Develop low cost screening systems that can detect explosives and other contraband in air cargo skids and pallets.
Non-availability of a low cost 3D skid scanning systems; Increasing volume of goods due to e-commerce that necessitate faster screening without losing detection ability; Poor environmental factors for location of screening equipment; and Extended operational hours, need for high MTBF and low MTTR factors
Air cargo screening solutions must complete Operational Test and Evaluation (OT&E) at Government facilities. Systems that pass TSA tests will be added to their Air Cargo Screening Technology List (ACSTL). Private Air Cargo screening companies are only allowed to use systems on the ACSTL.
Air cargo skid screening solutions which are less than $500,000.00 (US) in production quantities.
Non-availability of a low cost 3D skid scanning systems; Increasing volume of goods due to e-commerce that necessitate faster screening without losing detection ability; Poor environmental factors for location of screening equipment; Extended operational hours, need for high MTBF and low MTTR factors
Air cargo screening solutions must complete Operational Test and Evaluation (OT&E) at Government facilities. Systems that pass TSA tests will be added to their Air Cargo Screening Technology List (ACSTL). Private Air Cargo screening companies are only allowed to use systems on the ACSTL..
High penetration screening capability for dense (consolidated) air cargo skids.
Non-availability of a low cost 3D skid scanning systems; Increasing volume of goods due to e-commerce that necessitate faster screening without losing detection ability; Poor environmental factors for location of screening equipment; Extended operational hours, need for high MTBF and low MTTR factors>
Air cargo screening solutions must complete Operational Test and Evaluation (OT&E) at Government facilities. Systems that pass TSA tests will be added to their Air Cargo Screening Technology List (ACSTL). Private Air Cargo screening companies are only allowed to use systems on the ACSTL.
The Apex Screening at Speed Program is pursuing transformative R&D activities that support a future vision for increasing security effectiveness while dramatically reducing wait times and improving the passenger experience. These future capabilities will be interconnected through non-proprietary interfaces in a system of systems that is more secure, efficient, flexible, and adaptable than currently deployed sensors.
S&T seeks hardware and software technologies ... more
The Apex Screening at Speed Program is pursuing transformative R&D activities that support a future vision for increasing security effectiveness while dramatically reducing wait times and improving the passenger experience. These future capabilities will be interconnected through non-proprietary interfaces in a system of systems that is more secure, efficient, flexible, and adaptable than currently deployed sensors.
S&T seeks hardware and software technologies that assist in screening three hundred or more passengers per hour with minimal need for divestiture of headwear, footwear or personal items. Technologies shall contribute to a system of systems that provides detection at TSA's highest security detection standards. Technologies would ideally be capable of adapting or upgrading quickly to respond to emerging threats. Of highest interest are technologies that contribute to a system of systems that can adapt dynamically to TSA-provided individual risk assessments. Technologies shall be networkable and support cybersecurity best practices.
lessThe checkpoint of the future seeks to improve the passenger experience while enhancing detection capabilities. While the primary focus of the portfolio is on aviation security, technologies that also apply to other checkpoint scenarios (other modes of transportation, special events, etc.) are of interest as well. S&T understands that 'silver bullet' technologies that solve all possible threat scenarios are unlikely, and welcomes unique research materials regarding new capabilities that address specific threats within a broader system-of-systems security architecture.
Transportation Security Administration (TSA)
S&T is especially interested in technology that minimizes the Government's lifecycle costs and facilitates integration in a modular fashion. As such, S&T may prioritize the development of technology that better leverages open architectures, interfaces, and standards, or has additional utility in other markets that drive more favorable economies of scale. Technology that can readily adapt to multiple concepts of operations (e.g., to different threat environments, requirements for throughput, passenger risk assessments, etc.) is of special interest.
Systems that meet or exceed TSA's demanding security standards for aviation may be acquired through TSA's Passenger Screening Program. These systems may also be candidates for venues such as critical buildings, stadiums, and other modes of transportation. Additionally, TSA-qualified screening systems may adapt with minimal modification to aviation security needs in other nations.
Tools, techniques, and knowledge to better understand, train, and utilize the detection canine, and improve proficiency of the DHS/Homeland Security Enterprise (HSE) detection canine teams.
Detection Canine Technologies: Development of non-hazardous emerging threat and conventional explosive training aids with a specific focus on pure odor materials, not pseudo scents. Detection focus not limited to explosive threats but to include all detection canine threat vectors including narcotics, human detection, cadaver detection, infectious disease detection, and currency, for example. Operational efficacy, safety and cost are major metrics of success. Technologies and methodologies that advance detection canine performance in controlled and operational environments representative of the Homeland Security Enterprise at the federal, state and local level and facilitate scientifically significant data capture through independent operational test and evaluation. Specific focus on studies and training protocols that facilitate the reduction in the number of trained odors required for comprehensive canine detection proficiency. Canine R&D to support better understanding of the canine structure and function to include canine behavior, genetics, olfaction and cognition of the detector to improve operational efficiencies and training methods.
S&T goals are to provide our customer base - TSA and the Homeland Security Enterprise (HSE) - with the tools, techniques, and knowledge to better understand, train, and utilize the detection canine, and improve proficiency of the DHS/HSE detection canine teams. Provide an enduring research and development capability to the Homeland Security Enterprise with a unique focal point and knowledge base for detection canines by establishing a scientifically rigorous, statistically significant approach for the detection canine community that is currently absent in the industry.
The potential exists for licensing and commercialization of non-hazardous canine training aids that may serve the over 16,000 detection canine teams nationwide across all threat disciplines. Knowledge products and methodologies have been successful in receiving patents and facilitated various levels of commercialized products.
Tools, techniques, and knowledge to better understand, train, and utilize the detection canine, and improve proficiency of the DHS/Homeland Security Enterprise (HSE) detection canine teams.
Detection Canine Technologies: Development of non-hazardous emerging threat and conventional explosive training aids with a specific focus on pure odor materials, not pseudo scents. Detection focus not limited to explosive threats but to include all detection canine threat vectors including narcotics, human detection, cadaver detection, infectious disease detection, and currency, for example. Operational efficacy, safety and cost are major metrics of success. Technologies and methodologies that advance detection canine performance in controlled and operational environments representative of the Homeland Security Enterprise at the federal, state and local level and facilitate scientifically significant data capture through independent operational test and evaluation. Specific focus on studies and training protocols that facilitate the reduction in the number of trained odors required for comprehensive canine detection proficiency. Canine R&D to support better understanding of the canine structure and function to include canine behavior, genetics, olfaction and cognition of the detector to improve operational efficiencies and training methods.
