The end objective of this effort is develop and demonstrate innovative, reliable, easy-to-use, and easy-to-deploy technologies that allow the Department of Homeland Security Components to accurately and consistently detect, track, classify, and conduct threat assessments of Unmanned Aerial Systems in variable and complex environments.
Customs and Border Protection / United States Coast Guard
DHS S&T is working to facilitate the development of technologies that allow the DHS Component to accurately and consistently detect, track, classify, and conduct threat assessments of Unmanned Aerial Systems in variable and complex environments. As such, it is open to any potentially viable technique, methodology, or approach that fulfills the aforementioned requirements. The primary challenge is target discrimination as birds, debris, insects, and other airborne objects appear as valid UAS to many sensors. Other challenges include interference with and damage of other systems using the same wave bands (including visual bands in the case of high-power laser systems), high noise levels such as the use of acoustics sensors in urban environments, and excessive target-sensor stand-off distances. Technologies should address, but not be limited to, the following requirements:
1. Easy-to-Use
2. Easy-to-Deploy
3. Work in variable weather conditions
4. Work at variable altitudes
5. Work in densely populated urban centers or sparsely populated rural areas
6. Should not interfere with customer component standard operations
7. Should not cause disruptions of civilian services
8. Have a low false alarm rate in the areas of detection, tracking, and classification
9. Capable of being configured or converted for portable operations
10. Provide users with real-time analysis and after-action reports
11. Capable of being networked incorporating robust cybersecurity attributes
Selected industry participants will have their technologies exposed to DHS Component acquisition and operations personnel during development and demonstration.
The end objective of this effort is to collect unique research material that address and explore the development and deployment of innovative, reliable, easy-to-use, and easy-to-deploy technologies that allow the component customers of the Department of Homeland Security's Science and Technology Directorate to accurately and consistently detect, track, classify, and conduct a cursory threat assessment of Unmanned Aircraft Systems in variable and complex environments.
Customs and Border Protection, US Border Patrol
DHS S&T is working to facilitate the development of technologies that allow the component customers of the Department of Homeland Security's Science and Technology Directorate to accurately and consistently detect, track, classify, and conduct a cursory threat assessment of Unmanned Aircraft Systems in variable and complex environments. As such, it is open to any potentially viable technique, methodology, or approach that fulfills the aforementioned requirements on behalf of our component customers. Proposed systems should fulfill, but not be limited to, the following requirements:
1. Easy-to-Use
2. Easy-to-Deploy
3. Work in variable weather conditions
4. Work at variable altitudes
5. Work in densely populated urban centers or sparsely populated communities
6. Should not interfere with customer component standard operations
7. Should not cause disruptions of civilian services
8. Have a low false alarm rate in the areas of detection, tracking, and classification
9. Have a smaller portable version
10. Provide users with real-time analysis and after-action reports
11. Should have networking capabilities
12. Should have high-level cybersecurity capabilities
Industry participants chosen to take part in DHS S&T UAS Detection, Tracking, and Classification Programs will carry out projects whose ultimate objective and mission will fulfill key requirements defined by DHS S&T component customers. DHS S&T funded projects will have clearly defined transition requirements consistent with the needs of DHS S&T component customers.
The end objective of this effort the development and deployment of innovative, reliable, easy-to-use, and easy-to-deploy technologies that allow DHS Components to accurately and consistently mitigate Unmanned Aerial Systems in variable and complex environments.
Customs and Border Protection
DHS S&T is working to facilitate the development of technologies that allow the component customers of the Department of Homeland Security's Science and Technology Directorate to accurately and consistently mitigate Unmanned Aircraft Systems as a threat in variable and complex environments. As such, the Directorate is open to any potentially viable technique, methodology, or approach that fulfills the aforementioned requirements on behalf of our component customers. Proposed systems should fulfill, but not be limited to, the following requirements:
1. Innovative Approaches in the following areas should be considered:
a. Directional RF/GNSS Jamming
b. Omni-Directional RF/GNSS Jamming
c. Spoofing (cyber attacking)
d. Kinetic Attacks
2. Easy-to-Use
3. Easy-to-Deploy
4. Work in variable weather conditions
5. Work at variable altitudes
6. Work in densely populated urban centers or sparsely populated communities
7. Should not interfere with customer component standard operations
8. Should not cause disruptions of civilian services
9. Be effective at variable distances
10. Have a smaller portable version
11. Provide users with real-time analysis and after-action reports
12. Should have networking capabilities
13. Should have integrated cybersecurity protections
Industry participants chosen to take part in DHS S&T UAS Threat Mitigation Programs will carry out projects whose ultimate objective and mission will fulfill key requirements defined by DHS S&T component customers. DHS S&T funded projects will have clearly defined transition requirements consistent with the needs of DHS S&T component customers.
The end objective of this effort the development and deployment of innovative, reliable, easy-to-use, and easy-to-deploy technologies that allow DHS Components to accurately and consistently mitigate Unmanned Aerial Systems in variable and complex environments.
