Funding Opportunities
FUNDING TOPICS:

FILTER BY: action icon action icon
YEAR









DIVISION










TECHNICAL AREAS








































Research Topics:
Research Area
  • Securing Aviation
  • Protecting from Terrorist Attacks
  • Securing Borders
  • Securing Cyberspace
  • Preventing Terrorism
  • Managing Incidents
  • Securing Critical Infrastructure
Priority R&D Need
  • High-Throughput Cargo Screening
  • Cost-effective Electronic Imaging for Bulk Air Cargo
  • Passenger Identification and Vetting
  • Rapid Detection and Alarming of Explosives
  • Distinguishing Threats from Non-threats on Passengers
  • Efficient and Accurate Detection of Complex Threat Concealment on Passengers and Carried Property
  • Personal Protective Equipment for all CBRNE Hazards
  • Modeling and Predictive Analytics for Decision Making
  • Disease and Biological Threat Detection, Identification, and Classification in Field Operational Environments
  • Biological Attack Verification
  • Cross-border Tunnel Detection, Surveillance, and Forensics
  • Infrastructure Tunnel Surveillance
  • Integrated and Improved Sensors, Systems, and Data
  • Actionable Intelligence Gathering and Sharing
  • Dark Aircraft and Vessel Detection, Tracking, and Interdiction
  • Expedited People Screening
  • Maritime Surveillance and Communications in Remote Environments
  • Distributed Cloud-based Communications and Monitoring - Associated/Related Efforts
  • Human Aspects of Cybersecurity-Associated/Related Efforts
  • Network and Systems Security-Associated/Related Efforts
  • Mobile Security-Associated/Related Efforts
  • Critical Infrastructure - Associated/Related Efforts
  • Software Assurance - Associated/Related Efforts
  • Cyber Security Outreach - Associated/Related Efforts
  • Cybersecurity for Law Enforcement-Associated/Related Efforts
  • Cyber Enabled Networked Physical Systems Security
  • Organic Explosive Compound and Homemade Explosives Detection
  • Improvised Explosive Device-related Anomaly Detection
  • Automated Machine Learning
  • Prevention
  • Advanced Analytics
  • Situational Awareness
  • Communications
  • Command, Control, Communications
  • Training and Exercises
  • Responder Health, Safety, Performance
  • Logistics and Resource Management
  • Casualty Management
  • Risk Assessment and Planning
  • Intelligence and Investigation
  • Dependency and Interdependency Analysis
  • Risk-Informed Prioritization
Topic Keywords
  • Agricultural Pathogen
  • Algorithms
  • All-Hazard
  • Analysis
  • Big Data
  • Biometrics
  • Border Protection
  • Canine
  • Cargo
  • Checked Baggage
  • Child Exploitation
  • Classify
  • Communications
  • Contraband
  • Critical Infrastructure
  • Crowdsourcing
  • Cyber
  • Data
  • Data Analytics
  • Denial of Service
  • Detection
  • Diagnostics
  • Disaster
  • Explosives
  • Flood
  • Forensics
  • Human Trafficking
  • Identity
  • Incident Management
  • Infrastructure
  • Interdiction
  • Internet
  • Internet of Things
  • LMR
  • LTE
  • Locate
  • Managing Incidents
  • Mission Critical Voice
  • Mitigation
  • Mobile
  • Modeling & Simulation
  • Narcotics
  • Network
  • Opioids
  • P25
  • Physical Security
  • Policy
  • Position Navigation & Timing
  • Preventing Terrorism
  • Prevention
  • Privacy
  • Protection-Terrorist Attacks
  • Recognition
  • Resilience
  • Risk
  • Screening
  • Securing Aviation
  • Securing Borders
  • Securing Cyber
  • Security
  • Sensor
  • Situational Awareness
  • Social Media
  • Software
  • Terrorism
  • Test & Evaluation
  • Track
  • Training
  • UAS
  • Vaccine
  • Video
  • Virus
LRBAA TOPIC SEARCH RESULTS
Research Area:   Securing Aviation (SEC AVN)
Priority R&D Need:  Rapid Detection and Alarming of Explosives
Topic Number:  SEC AVN 04-01
Topic Title:  Canine R&D Structure and Function
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Canine R&D Structure and Function, part of the program focusing on the more basic understanding of canine behavior, genetics, olfaction, and cognition of this detector to improve operational efficiencies and training methods.
Canine R&D Structure and Function, part of the program focusing on the more basic understanding of canine behavior, genetics, olfaction, and cognition of this detector to improve operational efficiencies and training methods. less
Topic Research Type:  Type I
End Objective:

S&T goals are to provide our customer base - TSA and the Homeland Security Enterprise (HSE) - with the tools, techniques, and knowledge to better understand, train, and utilize the detection canine, and improve proficiency of the DHS/HSE detection canine teams. Provide an enduring research and development capability to the Homeland Security Enterprise with a unique focal point and knowledge base for detection canines by establishing a scientifically rigorous, statistically significant approach for the detection canine community that is currently absent in the industry.

