human-in-the-loop if desired, but not required. Presentation should be in an easily understandable format, to allow resource management to address threats as they evolve. Predictive Analysis may be applied at any phase or stage, from fully protected to compromise and recovery. All types of cyber threats may be considered.

SEC CYB 03-05 - Information Marketplace for Policy and Analysis of Cyber-risk and Trust

The Information Marketplace for Policy and Analysis of Cyber-risk & Trust (IMPACT) project supports the global cyber-risk research community by coordinating and developing real-world data and information-sharing capabilities-tools, models and methodologies. To accelerate solutions around cyber-risk issues and infrastructure security, the IMPACT project enables empirical data and information-sharing between and among the global cybersecurity research and development (R&D) community in academia, industry and government. Importantly, IMPACT also addresses the cybersecurity decision-analytic needs of Homeland Security Enterprise (HSE) customers in the face of high volume, high-velocity, high-variety and/or high-value data through its network of Decision Analytics-as-a-Service Providers (DASP). These resources are a service technology or tool capable of supporting the following types of analytics: descriptive (what happened), diagnostic (why it happened), predictive (what will happen) and prescriptive (what should happen).

SEC CYB 03-06 - National Research Infrastructure of Cyber Security Experimentation

The results of this topic will catalyze and support the research, and development of advanced experimental research tools, technologies and methodologies as broadly available national resources. Indicators of the success of this program objective will be the realization of experimental research capabilities, and approaches that reach beyond today's state of the art.

SEC CYB 04-01 - Mobile Ecosystem Security Research

The research and development of tools and techniques to enable the secure use of mobile ecosystem technologies in support of the DHS mission. Areas of interest include mobile device supply chain security analysis, mobile infrastructure resilience metrics, mobile communication security protocol analysis and security.

SEC CYB 05-01 - Next Generation Cyber Infrastructure (NGCI)

The Next Generation Cyber Infrastructure Apex program addresses the cybersecurity challenges facing our nation's critical infrastructure. Cyber Apex finds, tests and transfers proven solutions to these sectors to fill cybersecurity gaps and harden critical systems and networks.

Currently, Cyber Apex is working to harden the cyber-defenses of the financial services sector (FSS), which is a frequent target of cybercriminals. The Cyber Apex Review Team (CART), sponsored by CSD and made up of FSS institution and Treasury Department representatives, identifies gaps and evaluates solutions. While some identified gaps are solvable by mature technology, others needed novel ideas. This finding led Cyber Apex to establish two development paths: creating a consortium to test existing solutions and partnering with the DHS Silicon Valley Innovation Program (SVIP) for early-stage solutions.

The consortium focuses on operational testing of mature technologies to determine if they meet FSS needs. The program uses a consortium manager-Cyber Apex Solutions-to maintain an efficient process for foraging and building a consortium of technology owners.

SVIP focuses on finding novel solutions from startups whose technologies are not mature enough for rigorous operational testing and evaluation. Solutions with promise are piloted and evaluated. Cyber Apex solicitations under SVIP-the Financial Services Cyber Security Active Defense-seeks startups that have novel solutions in the areas of moving-target defense, isolation and containment and cyber-intrusion deception.

SEC CYB 05-02 - Government Networks (.gov)

The need for government departments and agencies to have a strong security posture is abundantly clear. DHS S&T is working closely with the National Protection and Programs Directorate, federal and state civilian departments and agencies, and industry to develop and transition modern and advanced prototyped cybersecurity capabilities. Specific R&D efforts are needed that can link major requirements of existing programs (e.g. National Cyber Protection System (NCPS), Continuous Diagnostics and Mitigation (CDM), Automated Information Sharing (AIS)) with new industry capabilities, normally through impactful demonstrations, experiments and pilots. Particular areas of interest include architectural elements such as fine-grained monitoring and control, whitelist-based security policies, automated cybersecurity decision loop and continuous risk analysis, and strengthening key human roles in these systems. We also seek capabilities to characterize current and evolving threats to help drive system requirements, to include technology considerations protecting cloud and mobile services, thereby ensuring newly developed or integrated cyber defense capabilities are relevant and effective against those threats. Ultimately, this work must result in key technology and guidance that can aid chief information and information security officers in securing department and agencies.

