alert image
  • The DHS S&T BAA Portal website will be undergoing scheduled maintenance and will not be available on the following dates and times:
    • 09:00 PM Friday, April 10, 2020 EDT - 1:00 AM, Saturday, April 11, 2020 EDT
    We apologize for any inconvenience. If you need assistance, please contact the help desk at dhsbaa@reisystems.com.

Funding Opportunities
FUNDING TOPICS:

FILTER BY: action icon action icon
YEAR









DIVISION










TECHNICAL AREAS








































Research Topics:
Research Area
  • Securing Aviation
  • Protecting from Terrorist Attacks
  • Securing Borders
  • Securing Cyberspace
  • Preventing Terrorism
  • Managing Incidents
  • Securing Critical Infrastructure
Priority R&D Need
  • High-Throughput Cargo Screening
  • Cost-effective Electronic Imaging for Bulk Air Cargo
  • Passenger Identification and Vetting
  • Rapid Detection and Alarming of Explosives
  • Distinguishing Threats from Non-threats on Passengers
  • Efficient and Accurate Detection of Complex Threat Concealment on Passengers and Carried Property
  • Personal Protective Equipment for all CBRNE Hazards
  • Modeling and Predictive Analytics for Decision Making
  • Disease and Biological Threat Detection, Identification, and Classification in Field Operational Environments
  • Biological Attack Verification
  • Cross-border Tunnel Detection, Surveillance, and Forensics
  • Infrastructure Tunnel Surveillance
  • Integrated and Improved Sensors, Systems, and Data
  • Actionable Intelligence Gathering and Sharing
  • Dark Aircraft and Vessel Detection, Tracking, and Interdiction
  • Expedited People Screening
  • Maritime Surveillance and Communications in Remote Environments
  • Distributed Cloud-based Communications and Monitoring - Associated/Related Efforts
  • Human Aspects of Cybersecurity-Associated/Related Efforts
  • Network and Systems Security-Associated/Related Efforts
  • Mobile Security-Associated/Related Efforts
  • Critical Infrastructure - Associated/Related Efforts
  • Software Assurance - Associated/Related Efforts
  • Cyber Security Outreach - Associated/Related Efforts
  • Cybersecurity for Law Enforcement-Associated/Related Efforts
  • Cyber Enabled Networked Physical Systems Security
  • Organic Explosive Compound and Homemade Explosives Detection
  • Improvised Explosive Device-related Anomaly Detection
  • Automated Machine Learning
  • Prevention
  • Advanced Analytics
  • Situational Awareness
  • Communications
  • Command, Control, Communications
  • Training and Exercises
  • Responder Health, Safety, Performance
  • Logistics and Resource Management
  • Casualty Management
  • Risk Assessment and Planning
  • Intelligence and Investigation
  • Dependency and Interdependency Analysis
  • Risk-Informed Prioritization
Topic Keywords
  • Agricultural Pathogen
  • Algorithms
  • All-Hazard
  • Analysis
  • Big Data
  • Biometrics
  • Border Protection
  • Canine
  • Cargo
  • Checked Baggage
  • Child Exploitation
  • Classify
  • Communications
  • Contraband
  • Critical Infrastructure
  • Crowdsourcing
  • Cyber
  • Data
  • Data Analytics
  • Denial of Service
  • Detection
  • Diagnostics
  • Disaster
  • Explosives
  • Flood
  • Forensics
  • Human Trafficking
  • Identity
  • Incident Management
  • Infrastructure
  • Interdiction
  • Internet
  • Internet of Things
  • LMR
  • LTE
  • Locate
  • Managing Incidents
  • Mission Critical Voice
  • Mitigation
  • Mobile
  • Modeling & Simulation
  • Narcotics
  • Network
  • Opioids
  • P25
  • Physical Security
  • Policy
  • Position Navigation & Timing
  • Preventing Terrorism
  • Prevention
  • Privacy
  • Protection-Terrorist Attacks
  • Recognition
  • Resilience
  • Risk
  • Screening
  • Securing Aviation
  • Securing Borders
  • Securing Cyber
  • Security
  • Sensor
  • Situational Awareness
  • Social Media
  • Software
  • Terrorism
  • Test & Evaluation
  • Track
  • Training
  • UAS
  • Vaccine
  • Video
  • Virus
LRBAA TOPIC SEARCH RESULTS
Research Area:   Securing Aviation (SEC AVN)
Priority R&D Need:  Rapid Detection and Alarming of Explosives
Topic Number:  SEC AVN 04-01
Topic Title:  Canine R&D Structure and Function
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Canine R&D Structure and Function, part of the program focusing on the more basic understanding of canine behavior, genetics, olfaction, and cognition of this detector to improve operational efficiencies and training methods.
Canine R&D Structure and Function, part of the program focusing on the more basic understanding of canine behavior, genetics, olfaction, and cognition of this detector to improve operational efficiencies and training methods. less
Topic Research Type:  Type I
End Objective:

S&T goals are to provide our customer base - TSA and the Homeland Security Enterprise (HSE) - with the tools, techniques, and knowledge to better understand, train, and utilize the detection canine, and improve proficiency of the DHS/HSE detection canine teams. Provide an enduring research and development capability to the Homeland Security Enterprise with a unique focal point and knowledge base for detection canines by establishing a scientifically rigorous, statistically significant approach for the detection canine community that is currently absent in the industry.

TRL Sought:  4
TRL at Conclusion:  7
Transition Customer or Program:

Operating components within the DHS and State and Local Law Enforcement within the Homeland Security Enterprise who maintain detection canines for the execution of their appointed missions

Background Information and S&T Challenges:

Detection focus not limited to explosive threats, but to include all detection canine threat vectors including narcotics, firearms detection, human detection, cadaver detection, infectious disease detection, and currency, for example. Operational efficacy, safety and cost are major metrics of success.

Transition Opportunities:

The potential exists for licensing and commercialization of tools and knowledge products that may serve the over 16,000 detection canine teams nationwide across all threat disciplines. Knowledge products and methodologies have been successful in receiving patents and facilitated various levels of commercialized products

division icon
Securing Aviation
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Aviation (SEC AVN)
Priority R&D Need:  Rapid Detection and Alarming of Explosives
Topic Number:  SEC AVN 04-02
Topic Title:  Development and Testing of Canine Training Aids
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Development and Testing of Canine Training Aids, specifically targeting the creation of low cost, non-hazardous emerging threat and conventional explosive training aids, with state-of-the-art laboratory technology for odor validation to the level of canine detection. The program is also interested in odor generalization analysis studies to reduce requisite numbers of trained odors.
Development and Testing of Canine Training Aids, specifically targeting the creation of low cost, non-hazardous emerging threat and conventional explosive training aids, with state-of-the-art laboratory technology for odor validation to the level of canine detection. The program is also interested in odor generalization analysis studies to reduce requisite numbers of trained odors. less
Topic Research Type:  Type II
End Objective:

S&T goals are to provide our customer base - TSA and the Homeland Security Enterprise (HSE) - with the tools, techniques, and knowledge to better understand, train, and utilize the detection canine and improve proficiency of the DHS/HSE detection canine teams. Provide an enduring research and development capability to the Homeland Security Enterprise with a unique focal point and knowledge base for detection canines by establishing a scientifically rigorous, statistically significant approach for the detection canine community that is currently absent in the industry.

TRL Sought:  4
TRL at Conclusion:  7
Transition Customer or Program:

Operating components within the DHS and State and Local Law Enforcement within the Homeland Security Enterprise who maintain detection canines for the execution of their appointed missions.

Background Information and S&T Challenges:

Detection focus not limited to explosive threats, but to include all detection canine threat vectors including narcotics, firearms detection, human detection, cadaver detection, infectious disease detection, and currency, for example. Operational efficacy, safety, and cost are major metrics of success.

Transition Opportunities:

The potential exists for licensing and commercialization of tools and knowledge products that may serve the over 16,000 detection canine teams nationwide across all threat disciplines. Knowledge products and methodologies have been successful in receiving patents and facilitated various levels of commercialized products.

division icon
Securing Aviation
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Aviation (SEC AVN)
Priority R&D Need:  Rapid Detection and Alarming of Explosives
Topic Number:  SEC AVN 04-03
Topic Title:  Independent Operational Test and Evaluation for Technologies and Methodologies That Advance Detection Canine Performance
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Technologies and methodologies that advance detection canine performance in controlled and operational environments representative of the Homeland Security Enterprise at the federal, state, and local level and facilitate scientifically significant data capture through independent operational test and evaluation.
Technologies and methodologies that advance detection canine performance in controlled and operational environments representative of the Homeland Security Enterprise at the federal, state, and local level and facilitate scientifically significant data capture through independent operational test and evaluation. less
Topic Research Type:  Type III
End Objective:

S&T's goals are to provide our customer base - TSA and the Homeland Security Enterprise (HSE) - with the tools, techniques, and knowledge to better understand, train, and utilize the detection canine, and improve proficiency of the DHS/HSE detection canine teams. Provide an enduring research and development capability to the Homeland Security Enterprise with a unique focal point and knowledge base for detection canines by establishing a scientifically rigorous, statistically significant approach for the detection canine community that is currently absent in the industry.

TRL Sought:  5
TRL at Conclusion:  7
Transition Customer or Program:

Operating components within the DHS and State and Local Law Enforcement within the Homeland Security Enterprise who maintain detection canines for the execution of their appointed missions.

Background Information and S&T Challenges:

Detection focus not limited to explosive threats, but to include all detection canine threat vectors including narcotics, firearms detection, human detection, cadaver detection, infectious disease detection, and currency, for example. Operational efficacy, safety and cost are major metrics of success.

Transition Opportunities:

The potential exists for licensing and commercialization of tools and knowledge products that may serve the over 16,000 detection canine teams nationwide across all threat disciplines. Knowledge products and methodologies have been successful in receiving patents and facilitated various levels of commercialized products

division icon
Securing Aviation
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Aviation (SEC AVN)
Priority R&D Need:  Rapid Detection and Alarming of Explosives
Topic Number:  SEC AVN 04-08
Topic Title:  Enhanced Contact and Non-Contact Trace Explosives Sampling and Detection
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 

The primary objective of this LRBAA is to develop enhanced contact and non-contact trace explosives sampling methods and prototypes that are seamlessly integrated with or integration-ready with currently deployed Explosives Trace Detectors (ETDs) and/or Next Generation ETDs. The non-contact sampling methods and prototypes are developed for use in cargo, checked baggage, and or checkpoint screening in aviation security environments.