TRL Sought:  4
TRL at Conclusion:  7
Transition Customer or Program:

Operating components within the DHS and State and Local Law Enforcement within the Homeland Security Enterprise who maintain detection canines for the execution of their appointed missions

Background Information and S&T Challenges:

Detection focus not limited to explosive threats, but to include all detection canine threat vectors including narcotics, firearms detection, human detection, cadaver detection, infectious disease detection, and currency, for example. Operational efficacy, safety and cost are major metrics of success.

Transition Opportunities:

The potential exists for licensing and commercialization of tools and knowledge products that may serve the over 16,000 detection canine teams nationwide across all threat disciplines. Knowledge products and methodologies have been successful in receiving patents and facilitated various levels of commercialized products

division icon
Securing Aviation
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Aviation (SEC AVN)
Priority R&D Need:  Rapid Detection and Alarming of Explosives
Topic Number:  SEC AVN 04-02
Topic Title:  Development and Testing of Canine Training Aids
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Development and Testing of Canine Training Aids, specifically targeting the creation of low cost, non-hazardous emerging threat and conventional explosive training aids, with state-of-the-art laboratory technology for odor validation to the level of canine detection. The program is also interested in odor generalization analysis studies to reduce requisite numbers of trained odors.
Development and Testing of Canine Training Aids, specifically targeting the creation of low cost, non-hazardous emerging threat and conventional explosive training aids, with state-of-the-art laboratory technology for odor validation to the level of canine detection. The program is also interested in odor generalization analysis studies to reduce requisite numbers of trained odors. less
Topic Research Type:  Type II
End Objective:

S&T goals are to provide our customer base - TSA and the Homeland Security Enterprise (HSE) - with the tools, techniques, and knowledge to better understand, train, and utilize the detection canine and improve proficiency of the DHS/HSE detection canine teams. Provide an enduring research and development capability to the Homeland Security Enterprise with a unique focal point and knowledge base for detection canines by establishing a scientifically rigorous, statistically significant approach for the detection canine community that is currently absent in the industry.

TRL Sought:  4
TRL at Conclusion:  7
Transition Customer or Program:

Operating components within the DHS and State and Local Law Enforcement within the Homeland Security Enterprise who maintain detection canines for the execution of their appointed missions.

Background Information and S&T Challenges:

Detection focus not limited to explosive threats, but to include all detection canine threat vectors including narcotics, firearms detection, human detection, cadaver detection, infectious disease detection, and currency, for example. Operational efficacy, safety, and cost are major metrics of success.

Transition Opportunities:

The potential exists for licensing and commercialization of tools and knowledge products that may serve the over 16,000 detection canine teams nationwide across all threat disciplines. Knowledge products and methodologies have been successful in receiving patents and facilitated various levels of commercialized products.

division icon
Securing Aviation
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Aviation (SEC AVN)
Priority R&D Need:  Rapid Detection and Alarming of Explosives
Topic Number:  SEC AVN 04-03
Topic Title:  Independent Operational Test and Evaluation for Technologies and Methodologies That Advance Detection Canine Performance
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Technologies and methodologies that advance detection canine performance in controlled and operational environments representative of the Homeland Security Enterprise at the federal, state, and local level and facilitate scientifically significant data capture through independent operational test and evaluation.
Technologies and methodologies that advance detection canine performance in controlled and operational environments representative of the Homeland Security Enterprise at the federal, state, and local level and facilitate scientifically significant data capture through independent operational test and evaluation. less
Topic Research Type:  Type III
End Objective:

S&T's goals are to provide our customer base - TSA and the Homeland Security Enterprise (HSE) - with the tools, techniques, and knowledge to better understand, train, and utilize the detection canine, and improve proficiency of the DHS/HSE detection canine teams. Provide an enduring research and development capability to the Homeland Security Enterprise with a unique focal point and knowledge base for detection canines by establishing a scientifically rigorous, statistically significant approach for the detection canine community that is currently absent in the industry.

TRL Sought:  5
TRL at Conclusion:  7
Transition Customer or Program:

Operating components within the DHS and State and Local Law Enforcement within the Homeland Security Enterprise who maintain detection canines for the execution of their appointed missions.

Background Information and S&T Challenges:

Detection focus not limited to explosive threats, but to include all detection canine threat vectors including narcotics, firearms detection, human detection, cadaver detection, infectious disease detection, and currency, for example. Operational efficacy, safety and cost are major metrics of success.

Transition Opportunities:

The potential exists for licensing and commercialization of tools and knowledge products that may serve the over 16,000 detection canine teams nationwide across all threat disciplines. Knowledge products and methodologies have been successful in receiving patents and facilitated various levels of commercialized products

division icon
Securing Aviation
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Aviation (SEC AVN)
Priority R&D Need:  Rapid Detection and Alarming of Explosives
Topic Number:  SEC AVN 04-08
Topic Title:  Enhanced Contact and Non-Contact Trace Explosives Sampling and Detection
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 

The primary objective of this LRBAA is to develop enhanced contact and non-contact trace explosives sampling methods and prototypes that are seamlessly integrated with or integration-ready with currently deployed Explosives Trace Detectors (ETDs) and/or Next Generation ETDs. The non-contact sampling methods and prototypes are developed for use in cargo, checked baggage, and or checkpoint screening in aviation security environments.