S&T goals are to provide our customer base - TSA and the Homeland Security Enterprise (HSE) - with the tools, techniques, and knowledge to better understand, train, and utilize the detection canine, and improve proficiency of the DHS/HSE detection canine teams. Provide an enduring research and development capability to the Homeland Security Enterprise with a unique focal point and knowledge base for detection canines by establishing a scientifically rigorous, statistically significant approach for the detection canine community that is currently absent in the industry.
The potential exists for licensing and commercialization of non-hazardous canine training aids that may serve the over 16,000 detection canine teams nationwide across all threat disciplines. Knowledge products and methodologies have been successful in receiving patents and facilitated various levels of commercialized products.
Tools, techniques, and knowledge to better understand, train, and utilize the detection canine, and improve proficiency of the DHS/Homeland Security Enterprise (HSE) detection canine teams.
Detection Canine Technologies: Development of non-hazardous emerging threat and conventional explosive training aids with a specific focus on pure odor materials, not pseudo scents. Detection focus not limited to explosive threats but to include all detection canine threat vectors including narcotics, human detection, cadaver detection, infectious disease detection, and currency, for example. Operational efficacy, safety and cost are major metrics of success. Technologies and methodologies that advance detection canine performance in controlled and operational environments representative of the Homeland Security Enterprise at the federal, state and local level and facilitate scientifically significant data capture through independent operational test and evaluation. Specific focus on studies and training protocols that facilitate the reduction in the number of trained odors required for comprehensive canine detection proficiency. Canine R&D to support better understanding of the canine structure and function to include canine behavior, genetics, olfaction and cognition of the detector to improve operational efficiencies and training methods.
S&T goals are to provide our customer base - TSA and the Homeland Security Enterprise (HSE) - with the tools, techniques, and knowledge to better understand, train, and utilize the detection canine, and improve proficiency of the DHS/HSE detection canine teams. Provide an enduring research and development capability to the Homeland Security Enterprise with a unique focal point and knowledge base for detection canines by establishing a scientifically rigorous, statistically significant approach for the detection canine community that is currently absent in the industry.
The potential exists for licensing and commercialization of non-hazardous canine training aids that may serve the over 16,000 detection canine teams nationwide across all threat disciplines. Knowledge products and methodologies have been successful in receiving patents and facilitated various levels of commercialized products.
The Checked Baggage Program seeks to improve detection capabilities of currently deployed EDS systems as well as create novel approaches to solve explosive detection. While the primary focus of the portfolio is on aviation security, technologies that also apply to other checked baggage scenarios (check point scenarios, other modes of transportation, special events, etc.) are of interest as well. S&T understands that 'silver bullet' technologies that solve all possible threat scenarios are unlikely, and welcomes unique research materials regarding new capabilities that address specific threats within a broader system-of-systems security architecture.
S&T is especially interested in technology that minimizes the Government's lifecycle costs and facilitates integration in a modular fashion. As such, S&T may prioritize the development of technology that better leverages open architectures, interfaces, and standards, or has additional utility in other markets that drive more favorable economies of scale. In particular, reductions in false alarm rate are a huge opportunity for operational cost savings. Technology that can readily adapt to multiple concepts of operations (to different threat environments, requirements for throughput, passenger risk assessments, etc.) is of special interest.
Successfully developed algorithms and software that meet or exceed TSA's demanding security standards for aviation may be candidates for usage at over 5,000 airports, scanning over 1.3 million pieces of checked luggage daily, across the country. As even small improvements in false alarm rates can save TSA millions of dollars annually, transition of successful developments is well-motivated. Transition would be to TSA's Office of Requirements and Capabilities Analysis (ORCA) or other appropriate office. Additionally, TSA-qualified screening systems may adapt with minimal modification to aviation security needs in other nations. Screening solutions must complete Operational Test and Evaluation (OT&E) at Government facilities.
The Checked Baggage Program seeks to improve detection capabilities of currently deployed EDS systems as well as create novel approaches to solve explosive detection. While the primary focus of the portfolio is on aviation security, technologies that also apply to other checked baggage scenarios (check point scenarios, other modes of transportation, special events, etc.) are of interest as well. S&T understands that 'silver bullet' technologies that solve all possible threat scenarios are unlikely, and welcomes unique research materials regarding new capabilities that address specific threats within a broader system-of-systems security architecture.
Transportation Security Administration (TSA)
S&T is especially interested in system components which minimize the Government's lifecycle costs and facilitates integration in a modular fashion. As such, S&T may prioritize the development of technology that better leverages open architectures, interfaces, and standards, or has additional utility in other markets that drive more favorable economies of scale. Technology that can readily adapt to multiple concepts of operations (e.g., to different threat environments, requirements for throughput, passenger risk assessments, etc.) is of special interest.
System components that meet or exceed TSA's demanding security standards for aviation may be candidates for inclusion in systems at over 5,000 airports, scanning over 1.3 million pieces of checked luggage daily, across the country. As even small improvements in false alarm rates can save TSA millions of dollars annually, transition of successful developments is well-motivated. Transition would be to TSA's Office of Requirements and Capabilities Analysis (ORCA) or other appropriate office. Additionally, TSA-qualified screening systems may adapt with minimal modification to aviation security needs in other nations. Screening solutions must complete Operational Test and Evaluation (OT&E) at Government facilities.
The Checked Baggage Program seeks to improve detection capabilities of currently deployed systems as well as create novel approaches to solve explosive detection. While the primary focus of the portfolio is on aviation security, technologies that also apply to other checked baggage scenarios (check point scenarios, other modes of transportation, special events, etc.) are of interest as well. S&T understands that 'silver bullet' technologies that solve all possible threat scenarios are unlikely, and welcomes unique research materials regarding new capabilities that address specific threats within a broader system-of-systems security architecture.
Transportation Security Administration (TSA)
S&T is especially interested in technology that minimizes the Government's lifecycle costs and facilitates integration in a modular fashion. As such, S&T may prioritize the development of technology that better leverages open architectures, interfaces, and standards, or has additional utility in other markets that drive more favorable economies of scale. Technology that can readily adapt to multiple concepts of operations (e.g., to different threat environments, requirements for throughput, passenger risk assessments, etc.) is of special interest.
Systems that meet or exceed TSA's demanding security standards for aviation may be candidates for airport usage across the country. Additionally, TSA-qualified screening systems may adapt with minimal modification to aviation security needs in other nations. Screening solutions must complete Operational Test and Evaluation (OT&E) at Government facilities.