Currently, contact sampling ... more

The primary objective of this LRBAA is to develop enhanced contact and non-contact trace explosives sampling methods and prototypes that are seamlessly integrated with or integration-ready with currently deployed Explosives Trace Detectors (ETDs) and/or Next Generation ETDs. The non-contact sampling methods and prototypes are developed for use in cargo, checked baggage, and or checkpoint screening in aviation security environments.

Currently, contact sampling (by swabbing) in aviation security environments requires divestiture and has limited throughput and detection libraries. Improvements to contact trace sampling has the promise of the ability to detect more threats of interest. Non-contact sampling technologies of both vapor and particulates have the potential to overcome these limitations by:

  • Enlarging total surface areas of the objects undergoing screening,
  • Minimizing operator errors during automatic or semi-automatic sampling processes
  • Enhancing passenger experiences
To realize the full potential of contact and non-contact sampling, candidate technologies must address the following challenges:
  1. Have high efficiencies in liberating, entraining, and collecting explosive traces in both vapor and particulates
  2. Broaden amenability to variable surface types (e.g. plastics, muslin, ballistic nylon, and clothing) yet maintain high collection efficiencies across these surface types
  3. Not causing damage to the surfaces undergoing screening
  4. Not contaminating the areas surrounding the objects undergoing screening
  5. Optimize collection efficiencies for objects with varying shapes and sizes
  6. Have provisions for the prototypes to seamlessly integrate with currently deployed ETDs and/or Next Gen ETDs.
  7. Provide the ability to detect a broader range of threats than currently available by currently deployed ETDs (especially for contact sampling methods).
less
Topic Research Type:  Type II
End Objective:

Enhanced contact and non-contact trace explosives sampling methods and prototypes that are seamlessly integrated with or integration-ready with currently deployed Explosives Trace Detectors (ETDs) and/or Next Generation ETDs. The methods and prototypes are expected to be developed and undergo Developmental Test and Evaluation at a Government laboratory. Upon successful completion of Developmental Testing and Evaluation (DT&E) phase(s), the method/prototype may be selected for advancement to Integration Test and Evaluation.

TRL Sought:  5
TRL at Conclusion:  7
Transition Customer or Program:

TSA Requirements and Capabilities Analysis

Background Information and S&T Challenges:

Non-contact distance: at least two in from the surface being screened.

Surface types to be sampled: Muslin, Nomex, Bytac, ABS plastic, vinyl, Teflon, packaging tapes, cardboard, cotton, metal, plastic zipper, and leather.

Broad spectrum threat sampling capability: Sampling capability for at least twenty explosives covering aliphatic organic nitrates, aromatic organic nitrates, organic peroxides, inorganic salts, plastics explosives, inorganic salt/fuel mixtures.

Collection efficiency: Ability to deliver >50% of the threat related trace amount to the sensor/detection engine. If a preconcentration component/method is involved, then collection efficiency is defined as the ability to deliver >50% of the threat related trace amount to the preconcentration component.

Size of object sampled: Focus on two of the following three object scales: 1. localized region of passengers' body (~200 square centimeter), 2. carry-on baggage (~0.8 square meter), 3. checked baggage (~1.3 square meter). Sampling time: <= 5 sec per sampling event.

Clear-down time after alarm (cleaning time between samples to prevent memory effect): not to exceed two minutes.

Reliability: minimal maintenance required similar to reliability specification of currently deployed ETDs.

Seamlessly integrated with or integration-ready with currently deployed Explosives Trace Detectors (ETDs) and/or Next Generation ETDs: Integration schemes may include the uses of a pre-concentration component, a desorber component, an ionization source, and/or a transfer line. Candidate technologies need to have provisions for how such integration can be accomplished. These include sizes and methods for coupling the samplers to the detection engines, what components of an ETD are to be kept and what components are to be taken out. The task of integration should not impact detection capabilities of ETDs. If detection capabilities of the ETDs are impacted (negatively) by the integration, technology developers need to devise a mitigation plan to circumvent or overcome these impacts.

Transition Opportunities:

TSA's Strategic Five-Year Technology Investment Plan for Aviation Security, 2017 called for the deployment of Next Generation ETDs in 2020 and the development of technologies and CONOPs that enhance the passenger experience during screening. Successful development of enhanced contact and non-contact explosives trace sampling technologies has the potential for higher return of investment by providing improved secondary screening and alarm resolution for TSA and their procurement cycle with a proven and matured technology.

Supporting Information and Links:

division icon
Securing Aviation
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Borders (SEC BORD)
Priority R&D Need:  Integrated and Improved Sensors, Systems, and Data
Topic Number:  SEC BORD 03-05
Topic Title:  Air Based Technologies
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 

The Air Based Technologies (ABT) program advances manned and unmanned aircraft technology to improve the mission capability of the DHS operational components as well as the extended Homeland Security Enterprise (HSE).

Within the ABT program, there are three focus areas:
  1. ISR Sensors;
  2. Small UAS (Suas) Technology; and
  3. C4 Operations (Command, Control, Communications, and Computers)

The focus area of ISR Sensors seeks sol ... more

The Air Based Technologies (ABT) program advances manned and unmanned aircraft technology to improve the mission capability of the DHS operational components as well as the extended Homeland Security Enterprise (HSE).

Within the ABT program, there are three focus areas:
  1. ISR Sensors;
  2. Small UAS (Suas) Technology; and
  3. C4 Operations (Command, Control, Communications, and Computers)

The focus area of ISR Sensors seeks solutions, processes, and means to advance the development and transition of ISR sensor technology applicable for HSE operational scenarios.

less
Topic Research Type:  Type III
End Objective:

The end objective of any ABT project is to transfer the advancement of aircraft technology (manned and/or unmanned) to enhance the mission capability of the DHS Operational Components and the extended HSE.

The enhancement must be operationally relevant, measurable, beneficial, and consistent with the documented priorities and needs of the mission partner.

TRL Sought:  1-7
TRL at Conclusion:  8
Transition Customer or Program:

DHS Components: CBP, USBP, USCG, HIS, ICE, USSS, FPS, FLETC, CWMD, CISA, I&A

Background Information and S&T Challenges:

Key challenge areas include the following:

  • Effective, small, lightweight, and affordable small ISR sensor packages that can be easily integrated into the current DHS sUAS operational assets
  • Technologies to enable FAA compliant sUAS operations beyond visual line of sight of the operator
  • Autonomous and automated vehicle to vehicle (V2V) communications among sUAS and manned aircraft to enable collision avoidance
  • Tracking of non-compliant and evasive land based and maritime contacts who employ denial and deception tactics to avoid detection and tracking
  • Remote detection of explosive and illicit materials
  • Innovative low cost technologies to enable greater hours of flight operations
  • Counter ISR capabilities

Transition Opportunities:

As a result of awards through this LRBAA, industry partners may become well positioned for additional rewards through the component's acquisition lifecycle. These opportunities are evaluated on a case by case basis with the component's acquisition teams.

Supporting Information and Links:

division icon
Securing Borders
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Borders (SEC BORD)
Priority R&D Need:  Actionable Intelligence Gathering and Sharing
Topic Number:  SEC BORD 04-02
Topic Title:  Non-Intrusive Screening to Detect Synthetic Opioids and Other Illicit Drugs
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Illicit drugs, such as fentanyl and other synthetic opioids, are entering the US at alarming rates. DHS requires the ability to non-intrusively screen bulk packaged materials (individual parcels/packages, mail bags, cargo, or containers) to detect synthetic opioids and other illicit drugs being smuggled into the United States at International Mail Facilities (IMFs), Express Consignment Centers (ECCs), and Border Ports of Entry (BPE). Topic seeks technologies that result ... more
Illicit drugs, such as fentanyl and other synthetic opioids, are entering the US at alarming rates. DHS requires the ability to non-intrusively screen bulk packaged materials (individual parcels/packages, mail bags, cargo, or containers) to detect synthetic opioids and other illicit drugs being smuggled into the United States at International Mail Facilities (IMFs), Express Consignment Centers (ECCs), and Border Ports of Entry (BPE). Topic seeks technologies that result in improvements to screening capabilities for end-users to include (1) advanced technologies that offer novel improvements or approaches to three-dimensional imaging; (2) algorithms or other analytical approaches to assist in operators in anomaly detection and reduce false alarms; and (3) technologies that will enable end-users to discriminate illicit materials from lawful materials to resolve alarms. Technologies are sought that enable end-users to conduct rapid, high-throughput inspection operations with minimal disruption to the flow of commerce and can be readily integrated into current Customs and Border Protection (CBP) field inspection operations. less
Topic Research Type:  Type III
End Objective:

A technology that improves non-intrusive screening capabilities to detect and interdict illicit drugs with minimal disruption to the flow of commerce, is likely to be adopted by end users, and has a path to transition and/or commercialization.

TRL Sought:  5-7
TRL at Conclusion:  7-9
Transition Customer or Program:

Customs and Border Protection Office of Field Operations

Background Information and S&T Challenges:

The President's Commission on Combating Drug Addiction and the Opioid Crisis final report recommended that DHS use additional technologies to detect and intercept synthetic opioids, like fentanyl, and other illicit drugs. The magnitude and urgency of the opioid crisis demands that S&T take an innovative approach to develop near-term deployable solutions that impact the supply of opioids entering the United States.

With the tightened controls on the legal acquisition of fentanyl and other medical opioids, the problem of controlling the illegal supply has only been made more pressing to solve. Illegal synthetic opioids are largely being provided to users and criminal elements from overseas and are entering the US via the mail (USPS) and express consignment (Fed Ex, DHL,UPS). Customs and Border Protection (CBP) Office of Field Operations (OFO) has the mission to inspect items entering the US for illegal material, to include illegal drugs.