Currently, contact sampling ... more

The primary objective of this LRBAA is to develop enhanced contact and non-contact trace explosives sampling methods and prototypes that are seamlessly integrated with or integration-ready with currently deployed Explosives Trace Detectors (ETDs) and/or Next Generation ETDs. The non-contact sampling methods and prototypes are developed for use in cargo, checked baggage, and or checkpoint screening in aviation security environments.

Currently, contact sampling (by swabbing) in aviation security environments requires divestiture and has limited throughput and detection libraries. Improvements to contact trace sampling has the promise of the ability to detect more threats of interest. Non-contact sampling technologies of both vapor and particulates have the potential to overcome these limitations by:

  • Enlarging total surface areas of the objects undergoing screening,
  • Minimizing operator errors during automatic or semi-automatic sampling processes
  • Enhancing passenger experiences
To realize the full potential of contact and non-contact sampling, candidate technologies must address the following challenges:
  1. Have high efficiencies in liberating, entraining, and collecting explosive traces in both vapor and particulates
  2. Broaden amenability to variable surface types (e.g. plastics, muslin, ballistic nylon, and clothing) yet maintain high collection efficiencies across these surface types
  3. Not causing damage to the surfaces undergoing screening
  4. Not contaminating the areas surrounding the objects undergoing screening
  5. Optimize collection efficiencies for objects with varying shapes and sizes
  6. Have provisions for the prototypes to seamlessly integrate with currently deployed ETDs and/or Next Gen ETDs.
  7. Provide the ability to detect a broader range of threats than currently available by currently deployed ETDs (especially for contact sampling methods).
less
Topic Research Type:  Type II
End Objective:

Enhanced contact and non-contact trace explosives sampling methods and prototypes that are seamlessly integrated with or integration-ready with currently deployed Explosives Trace Detectors (ETDs) and/or Next Generation ETDs. The methods and prototypes are expected to be developed and undergo Developmental Test and Evaluation at a Government laboratory. Upon successful completion of Developmental Testing and Evaluation (DT&E) phase(s), the method/prototype may be selected for advancement to Integration Test and Evaluation.

TRL Sought:  5
TRL at Conclusion:  7
Transition Customer or Program:

TSA Requirements and Capabilities Analysis

Background Information and S&T Challenges:

Non-contact distance: at least two in from the surface being screened.

Surface types to be sampled: Muslin, Nomex, Bytac, ABS plastic, vinyl, Teflon, packaging tapes, cardboard, cotton, metal, plastic zipper, and leather.

Broad spectrum threat sampling capability: Sampling capability for at least twenty explosives covering aliphatic organic nitrates, aromatic organic nitrates, organic peroxides, inorganic salts, plastics explosives, inorganic salt/fuel mixtures.

Collection efficiency: Ability to deliver >50% of the threat related trace amount to the sensor/detection engine. If a preconcentration component/method is involved, then collection efficiency is defined as the ability to deliver >50% of the threat related trace amount to the preconcentration component.

Size of object sampled: Focus on two of the following three object scales: 1. localized region of passengers' body (~200 square centimeter), 2. carry-on baggage (~0.8 square meter), 3. checked baggage (~1.3 square meter). Sampling time: <= 5 sec per sampling event.

Clear-down time after alarm (cleaning time between samples to prevent memory effect): not to exceed two minutes.

Reliability: minimal maintenance required similar to reliability specification of currently deployed ETDs.

Seamlessly integrated with or integration-ready with currently deployed Explosives Trace Detectors (ETDs) and/or Next Generation ETDs: Integration schemes may include the uses of a pre-concentration component, a desorber component, an ionization source, and/or a transfer line. Candidate technologies need to have provisions for how such integration can be accomplished. These include sizes and methods for coupling the samplers to the detection engines, what components of an ETD are to be kept and what components are to be taken out. The task of integration should not impact detection capabilities of ETDs. If detection capabilities of the ETDs are impacted (negatively) by the integration, technology developers need to devise a mitigation plan to circumvent or overcome these impacts.

Transition Opportunities:

TSA's Strategic Five-Year Technology Investment Plan for Aviation Security, 2017 called for the deployment of Next Generation ETDs in 2020 and the development of technologies and CONOPs that enhance the passenger experience during screening. Successful development of enhanced contact and non-contact explosives trace sampling technologies has the potential for higher return of investment by providing improved secondary screening and alarm resolution for TSA and their procurement cycle with a proven and matured technology.

Supporting Information and Links:

division icon
Securing Aviation
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Borders (SEC BORD)
Priority R&D Need:  Integrated and Improved Sensors, Systems, and Data
Topic Number:  SEC BORD 03-05
Topic Title:  Air Based Technologies
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 

The Air Based Technologies (ABT) program advances manned and unmanned aircraft technology to improve the mission capability of the DHS operational components as well as the extended Homeland Security Enterprise (HSE).