The Checked Baggage Program seeks to improve detection capabilities of currently deployed EDS systems as well as create novel approaches to solve explosive detection. While the primary focus of the portfolio is on aviation security, technologies that also apply to other checked baggage scenarios (check point scenarios, other modes of transportation, special events, etc.) are of interest as well. S&T understands that 'silver bullet' technologies that solve all possible threat scenarios are unlikely, and welcomes unique research materials regarding new capabilities that address specific threats within a broader system-of-systems security architecture.
Transportation Security Administration (TSA)
S&T routinely performs feasibility analysis and developmental testing at a small number of locations. As these locations have to prioritize operational evaluation of equipment as directed by TSA, testing availability for S&T projects and vendors is sometimes limited. S&T is interested in technological developments that expands third-party testing opportunities in a regular and standardized fashion. S&T may prioritize the development of technology that better leverages open architectures, interfaces, and standards, or has additional utility in other markets that drive more favorable economies of scale. Technology that can readily adapt to the testing of multiple concepts of operations (e.g., to different threat environments, requirements for throughput, passenger risk assessments, etc.) is of special interest.
Systems or test articles that allowing meaningful testing to occur may transition to TSL or be used by the government on a routine recurring basis consistent with program development cycles and test opportunities. Additionally, qualified test articles and system may adapt with minimal modification to aviation security development needs in other nations. Solutions must complete Operational Test and Evaluation (OT&E) at Government facilities.
The checkpoint of the future seeks to improve the passenger experience while enhancing detection capabilities. While the primary focus of the portfolio is on aviation security, technologies that also apply to other checkpoint scenarios (other modes of transportation, special events, etc.) are of interest as well. S&T understands that 'silver bullet' technologies that solve all possible threat scenarios are unlikely, and welcomes proposals regarding new capabilities that address specific threats within a broader system-of-systems security architecture.
Transportation Security Administration (TSA)
S&T is especially interested in technology that minimizes the Government's lifecycle costs and facilitates integration in a modular fashion. As such, S&T may prioritize the development of technology that better leverages open architectures, interfaces, and standards, or has additional utility in other markets that drive more favorable economies of scale. Technology that can readily adapt to multiple concepts of operations (e.g., to different threat environments, requirements for throughput, passenger risk assessments, etc.) is of special interest.
Systems that meet or exceed TSA's demanding security standards for aviation may also be candidates for venues such as critical buildings, stadiums, and other modes of transportation. Additionally, TSA-qualified screening systems may adapt with minimal modification to aviation security needs in other nations.
S&T seeks systems that can meet or exceed TSA's Accessible Property Screening System security standards, and significantly accelerate the overall throughput of accessible property. This acceleration may come from a reduction in the current need to divest certain items (electronics, liquids, aerosols, gels, etc.) from bags, a reduction of false alarms, faster processing, improved human-systems integration with Transportation Security Officers, or other means. While the primary focus of the portfolio is on aviation security, technologies that also apply to other checkpoint scenarios (other modes of transportation, special events, etc.) are of interest as well. S&T understands that 'silver bullet' technologies that solve all possible threat scenarios are unlikely, and welcomes unique research materials regarding new capabilities that address specific threats within a broader system-of-systems security architecture.
Transportation Security Administration (TSA)
S&T is especially interested in technology that minimizes the Government's lifecycle costs and facilitates integration in a modular fashion. As such, S&T may prioritize the development of technology that better leverages open architectures, interfaces, and standards, or has additional utility in other markets that drive more favorable economies of scale. Technology that can readily adapt to multiple concepts of operations (e.g., to different threat environments, requirements for throughput, passenger risk assessments, etc.) is of special interest.
Systems that meet or exceed TSA's demanding security standards for aviation may also be candidates for venues such as critical buildings, stadiums, and other modes of transportation. Additionally, TSA-qualified screening systems may adapt with minimal modification to aviation security needs in other nations.
The checkpoint of the future seeks to improve the passenger experience while enhancing detection capabilities. While the primary focus of the portfolio is on aviation security, technologies that also apply to other checkpoint scenarios (other modes of transportation, special events, etc.) are of interest as well. S&T understands that 'silver bullet' technologies that solve all possible threat scenarios are unlikely, and welcomes unique research materials regarding new capabilities that address specific threats within a broader system-of-systems security architecture.
Transportation Security Administration (TSA)
S&T is especially interested in technology that minimizes the Government's lifecycle costs and facilitates integration in a modular fashion. S&T's challenge is to deliver systems that can be maintained, adapted, and upgraded in an efficient manner. As such, S&T may prioritize the development of technology that better leverages open architectures, interfaces, and standards, or has additional utility in other markets that drive more favorable economies of scale. Technology that can readily adapt to multiple concepts of operations (e.g., to different threat environments, requirements for throughput, passenger risk assessments, etc.) is of special interest.
Systems that meet or exceed TSA's demanding security standards for aviation may also be candidates for venues such as critical buildings, stadiums, and other modes of transportation. Additionally, TSA-qualified screening systems may adapt with minimal modification to aviation security needs in other nations.
The checkpoint of the future seeks to improve the passenger experience while enhancing detection capabilities. While the primary focus of the portfolio is on aviation security, technologies that also apply to other checkpoint scenarios (other modes of transportation, special events, etc.) are of interest as well. S&T understands that 'silver bullet' technologies that solve all possible threat scenarios are unlikely, and welcomes unique research materials regarding new capabilities that address specific threats within a broader system-of-systems security architecture. The end objective includes systems that are interconnected to collect and utilize security data more effectively to meet TSA's highest security standards at throughputs of 300+ passengers per lane, per hour. The systems will also more efficiently occupy space at the checkpoint to optimize value per square foot.
Transportation Security Administration (TSA)
S&T is challenged to move from the current "standalone" architecture employed at the checkpoint to a more efficient, integrated concept. To meet the challenge, S&T needs to maintain data integrity, cybersecurity, and effective analytics in modular configurations that can be adapted, upgraded, and reconfigured based on evolving operational requirements. S&T is especially interested in technology that minimizes the Government's lifecycle costs and facilitates integration in a modular fashion. As such, S&T may prioritize the development of technology that better leverages open architectures, interfaces, and standards, or has additional utility in other markets that drive more favorable economies of scale. Technology that can readily adapt to multiple concepts of operations (e.g., to different threat environments, requirements for throughput, passenger risk assessments, etc.) is of special interest.