The chemical and physical nature of synthetic opioids impose significant limitations to non-intrusive detection and identification of these substances in packaged mail and parcels, and other vessels for illegal smuggling. This topic seeks technologies that can improve the ability for end-users to rapidly screen bulk packaged materials (e.g., packages/parcels, containers, cargo) to detect synthetic opioids and other drugs, to include: (1) advanced technologies that offer three-dimensional imaging; (2) technologies that will enable end-users to discriminate illicit materials from lawful materials; and (3) technologies that enable end-users to continue normal operations with minimal disruption to flow of commerce. Such technology is critical to increasing seizures and thereby taking illegal drugs off the street.

Offerors should consider the operational environment of DHS end-users at BPE and IMFs and factors that would facilitate successful transition/adoption. These factors include, but are not limited to, training and usability, ease of integration into existing operational environments, lifecycle costs, and reliability. These considerations should be part of an Offeror's transition strategy.

Transition Opportunities:

Opportunities for higher return on investment include patents and licenses and/or commercialization.

Supporting Information and Links:

division icon
Securing Borders
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Borders (SEC BORD)
Priority R&D Need:  Dark Aircraft and Vessel Detection, Tracking, and Interdiction
Topic Number:  SEC BORD 05-01
Topic Title:  Sensors for Unmanned Maritime Systems
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
DHS Science & Technology seeks innovative, capable, and reliable sensors to mount on small, commercially available unmanned maritime sensor platforms. The sensors are envisioned to be suitable for the size of the platform, require minimal power (less than 1,000 KVA), capable of functioning above and/or below the surface (as appropriate for the sensor type), and able to be integrated with the platform's communication system using non-proprietary data formats. Sensors are ... more
DHS Science & Technology seeks innovative, capable, and reliable sensors to mount on small, commercially available unmanned maritime sensor platforms. The sensors are envisioned to be suitable for the size of the platform, require minimal power (less than 1,000 KVA), capable of functioning above and/or below the surface (as appropriate for the sensor type), and able to be integrated with the platform's communication system using non-proprietary data formats. Sensors are expected to surveil the surface and/or subsurface for a variety of threats (i.e. fast boats, chemical spills, subsurface vehicles, obstacles, etc.). Sensors are also required to classify the detected object. Sensor system need to be less than 3 kg and marinized for ocean environments. less
Topic Research Type:  Type III
End Objective:

DHS S&T seeks TRL 7-9 technologies to provide sensor capability to existing unmanned maritime system platforms. In the end state, sensors and sensors platforms are envisioned to integrate with existing government command and control systems to aid in the detection, classification, and resolution of maritime threats.

TRL Sought:  7-9
TRL at Conclusion:  8-9
Transition Customer or Program:

United States Coast Guard, Customs and Border Protection

Background Information and S&T Challenges:

One of the key challenges for U.S. homeland security is achieving awareness of the nation's vast maritime domain, which is roughly as large as the nation's land area and extends from New England to Guam. These waters are vital to our nation's prosperity as routes for trade, sources of food, and sources of energy; they also play an important economic role in providing recreation. However, the nation's vast maritime area also imposes requirements on DHS and other agencies. These agencies seek to protect people and property from damage by the sea, the nation from illicit movements via the maritime environment that threaten its security, and the maritime environment itself from both pollution and illicit fishing. To do so, they need to achieve maritime domain awareness (MDA) across diverse regions, as well as the ability to rapidly communicate, integrate, and analyze this information to facilitate effective and appropriate actions. Increasing MDA can contribute to numerous DHS mission sets, including counter drug, migrant interdiction, critical infrastructure surveillance, port and coastal surveillance, environmental monitoring, spill monitoring, fisheries enforcement, and security zone enforcement, and enforcement of laws and treaties.

The goal of this project is to research and integrate technologies that will enable the USCG to conduct more effective operations in support of any of their eleven statutory missions:

  • Port & Waterway Security
  • Drug Interdiction
  • Aids to Navigation
  • Search & Rescue
  • Living Marine Resources
  • Marine Safety
  • Defense Readiness
  • Migrant Interdiction
  • Marine Environmental Protection
  • Ice Operations
  • Law Enforcement

This program will concentrate on Intelligence, Surveillance, Reconnaissance (ISR) missions to provide situation awareness and critical law enforcement information using unmanned maritime systems (UMS).

Transition Opportunities:

The potential exists for commercialization of sensors across a broad spectrum of UMS platforms in the federal space. Potential also exists for the use of adapted sensors on platforms other than UMS.

Supporting Information and Links:

division icon
Securing Borders
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Cyberspace (SEC CYB)
Priority R&D Need:  Human Aspects of Cybersecurity-Associated/Related Efforts
Topic Number:  SEC CYB 02-03
Topic Title:  Cyber Risk Economics (CYRIE)
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Cybersecurity is a multidimensional problem that demands interdisciplinary attention. The CYRIE program supports research into the business, legal, technical, and behavioral aspects of the economics of cyber threats, vulnerabilities, and controls. CYRIE R&D emphasizes empirically based measurement, modeling, and evaluation of:
  • Investment into cybersecurity controls (technology, regulatory, and legal) by private-sector, government, and private actors
  • ... more
Cybersecurity is a multidimensional problem that demands interdisciplinary attention. The CYRIE program supports research into the business, legal, technical, and behavioral aspects of the economics of cyber threats, vulnerabilities, and controls. CYRIE R&D emphasizes empirically based measurement, modeling, and evaluation of:
  • Investment into cybersecurity controls (technology, regulatory, and legal) by private-sector, government, and private actors
  • Impact of investment on the probability, severity, and consequences of actual risks and resulting cost and harm
  • Value of the correlation between business performance measures and evaluations of cybersecurity investments and impacts
  • Incentives to optimize the investments, impacts and value basis of cyber risk management
less
Topic Research Type:  Type III
End Objective:

Priority R&D needs for this program are analytics and metrics for cybersecurity effectiveness, severity, and comparison. The CYRIE program endeavors to improve value-based decision making by those who own, operate, protect, and regulate the nation's vital data assets and critical infrastructure. As such, the program looks beyond the traditional economics view of incentives for cybersecurity, where individuals are assumed to be rational actors who know how to maximize their well-being, and considers a broader array of factors that include business, legal, technical, and behavioral factors. In this way, CYRIE R&D can more effectively address strategy and tactics for cyber risk avoidance, acceptance, mitigation, and transfer.

TRL Sought:  2-5
TRL at Conclusion:  6
Transition Customer or Program:

Application to Cyber Security Operations, Critical Infrastructure Operations, Law Enforcement, Incident and Disaster Response, and Businesses of all sizes

Background Information and S&T Challenges:

In 2013, two Executive actions were issued, aimed at enhancing the capability of owners and operators of the nation's critical infrastructure to protect their networks and systems against cyber attacks (Executive Order 13636, Improving Critical Infrastructure Cybersecurity, and Presidential Policy Directive 21, Critical Infrastructure Security and Resilience). These policy documents gave DHS a coordinating role in pursing the cybersecurity objectives outlined in each document and directed National Institute of Science and Technology (NIST) to develop a voluntary framework that owner/operators could use to improve their cybersecurity posture. DHS led an interagency working group focused on cyber economic incentives, and together, with the Departments of Commerce and Treasury, prepared an analysis of federal policy options for incentivizing adoption of the NIST framework. DHS S&T continues to maintain active engagement in the effort to understand and develop stronger cyber economic incentives through its R&D efforts and portfolio.

The working group and resulting analysis focused primarily on policy and incentives from a microeconomic-based view of marginal costs and benefits of adoption. While this analysis provided a solid start for the study of incentives in cybersecurity, a more holistic approach to research in the area of cyber risk economics is clearly needed that incorporates perspectives on security decisions and behavior from a wide range of social and behavioral sciences.

Recognizing the importance of data sharing to building capacity across the four dimensions (investment, impact, value, incentives), CYRIE supports the sharing of cybersecurity best practices, investments, incidents, and outcomes among diverse stakeholders. More collective information is needed to enable value-based risk management of the shared ecosystem. Effective information sharing can help mitigate against the often siloed view of risk, create positive network effects, and foster "RoS"(return on sharing) as an element of cyber risk management.

Transition Opportunities:

CYRIE supports the development and operationalization of technical and knowledge solutions to help the Transition Customer address capability gaps along any of the program's stated dimensions. The program also aims to inform the government about how it can reduce cyber risk levels through development and enforcement of policy and regulation, convening and coordination of stakeholders, adoption of technology, promulgation of standards, and facilitation of research and development.

Supporting Information and Links:
division icon
Securing Cyberspace
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Cyberspace (SEC CYB)
Priority R&D Need:  Network and Systems Security-Associated/Related Efforts
Topic Number:  SEC CYB 03-01
Topic Title:  Distributed Denial of Service Defense (DDoSD)
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Distributed Denial of Service Defense and Telephony Denial of Service Defense (DDoSD/TDoSD) - Denial of service attacks are pervasive and have the potential to disrupt critical network infrastructure. Proposals that identify, provide situational awareness for, mitigate, provide recovery techniques, or protection for networks such as the Internet, enterprise networks, emergency communications (e.g. Next Generation 9-1-1 (NG911)), or other critical infrastructure networks ... more
Distributed Denial of Service Defense and Telephony Denial of Service Defense (DDoSD/TDoSD) - Denial of service attacks are pervasive and have the potential to disrupt critical network infrastructure. Proposals that identify, provide situational awareness for, mitigate, provide recovery techniques, or protection for networks such as the Internet, enterprise networks, emergency communications (e.g. Next Generation 9-1-1 (NG911)), or other critical infrastructure networks are of interest. Situational Awareness, identification of, mitigation, recovery, and protection for communication channels such as voice, text, video, or other communication that may be received by NG911 are also of interest. less
Topic Research Type:  Type II
End Objective:

The end goal is mitigation of Distributed Denial of Service (DDoS) attacks or protection for relevant networks and communication channels from Denial of Service attacks.

Efforts that provide tools and/or techniques for situational awareness and identify Denial of Service (DoS) attacks on relevant networks and communications channels, including differentiating between DDoS and other disruptions on relevant networks are of interest. These disruptions may occur at various layers of the network.

Efforts that provide mitigation techniques/tools, recovery techniques/tools, or protection to relevant networks and communication channels are also of interest. These efforts may leverage existing policies and practices or adopt existing technologies for near term protection. Novel approaches for understanding and mitigating new forms of DDoS against relevant networks and communication channels are encouraged.