Within the ABT program, there are three focus areas:
  1. ISR Sensors;
  2. Small UAS (Suas) Technology; and
  3. C4 Operations (Command, Control, Communications, and Computers)

The focus area of ISR Sensors seeks sol ... more

The Air Based Technologies (ABT) program advances manned and unmanned aircraft technology to improve the mission capability of the DHS operational components as well as the extended Homeland Security Enterprise (HSE).

Within the ABT program, there are three focus areas:
  1. ISR Sensors;
  2. Small UAS (Suas) Technology; and
  3. C4 Operations (Command, Control, Communications, and Computers)

The focus area of ISR Sensors seeks solutions, processes, and means to advance the development and transition of ISR sensor technology applicable for HSE operational scenarios.

less
Topic Research Type:  Type III
End Objective:

The end objective of any ABT project is to transfer the advancement of aircraft technology (manned and/or unmanned) to enhance the mission capability of the DHS Operational Components and the extended HSE.

The enhancement must be operationally relevant, measurable, beneficial, and consistent with the documented priorities and needs of the mission partner.

TRL Sought:  1-7
TRL at Conclusion:  8
Transition Customer or Program:

DHS Components: CBP, USBP, USCG, HIS, ICE, USSS, FPS, FLETC, CWMD, CISA, I&A

Background Information and S&T Challenges:

Key challenge areas include the following:

  • Effective, small, lightweight, and affordable small ISR sensor packages that can be easily integrated into the current DHS sUAS operational assets
  • Technologies to enable FAA compliant sUAS operations beyond visual line of sight of the operator
  • Autonomous and automated vehicle to vehicle (V2V) communications among sUAS and manned aircraft to enable collision avoidance
  • Tracking of non-compliant and evasive land based and maritime contacts who employ denial and deception tactics to avoid detection and tracking
  • Remote detection of explosive and illicit materials
  • Innovative low cost technologies to enable greater hours of flight operations
  • Counter ISR capabilities

Transition Opportunities:

As a result of awards through this LRBAA, industry partners may become well positioned for additional rewards through the component's acquisition lifecycle. These opportunities are evaluated on a case by case basis with the component's acquisition teams.

Supporting Information and Links:

division icon
Securing Borders
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Borders (SEC BORD)
Priority R&D Need:  Actionable Intelligence Gathering and Sharing
Topic Number:  SEC BORD 04-02
Topic Title:  Non-Intrusive Screening to Detect Synthetic Opioids and Other Illicit Drugs
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Illicit drugs, such as fentanyl and other synthetic opioids, are entering the US at alarming rates. DHS requires the ability to non-intrusively screen bulk packaged materials (individual parcels/packages, mail bags, cargo, or containers) to detect synthetic opioids and other illicit drugs being smuggled into the United States at International Mail Facilities (IMFs), Express Consignment Centers (ECCs), and Border Ports of Entry (BPE). Topic seeks technologies that result ... more
Illicit drugs, such as fentanyl and other synthetic opioids, are entering the US at alarming rates. DHS requires the ability to non-intrusively screen bulk packaged materials (individual parcels/packages, mail bags, cargo, or containers) to detect synthetic opioids and other illicit drugs being smuggled into the United States at International Mail Facilities (IMFs), Express Consignment Centers (ECCs), and Border Ports of Entry (BPE). Topic seeks technologies that result in improvements to screening capabilities for end-users to include (1) advanced technologies that offer novel improvements or approaches to three-dimensional imaging; (2) algorithms or other analytical approaches to assist in operators in anomaly detection and reduce false alarms; and (3) technologies that will enable end-users to discriminate illicit materials from lawful materials to resolve alarms. Technologies are sought that enable end-users to conduct rapid, high-throughput inspection operations with minimal disruption to the flow of commerce and can be readily integrated into current Customs and Border Protection (CBP) field inspection operations. less
Topic Research Type:  Type III
End Objective:

A technology that improves non-intrusive screening capabilities to detect and interdict illicit drugs with minimal disruption to the flow of commerce, is likely to be adopted by end users, and has a path to transition and/or commercialization.

TRL Sought:  5-7
TRL at Conclusion:  7-9
Transition Customer or Program:

Customs and Border Protection Office of Field Operations

Background Information and S&T Challenges:

The President's Commission on Combating Drug Addiction and the Opioid Crisis final report recommended that DHS use additional technologies to detect and intercept synthetic opioids, like fentanyl, and other illicit drugs. The magnitude and urgency of the opioid crisis demands that S&T take an innovative approach to develop near-term deployable solutions that impact the supply of opioids entering the United States.

With the tightened controls on the legal acquisition of fentanyl and other medical opioids, the problem of controlling the illegal supply has only been made more pressing to solve. Illegal synthetic opioids are largely being provided to users and criminal elements from overseas and are entering the US via the mail (USPS) and express consignment (Fed Ex, DHL,UPS). Customs and Border Protection (CBP) Office of Field Operations (OFO) has the mission to inspect items entering the US for illegal material, to include illegal drugs.