Systems that meet or exceed TSA's demanding security standards for aviation may also be candidates for venues such as critical buildings, stadiums, and other modes of transportation. Additionally, TSA-qualified screening systems may adapt with minimal modification to aviation security needs in other nations.
The Apex Screening at Speed Program is pursuing transformative R&D activities that support a future vision for increasing security effectiveness while dramatically reducing wait times and improving the passenger experience. These future capabilities will be interconnected through non-proprietary interfaces in a system of systems that is more secure, efficient, flexible, and adaptable than currently deployed sensors.
S&T seeks third-party test and evaluati ... more
The Apex Screening at Speed Program is pursuing transformative R&D activities that support a future vision for increasing security effectiveness while dramatically reducing wait times and improving the passenger experience. These future capabilities will be interconnected through non-proprietary interfaces in a system of systems that is more secure, efficient, flexible, and adaptable than currently deployed sensors.
S&T seeks third-party test and evaluation checkpoint capabilities relevant to aviation security and similar environments to accelerate the certification and deployment of checkpoint screening systems under TSA's Passenger Screening Program and Electronic Baggage Screening Program. Specialized modeling and simulation capabilities that inform, accelerate, develop and support testing and evaluation activities are also of interest.
lessThe checkpoint of the future seeks to improve the passenger experience while enhancing detection capabilities. While the primary focus of the portfolio is on aviation security, technologies that also apply to other checkpoint scenarios (other modes of transportation, special events, etc.) are of interest as well. S&T understands that 'silver bullet' technologies that solve all possible threat scenarios are unlikely, and welcomes unique research materials regarding new capabilities that address specific threats within a broader system-of-systems security architecture.
Transportation Security Administration (TSA)
S&T is especially interested in technology that minimizes the Government's lifecycle costs and facilitates integration in a modular fashion. As such, S&T may prioritize the development of technology that better leverages open architectures, interfaces, and standards, or has additional utility in other markets that drive more favorable economies of scale. Technology that can readily adapt to multiple concepts of operations (e.g., to different threat environments, requirements for throughput, passenger risk assessments, etc.) is of special interest.
Systems that meet or exceed TSA's demanding security standards for aviation may also be candidates for venues such as critical buildings, stadiums, and other modes of transportation. Additionally, TSA-qualified screening systems may adapt with minimal modification to aviation security needs in other nations.
Expanding countermeasure discovery and development of new and emerging animal and zoonotic infectious diseases using cutting edge broad spectrum vaccines, and metaphylactic and biotherapeutic technologies. Developing end-user friendly, rapid diagnostic platforms for agricultural pathogens.
PIADC-USDA-DHS, APHIS, NBAF
New and improved animal pathogen vaccine platforms expressing multiple antigenic determinants to reduce the scope and number of individual vaccines (i.e., covering multiple serotypes to reduce the necessary number of vaccines that are needed for agricultural linked diseases. Improved and end-user friendly, portable and hand-held rapid detection and surveillance platforms and devices are also needed to provide front-line personnel the ability to screen and detect various viral diseases in livestock. S&T Challenges and Capability Gaps include few or no efforts to develop countermeasures on new and emerging animal and zoonotic diseases, or efforts on other veterinary species of agricultural importance with respect to transboundary animal diseases (e.g., ovine, caprine, avian). There are few or no efforts to develop veterinary adjuvant, and there is a lack of robust, next-generation adjuvant development programs for lead vaccine platforms. There is also a lack of countermeasure development projects focused on lead optimization, broad spectrum metaphylactic or biotherapeutic candidates for animal diseases. Finally, there is a requirement for end-user-friendly, rapid diagnostics and detection and surveillance methods and platforms for foreign animal diseases and zoonoses.
Transition opportunities include multiple Federal and State agencies with responsibilities for the monitoring, protection (vaccinations and countermeasures), detection and surveillance against foreign animal diseases. DHS-PIADC-USDA, NBAF, APHIS, State Agricultural Agencies.
Advance operationally-relevant, end-user focused applied social and behavioral science research that will enable decision makers, inform policy makers, and assist operational partners in mitigating the human and monetary costs of human trafficking.
DHS Blue Campaign, Immigrations and Customs Enforcement, Customs and Border Protection, DHS Policy/Trade Policy
The Human Trafficking and Modern Slavery program will pursue evidence-based research to address the growing phenomenon of human trafficking. Worldwide there are an estimated 20.9 million victims of human trafficking, comprising an industry worth more than $150 billion in illegal profits. Given the scale, evolving nature, and complexity of human trafficking, combatting the problem poses a significant challenge, particularly for those on the front lines.
Opportunities for higher return on investment include leveraging and integrating findings and lessons learned to improve efficiency of operational components.
A technology that improves non-intrusive screening capabilities to detect and interdict illicit drugs with minimal disruption to the flow of commerce, is likely to be adopted by end-users, and has a path to transition and/or commercialization.
The President's Commission on Combatting Drug Addiction and the Opioid Crisis final report recommended that DHS use additional technologies to detect and intercept synthetic opioids, like fentanyl, and other illicit drugs. The magnitude and urgency of the opioid crisis demands that S&T take an innovative approach to develop near-term deployable solutions that impact the supply of opioids entering the United States. The chemical and physical properties of synthetic opioids make detecting them in obscured bulk samples in an operational environment technically difficult. This topic seeks technologies that can improve the ability for end-users to rapidly scan cargo, containers, and other bulk packaged materials to detect synthetic opioids and other drugs, to include: (1)advanced technologies that offer three-dimensional imaging; (2)technologies that will enable end-users to discriminate illicit materials from lawful materials; and (3)technologies that enable end-users to continue normal operations with minimal disruption to flow of commerce.
Offerors should consider the operational environment of DHS end-users at BPE and IMFs and factors that would facilitate successful transition/adoption. These factors include, but are not limited to, training and usability, ease of integration into existing operational environments, lifecycle costs, and reliability. These considerations should be part of an Offeror's transition strategy.
Opportunities for higher return on investment include patents and licenses and/or commercialization.
Architectures, technologies and processes needed to enhance the security and trustworthiness of systems and services.
DHS Components, Homeland Security Enterprise
This topic is seeking to address challenges faced by organizations across the following identity management components:
Developed solutions should transition to provide availability to commercial and government end-users. Solutions may be brand new capabilities not currently available on the market or current solutions that can be modified to address specific needs.