SEC CYB 05-03 - Critical Infrastructure (CIDARS, CREDC, LOGIIC)

The Critical Infrastructure Design and Adaptive Resilient Systems project is an initiative focused on enhancing the security and resilience of critical infrastructure systems consistent with Presidential Policy Directive 21 and the National Critical Infrastructure Security and Resilience (CISR) Research and Development Plan. This project is examining innovative approaches to plan and design adaptive performance into critical infrastructure systems. The goal is to create common capabilities and quantitative approaches to facilitate the development and implementation of integrated solutions that will enable secure and resilient service provisioning.

The nation's electric grid faces challenges from cyberattacks, natural disasters and accidental failures. To address these challenges, CSD and the Department of Energy (DOE) jointly fund the Cyber Resilient Energy Delivery Consortium (CREDC). The consortium is developing solutions through R&D, education and industry engagement. CREDC will generate research, evaluate the results and deploy solutions in the marketplace. The project's foci include cyber-protection technologies; cyber monitoring, metrics, and event detection; risk assessment of Energy Delivery Systems (EDS) technology; data analytics for cyber event detection; resilient EDS architectures and networks; and identifying the impact of disruptive technologies such as the Internet of Things and cloud computing on EDS resiliency.

The Linking the Oil and Gas Industry to Improve Cybersecurity (LOGIIC) project is an ongoing collaboration between DHS S&T and oil and natural gas companies. The collaborative program facilitates cooperative research, development, testing and evaluation procedures to improve cybersecurity in petroleum industry digital control systems. The project undertakes collaborative R&D projects to improve the level of cybersecurity in critical systems of interest to the oil and natural gas sector. The project objective is to develop sector capabilities while maintaining impartiality, the independence of the participants and vendor neutrality.

SEC CYB 05-04 - Quantifying Mission Impacts of Cyber Disruptions to Information Technology (NPPD)

Projects in support of this topic will develop homeland security decision makers' ability to assess and communicate the consequences--including cascading effects--to critical infrastructure systems, services, and data caused by cyber-attacks to information technology or operational technology systems. Projects will address one or more of the following objectives:

  • Strengthen DHS's ability to assess the impact of cyber-attacks and cyber disruptions on critical infrastructure operations.
  • Develop methodologies to characterize the criticality of Federal networks and better estimate the consequences of their disruption.
  • Improve DHS's ability to anticipate emerging cyber risk by using innovative and advanced techniques to analyze evolving cyber threats, vulnerabilities, and trends.
SEC CYB 06-01 - Software Assurance

The research and development of tools and techniques to reduce vulnerabilities in software and improve how security is addressed in the process of developing and vetting software applications.

SEC CYB 07-01 - Cyber Security Education

Applied research in key education and training areas, to help ensure the nation has a highly skilled cybersecurity workforce is important to maintaining its systems and networks and combating future cyberattacks. Other areas of interest include:

  • The coupling of operations with education and training;
  • Abstract learning versus learning with context;
  • Bayesian learning (prior knowledge) and where and how it might be applicable;
  • Incident response feedback systems, that drive subsequent training/learning directions;
  • Regional education and learning models coordinating efforts across different kinds of organizations.

SEC CYB 08-01 - Anonymous Networks and Currencies

The research and development of tools and techniques to aid law enforcement in the investigation of cybercrimes committed using friend-to-friend networks, anonymous networks and/or cryptocurrencies.

SEC CYB 08-02 - Digital Forensics Support to Law Enforcement

The research and development of tools and technologies that will allow investigators to visualize, analyze, share and present data derived from cell phones, GPS devices, computer hard drives, networks, and other digital media.

SEC CYB 08-03 - Child Exploitation

Identify the research areas of greatest need to combat child exploitation and assist victims.

SEC CYB 08-04 - Digital Forensics for First Responder Applications

Near real time and forensics capability improvements for first responder applications.

SEC CYB 09-01 - Cyber Enabled Networked Physical Systems

This is a critical time in the design and deployment of Cyber Enabled Networked Physical Systems (CNPS). Advances in networking, computing, sensing, and control systems have enabled a broad range of new devices. These systems are being designed and deployed now, but unfortunately security is often left as an additional feature that will be bolted on later. Industry is driven by functional requirements and fast moving markets. The design choices being made today will directly impact next several decades in transportation, emergency response, medical devices, and so forth. To address these challenges, CSD is engaging in efforts to build security into the design of these critical systems.