TRL Sought:  4 or above
TRL at Conclusion:  8-9
Transition Customer or Program:

Cybersecurity and Infrastructure Security Agency (CISA) Emergency Communications Division (ECD), CISA Critical Infrastructure

Background Information and S&T Challenges:

Denial of service attacks can affect many aspects of networking, from the application layer to the network itself. Attacks may be multi-pronged, using several attacks simultaneously or be used to distract from a more focused and damaging attack. For critical infrastructure, such as 911 systems, there have been deaths reported because the system was not available when needed.

The state of the art mitigation technique is to "scrub" the data, sending all the victim's data to a scrubbing center and removing the attack traffic while returning the "good" traffic to the victim. This approach can be quite expensive, beyond the means of many small to medium sized businesses. The drop rate for "good" traffic can border on the unacceptable as well. For some critical infrastructure networks such as a public safety answering point (PSAP), a TDoS attack or call flood can prevent the PSAP from answering emergency calls.

Significant work has been done in several areas of DDoS defense. In particular, authentication for voice calls is now available for several types of calls, such as calls from "do not originate (DNO)" phone numbers or numbers that have never been assigned to a phone. However, much work remains to solve the DDoS problem, especially for niche network types. In particular, very little work has been done to provide situational awareness for DDoS Defense, where other network disruptions may masquerade as a DDoS attack. Understanding the situation is critical to an appropriate response to the network issues. Some network types require adaptation of standard techniques/tools or creation of new techniques/tools to mitigate and recover from a DDoS attack.

DDoSD solutions should be low cost and available to resource-constrained small or medium sized businesses and municipalities.

Transition Opportunities:

There is a great need for DDoSD situational awareness, identification, mitigation recovery, and/or protection for relevant networks and communication channels. NG911 in particular is very vulnerable to TDoS attacks, as well as DDoS attacks from the network. Internet of Things (IoT) devices are often compromised and used in such attacks. Protecting relevant networks, such as those comprised of IoT devices in critical infrastructure (e.g. building controllers at facilities such as PIADC) is necessary, as is protecting other networks.

Some projects, such as those protecting 911 voice systems, have a cross-over market in-call center protection that is sustainable commercially.

division icon
Securing Cyberspace
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Cyberspace (SEC CYB)
Priority R&D Need:  Network and Systems Security-Associated/Related Efforts
Topic Number:  SEC CYB 03-02
Topic Title:  Federated Enterprise Environments (formerly Cloud Computing Security)
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Research and Development to build upon security in Federated Enterprise Environments including secure protocols to protect data flow to, within and out of the federated environment; command and control (C2) infrastructure for federated environments; incorporation of adaptive defenses into federated environments; preserving data integrity; privacy constraints; privacy-preserving computation/contract generation; and systems to identify unauthorized activity.
Research and Development to build upon security in Federated Enterprise Environments including secure protocols to protect data flow to, within and out of the federated environment; command and control (C2) infrastructure for federated environments; incorporation of adaptive defenses into federated environments; preserving data integrity; privacy constraints; privacy-preserving computation/contract generation; and systems to identify unauthorized activity. less
Topic Research Type:  Type III
End Objective:

Research and development results of this topic should provide innovative technologies, techniques, and processes towards the creation, operation, and maintenance of federated enterprise environments and the related C2 infrastructure. Objectives include enabling local decision making given global knowledge and the seamless incorporation of various cybersecurity technologies and techniques (Moving Target/Dynamic/Adaptive Defenses, privacy preserving and multi-party computing, deception, etc.) into federated enterprise environments. Results are also sought to protect any cloud-based infrastructure that enables federated enterprise environments.

TRL Sought:  4-7
TRL at Conclusion:  8
Transition Customer or Program:

Cybersecurity and Infrastructure Security Agency (CISA), Homeland Security Enterprise, DHS and Components with need for federated environments

Background Information and S&T Challenges:

This topic is seeking to address various challenges faced by Federal government entities and the Homeland Security Enterprise in the creation, operation, and maintenance of federated enterprise environments. Coordinating mechanisms are needed in order to provide reliable defenses that do not adversely affect usability or limit privacy protections. Additionally, a robust command and control capability is needed to coordinate defenses and make management of processes easier, faster, more reliable, and secure.

Transition Opportunities:

Developed solutions should transition to DHS Components, Federal, State and Local Government Agencies; the Homeland Security Enterprise Solutions may be brand new capabilities not currently available on the market or current solutions that can be modified to address specific needs. Some projects, such as those protecting 911 voice systems, have a cross-over market in-call center protection that is sustainable commercially.

division icon
Securing Cyberspace
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Cyberspace (SEC CYB)
Priority R&D Need:  Network and Systems Security-Associated/Related Efforts
Topic Number:  SEC CYB 03-04
Topic Title:  Predictive Analytics
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Predictive Analysis, as applied to cybersecurity, is the ability to identify potential cyber threat vectors and determine the probable course of action for each threat.
Predictive Analysis, as applied to cybersecurity, is the ability to identify potential cyber threat vectors and determine the probable course of action for each threat. less
Topic Research Type:  Type II
End Objective:

Predictive Analysis, as applied to cybersecurity, is the ability to identify potential cyber threat vectors and determine the probable course of action for each threat. These findings should be presented automatically, with human-in-the-loop if desired, but not required. Presentation should be in an easily understandable format, to allow resource management to address threats as they evolve. Predictive Analysis may be applied at any phase or stage, from fully protected to compromise and recovery. All types from fully protected to compromise and recovery. All types of cyber threats may be considered.

TRL Sought:  4 or Higher
TRL at Conclusion:  8-9
Transition Customer or Program:

Cybersecurity and Infrastructure Security Agency

Background Information and S&T Challenges:

Prediction of cyber threats allows the development of mitigation and recovery strategies before an attack occurs. With the collection of large data sets and machine learning or artificial intelligence algorithms, some cyber events may be predicted with enough time to do the required development, actually preventing or deflecting attacks so that little damage may occur. This is the cutting edge of cyber security, and requires large data sets and trust networks.

Transition Opportunities:

The Networking Information Technology Research and Development (NITRD) report by Martin Stanley of Cybersecurity and Infrastructure Security Agency (CISA) lists cyber analytics as a high priority item for CISA.

division icon
Securing Cyberspace
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Cyberspace (SEC CYB)
Priority R&D Need:  Network and Systems Security-Associated/Related Efforts
Topic Number:  SEC CYB 03-05
Topic Title:  Information Marketplace for Policy and Analysis of Cyber-risk & Trust
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
The Information Marketplace for Policy and Analysis of Cyber-risk & Trust (IMPACT) project supports the global cyber risk research community by coordinating and developing real world data and information sharing capability tools, models, and methodologies. To accelerate solutions around cyber risk issues and infrastructure security, the IMPACT project enables empirical data and information sharing between and among the global cybersecurity research and development (R&D) ... more
The Information Marketplace for Policy and Analysis of Cyber-risk & Trust (IMPACT) project supports the global cyber risk research community by coordinating and developing real world data and information sharing capability tools, models, and methodologies. To accelerate solutions around cyber risk issues and infrastructure security, the IMPACT project enables empirical data and information sharing between and among the global cybersecurity research and development (R&D) community in academia, industry, and government. Importantly, IMPACT also addresses the cybersecurity decision-analytic needs of Homeland Security Enterprise (HSE) customers in the face of high volume, high-velocity, high-variety and/or high-value data through its network of Decision Analytics-as-a-Service Providers (DASP). These resources are a service technology or tool capable of supporting the following types of analytics: descriptive (what happened), diagnostic (why it happened), predictive (what will happen) and prescriptive (what should happen). less
Topic Research Type:  Type III
End Objective:

The Department of Homeland Security (DHS) Science and Technology Directorate's (S&T) Office of Mission Capability Support (MCS) Physical and Cyber Security (PCS) Division seeks to coordinate, enhance, and develop advanced data and information sharing tools, datasets, technologies, models, methodologies, and infrastructure to strengthen the capabilities of national and international cyber risk R&D. These data sharing components are intended to be broadly available as national and international resources to bridge the gap between producers of cyber risk-relevant ground truth data, academic and industrial researchers, cybersecurity technology developers, and decision makers to inform their analysis of and policymaking on cyber risk and trust issues.

TRL Sought:  2-5
TRL at Conclusion:  6
Transition Customer or Program:

Application to Cyber Security Operations, Critical Infrastructure Operations, Law Enforcement, Incident and Disaster Response, and Day-To-Day Business, Public and Private Cyber Security Researchers

Background Information and S&T Challenges:

Cybersecurity R&D requires real world data to develop advanced knowledge, test products and technologies, and prove the utility of research in large scale network environments. IMPACT is the only publicly available, legally collected, distributed repository of large scale datasets containing real network and system traffic that could be used to advance state-of-the-art cybersecurity R&D. The centralized brokering and distributed provisioning between the data providers, data hosts, and researchers addresses the operational, trust, and administrative costs and challenges that impede sustainable and scalable data sharing. IMPACT continually adds new data that is responsive to cyber risk management (e.g. attacks and measurements) to provide the R&D community timely, high-value information to enhance research innovation and quality. The IMPACT model also serves as a laboratory for testing various data sharing models, including batch transfers, newer Data Analytics as a Service (DaaS), and visualization techniques.

Transition Opportunities:

Transition data, decision analytics, and capabilities outputs to the cybersecurity research community.

division icon
Securing Cyberspace
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Cyberspace (SEC CYB)
Priority R&D Need:  Network and Systems Security-Associated/Related Efforts
Topic Number:  SEC CYB 03-06
Topic Title:  National Research Infrastructure of Cyber Security Experimentation
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
When new or updated tools and techniques are developed, the first step is to test them in a restricted environment. Testing always reveals subtleties in the environment that mandate changes to any new tool or technique. The DETER is such an environment and is required for testing, especially for Distributed Denial of Service tools and techniques as they are developed.
When new or updated tools and techniques are developed, the first step is to test them in a restricted environment. Testing always reveals subtleties in the environment that mandate changes to any new tool or technique. The DETER is such an environment and is required for testing, especially for Distributed Denial of Service tools and techniques as they are developed. less
Topic Research Type:  Type III
End Objective:

The primary objective is to have a mature testbed that can be used to test and validate claims from various projects, in particular the DDoSD projects.