The purpose of the Data Privacy Program is to help society realize the benefits of information technologies in the three stated contexts (connected devices and sensors, automation and autonomous systems, and digital services delivery) while minimizing their negative societal impact. Strategies for minimizing potential risks to privacy must consider a range of opportunities, from minimizing data collections to proper safeguarding of data once collected to controlling how data is used. To achieve this objective, Data Privacy calls for applied research and advanced development along a continuum of challenges, from how people understand privacy in different situations and how their privacy needs can be formally specified, to how these needs can be respected and how mitigation and remediation can be accomplished should privacy expectations and interests be violated. Finally, Data Privacy emphasizes the need to transition research results that address governmental and commercial stakeholder's needs so that they can improve practice as necessary and appropriate.
Cyber-threats are rapidly shifting and privacy-related breaches are increasing in frequency and impact. The Data Privacy project is aligned with National Privacy and Cyber Security Research and Development strategic initiatives to develop a targeted set of research priorities to ensure that cyberspace is safe, trustworthy and prosperous. Specifically, the project provides the R&D community expertise and resources to prevent, mitigate and recover from adverse effects of privacy threats and intrusions on privacy that arise from information system policies and processing. This work includes mitigation of risks by engineering privacy-protecting systems, educating the public, and understanding behavioral, social, organizational and policy dimensions of privacy. The Data Privacy Program is working to develop innovative solutions that ensure trusted innovation by helping to ensure that the protection of individual privacy is consistent with applicable law, policy and mission.
Data Privacy supports the development and operationalization of technical and knowledge solutions to help the Transition Customer address data privacy capability gaps.
Priority R&D needs for this program are analytics and metrics for cybersecurity effectiveness, severity, and comparison. The CYRIE program endeavors to improve value-based decision making by those who own, operate, protect, and regulate the nation's vital data assets and critical infrastructure. As such the program looks beyond the traditional economics view of incentives for cybersecurity - where individuals are assumed to be rational actors who know how to maximize their well-being - and considers a broader array of factors that include business, legal, technical, and behavioral factors. In this way CYRIE R&D can more effectively address strategy and tactics for cyber risk avoidance, acceptance, mitigation, and transfer.
Application to Cyber Security Operations, Critical Infrastructure Operations, Law Enforcement, Incident and Disaster Response, and Businesses of all sizes.
In 2013 two Executive actions were issued, aimed at enhancing the capability of owners and operators of the nation's critical infrastructure to protect their networks and systems against cyberattack (Executive Order 13636, Improving Critical Infrastructure Cybersecurity, and Presidential Policy Directive 21, Critical Infrastructure Security and Resilience). These policy documents gave DHS a coordinating role in pursing the cybersecurity objectives outlined in each document and directed NIST to develop a voluntary framework that owner/operators could use to improve their cybersecurity posture. DHS led an interagency working group focused on cyber economic incentives, and together with the Departments of Commerce and Treasury, prepared an analysis of federal policy options for incenting adoption of the NIST framework. DHS S&T continues to maintain active engagement in the effort to understand and develop stronger cyber economic incentives, through its R&D efforts and portfolio.
The working group and resulting analysis focused primarily on policy and incentives from a microeconomic-based view of marginal costs and benefits of adoption. While this analysis provided a solid start for the study of incentives in cybersecurity, a more holistic approach to research in the area of cyber risk economics is clearly needed, one that incorporate perspectives on security decisions and behavior from a wide range of social and behavioral sciences.
Recognizing the importance of data sharing to building capacity across the four dimensions (investment, impact, value, incentives), CYRIE supports the sharing of cybersecurity best practices, investments, incidents, and outcomes among diverse stakeholders. More collective information is needed to enable value-based risk management of the shared ecosystem. Effective information sharing can help mitigate against the often-siloed view of risk, create positive network effects, and foster "RoS" or return on sharing as an element of cyber risk management.
CYRIE supports the development and operationalization of technical and knowledge solutions to help the Transition Customer address capability gaps along any of the program's stated dimensions. The program also aims to inform the government about how it can reduce cyber risk levels through development and enforcement of policy and regulation, convening and coordination of stakeholders, adoption of technology, promulgation of standards, and facilitation of research and development.
Results of this topic should provide new and novel capabilities and solutions to assist federal, state, and local agencies investigating cybercrimes.
DHS Components, Federal, State and Local Law Enforcement Agencies, Financial Institutions
This topic is seeking to address various challenges faced by Government Agencies, Law Enforcement (LE) and Financial Institutions to protect networks and prevent DDoS attacks that are used to render key resources unavailable. DDoS attacks have targeted critical sectors and government agencies, as well as the financial sector; which has been a frequent target of large-scale attacks.
Developed solutions should transition to federal, state and local law enforcement end-users. Solutions may be brand new capabilities not currently available on the market or current solutions that can be modified to address specific needs.
Research and development results of this topic should provide innovative technologies, techniques, and processes towards the creation, operation, and maintenance of federated enterprise environments and the related C2 infrastructure. Objectives include enabling local decision making given global knowledge, and the seamless incorporation of various cybersecurity technologies and techniques (Moving Target/Dynamic/Adaptive Defenses, privacy preserving and multi-party computing, deception, etc.) into federated enterprise environments. Results are also sought to protect any cloud-based infrastructure that enables federated enterprise environments.
Homeland Security Enterprise, DHS and Components with need for federated environments
This topic is seeking to address various challenges faced by Federal government entities and the Homeland Security Enterprise in the creation, operation, and maintenance of federated enterprise environments. Coordinating mechanisms are needed in order to provide reliable defenses that do not adversely affect usability or limit privacy protections. Additionally, a robust command and control capability is needed to coordinate defenses and make management of processes easier, faster, more reliable, and secure.
Developed solutions should transition to DHS Components, Federal, State and Local Government Agencies, the Homeland Security Enterprise Solutions may be brand new capabilities not currently available on the market or current solutions that can be modified to address specific needs.
Results of this topic should provide new and novel capabilities and solutions to assist federal, state, and local agencies to improve their security posture.
DHS Components, Federal, State and Local Government Agencies
This topic is seeking to address various challenges faced by DHS Components, Federal, State and Local Government Agencies, the Homeland Security Enterprise for situational awareness and to improve their security posture.
Developed solutions should transition to DHS Components, Federal, State and Local Government Agencies, the Homeland Security Enterprise Solutions may be brand new capabilities not currently available on the market or current solutions that can be modified to address specific needs.