The chemical and physical nature of synthetic opioids impose significant limitations to non-intrusive detection and identification of these substances in packaged mail and parcels, and other vessels for illegal smuggling. This topic seeks technologies that can improve the ability for end-users to rapidly screen bulk packaged materials (e.g., packages/parcels, containers, cargo) to detect synthetic opioids and other drugs, to include: (1) advanced technologies that offer three-dimensional imaging; (2) technologies that will enable end-users to discriminate illicit materials from lawful materials; and (3) technologies that enable end-users to continue normal operations with minimal disruption to flow of commerce. Such technology is critical to increasing seizures and thereby taking illegal drugs off the street.

Offerors should consider the operational environment of DHS end-users at BPE and IMFs and factors that would facilitate successful transition/adoption. These factors include, but are not limited to, training and usability, ease of integration into existing operational environments, lifecycle costs, and reliability. These considerations should be part of an Offeror's transition strategy.

Transition Opportunities:

Opportunities for higher return on investment include patents and licenses and/or commercialization.

Supporting Information and Links:

division icon
Securing Borders
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Borders (SEC BORD)
Priority R&D Need:  Dark Aircraft and Vessel Detection, Tracking, and Interdiction
Topic Number:  SEC BORD 05-01
Topic Title:  Sensors for Unmanned Maritime Systems
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
DHS Science & Technology seeks innovative, capable, and reliable sensors to mount on small, commercially available unmanned maritime sensor platforms. The sensors are envisioned to be suitable for the size of the platform, require minimal power (less than 1,000 KVA), capable of functioning above and/or below the surface (as appropriate for the sensor type), and able to be integrated with the platform's communication system using non-proprietary data formats. Sensors are ... more
DHS Science & Technology seeks innovative, capable, and reliable sensors to mount on small, commercially available unmanned maritime sensor platforms. The sensors are envisioned to be suitable for the size of the platform, require minimal power (less than 1,000 KVA), capable of functioning above and/or below the surface (as appropriate for the sensor type), and able to be integrated with the platform's communication system using non-proprietary data formats. Sensors are expected to surveil the surface and/or subsurface for a variety of threats (i.e. fast boats, chemical spills, subsurface vehicles, obstacles, etc.). Sensors are also required to classify the detected object. Sensor system need to be less than 3 kg and marinized for ocean environments. less
Topic Research Type:  Type III
End Objective:

DHS S&T seeks TRL 7-9 technologies to provide sensor capability to existing unmanned maritime system platforms. In the end state, sensors and sensors platforms are envisioned to integrate with existing government command and control systems to aid in the detection, classification, and resolution of maritime threats.

TRL Sought:  7-9
TRL at Conclusion:  8-9
Transition Customer or Program:

United States Coast Guard, Customs and Border Protection

Background Information and S&T Challenges:

One of the key challenges for U.S. homeland security is achieving awareness of the nation's vast maritime domain, which is roughly as large as the nation's land area and extends from New England to Guam. These waters are vital to our nation's prosperity as routes for trade, sources of food, and sources of energy; they also play an important economic role in providing recreation. However, the nation's vast maritime area also imposes requirements on DHS and other agencies. These agencies seek to protect people and property from damage by the sea, the nation from illicit movements via the maritime environment that threaten its security, and the maritime environment itself from both pollution and illicit fishing. To do so, they need to achieve maritime domain awareness (MDA) across diverse regions, as well as the ability to rapidly communicate, integrate, and analyze this information to facilitate effective and appropriate actions. Increasing MDA can contribute to numerous DHS mission sets, including counter drug, migrant interdiction, critical infrastructure surveillance, port and coastal surveillance, environmental monitoring, spill monitoring, fisheries enforcement, and security zone enforcement, and enforcement of laws and treaties.

The goal of this project is to research and integrate technologies that will enable the USCG to conduct more effective operations in support of any of their eleven statutory missions:

  • Port & Waterway Security
  • Drug Interdiction
  • Aids to Navigation
  • Search & Rescue
  • Living Marine Resources
  • Marine Safety
  • Defense Readiness
  • Migrant Interdiction
  • Marine Environmental Protection
  • Ice Operations
  • Law Enforcement

This program will concentrate on Intelligence, Surveillance, Reconnaissance (ISR) missions to provide situation awareness and critical law enforcement information using unmanned maritime systems (UMS).

Transition Opportunities:

The potential exists for commercialization of sensors across a broad spectrum of UMS platforms in the federal space. Potential also exists for the use of adapted sensors on platforms other than UMS.