Customs and Border Protection
DHS S&T is working to facilitate the development of technologies that allow the component customers of the Department of Homeland Security's Science and Technology Directorate to accurately and consistently mitigate Unmanned Aircraft Systems as a threat in variable and complex environments. As such, the Directorate is open to any potentially viable technique, methodology, or approach that fulfills the aforementioned requirements on behalf of our component customers. Proposed systems should fulfill, but not be limited to, the following requirements:
1. Innovative Approaches in the following areas should be considered:
a. Directional RF/GNSS Jamming
b. Omni-Directional RF/GNSS Jamming
c. Spoofing (cyber attacking)
d. Kinetic Attacks
2. Easy-to-Use
3. Easy-to-Deploy
4. Work in variable weather conditions
5. Work at variable altitudes
6. Work in densely populated urban centers or sparsely populated communities
7. Should not interfere with customer component standard operations
8. Should not cause disruptions of civilian services
9. Be effective at variable distances
10. Have a smaller portable version
11. Provide users with real-time analysis and after-action reports
12. Should have networking capabilities
13. Should have integrated cybersecurity protections
Industry participants chosen to take part in DHS S&T UAS Threat Mitigation Programs will carry out projects whose ultimate objective and mission will fulfill key requirements defined by DHS S&T component customers. DHS S&T funded projects will have clearly defined transition requirements consistent with the needs of DHS S&T component customers.
Results of this topic should provide new and novel capabilities and solutions to assist DHS, Operations, and Law Enforcement components to improve the understanding and confidence of DHS and the Homeland Security Enterprise (HSE) on how CNPS leverage network environments (trusted and untrusted), devices, and sensors to compute and communicate processes and the security risks and challenges associated with the appropriate level of automation, Machine-to-Machine (M2M), communications, learning, and intelligence.
DHS Components, Operations, and Law Enforcement Components
This topic is seeking to address various challenges faced by DHS, Operations, and Law Enforcement. CNPS builds upon the CPSSEC Strategy and the nine key strategic drivers identified in the 2015 NITRD CPS Vision Statement. CNPS are being designed and scaled to autonomously compute, communicate, and execute processes from data collected from networks, devices and sensors, and other intelligent systems. As CNPS system design becomes more complex, automated, intelligent, and integrated with legacy networks and systems - Cybersecurity risks and challenges will only increase.
Developed solutions should transition to federal and law enforcement end-users. Solutions may be brand new capabilities not currently available on the market or current solutions that can be modified to address specific needs.
Results of this topic should provide new and novel capabilities and solutions to assist DHS mission, operations, and law enforcement components to securely leverage, integrate, and interact with IoT systems that affect their operations and assets. Objectives include Detecting, Authenticating, and Updating IoT devices, sensors, and systems to gain comprehensive and near continuous knowledge of an IoT environment.
DHS Mission, Operations, and Law Enforcement Components
This topic is seeking to address various challenges faced by DHS Mission, Operations, and Law Enforcement components in securing the interactions between existing networks and IoT Devices. The IoT continues to expand and disrupt the nation's CI/IT infrastructure. This expansion has resulted in numerous advancements but has also increased the attack surface for malicious actors.
Developed solutions should transition to federal and law enforcement end-users. Solutions may be brand new capabilities not currently available on the market or current solutions that can be modified to address specific needs.
The Cybersecurity Experimentation of the Future (CEF) Testbed will provide cybersecurity researchers with the ability to run experiments on an unclassified secure "virtual internet," through contained environments that can safely test advanced defense mechanisms against live threats without endangering operational networks.The CEF Testbed will provide the cybersecurity research community with a complex test capability and infrastructure (networks, tools, methodologies, tech support) to support national-scale testing of advanced cybersecurity technologies in an open, non-proprietary environment. CEF will enable the applied/research community to share complex cybersecurity experiments, designs, lab setups, software, tools, procedures and data; this allows rapid validation of complex technical findings and avoiding redundant experimental effort.
Transition customers include cybersecurity researchers, instructors and students.
Realization of experimental research infrastructures, capabilities, and approaches that reach beyond today's state of the art are needed. These infrastructures, together with similar broad-based objectives that transform discovery, validation, and ongoing analysis in an increasingly complex and challenging domain must provide, as examples:
Developed solutions should transition to federal, state and academic cybersecurity testbeds. Solutions may be brand new capabilities not currently on the market or current solutions that can be modified to address specific requirements.
To establish and demonstrate replicable, scalable, and sustainable models for incubation and deployment of interoperable, secure, standard-based solutions using advanced technologies such as Internet of Things (IoT) and Cyber-Physical Systems (CPS) and demonstrate their measurable benefits in cities and communities
Homeland Security Enterprise, DHS Components
There are numerous organizations across the United States and internationally, including local governments, nonprofit organizations, academic institutions, technologists, and corporations working to enhance and improve life in cities and communities. These projects have primarily focused on enabling IoT devices and applications to interact and improve processes across a range of domains. The challenge is that many of these projects have not focused on the privacy and security aspects of IoT enabled devices.
Developed solutions should transition to primarily local Smart City communities, but may be applied to a broader range of organizations.
The Cybersecurity Experimentation of the Future (CEF) Testbed will provide cybersecurity researchers with the ability to run experiments on an unclassified secure "virtual internet," through contained environments that can safely test advanced defense mechanisms against live threats without endangering operational networks. The CEF Testbed will provide the cybersecurity research community with a complex test capability and infrastructure (networks, tools, methodologies, tech support) to support national-scale testing of advanced cybersecurity technologies in an open, non-proprietary environment. CEF will enable the applied/research community to share complex cybersecurity experiments, designs, lab setups, software, tools, procedures and data; this allows rapid validation of complex technical findings and avoiding redundant experimental effort.