Results of this topic should provide new and novel capabilities and solutions to assist federal, state, and local agencies to use predictive analytics for network defense and situational awareness.
DHS Components, Federal, State and Local Law Enforcement Agencies
This topic is seeking to address various challenges faced by Government Agencies, to provide situational understanding for network and data protection. The goal is for predictive analysis to develop and place defenses prior to attacks, moving the advantage to the defender.
Developed solutions should transition to DHS Components, Federal, State and Local governments' end-users. Solutions may be brand new capabilities not currently available on the market or current solutions that can be modified to address specific needs.
The Department of Homeland Security (DHS) Science and Technology Directorate's (S&T) Cyber Security Division (CSD) seeks to coordinate, enhance and develop advanced data and information-sharing tools, datasets, technologies, models, methodologies and infrastructure to strengthen the capabilities of national and international cyber-risk R&D. These data-sharing components are intended to be broadly available as national and international resources to bridge the gap between producers of cyber-risk-relevant ground truth data, academic and industrial researchers, cybersecurity technology developers, and decision-makers to inform their analysis of and policymaking on cyber-risk and trust issues.
Application to Cyber Security Operations, Critical Infrastructure Operations, Law Enforcement, Incident and Disaster Response, and Day-To-Day Business, Public and Private Cyber Security Researchers
Cybersecurity R&D requires real-world data to develop advanced knowledge, test products and technologies and prove the utility of research in large-scale network environments. IMPACT is the only publicly available, legally collected, distributed repository of large-scale datasets containing real network and system traffic that could be used to advance state-of-the-art cybersecurity R&D. The centralized brokering and distributed provisioning between the data providers, data hosts and researchers addresses the operational, trust and administrative costs and challenges that impede sustainable and scalable data-sharing. IMPACT continually adds new data that is responsive to cyber-risk management (e.g., attacks and measurements) to provide the R&D community timely, high-value information to enhance research innovation and quality. The IMPACT model also serves as a laboratory for testing various data-sharing models, including batch transfers, newer Data Analytics as a Service (DaaS) and visualization techniques.
Transition data, decision analytics and capabilities outputs to the cyber security research community
The Cybersecurity Experimentation of the Future (CEF) Testbed will provide cybersecurity researchers with the ability to run experiments on an unclassified secure "virtual internet," through contained environments that can safely test advanced defense mechanisms against live threats without endangering operational networks. The CEF Testbed will provide the cybersecurity research community with a complex test capability and infrastructure (networks, tools, methodologies, tech support) to support national-scale testing of advanced cybersecurity technologies in an open, non-proprietary environment. CEF will enable the applied/research community to share complex cybersecurity experiments, designs, lab setups, software, tools, procedures and data; this allows rapid validation of complex technical findings and avoiding redundant experimental effort.
Transition customers include cybersecurity researchers, instructors and students.
Realization of experimental research infrastructures, capabilities, and approaches that reach beyond today's state of the art are needed. These infrastructures, together with similar broad-based objectives that transform discovery, validation, and ongoing analysis in an increasingly complex and challenging domain must provide, as examples:
Developed solutions should transition to federal, state and academic cybersecurity testbeds. Solutions may be brand new capabilities not currently on the market or current solutions that can be modified to address specific requirements.
Results of this topic should provide new and novel capabilities and solutions to support operational security requirements for mobile ecosystem technologies.
DHS Components, Civilian Federal Government and DoD
The DHS workforce is becoming increasingly mobile, and employees expect to use mobile devices to access data and deliver mission services wherever they may be located, and at any time. DHS mobile user groups cross all Components and Offices and include executives, managers, knowledge workers, immigration and law enforcement officials, case officers, and emergency responders.
The architecture, design, and use of mobile technologies to access systems, applications, and data and deliver government services is substantially different from the traditional desktop workstations and laptops used within a protected enterprise network. A new security approach is needed to protect DHS data and systems from the additional risk posed by use of consumer devices that may operate from anywhere in the world across any available network (cellular, Wi-Fi), possess features and capabilities beyond those available on desktops, and that may contain dozens of diverse mobile apps that can access data on the device.
The Mobile Security Research and Development (R&D) program is partnering with all DHS components and collaborating with several organizations to facilitate piloting, transition and adoption of the technologies developed under the program. This provides an opportunity to fine-tune requirements, align to and influence development of federal standards or criteria, and conduct pilots with real-world applications. The partners will provide support in developing requirements and use cases; providing information, insights, and access to information technology architecture; offering feedback and evaluation of CSD-developed R&D; and contributing in-kind resources associated with testing.
The results of this topic should produce new and novel technologies, techniques and approaches to help secure the nation's critical infrastructure sectors.
Homeland Security Enterprise, DHS Components, Critical Infrastructure organizations
The nation's critical infrastructure provides the essential services that underpin American society and serve as the backbone of our nation's economy, security, and health. The needs and cyber security maturity levels of the 16 sectors vary widely (e.g. different architectures, different regulatory and compliance factors), which make securing them a challenge for S&T.
Developed solutions should transition to federal and Homeland Security Enterprise end users.
The results of this topic should produce new and novel technologies, techniques and approaches to secure government networks.
Homeland Security Enterprise, DHS Components
Securing government networks is a significant challenge for DHS. S&Ts challenges supporting this activity include: the customer set (e.g. large agencies to very small agencies) and the variety of architectural approaches that each agency has developed over time, suited to their mission needs.
Developed solutions should transition to federal and Homeland Security Enterprise end users.
The result from this topic should provide new and novel approaches to help formulate risk-informed, integrated design solutions and management strategies that can incorporate proactive resilience remains a significant multi-domain challenge.
Homeland Security Enterprise, Critical Infrastructure Organizations
Critical infrastructure is vital to national and economic security, public health and well-being, and has become increasingly global, complex and susceptible to disruptions. S&T seeks solutions that provide improved awareness of potential disruptions and the ability to design in flexibility and resilience to mitigate the effects of such disruptions. S&T also seeks risk-assessment and management approaches that incorporate all relevant linkages such as sector interdependencies and cybersecurity risk factors.
Developed solutions should transition to federal and Homeland Security Enterprise end users.
The end objective of this project is a model that discretely quantifies the mission impacts of cyber disruptions to information technology networks (e.g. a Federal agency loses the ability to execute a Mission Essential Function due to a disruption to a certain IT network).
Models/tools developed must comply with DHS security standards. Models/tools should run on stand-alone commodity computing hardware (a single computer with, e.g. up to 32 cores, 128GB RAM, 1TB disk space). Models should provide a docker build script so they can easily be compiled and run anywhere.