Supporting Information and Links:

division icon
Securing Borders
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Cyberspace (SEC CYB)
Priority R&D Need:  Human Aspects of Cybersecurity-Associated/Related Efforts
Topic Number:  SEC CYB 02-03
Topic Title:  Cyber Risk Economics (CYRIE)
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Cybersecurity is a multidimensional problem that demands interdisciplinary attention. The CYRIE program supports research into the business, legal, technical, and behavioral aspects of the economics of cyber threats, vulnerabilities, and controls. CYRIE R&D emphasizes empirically based measurement, modeling, and evaluation of:
  • Investment into cybersecurity controls (technology, regulatory, and legal) by private-sector, government, and private actors
  • ... more
Cybersecurity is a multidimensional problem that demands interdisciplinary attention. The CYRIE program supports research into the business, legal, technical, and behavioral aspects of the economics of cyber threats, vulnerabilities, and controls. CYRIE R&D emphasizes empirically based measurement, modeling, and evaluation of:
  • Investment into cybersecurity controls (technology, regulatory, and legal) by private-sector, government, and private actors
  • Impact of investment on the probability, severity, and consequences of actual risks and resulting cost and harm
  • Value of the correlation between business performance measures and evaluations of cybersecurity investments and impacts
  • Incentives to optimize the investments, impacts and value basis of cyber risk management
less
Topic Research Type:  Type III
End Objective:

Priority R&D needs for this program are analytics and metrics for cybersecurity effectiveness, severity, and comparison. The CYRIE program endeavors to improve value-based decision making by those who own, operate, protect, and regulate the nation's vital data assets and critical infrastructure. As such, the program looks beyond the traditional economics view of incentives for cybersecurity, where individuals are assumed to be rational actors who know how to maximize their well-being, and considers a broader array of factors that include business, legal, technical, and behavioral factors. In this way, CYRIE R&D can more effectively address strategy and tactics for cyber risk avoidance, acceptance, mitigation, and transfer.

TRL Sought:  2-5
TRL at Conclusion:  6
Transition Customer or Program:

Application to Cyber Security Operations, Critical Infrastructure Operations, Law Enforcement, Incident and Disaster Response, and Businesses of all sizes

Background Information and S&T Challenges:

In 2013, two Executive actions were issued, aimed at enhancing the capability of owners and operators of the nation's critical infrastructure to protect their networks and systems against cyber attacks (Executive Order 13636, Improving Critical Infrastructure Cybersecurity, and Presidential Policy Directive 21, Critical Infrastructure Security and Resilience). These policy documents gave DHS a coordinating role in pursing the cybersecurity objectives outlined in each document and directed National Institute of Science and Technology (NIST) to develop a voluntary framework that owner/operators could use to improve their cybersecurity posture. DHS led an interagency working group focused on cyber economic incentives, and together, with the Departments of Commerce and Treasury, prepared an analysis of federal policy options for incentivizing adoption of the NIST framework. DHS S&T continues to maintain active engagement in the effort to understand and develop stronger cyber economic incentives through its R&D efforts and portfolio.

The working group and resulting analysis focused primarily on policy and incentives from a microeconomic-based view of marginal costs and benefits of adoption. While this analysis provided a solid start for the study of incentives in cybersecurity, a more holistic approach to research in the area of cyber risk economics is clearly needed that incorporates perspectives on security decisions and behavior from a wide range of social and behavioral sciences.

Recognizing the importance of data sharing to building capacity across the four dimensions (investment, impact, value, incentives), CYRIE supports the sharing of cybersecurity best practices, investments, incidents, and outcomes among diverse stakeholders. More collective information is needed to enable value-based risk management of the shared ecosystem. Effective information sharing can help mitigate against the often siloed view of risk, create positive network effects, and foster "RoS"(return on sharing) as an element of cyber risk management.

Transition Opportunities:

CYRIE supports the development and operationalization of technical and knowledge solutions to help the Transition Customer address capability gaps along any of the program's stated dimensions. The program also aims to inform the government about how it can reduce cyber risk levels through development and enforcement of policy and regulation, convening and coordination of stakeholders, adoption of technology, promulgation of standards, and facilitation of research and development.

Supporting Information and Links:
division icon
Securing Cyberspace
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Cyberspace (SEC CYB)
Priority R&D Need:  Network and Systems Security-Associated/Related Efforts
Topic Number:  SEC CYB 03-01
Topic Title:  Distributed Denial of Service Defense (DDoSD)
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Distributed Denial of Service Defense and Telephony Denial of Service Defense (DDoSD/TDoSD) - Denial of service attacks are pervasive and have the potential to disrupt critical network infrastructure. Proposals that identify, provide situational awareness for, mitigate, provide recovery techniques, or protection for networks such as the Internet, enterprise networks, emergency communications (e.g. Next Generation 9-1-1 (NG911)), or other critical infrastructure networks ... more
Distributed Denial of Service Defense and Telephony Denial of Service Defense (DDoSD/TDoSD) - Denial of service attacks are pervasive and have the potential to disrupt critical network infrastructure. Proposals that identify, provide situational awareness for, mitigate, provide recovery techniques, or protection for networks such as the Internet, enterprise networks, emergency communications (e.g. Next Generation 9-1-1 (NG911)), or other critical infrastructure networks are of interest. Situational Awareness, identification of, mitigation, recovery, and protection for communication channels such as voice, text, video, or other communication that may be received by NG911 are also of interest. less
Topic Research Type:  Type II
End Objective:

The end goal is mitigation of Distributed Denial of Service (DDoS) attacks or protection for relevant networks and communication channels from Denial of Service attacks.

Efforts that provide tools and/or techniques for situational awareness and identify Denial of Service (DoS) attacks on relevant networks and communications channels, including differentiating between DDoS and other disruptions on relevant networks are of interest. These disruptions may occur at various layers of the network.