The results of this topic will catalyze and support the research and development of advanced experimental research tools, technologies, and methodologies as broadly available national resources. Indicators of the success of this program objective will be the realization of experimental research capabilities and approaches that reach beyond today's state of the art.

TRL Sought:  8-9
TRL at Conclusion:  9
Transition Customer or Program:

Distributed Denial of Service (DDoSD) projects

Background Information and S&T Challenges:

Extensive testing and evaluation is required before any new tool or technique goes "live" on a real network. This testing generally starts in a testbed environment where conditions can be tightly controlled, then progresses to more realistic environments. The first step in testing is required for any project to get out of the development stage and into operations.

Transition Opportunities:

The DETER testbed is used not only by DHS projects to test and validate results, but also to train new cyber professionals in a controlled environment, where mistakes do not have operational consequences.

division icon
Securing Cyberspace
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Cyberspace (SEC CYB)
Priority R&D Need:  Network and Systems Security-Associated/Related Efforts
Topic Number:  SEC CYB 03-07
Topic Title:  IMPACT Data Catalogue
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
The Information Marketplace for Policy and Analysis of Cyber-risk & Trust (IMPACT) is a data catalogue with access protections.
The Information Marketplace for Policy and Analysis of Cyber-risk & Trust (IMPACT) is a data catalogue with access protections. less
Topic Research Type:  Type III
End Objective:

The end objective is to have data available for research, development, testing and training. The data shall be managed for access and to meet all data provider requirements.

The Information Marketplace for Policy and Analysis of Cyber-risk & Trust (IMPACT) project supports the global cyber-risk research community by coordinating and developing real world data and information sharing capabilities, tools, models, and methodologies. To accelerate solutions around cyber-risk issues and infrastructure security, the IMPACT project enables empirical data and information sharing between and among the global cybersecurity research and development (R&D) community in academia, industry, and government. Importantly, IMPACT also addresses the cybersecurity decision-analytic needs of Homeland Security Enterprise (HSE) customers in the face of high volume, high velocity, high variety, and/or high value data through its network of Decision Analytics-as-a-Service Providers (DASP). These resources are a service technology or tool capable of supporting the following types of analytics: descriptive (what happened), diagnostic (why it happened), predictive (what will happen), and prescriptive (what should happen).

TRL Sought:  8-9
TRL at Conclusion:  9
Transition Customer or Program:

Application to Cyber Security Operations, Critical Infrastructure Operations, Law Enforcement, Incident and Disaster Response, and Day-To-Day Business, Public and Private Cyber Security Researchers

Background Information and S&T Challenges:

Reproducibility of research results has been an issue for a long time for cybersecurity. The Internet is constantly changing, and running two experiments even a short time apart can lead to different results. Data sets collected for specific events, such as DDOS attack traffic, is required for research and development of tools and mitigation techniques.

Data sets are also used for training and planning purposes. In short, having good data available leads to good research, development, and tools that meet the needs of DHS.

Transition Opportunities:

Data sets are used at CISA and also by many academic and commercial researchers and developers.

division icon
Securing Cyberspace
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Cyberspace (SEC CYB)
Priority R&D Need:  Mobile Security-Associated/Related Efforts
Topic Number:  SEC CYB 04-02
Topic Title:  Mobile Security & Resiliency R&D
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
The research and development of creating or enhancing technologies to enable the secure and/or resilient use of mobile ecosystem technologies in support of the DHS mission. Areas of interest include: 5G, mobile supply chain, security analysis, mobile infrastructure resilience, emergency communications, mobile vulnerability analysis, mobile communication security protocol analysis, and security.
The research and development of creating or enhancing technologies to enable the secure and/or resilient use of mobile ecosystem technologies in support of the DHS mission. Areas of interest include: 5G, mobile supply chain, security analysis, mobile infrastructure resilience, emergency communications, mobile vulnerability analysis, mobile communication security protocol analysis, and security. less
Topic Research Type:  Type I
End Objective:

The development of technologies that secure and add resilience to the mobile ecosystem that support DHS use cases.

TRL Sought:  3
TRL at Conclusion:  7
Transition Customer or Program:

CISA, CBP, FEMA, TSA, Civilian Federal Government, DoD

Background Information and S&T Challenges:

The DHS Study on Mobile Device Security identified threats to, and security challenges in, mobile network infrastructure that could negatively impact the Government's use of mobile technologies. It also identified the need for government research and development (R&D) to address the risks. R&D is still needed to develop and implement improvements in security and resilience of critical mobile communications networks to enable DHS use-cases.

Transition Opportunities:

The Mobile Security R&D program is partnering with all DHS components and collaborating with several organizations to facilitate piloting, transition, and adoption of the technologies developed under the program. This provides an opportunity to fine-tune requirements, align to and influence development of federal standards or criteria, and conduct pilots with real-world applications. The partners will provide support in developing requirements and use cases, providing information, insights, and access to information technology architecture, offering feedback and evaluation of developed R&D, and contributing in-kind resources associated with testing.

division icon
Securing Cyberspace
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Cyberspace (SEC CYB)
Priority R&D Need:  Software Assurance - Associated/Related Efforts
Topic Number:  SEC CYB 06-01
Topic Title:  Software Assurance
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
The research and development of tools and techniques to reduce vulnerabilities in software and improve how security is addressed in the process of developing and vetting software applications.
The research and development of tools and techniques to reduce vulnerabilities in software and improve how security is addressed in the process of developing and vetting software applications. less
Topic Research Type:  Type III
End Objective:

Develop or provide software assurance tools, including making combinations of tools easier to use and to understand the results of such tools. This may be provided as a cloud service or as a stand-alone product. Both static and dynamic analysis tools or access to tools are desired. Code coverage metrics should be provided for any tools proposed or supported.

Additional desired activities include improving the software assurance ecosystem in novel or unique ways. This allows for a broad spectrum of activities, limited only by the creativity of the proposer.

TRL Sought:  6 or higher
TRL at Conclusion:  9
Transition Customer or Program:

National Risk Management Center (NRMC)

Background Information and S&T Challenges:

Software errors remain prominently in cybersecurity breaches; even in good to excellent code, there are thousands of errors that may be exploited for every million lines of code. There is much work to be done in this area, from training students to security when coding, encouraging software developers to actually use software assurance tools, and ensuring the tools themselves are effective in discovering errors that need correction.

Transition Opportunities:

Cybersecurity and Infrastructure Security Agency (CISA) has listed software assurance as an area of interest.

division icon
Securing Cyberspace
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Cyberspace (SEC CYB)
Priority R&D Need:  Cyber Security Outreach - Associated/Related Efforts
Topic Number:  SEC CYB 07-01
Topic Title:  Cyber Security Education
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Applied research in key education and training areas, to help ensure the nation has a highly skilled cybersecurity workforce is important to maintaining its systems and networks and combating future cyberattacks. Other areas of interest include:

  • The coupling of operations with education and training;
  • Abstract learning versus learning with context;
  • Bayesian learning (prior knowledge) and where and how it might be applicable;
  • more
Applied research in key education and training areas, to help ensure the nation has a highly skilled cybersecurity workforce is important to maintaining its systems and networks and combating future cyberattacks. Other areas of interest include:

  • The coupling of operations with education and training;
  • Abstract learning versus learning with context;
  • Bayesian learning (prior knowledge) and where and how it might be applicable;
  • Incident response feedback systems, that drive subsequent training/learning directions;
  • Regional education and learning models coordinating efforts across different kinds of organizations.
less
Topic Research Type:  Type II
End Objective:

The objective is to develop, demonstrate, and transition substantive and adaptive cyber security education models that impact organizations and infrastructures/sectors for the better. These models should address key dimensions of the challenge, such as multiple age levels, cyber security across multiple operational domains, and different kinds of threats. An overarching objective of this work is to support development of "learning organization" capabilities across all kinds of organizations and infrastructures/sectors. The models and associated technologies need to support cybersecurity competitions, education and curriculum development, and workforce training and development needs.

TRL Sought:  2-5
TRL at Conclusion:  6
Transition Customer or Program:

Cybersecurity and Infrastructure Security Agency (CISA), Homeland Security Enterprise, Other DHS Components

Background Information and S&T Challenges:

This topic is seeking to address various challenges faced by Federal government entities and the Homeland Security Enterprise in regards to addressing the Nation's shortage of skilled cybersecurity professionals.

Transition Opportunities:

Developed solutions should transition to federal and Homeland Security Enterprise end users.

division icon
Securing Cyberspace
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Preventing Terrorism (PREV)
Priority R&D Need:  Prevention
Topic Number:  PREV 04-02
Topic Title:  Vehicle Ramming Mitigation Technology
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Terrorists and other violent extremists have demonstrated an interest in leveraging simple and less sophisticated methods to inflict harm and disrupt infrastructure operations. As highlighted by incidents both domestically and abroad, vehicle ramming has become a common attack vector that is difficult to prevent given there are few to no identifiable indicators.
Terrorists and other violent extremists have demonstrated an interest in leveraging simple and less sophisticated methods to inflict harm and disrupt infrastructure operations. As highlighted by incidents both domestically and abroad, vehicle ramming has become a common attack vector that is difficult to prevent given there are few to no identifiable indicators. less
Topic Research Type:  Type I
End Objective:

This project aims to develop a capability that can be commercialized to enhance security against the vehicle ramming threat, with particular emphasis on special events.

TRL Sought:  2
TRL at Conclusion:  5
Transition Customer or Program:

CISA and public and private sector owners and operators of critical infrastructure and manufacturers, distributors, and retailers of commercial vehicle ramming mitigation technology

Background Information and S&T Challenges:

Through CISA's partnership, it is apparent that there is no cost effective, easy to use, and commercially available vehicle ramming mitigation technologies that can be leveraged as part of security procedures. As a result, security planners have to use larger vehicles or expensive, immobile barriers to create perimeters around a special event. There are also significant limitations on budgetary impacts from liability and restoration.