Office of Cyber and Infrastructure Analysis, National Protection and Programs Directorate
Results of this topic should provide novel capabilities that enable software developers to produce software with fewer vulnerabilities, improve coding and software engineering practices, and/or reduce the burden for vetting and testing the security of software.
Industry, software developer community, DHS and other Federal and State Agencies
This topic is seeking to address various challenges faced in mitigating cybersecurity risk associated with the development and use of software. Software increasingly makes possible every aspect of the digital world. It powers the nation's critical infrastructure and nearly every device humans interact with today. However, security often is an after-the-fact consideration or a secondary activity compared with software functionality and getting the product to market. A key remaining challenge is providing tools that are suited for today's complex code to the software development community to reduce weaknesses in software that create vulnerabilities and risk.
Developed solutions should transition to federal, state and industry end-users. Solutions may be brand new capabilities not currently available on the market or current solutions that can be modified to address specific needs.
The objective is to develop, demonstrate, and transition substantive and adaptive cyber security education models that impact organizations and infrastructures/sectors for the better. These models should address key dimensions of the challenge, such as multiple age levels, cyber security across multiple operational domains, and different kinds of threats. An overarching objective of this work is to support development of "learning organization" capabilities across all kinds of organizations and infrastructures/sectors. The models and associated technologies need to support cyber security competitions, education and curriculum development, and workforce training and development needs.
Homeland Security Enterprise, DHS Components
This topic is seeking to address various challenges faced by Federal government entities and the Homeland Security Enterprise in regards to addressing the Nation's shortage of skilled cybersecurity professionals.
Developed solutions should transition to federal and Homeland Security Enterprise end users.
Results of this topic should provide new and novel capabilities and solutions to assist federal, state, and local law enforcement investigating cybercrimes. Objectives include identifying illicit anonymous marketplaces and website users, as well as users facilitating illicit transactions.
DHS Law Enforcement Components, Federal, State and Local Law Enforcement Agencies
This topic is seeking to address various challenges faced by Law Enforcement (LE) investigating anonymous networks and currencies. Investigations are resource intensive, requiring significant man hours to investigate and prosecute. Criminals use these networks to exploit the anonymity and protections built into the encryption.
Developed solutions should transition to federal, state and local law enforcement end-users. Solutions may be brand new capabilities not currently available on the market or current solutions that can be modified to address specific needs.
Results of this topic should provide new and novel capabilities and solutions to assist federal, state, and local law enforcement in the forensic acquisition and analysis of evidence from digital devices used in criminal activity.
DHS Law Enforcement Components, Federal, State and Local Law Enforcement Agencies
This topic is seeking to address three main challenges faced by law enforcement: lack of forensic tool testing standards and uniformity, high cost of forensics tools, and technology gaps between commercial technology advances and advances in acquiring data in support of investigations.
Developed solutions should transition to federal, state and local law enforcement end-users. Solutions may be brand new capabilities not currently available on the market or current solutions that can be modified to address specific needs.
(1)Conduct research, develop tools, and technologies to improve the detection, analysis, and understanding of victims and perpetrators of child exploitation, and (2)conduct gap analysis to identify aspects of child exploitation in greatest need of empirical research.
Homeland Security Investigations (HSI), Internet Crimes Against Children Task Forces, National Center for Missing and Exploited Children (NCMEC)
An astonishing 16 million reports of child exploitation are submitted per year. Without an efficient way to prioritize tips and identify the most dangerous offenders, the current volume of incoming data is overwhelming law enforcement.
Opportunities for higher return on investment include leveraging and integrating findings and lessons learned to improve the efficiency of operational components.
Improvements in digital forensics, biometrics, and identity management, including real-time and forensics positive verification of individual identity using multiple biometrics; mobile biometrics screening capabilities; high-fidelity ten print capture; and non-cooperative biometric technologies for identification of adults and children.
First Responders (Federal, State and local)
Current systems used in identity management are limited by algorithm development, training and machine learning using limited data sets and end user capabilities.
Potential for higher return on investment for industry as a result of this research project.
Results of this topic should provide new and novel capabilities and solutions to assist DHS, Operations, and Law Enforcement components to improve the understanding and confidence of DHS and the Homeland Security Enterprise (HSE) on how CNPS leverage network environments (trusted and untrusted), devices, and sensors to compute and communicate processes and the security risks and challenges associated with the appropriate level of automation, Machine-to-Machine (M2M), communications, learning, and intelligence.
DHS Components, Operations, and Law Enforcement Components
This topic is seeking to address various challenges faced by DHS, Operations, and Law Enforcement. CNPS builds upon the CPSSEC Strategy and the nine key strategic drivers identified in the 2015 NITRD CPS Vision Statement. CNPS are being designed and scaled to autonomously compute, communicate, and execute processes from data collected from networks, devices and sensors, and other intelligent systems. As CNPS system design becomes more complex, automated, intelligent, and integrated with legacy networks and systems - Cybersecurity risks and challenges will only increase.
Developed solutions should transition to federal and law enforcement end-users. Solutions may be brand new capabilities not currently available on the market or current solutions that can be modified to address specific needs.
Results of this topic should provide new and novel capabilities and solutions to assist DHS mission, operations, and law enforcement components to securely leverage, integrate, and interact with IoT systems that affect their operations and assets. Objectives include Detecting, Authenticating, and Updating IoT devices, sensors, and systems to gain comprehensive and near continuous knowledge of an IoT environment.
DHS Mission, Operations, and Law Enforcement Components
This topic is seeking to address various challenges faced by DHS Mission, Operations, and Law Enforcement components in securing the interactions between existing networks and IoT Devices. The IoT continues to expand and disrupt the nation's CI/IT infrastructure. This expansion has resulted in numerous advancements but has also increased the attack surface for malicious actors.
Developed solutions should transition to federal and law enforcement end-users. Solutions may be brand new capabilities not currently available on the market or current solutions that can be modified to address specific needs.
To establish and demonstrate replicable, scalable, and sustainable models for incubation and deployment of interoperable, secure, standard-based solutions using advanced technologies such as Internet of Things (IoT) and Cyber-Physical Systems (CPS) and demonstrate their measurable benefits in cities and communities.
Transition customers include cybersecurity researchers, instructors and students.