Efforts that provide mitigation techniques/tools, recovery techniques/tools, or protection to relevant networks and communication channels are also of interest. These efforts may leverage existing policies and practices or adopt existing technologies for near term protection. Novel approaches for understanding and mitigating new forms of DDoS against relevant networks and communication channels are encouraged.

TRL Sought:  4 or above
TRL at Conclusion:  8-9
Transition Customer or Program:

Cybersecurity and Infrastructure Security Agency (CISA) Emergency Communications Division (ECD), CISA Critical Infrastructure

Background Information and S&T Challenges:

Denial of service attacks can affect many aspects of networking, from the application layer to the network itself. Attacks may be multi-pronged, using several attacks simultaneously or be used to distract from a more focused and damaging attack. For critical infrastructure, such as 911 systems, there have been deaths reported because the system was not available when needed.

The state of the art mitigation technique is to "scrub" the data, sending all the victim's data to a scrubbing center and removing the attack traffic while returning the "good" traffic to the victim. This approach can be quite expensive, beyond the means of many small to medium sized businesses. The drop rate for "good" traffic can border on the unacceptable as well. For some critical infrastructure networks such as a public safety answering point (PSAP), a TDoS attack or call flood can prevent the PSAP from answering emergency calls.

Significant work has been done in several areas of DDoS defense. In particular, authentication for voice calls is now available for several types of calls, such as calls from "do not originate (DNO)" phone numbers or numbers that have never been assigned to a phone. However, much work remains to solve the DDoS problem, especially for niche network types. In particular, very little work has been done to provide situational awareness for DDoS Defense, where other network disruptions may masquerade as a DDoS attack. Understanding the situation is critical to an appropriate response to the network issues. Some network types require adaptation of standard techniques/tools or creation of new techniques/tools to mitigate and recover from a DDoS attack.

DDoSD solutions should be low cost and available to resource-constrained small or medium sized businesses and municipalities.

Transition Opportunities:

There is a great need for DDoSD situational awareness, identification, mitigation recovery, and/or protection for relevant networks and communication channels. NG911 in particular is very vulnerable to TDoS attacks, as well as DDoS attacks from the network. Internet of Things (IoT) devices are often compromised and used in such attacks. Protecting relevant networks, such as those comprised of IoT devices in critical infrastructure (e.g. building controllers at facilities such as PIADC) is necessary, as is protecting other networks.

Some projects, such as those protecting 911 voice systems, have a cross-over market in-call center protection that is sustainable commercially.

division icon
Securing Cyberspace
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Cyberspace (SEC CYB)
Priority R&D Need:  Network and Systems Security-Associated/Related Efforts
Topic Number:  SEC CYB 03-02
Topic Title:  Federated Enterprise Environments (formerly Cloud Computing Security)
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Research and Development to build upon security in Federated Enterprise Environments including secure protocols to protect data flow to, within and out of the federated environment; command and control (C2) infrastructure for federated environments; incorporation of adaptive defenses into federated environments; preserving data integrity; privacy constraints; privacy-preserving computation/contract generation; and systems to identify unauthorized activity.
Research and Development to build upon security in Federated Enterprise Environments including secure protocols to protect data flow to, within and out of the federated environment; command and control (C2) infrastructure for federated environments; incorporation of adaptive defenses into federated environments; preserving data integrity; privacy constraints; privacy-preserving computation/contract generation; and systems to identify unauthorized activity. less
Topic Research Type:  Type III
End Objective:

Research and development results of this topic should provide innovative technologies, techniques, and processes towards the creation, operation, and maintenance of federated enterprise environments and the related C2 infrastructure. Objectives include enabling local decision making given global knowledge and the seamless incorporation of various cybersecurity technologies and techniques (Moving Target/Dynamic/Adaptive Defenses, privacy preserving and multi-party computing, deception, etc.) into federated enterprise environments. Results are also sought to protect any cloud-based infrastructure that enables federated enterprise environments.

TRL Sought:  4-7
TRL at Conclusion:  8
Transition Customer or Program:

Cybersecurity and Infrastructure Security Agency (CISA), Homeland Security Enterprise, DHS and Components with need for federated environments

Background Information and S&T Challenges:

This topic is seeking to address various challenges faced by Federal government entities and the Homeland Security Enterprise in the creation, operation, and maintenance of federated enterprise environments. Coordinating mechanisms are needed in order to provide reliable defenses that do not adversely affect usability or limit privacy protections. Additionally, a robust command and control capability is needed to coordinate defenses and make management of processes easier, faster, more reliable, and secure.