Transition Opportunities:

The end users would be public and private sector stakeholders responsible for security during special events. These events include sporting events, festivals, parades, and many other events often limited in the level of support received from local law enforcement and other levels of government, making the implications of this technology extremely vast. The number of potential lives saved can amount to hundreds or thousands depending on the type of event, support received from local law enforcement and federal government if identified as a National Special Security Event (NSSE) or Special Events Assessment Rating (SEAR) 1-5, and location of the venue.

division icon
Preventing Terrorism
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Preventing Terrorism (PREV)
Priority R&D Need:  Advanced Analytics
Topic Number:  PREV 05-01
Topic Title:  Advanced Analytics for Next Generation Homeland Security Missions
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 

The Data Analytics Technology Center (DA-TC) invests in research, innovative solutions, and emerging technologies to enable advanced analytics for Next Generation Homeland Security Missions. Facilitating data driven solutions demands cross-cutting work on computation, data management, advanced analytics, technical architecture, and the underlying policy and for using enterprise data sets for cross mission applications.

Areas of interest to DA-TC that focus ... more

The Data Analytics Technology Center (DA-TC) invests in research, innovative solutions, and emerging technologies to enable advanced analytics for Next Generation Homeland Security Missions. Facilitating data driven solutions demands cross-cutting work on computation, data management, advanced analytics, technical architecture, and the underlying policy and for using enterprise data sets for cross mission applications.

Areas of interest to DA-TC that focus on technical architecture include distributed storage systems, block chain applications for privacy protecting information sharing and analytics, and secure multi-party computation. Effective data analytics requires reliable data, so that DA-TC is also focused on solutions to enable data wrangling and preparation as well as entity resolution.

DA-TC investigates the potential of advanced and emerging analytics capabilities to support the Homeland Security Mission, including advanced computational concepts, analytics and visualization, machine learning and deep learning, human centered systems, analytics for the Internet of Things (IOT), large-scale analytics on publicly available information including social media, real-time analytics for multi-party, multi-latency, metro-scale networks, human-centered systems, and quantum information science.

Nearly all DA-TC research and development undertakings also have important policy implications. A few of DA-TC's areas of interest highlight the cross-cutting nature of technical and policy considerations such as countering foreign influence, cyber security and cyber-physical security, election security, infrastructure protection, emergency management, and decision support and business processes, advanced privacy and security concepts, and adversarial machine learning.

less
Topic Research Type:  Type I
End Objective:

Develop capabilities that will increase the Department's ability to leverage data for decision-making.

TRL Sought:  1
TRL at Conclusion:  7
Transition Customer or Program:

Various customers throughout DHS, including the homeland security enterprise and supporting agencies.

Background Information and S&T Challenges:

The Data Analytics Technology Center (DA-TC) advises DHS and the larger Homeland Security Enterprise (HSE) on advanced data analytics tools, storage, and computational techniques that increase the effectiveness of the government's homeland security missions. DA-TC engages in rapid prototyping, independent assessments of emerging technologies, and strategic research and development.

Transition Opportunities:

Transition opportunities include DHS Components and partners in the homeland security enterprise.

Supporting Information and Links:

division icon
Preventing Terrorism
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Managing Incidents (MGMT)
Priority R&D Need:  Situational Awareness
Topic Number:  MGMT 01-01
Topic Title:  Alerts, Warnings, and Notifications Program Planning
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Research and development of Alerts, Warnings, and Notifications (AWN) tools, materials, and strategies for State, Local, Territorial, and Tribal (SLTT) alert originators that foster more effective AWN program planning and reduced alerting delays.
Research and development of Alerts, Warnings, and Notifications (AWN) tools, materials, and strategies for State, Local, Territorial, and Tribal (SLTT) alert originators that foster more effective AWN program planning and reduced alerting delays. less
Topic Research Type:  Type II
End Objective:

Conduct research and pilots; and develop Alerts, Warnings, and Notifications (AWN) program planning guidance on how to build an effective AWN Program (e.g., Standard Messaging Templates, Hazard Matrices, Training Standards, Metrics, and Advocacy Materials for key decision makers) with planning artifacts for State, Local, Territorial, and Tribal (SLTT) alert originators.

TRL Sought:  3-4
TRL at Conclusion:  7
Transition Customer or Program:

Department of Homeland Security (DHS) Federal Emergency Management Agency (FEMA) Integrated Public Alert and Warning System (IPAWS) Program Management Office (PMO)

Background Information and S&T Challenges:

S&Ts recently developed AWN program planning guidance:

  • The Report on Alerting Tactics provides recommendations on effective combinations of alerting tactics for various incident types based upon lessons learned from practitioners.
  • The Common Alerting Protocol (CAP) Assessment Guide examines the current version of the CAP standard and whether modifications are necessary for the standard to keep pace with the evolution of the alerts and warnings ecosystem.
  • Alerts, Warnings, and Notifications (AWN) Guidance Materials help agencies plan for enhanced AWN, providing both guidance for, and a measure of how to successfully address alerting issues in totality. These tools and solutions most closely align with the S&T emergency communications strategic program area.

Transition Opportunities:

Projects in support of this topic will empower FEMA to (1) increase the number of SLTT alerting authorities using the IPAWS system, and following its requirements; (2) support alert originator education and guidance on best practices for modern and accessible AWN to enhance emergency messaging; and (3) address ad-hoc public alerting procedures and processes to support standardized local, regional, or national AWN planning.

Supporting Information and Links:

division icon
Managing Incidents
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Managing Incidents (MGMT)
Priority R&D Need:  Communications
Topic Number:  MGMT 02-01
Topic Title:  Resilient Position, Navigation, and Timing (PNT)
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Accurate position, navigation, and timing (PNT) information is important for the functioning of many critical infrastructure sectors. Disruption of PNT services can hamper the operational capabilities of critical infrastructure operations that rely on precision timing or positioning. This topic seeks technologies that can improve resilience for PNT end-users to include:

1. disruption alerting and mitigation technologies;
2. technologies that will enabl ... more
Accurate position, navigation, and timing (PNT) information is important for the functioning of many critical infrastructure sectors. Disruption of PNT services can hamper the operational capabilities of critical infrastructure operations that rely on precision timing or positioning. This topic seeks technologies that can improve resilience for PNT end-users to include:

1. disruption alerting and mitigation technologies;
2. technologies that will enable end-users to continue normal operations through timing disruption events
3. technologies that provide novel timing capabilities.

Offerors should consider the operational environment of timing end-users in critical infrastructure and factors that would facilitate successful transition/adoption. These factors include, but are not limited to, ease of integration into existing operational environments, price, and reliability. These considerations should be part of an Offeror's transition strategy. less
Topic Research Type:  Type III
End Objective:

A technology that improves PNT resilience, is likely to be adopted by critical infrastructure PNT end-users, and has a path to transition and/or commercialization.

TRL Sought:  7-9
TRL at Conclusion:  8-9
Transition Customer or Program:

DHS Cybersecurity and Infrastructure Security Agency (CISA) - National Risk Management Center - is interested in developing these technologies for use in Critical Infrastructure

Background Information and S&T Challenges:

Position, Navigation, and Timing (PNT) data services are critical to the operations of multiple critical infrastructure sectors, such as communication and transportation. As the Nation's critical infrastructure assets, networks, and systems have become much more interdependent across vast regions, crossing jurisdictional/national boundaries and time zones, the need for accurate and precise PNT services is vital to the continued functioning of infrastructure. The 16 critical infrastructure sectors' increased dependency on timing services leaves them potentially vulnerable to disruption; the potential severity of impacts and possible cascading effects from denial of timing services has not been fully explored.

National Security Presidential Directive-39 (NSPD-39: 2004) requires DHS to develop backup capabilities to mitigate Global Positioning System (GPS) disruptions in coordination with the Department of Transportation, and "identify space-based positioning, navigation, and timing requirements for homeland security purposes to the Secretary of Transportation, and coordinate the use of positioning, navigation, and timing capabilities and backup systems for homeland security purposes by Federal, State, and local governments and authorities."

DHS CISA National Risk Management Center has identified the need for resilient PNT as a key programmatic goal. This work will initially focus on the timing portion of PNT services used throughout critical infrastructure. In 2019, CISA identified "Provide Positioning, Navigation, and Timing Services" as one of the National Critical Functions.

Transition Opportunities:

Opportunities for higher return on investment include patents and licenses and/or commercialization.

Supporting Information and Links:
division icon
Managing Incidents
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Managing Incidents (MGMT)
Priority R&D Need:  Communications
Topic Number:  MGMT 02-05
Topic Title:  Low-cost tactical communication devices for information sharing in remote environments (Border Security Technology Solution)
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Low-cost tactical communication devices that interface with modern smartphones to enable secure sharing of position location information (PLI) and text messages in remote environments for increased situational awareness.
Low-cost tactical communication devices that interface with modern smartphones to enable secure sharing of position location information (PLI) and text messages in remote environments for increased situational awareness. less
Topic Research Type:  Type III
End Objective:

By providing a low-cost device that interfaces wirelessly with modern smartphones, low bandwidth data including position location information (PLI), text messages and other customer-provided payloads can be transmitted and received by DHS users in remote environments that do not have commercial infrastructure like cell towers. This effort will enable tactical air, land, and maritime information sharing to provide agent safety and increase agent situational awareness.

TRL Sought:  6-9
TRL at Conclusion:  7 - 9
Transition Customer or Program:

CBP, DNDO, FEMA, ICE, USCG, USSS

Background Information and S&T Challenges:

DHS S&T is looking for low-cost communication devices with the following characteristics:

  • Must work off-grid, with no local infrastructure required.
  • Lightweight, must weigh less than 5 ounces.
  • Low-cost, must cost <=$200 each for 20,000 quantity,~$400 each for quantity 50.
  • Unit must be environmentally protected, IP67 rated or better.
  • Battery life must be >=24 hours per charge.
  • Battery charger must be same as standard cell phone chargers, micro-USB, USB-C, etc.
  • Size must be 8" or less in length, 2" or less in width, 2" or less in depth.
  • Antenna must be integrated into unit with industry-standard external antenna port that becomes enabled in the presence of an antenna for integration into a vehicle, aircraft, vessel, etc.
  • Must be able to receive data from modern smartphones wirelessly using Bluetooth, WiFi or other common smartphone communications method. Wired connection can be an option, but it must contain wireless connection. If wired connection is used, it will need to work with stock Android OS 6.0+ without the need for special rooting of the device or special applications to make the interface work.
  • Must provide an open API/SDK to allow custom payloads with target size of 1KB per data transmission.
  • Radio frequency preferable in U.S. ISM bands for HF, VHF, UHF. Frequency can be outside U.S. ISM bands but NTIA certification plan must be addressed.
  • Must be capable of secure/encrypted communications with smartphone using AES-256 bit encryption. When the device is encrypted it will only communicate with other devices on the same encryption key, no communication with non-keyed devices will take place to mesh data unless it has the same encryption key
  • Mesh networking capable up to 30-50 nodes with a minimum of 4 hops in a 10 square mile area.
  • Power less than or equal to 5 Watts.
  • No subscription costs.
  • No vendor hosted server infrastructure to setup devices (encryption, frequencies).
  • Ability to fully program radio via API/SDK for encryption keys, frequencies, and all setup with Android Application. iOS app not immediately required but must address plan and cost.
  • Ability to toggle message Tx/Rx receipt flag on messages.
  • Must contain external emergency beacon button on the device case that transmits an emergency message across the API/SDK.