Realization of experimental research infrastructures, capabilities, and approaches that reach beyond today's state of the art are needed. These infrastructures, together with similar broad-based objectives that transform discovery, validation, and ongoing analysis in an increasingly complex and challenging domain must provide, as examples:
Developed solutions should transition to federal, state and academic cybersecurity testbeds. Solutions may be brand new capabilities not currently on the market or current solutions that can be modified to address specific requirements.
To provide private industry with an alternative fertilizer to those that can be used as an explosive precursor. This will make it harder for adversaries to construct explosives devices while also allowing industry to continue providing the agricultural community with effective fertilizers. The product must be completely non-detonable, even if manipulated, mixed, or concentrated
The private sector agricultural industry.
Terrorists often utilize products with legitimate uses as precursors to construct homemade explosive devices. This is a threat not only to homeland soft-targets and critical infrastructure, but also to American personnel in-theatre. This effort would require buy-in from both the private industry and public agencies. This topic would complement the DHS NPPD Chemical Facilities Anti-Terrorism Standards program (CFATS
A better understanding of how to prevent targeted violence or mitigate the effects of that violence through knowledge of evidence-based research and/or evaluation of existing or emerging programs addressing targeted violence
First Responders, NGOs, State/Local government.
Given there is no one pathway to violent extremism and the ubiquity of social media in terrorist and extremist groups recruiting individuals, this is a field where the state of knowledge is always changing, and requires multi-disciplinary applications to the social science issues related to targeted violence.
Local stakeholders can tailor local solutions to targeted violence based on the translation of research knowledge/evaluation into practice.
Develop capabilities that will increase the Department's ability to leverage data for decision-making.
Various customers throughout DHS, including the homeland security enterprise.
A technology that improves PNT resilience, is likely to be adopted by critical infrastructure PNT end-users, and has a path to transition and/or commercialization.
Accurate position, navigation, and timing (PNT) information is important for the functioning of many critical infrastructure sectors. Disruption of PNT services can hamper the operational capabilities of critical infrastructure operations that rely on precision timing or positioning. This topic seeks technologies that can improve resilience for PNT end-users to include:
1. disruption alerting and mitigation technologies;
2. technologies that will enable end-users to continue normal operations through PNT disruption events; and
3. technologies that provide novel PNT capabilities.
Offerors should consider the operational environment of PNT end-users in critical infrastructure and factors that would facilitate successful transition/adoption. These factors include, but are not limited to, ease of integration into existing operational environments, price, and reliability. These considerations should be part of an Offeror's transition strategy.
Opportunities for higher return on investment include patents and licenses and/or commercialization.
A technology that improves PNT resilience, is likely to be adopted by critical infrastructure PNT end-users, and has a path to transition and/or commercialization.
Accurate position, navigation, and timing (PNT) information is important for the functioning of many critical infrastructure sectors. Disruption of PNT services can hamper the operational capabilities of critical infrastructure operations that rely on precision timing or positioning. This topic seeks technologies that can improve resilience for PNT end-users to include:
1. disruption alerting and mitigation technologies;
2. technologies that will enable end-users to continue normal operations through PNT disruption events; and
3. technologies that provide novel PNT capabilities.
Offerors should consider the operational environment of PNT end-users in critical infrastructure and factors that would facilitate successful transition/adoption. These factors include, but are not limited to, ease of integration into existing operational environments, price, and reliability. These considerations should be part of an Offeror's transition strategy.
Opportunities for higher return on investment include patents and licenses and/or commercialization.
A technology that improves PNT resilience, is likely to be adopted by critical infrastructure PNT end-users, and has a path to transition and/or commercialization
Accurate position, navigation, and timing (PNT) information is important for the functioning of many critical infrastructure sectors. Disruption of PNT services can hamper the operational capabilities of critical infrastructure operations that rely on precision timing or positioning. This topic seeks technologies that can improve resilience for PNT end-users to include
1. disruption alerting and mitigation technologies;
2. technologies that will enable end-users to continue normal operations through PNT disruption events; and
3. technologies that provide novel PNT capabilities.
Offerors should consider the operational environment of PNT end-users in critical infrastructure and factors that would facilitate successful transition/adoption. These factors include, but are not limited to, ease of integration into existing operational environments, price, and reliability. These considerations should be part of an Offeror's transition strategy.
Opportunities for higher return on investment include patents and licenses and/or commercialization.
A technology that enables CBP to deploy enterprise-wide data services within the next 12-18 months.
CBP with potential transition across DHS Components.
CBP is seeking solutions that would allow a seamless transition from existing voice-only services based on current LMR networks today to mixed-mode voice, data, and video services leveraging broadband capabilities from commercial and public safety networks. Data services should provide adequate bandwidth for situational awareness tools, image/file transfer, and video capabilities. Solutions and technologies should address ease of integration, use of non-proprietary open standards, price, reliability, and a deployment schedule of 12-18 months. Each Source's transition strategy should address these considerations.
Opportunities for higher return on investment include patents and licenses and/or commercialization.
By providing a low-cost device that interfaces wirelessly with modern smartphones, low bandwidth data including position location information (PLI), text messages and other customer-provided payloads can be transmitted and received by DHS users in remote environments that do not have commercial infrastructure like cell towers. This effort will enable tactical air, land, and maritime information sharing to provide agent safety and increase agent situational awareness.
CBP, DNDO, FEMA, ICE, USCG, USSS
BACKGROUND INFORMATION: DHS S&T is looking for low-cost communication devices with the following characteristics:
Investment in this technology supports many tactical users within DHS components and will provide real-time situational awareness and sharing of timely and actionable information in support of law enforcement operations across our air, land, and maritime borders. This capability could also be used by the public sector for secure, mobile, low-cost communications without reliance on commercial infrastructure or in locations where commercial infrastructure is not available, or where it has been degraded due to natural disasters.
Improve interoperability and compatibility by ensuring that equipment are developed using existing standards and verified through a compliant testing program. Conduct gap analysis of standards and recommend new standards or changes to existing standards as necessary.
Communications interoperability and compatibility is essential for safety of First Responders and their ability to complete their mission. Public safety standards (e.g., Project 25 (P25)) and related commercial standards (e.g., 3GPP LTE) are used to improve interoperability and compatibility for first responders. Within the P25 environment, existing testing processes and procedures for assuring interoperability and compatibility across different vendor solutions are inadequate and evolving technologies may also necessitate the need for updating the standards and subsequently the existing testing program.
Land Mobile Radio and LTE manufacturers can submit their equipment for compliance to standards through the procedures established by this proposal. Once achieved, the vendors could market their equipment more effectively to first responders highlighting its adherence to rigorous testing procedures.