SEC CYB 09-02 - Internet of Things (IoT) Security (IoTSEC)

The research and development of tools and techniques to aid DHS mission and operations components, law enforcement entities, and Critical Infrastructure (CI) asset owners and operators (to include IT and Internet Infrastructures) in addressing the security gaps between existing traditional IT networks and the broad range of new IoT devices being designed and deployed without security considerations.

SEC CYB 09-03 - Smart Cities

DHS S&T is working closely with National Institute of Standards and Technology (NIST) on NIST's 2017-2018 Global Cities Team Challenge (GCTC) to reach out and raise awareness of the need for cybersecurity in emerging "Smart Cities." The new DHS S&T-NIST Smart and Secure Cities and Communities Challenge (SC3) program is encouraging GCTC participants to adopt designed-in cybersecurity for "smart city" systems that are more secure, reliable, resilient and protective of privacy. Through SC3, DHS S&T CSD is promoting the development, adoption and implementation of cybersecurity protections within smart-city environments and helping DHS S&T-funded programs and performers bring their solutions into the GCTC. DHS S&T is also calling on innovators from the cybersecurity industry and research community to teach cities, communities and GCTC teams about cyber challenges, cyber physical systems and internet-of-things devices to help address cybersecurity and privacy objectives.

SEC INFRA 01-01 - Estimating Impacts of Emerging Man-Made Attack Vectors on Critical Supply Chains

Projects in support of this topic will improve homeland security decision makers' ability to anticipate and communicate the cascade of all-hazards critical infrastructure disruptions--including supply chain disruptions--through dependent infrastructure systems and sectors and the impact of those cascading effects on lifeline services, critical functions, and regionally significant industrial clusters. Projects will address one or more of the following capabilities and outcomes:

  • Establish a capability to identify or assign dependency relationships for assets supporting the critical infrastructure lifelines or other key functions, and use methods such as failure analysis to identify the links or nodes most critical to supporting those functions.
  • Improve DHS's ability to provide accurate and timely analysis of the impacts to services caused by all-hazards disruptions to the lifeline critical infrastructure systems, including integrated tools that provide end-to-end capabilities for key hazards.
  • Improve data, information, and heuristics related to infrastructure dependencies through techniques that may include machine learning, web-scraping, open source information, /field collection, case studies, and validation/verification activities.
  • Provide DHS analysts and field personnel with analytic tools to understand infrastructure dependencies during crisis events, exercises, and steady-state analysis

SEC INFRA 02-01 - System Model of Major Critical Infrastructure Assets

Projects in support of this topic will increase DHS's understanding and use of infrastructure risk information to determine strategic, operational, policy, and resource priorities and to inform risk management decisions by Federal, state, and local stakeholders. Projects will address one or more of the following objectives:

  • Implement an approach to use National Critical Functions to understand dependencies and the effects of all-hazards infrastructure disruptions on these functions.
  • Improve DHS's capacity to identify and communicate areas of greatest strategic infrastructure risk through the refinement and execution of an annual NPPD Mission Risk Register and other risk analyses.
  • Develop the capability to analyze and communicate nationally, regionally, and functionally significant systemic, all-hazards risks-including cyber risks-across and within infrastructure sectors and the attributes that may help detect and mitigate the risks.
  • Implement an ongoing futures analysis capability focused on identifying future drivers of all-hazards risk in the NPPD mission space and risk management strategies that are robust across multiple alternative futures.
  • Improve homeland security decision makers' understanding of how to apply risk-informed priorities to the development and management of strategy, plans, programs, and budgets.

Discontinued

SEC BORD 03-01 - Unmanned Aircraft Systems (UAS) Detection, Tracking and Classification-Test and Evaluation

Unmanned Aircraft Systems (UAS) Detection, Tracking, and Classification: Unmanned Aircraft Systems can represent a threat to people, critical infrastructure, and border alike. Technologies and methods to detect, track, and classify UAS's in complex environments, including the determination of intent. Unique research material for test and evaluation of technologies to detect, track, and locate the pilot controller of a UAS vehicle.