Transition Opportunities:

Investment in this technology supports many tactical users within DHS components and will provide real-time situational awareness and sharing of timely and actionable information in support of law enforcement operations across our air, land, and maritime borders. This capability could also be used by the public sector for secure, mobile, low-cost communications without reliance on commercial infrastructure or in locations where commercial infrastructure is not available, or where it has been degraded due to natural disasters.

Supporting Information and Links:

division icon
Managing Incidents
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Managing Incidents (MGMT)
Priority R&D Need:  Communications
Topic Number:  MGMT 02-07
Topic Title:  Measuring Impact of Foreign Influence Operations and Resilience Efforts to Mitigate
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 

No methodology exists to measure the impact of foreign influence operations on Americans or the effectiveness of measures put in place to mitigate the risk of foreign influence. In order to design and implement effective resilience measures, a baseline understanding of how foreign influence operations impact citizens and a methodology to measure the effectiveness of programs is required.


Designing robust metrics requires analysis of foreign influence al ... more

No methodology exists to measure the impact of foreign influence operations on Americans or the effectiveness of measures put in place to mitigate the risk of foreign influence. In order to design and implement effective resilience measures, a baseline understanding of how foreign influence operations impact citizens and a methodology to measure the effectiveness of programs is required.


Designing robust metrics requires analysis of foreign influence along several dimensions, including both the physical and cyber. Given that much human activity today has both physical and cyber footprints, detecting bad activity would be harder if one focuses on one of the other only. Infrastructure Protection (IP) theft for example, typically involves both.

less
Topic Research Type:  Type I
End Objective:

These metrics would be used to identify the most effective methods for building national resilience to foreign influence operations. The information would be used to design and implement programs and communications to mitigate the risk of foreign influence operations. This is particularly important to DHS' emphasis on building National resilience through public awareness and education. Messaging, tactics, target audience, and outreach can all be guided by these metrics and methodology.

TRL Sought:  2
TRL at Conclusion:  5
Transition Customer or Program:

Cybersecurity and Infrastructure Security Agency (CISA), National Risk Management Center (NRMC) in support of the DHS Countering foreign influence subcommittee

Background Information and S&T Challenges:

Design an easily implemented methodology to measure the impact of foreign influence operations and the effectiveness of resilience building activities to mitigate the risk. Foreign influence can take on many different forms manifesting into the physical and cyber world, yet no methodology yet exists to identify foreign activities that specifically try to influence domestic population and economy.

Transition Opportunities:

Potential to benefit DHS and all The Committee on Foreign Investment in the United States (CFIUS) Departments and Agencies members including: Department of the Treasury, Department of Justice, Department of Commerce, Department of Defense, Department of State, Department of Energy, Office of the U.S. Trade Representative, Office of Science & Technology Policy

division icon
Managing Incidents
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Managing Incidents (MGMT)
Priority R&D Need:  Communications
Topic Number:  MGMT 02-08
Topic Title:  GMD and Nuclear EMP Critical Infrastructure Risk
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Extreme electromagnetic incidents caused by an intentional electromagnetic pulse (EMP) attack or a naturally occurring geomagnetic disturbance (GMD, also referred to as "space weather") could damage significant portions of the Nation's critical infrastructure. Although EMP can be generated by several means, high-altitude electromagnetic pulse attacks (HEMP) using nuclear weapons are of most concern because they may permanently damage or disable large sections of the nati ... more
Extreme electromagnetic incidents caused by an intentional electromagnetic pulse (EMP) attack or a naturally occurring geomagnetic disturbance (GMD, also referred to as "space weather") could damage significant portions of the Nation's critical infrastructure. Although EMP can be generated by several means, high-altitude electromagnetic pulse attacks (HEMP) using nuclear weapons are of most concern because they may permanently damage or disable large sections of the national electric grid and other critical infrastructure control system. Similarly, extreme geomagnetic disturbances associated with solar coronal mass ejections (when plasma from the sun, with an embedded magnetic field, arrives at Earth) may cause widespread and long-lasting damage to electric power systems, satellites, electronic navigation systems, and undersea cables. The systems at risk may be directly impacted or affected by damage to the communications and control upon which they are dependent. less
Topic Research Type:  Type I
End Objective:

Any or all of the following:

  • Threat and Hazard Modeling-Severe geomagnetic disturbance (GMD) and nuclear electromagnetic pulse (EMP) are large-scale, high-impact, low-frequency (HILF) events where we have limited historical data and experience. The lack of experience creates a heavy reliance on models and simulations of these events to guide the protection of critical infrastructure (CI) and to estimate post-event responses for recovery and restoration.
  • Mapping of National Critical Functions to Critical Infrastructure Networks-National Critical Functions (NCF) provide a high level definitions of functions that need to be sustained to avoid serious disruption to national security and safety and economic activity.
  • Identification of Key Critical Infrastructure Assets and Vulnerability Assessments-The CI networks that support the NCFs are composed of many subsystems, devices and components.
  • Prediction of Critical Infrastructure Network Performance Under Extreme Conditions-The CI networks that support the NCFs often exhibit complex behavior governed by physics, control systems, and human operator intervention.
  • Design of Critical Infrastructure Network Vulnerability Mitigations To Ensure NCF Performance-Resources for hardening or sparing CI network subsystems, devices and components are often limited, and the effect of these mitigations on the CI network, especially as it pertains to NCF PEMP, are often not straightforward due to complex network behavior.

TRL Sought:  2
TRL at Conclusion:  5
Transition Customer or Program:

Cybersecurity and Infrastructure Security Agency (CISA) - National Risk Management Center, public and private sector owners, operators of critical infrastructure and manufacturers, distributors

Background Information and S&T Challenges:

  • Lack of historical experience and data-Infrequent natural occurrence or full-scale testing of these phenomena limits the available ground truth, system response data to baseline mitigation methods, and creates heavy reliance on modeling and simulation to guide decision making
  • Multi-physics-End-to-end modeling and simulating EMP and GMD requires integration of a vast range of physical phenomena including nuclear weapons outputs, space weather, particle scattering, electromagnetic propagation and coupling, and component and infrastructure network response
  • Wide range of spatial and temporal scales-The physics discussed above spans from sub nanosecond for nuclear physics and particle scattering to minutes for infrastructure response. Important spatial scales include CONUS-scale electromagnetic fields and infrastructure networks to 10-km electrical transmission lines to 1-meter conductors in an electrical substation
  • Multiple affected infrastructures-The widespread nature of these events leads to simultaneous impacts on multiple infrastructure, and the interconnectivity of modern infrastructure systems may lead to complex impacts
  • Complex mitigations-The widespread nature of the EMP and GMD hazards and the complexity of infrastructure network response to potential component failures. Hardening or other resilience mitigations in one part of a network may increase risk in other parts of the network complicating achieving overall infrastructure resilience.

DHS recently released its "Strategy for Protecting and Preparing the Homeland Against Threats of Electromagnetic Pulse and Geomagnetic Disturbances" (as required in 6 USC 121(d)) that defines a vision where the United States is prepared for extreme electromagnetic incidents and capable of quickly restoring critical infrastructure and supporting communities to fully recover. This strategy is aligned with the statutory direction to the Department in 6 USC 195(f) that current efforts must take further action to mitigate the impact of EMP and GMD on critical infrastructure. Action includes completing objective scientific analyses, identifying critical utilities and national security assets and infrastructure that are at risk from threats of EMP and GMD, and analysis of technology options available to improve the resiliency of critical infrastructure to threats of EMP and GMD.

Transition Opportunities:

Both GMD and EMP are low probability/high consequence scenarios that challenge effective policymaking. Science and technology advancements in the following topic areas will clarify our understanding the threat and impacts and improve our ability to mitigate the consequences.

Supporting Information and Links:

Additional Transition Customers: retailers of energy system (i.e., electrical grid and natural gas and petroleum pipelines), communications, water and wastewater systems, and transportation equipment.

https://www.dhs.gov/publication/protecting-and-preparing-homeland-against-threats-electromagnetic-pulse-and-geomagnetic

division icon
Managing Incidents
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Managing Incidents (MGMT)
Priority R&D Need:  Communications
Topic Number:  MGMT 02-08
Topic Title:  GMD and Nuclear EMP Critical Infrastructure Risk
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Extreme electromagnetic incidents caused by an intentional electromagnetic pulse (EMP) attack or a naturally occurring geomagnetic disturbance (GMD, also referred to as "space weather") could damage significant portions of the Nation's critical infrastructure. Although EMP can be generated by several means, high-altitude electromagnetic pulse attacks (HEMP) using nuclear weapons are of most concern because they may permanently damage or disable large sections of the nati ... more
Extreme electromagnetic incidents caused by an intentional electromagnetic pulse (EMP) attack or a naturally occurring geomagnetic disturbance (GMD, also referred to as "space weather") could damage significant portions of the Nation's critical infrastructure. Although EMP can be generated by several means, high-altitude electromagnetic pulse attacks (HEMP) using nuclear weapons are of most concern because they may permanently damage or disable large sections of the national electric grid and other critical infrastructure control system. Similarly, extreme geomagnetic disturbances associated with solar coronal mass ejections (when plasma from the sun, with an embedded magnetic field, arrives at Earth) may cause widespread and long-lasting damage to electric power systems, satellites, electronic navigation systems, and undersea cables. The systems at risk may be directly impacted or affected by damage to the communications and control upon which they are dependent. less
Topic Research Type:  Type I
End Objective:

TRL Sought:  2
TRL at Conclusion:  5
Background Information and S&T Challenges:

Transition Opportunities:

Supporting Information and Links:

division icon
Managing Incidents
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Managing Incidents (MGMT)
Priority R&D Need:  Command, Control, Communications
Topic Number:  MGMT 03-01
Topic Title:  Enhanced Incident Management Services to Support Interoperable Rich-Data Information Integration and Exchange
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
S&T seeks R&D for standards-based, enhanced incident management solutions with an emphasis on data interoperability and seamless integration of next-generation, data-rich environments including, but not limited to, mobile data, sensors, IoT, voice, video, asset utilization and availability, and GIS data sources. Research concept materials should:
  • Use of cloud-based solutions to provide greater scalability and adaptability for future technological capab ... more
S&T seeks R&D for standards-based, enhanced incident management solutions with an emphasis on data interoperability and seamless integration of next-generation, data-rich environments including, but not limited to, mobile data, sensors, IoT, voice, video, asset utilization and availability, and GIS data sources. Research concept materials should:
  • Use of cloud-based solutions to provide greater scalability and adaptability for future technological capabilities
  • Platform that supports data interoperability and integration from diverse sources. Compatibility, where possible, with legacy and state-of-the-art edge network devices.
  • Adoption of data hierarchy concepts (i.e. "authoritative data" concept from CAD architectures) as an organizing principle;
  • Utilize standards-based technology interfaces, promoting standards-based solutions rather than proprietary ones;
  • Demonstrably reduce life-cycle costs (acquisition, operations & maintenance, and technology refresh);
  • Result in force-multiplier functionality for users across all public safety disciplines and at all jurisdictional levels.
less
Topic Research Type:  Type III
End Objective:

The successful demonstration of data interoperability and integration of cloud based solutions to support multi-agency dispatching, information sharing, and incident management. Solutions will result in enhanced functions for call taking, dispatch, resource management, situational awareness, intelligent data analytics, sensor integration, alerting, and provide common operating intelligence to streamline and expedite decisions while reducing response time and improving responder awareness and safety.

TRL Sought:  7
TRL at Conclusion:  8
Transition Customer or Program:

State and Local First Responder Agencies

Background Information and S&T Challenges:

I. Although NGFR's primary focus was on-body sensor devices, integrated situational awareness platforms that could give leadership a view of the incident scene provided first responders with the most operational impact II. During all NGFR integration experiments, edge device sensors pushed data through an intermediary broker in order to reach participating situational awareness platforms III. One Situational awareness platform that can provide cross agency interoperable functionality will allow all responders to focus on one system instead of many

Transition Opportunities:

Investment in this technology supports many tactical users within DHS components and the public safety community. The resulting solutions, models, and practices will provide a roadmap for agencies nationwide and across all levels of government to migrate from legacy systems to next-generation, secure, interoperable, integrated solutions while lowering operating costs and initial investments.

division icon
Managing Incidents
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Managing Incidents (MGMT)
Priority R&D Need:  Command, Control, Communications
Topic Number:  MGMT 03-02
Topic Title:  CAD-to-CAD Interoperability
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Critical data supporting incident response and resource management decisions is often not available to all organizations responding to an emergency because the various Computer-Aided-Dispatch (CAD) systems supporting each agency's mission and the systems they interact with on a daily base are unable to electronically exchange that information. Most CAD technology in use today by first responders was not developed to be interoperable with other systems and no communicatio ... more
Critical data supporting incident response and resource management decisions is often not available to all organizations responding to an emergency because the various Computer-Aided-Dispatch (CAD) systems supporting each agency's mission and the systems they interact with on a daily base are unable to electronically exchange that information. Most CAD technology in use today by first responders was not developed to be interoperable with other systems and no communication or data exchange standards are currently in widespread use. As a result, situational awareness may suffer, operational inefficiencies may be introduced that negatively impact the optimum response to an incident, and improvised interoperability is achieved by developing custom interfaces that can be very costly to develop and maintain. Therefore, there is a need to:
  • Understand the CAD interoperability landscape today including its challenges.
  • Define interoperability, associated requirements, and their specifications to encourage interoperability between different solutions in use within one or more public safety agencies and with other incident information management stakeholders.
  • Evaluate standards for use, aimed at the achievement of increased interoperability to support a full complement of inter-operable emergency incident data exchanges between a variety of public safety systems (CAD-to-CAD, CAD-to-records management system, CAD-to-mobile data, and others).
  • Determine conformance specifications, validating testing methodologies, and encourage agency inclusion of the specifications during the acquisition process to foster broader adoption.
  • Leverage existing national systems if feasible.
  • Make recommendations to other public safety organizations and/or committees. on actions and steps that need to be taken in a comprehensive report.
  • A phased approach that includes a proof of concept/operational prototypes.
  • less
Topic Research Type:  Type I
End Objective:

The end objective is to achieve a very resilient public safety Cad-to-Cad ecosystem that is very efficient, interoperable, and supports multi-discipline response to regional, multistate, or national events.

TRL Sought:  1-3
TRL at Conclusion:  8-9
Transition Customer or Program:

Leveraging a national system, such as the National Law Enforcement Telecommunications System (NLETS) should be considered.

Background Information and S&T Challenges:

Cad-to-Cad communications is key to interoperability and resilience between government agencies responding to emergencies. Public safety agencies have different CAD systems causing ineffective and costly interoperable communications. These systems in most cases do not efficiently share information during unified responses that include many public safety (Fire/Law Enforcement/EMS) disciplines. Advances in technology have nonetheless transformed challenges into opportunities and S&T can take this National interoperable need and provide leadership to develop a viable solution.

Transition Opportunities:

The seamless exchange of data that is technology agnostic and without geographic or agency response area boundaries is a core element of interoperability in the public safety environment. The costs savings and resiliency improvements that the Nation can achieve can be very substantial. The Government can also provide procurement language, implementation guidance documentation, outreach, and communications to facilitate understanding of issues, recommendations, and opportunities.

Supporting Information and Links:

A phased approach to achieve the end objective shall be established. Phase-I with TRLs 1 to 3 can be achieved through the items outlined on the topic description. Upon completion of Phase-I, research recommendations to the Government, public safety organizations and/or committees on actions and key steps that need to be taken should be provided in a comprehensive report. Phase-II shall look to achieve TRLs 4 to 7 extrapolating the best of ongoing or completed pilots in the recent past and use Phase-I findings. In addition, implement operational pilots and proofs of concepts based on Phase-I findings and new technology opportunities. Phase-III should layout a standard baseline for TRL 8 to 9 that would be scalable, duplicable, cost effective and commercially available.

TRLs Chart

TRL TRL Definition
1 Basic principles observed and reported.
2 Technology concept and/or application formulated.
3 Analytical and experimental critical function and/or characteristic proof-of-concept.
4 Component and/or breadboard validation in laboratory environment.
5 Component and/or breadboard validation in relevant environment.
6 System/subsystem model or prototype demonstration in a relevant environment.
7 System prototype demonstration in an operational environment.
8 Actual system completed and qualified through test and demonstration.
9 Actual system proven through successful mission operations.

At the conclusion of this project, we envision a standard's-based system that is scalable, duplicable, and ready to be commercialized.

National Capital Region - Communications Infrastructure
https://www.nist.gov/system/files/documents/2019/06/27/nist.ir_.8255.pdf
CAD-to-CAD Data Sharing: A Review of Recommended Standards, IJIS (February 2017).

division icon
Managing Incidents
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Managing Incidents (MGMT)
Priority R&D Need:  Risk Assessment and Planning
Topic Number:  MGMT 08-01
Topic Title:  Community Resilience Through Technology
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 

Supporting R&D through social media, crowdsourcing models, planning tools and templates, trainings, architectures, and technologies to enhance community preparation, resilience, response, and recovery in the face of all-hazards. Improvements in these capabilities can include:

1. Improved risk awareness, communications, and information-sharing between emergency responders and public officials;
2. Increased pre-event planning, tactical operations, and recover ... more

Supporting R&D through social media, crowdsourcing models, planning tools and templates, trainings, architectures, and technologies to enhance community preparation, resilience, response, and recovery in the face of all-hazards. Improvements in these capabilities can include:

1. Improved risk awareness, communications, and information-sharing between emergency responders and public officials;
2. Increased pre-event planning, tactical operations, and recovery through education and training methods to support the implementation of information-sharing tools and tactics (examples including but not limited to: social media and crowdsourcing technologies) during emergency response operations;
3. Applied theoretical and empirical research into the properties of resilient Smart Cities and communities less
Topic Research Type:  Type III
End Objective:

Planning tools and templates, trainings, architectures, and technologies to enhance community preparation, resilience, response, and recovery through new and novel application(s) of all-hazards mitigation strategies

TRL Sought:  3-4
TRL at Conclusion:  7
Transition Customer or Program:

First Responders, FEMA, CISA

Background Information and S&T Challenges:

For years, S&T has supported first responders in enhancing information-sharing and technology integration to improve community resilience. All efforts align to S&T's key mission areas in managing incidents and foster stakeholders' increased situational awareness, communications, and risk assessment and planning. Specific initiatives include:

The DHS S&T Social Media Emergency Management (SMEM) Guidance Tool - The DHS S&T SMEM Guidance tool provides emergency managers and public information officers with a simple, step-by-step line of questioning to create plans to improve their organization's SMEM operations.

Virtual Social Media Working Group (VSMWG) - The VSMWG provides recommendations to the emergency preparedness and response community on the safe and sustainable use of social media technologies before, during and after emergencies.

Smart Cities - Smart cities efforts range from piloting innovative new edge network devices, integration platforms, developing system architectures, and crafting best practices and lessons learned from rigorous scientific experimentation.

Transition Opportunities:

Projects in support of this topic will further DHS S&T's role as a force multiplier to its component customers. Successful technology integration and implementation will facilitate smooth transition to component customers through a variety of means. To FEMA the focus on community resilience is in alignment with their foundational strategy, and the fitment to their requirements ensures topical relevance to their needs. To first responders, developing capabilities and tools to serve their communities gives them enhanced planning, response, and recovery options not currently available.

division icon
Managing Incidents
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Showing  to  of  topics