SEC BORD 03-02 - Unmanned Aircraft Systems (UAS) Detection, Tracking and Classification-Develop Advanced Technology

Unmanned Aircraft Systems (UAS) Detection, Tracking, and Classification: Unmanned Aircraft Systems can represent a threat to people, critical infrastructure, and border alike. Technologies and methods to detect, track, and classify UAS's in complex environments, including the determination of intent. Unique research material for developing advanced technologies to detect, track, and locate the pilot controller of a UAS vehicle.

SEC BORD 03-03 - Unmanned Aircraft Systems Mitigation-Test and Evaluation

Unmanned Aerial Systems (UAS) Mitigation: Unmanned Aerial Systems can represent a threat to people, critical infrastructure, and borders alike. Technologies and methods to mitigate either the UAS aircraft, communications links, or the controllers in environments which may be complex and/or urban. Modifications or adjuncts to existing systems that extent their capabilities to include mitigation also fall under this topic.

SEC BORD 03-04 - Unmanned Aircraft Systems Mitigation-Develop New or Advanced Capability

Unmanned Aerial Systems (UAS) Mitigation: Unmanned Aerial Systems can represent a threat to people, critical infrastructure, and borders alike. Technologies and methods to mitigate either the UAS aircraft, communications links, or the controllers in environments which may be complex and/or urban. Modifications or adjuncts to existing systems that extent their capabilities to include mitigation also fall under this topic.

SEC CYB 01-01 - Cyber Enabled Networked Physical Systems

This is a critical time in the design and deployment of Cyber Enabled Networked Physical Systems (CNPS). Advances in networking, computing, sensing, and control systems have enabled a broad range of new devices. These systems are being designed and deployed now, but unfortunately security is often left as an additional feature that will be bolted on later. Industry is driven by functional requirements and fast moving markets. The design choices being made today will directly impact next several decades in transportation, emergency response, medical devices, and so forth. To address these challenges, CSD is engaging in efforts to build security into the design of these critical systems.

SEC CYB 01-02 - Internet of Things (IoT) Security (IoTSEC)

The research and development of tools and techniques to aid DHS mission and operations components, law enforcement entities, and Critical Infrastructure (CI) asset owners and operators (to include IT and Internet Infrastructures) in addressing the security gaps between existing traditional IT networks and the broad range of new IoT devices being designed and deployed without security considerations.

SEC CYB 01-03 - National Research Infrastructure of Cyber Security Experimentation

The results of this topic will catalyze and support the research, and development of advanced experimental research tools, technologies and methodologies as broadly available national resources. Indicators of the success of this program objective will be the realization of experimental research capabilities, and approaches that reach beyond today's state of the art.

SEC CYB 01-04 - Smart Cities

DHS S&T is working closely with National Institute of Standards and Technology (NIST)on NIST's 2017-2018 Global Cities Team Challenge (GCTC) to reach out and raise awareness of the need for cybersecurity in emerging "Smart Cities." The new DHS S&T-NIST Smart and Secure Cities and Communities Challenge (SC3) program is encouraging GCTC participants to adopt designed-in cybersecurity for "smart city" systems that are more secure, reliable, resilient and protective of privacy. Through SC3, DHS S&T CSD is promoting the development, adoption and implementation of cybersecurity protections within smart-city environments and helping DHS S&T-funded programs and performers bring their solutions into the GCTC. DHS S&T is also calling on innovators from the cybersecurity industry and research community to teach cities, communities and GCTC teams about cyber challenges, cyber physical systems and internet-of-things devices to help address cybersecurity and privacy objectives.

SEC CYB 03-06 - National Research Infrastructure of Cyber Security Experimentation

Duplicate Topic - The results of this topic will catalyze and support the research, and development of advanced experimental research tools, technologies and methodologies as broadly available national resources. Indicators of the success of this program objective will be the realization of experimental research capabilities, and approaches that reach beyond today's state of the art.

Key Dates
Solicitation Open Date:
06/04/2018
Registration Deadline:
06/03/2023 11:59 PM ET
Submission Deadline:
See Notice on FedBizOpps




Back to Past Solicitations List