Transition Opportunities:

Developed solutions should transition to DHS Components, Federal, State and Local Government Agencies; the Homeland Security Enterprise Solutions may be brand new capabilities not currently available on the market or current solutions that can be modified to address specific needs. Some projects, such as those protecting 911 voice systems, have a cross-over market in-call center protection that is sustainable commercially.

division icon
Securing Cyberspace
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Cyberspace (SEC CYB)
Priority R&D Need:  Network and Systems Security-Associated/Related Efforts
Topic Number:  SEC CYB 03-04
Topic Title:  Predictive Analytics
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Predictive Analysis, as applied to cybersecurity, is the ability to identify potential cyber threat vectors and determine the probable course of action for each threat.
Predictive Analysis, as applied to cybersecurity, is the ability to identify potential cyber threat vectors and determine the probable course of action for each threat. less
Topic Research Type:  Type II
End Objective:

Predictive Analysis, as applied to cybersecurity, is the ability to identify potential cyber threat vectors and determine the probable course of action for each threat. These findings should be presented automatically, with human-in-the-loop if desired, but not required. Presentation should be in an easily understandable format, to allow resource management to address threats as they evolve. Predictive Analysis may be applied at any phase or stage, from fully protected to compromise and recovery. All types from fully protected to compromise and recovery. All types of cyber threats may be considered.

TRL Sought:  4 or Higher
TRL at Conclusion:  8-9
Transition Customer or Program:

Cybersecurity and Infrastructure Security Agency

Background Information and S&T Challenges:

Prediction of cyber threats allows the development of mitigation and recovery strategies before an attack occurs. With the collection of large data sets and machine learning or artificial intelligence algorithms, some cyber events may be predicted with enough time to do the required development, actually preventing or deflecting attacks so that little damage may occur. This is the cutting edge of cyber security, and requires large data sets and trust networks.

Transition Opportunities:

The Networking Information Technology Research and Development (NITRD) report by Martin Stanley of Cybersecurity and Infrastructure Security Agency (CISA) lists cyber analytics as a high priority item for CISA.

division icon
Securing Cyberspace
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Cyberspace (SEC CYB)
Priority R&D Need:  Network and Systems Security-Associated/Related Efforts
Topic Number:  SEC CYB 03-05
Topic Title:  Information Marketplace for Policy and Analysis of Cyber-risk & Trust
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
The Information Marketplace for Policy and Analysis of Cyber-risk & Trust (IMPACT) project supports the global cyber risk research community by coordinating and developing real world data and information sharing capability tools, models, and methodologies. To accelerate solutions around cyber risk issues and infrastructure security, the IMPACT project enables empirical data and information sharing between and among the global cybersecurity research and development (R&D) ... more
The Information Marketplace for Policy and Analysis of Cyber-risk & Trust (IMPACT) project supports the global cyber risk research community by coordinating and developing real world data and information sharing capability tools, models, and methodologies. To accelerate solutions around cyber risk issues and infrastructure security, the IMPACT project enables empirical data and information sharing between and among the global cybersecurity research and development (R&D) community in academia, industry, and government. Importantly, IMPACT also addresses the cybersecurity decision-analytic needs of Homeland Security Enterprise (HSE) customers in the face of high volume, high-velocity, high-variety and/or high-value data through its network of Decision Analytics-as-a-Service Providers (DASP). These resources are a service technology or tool capable of supporting the following types of analytics: descriptive (what happened), diagnostic (why it happened), predictive (what will happen) and prescriptive (what should happen). less
Topic Research Type:  Type III
End Objective:

The Department of Homeland Security (DHS) Science and Technology Directorate's (S&T) Office of Mission Capability Support (MCS) Physical and Cyber Security (PCS) Division seeks to coordinate, enhance, and develop advanced data and information sharing tools, datasets, technologies, models, methodologies, and infrastructure to strengthen the capabilities of national and international cyber risk R&D. These data sharing components are intended to be broadly available as national and international resources to bridge the gap between producers of cyber risk-relevant ground truth data, academic and industrial researchers, cybersecurity technology developers, and decision makers to inform their analysis of and policymaking on cyber risk and trust issues.

TRL Sought:  2-5
TRL at Conclusion:  6
Transition Customer or Program:

Application to Cyber Security Operations, Critical Infrastructure Operations, Law Enforcement, Incident and Disaster Response, and Day-To-Day Business, Public and Private Cyber Security Researchers

Background Information and S&T Challenges:

Cybersecurity R&D requires real world data to develop advanced knowledge, test products and technologies, and prove the utility of research in large scale network environments. IMPACT is the only publicly available, legally collected, distributed repository of large scale datasets containing real network and system traffic that could be used to advance state-of-the-art cybersecurity R&D. The centralized brokering and distributed provisioning between the data providers, data hosts, and researchers addresses the operational, trust, and administrative costs and challenges that impede sustainable and scalable data sharing. IMPACT continually adds new data that is responsive to cyber risk management (e.g. attacks and measurements) to provide the R&D community timely, high-value information to enhance research innovation and quality. The IMPACT model also serves as a laboratory for testing various data sharing models, including batch transfers, newer Data Analytics as a Service (DaaS), and visualization techniques.

Transition Opportunities:

Transition data, decision analytics, and capabilities outputs to the cybersecurity research community.

division icon
Securing Cyberspace
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Cyberspace (SEC CYB)
Priority R&D Need:  Network and Systems Security-Associated/Related Efforts
Topic Number:  SEC CYB 03-06
Topic Title:  National Research Infrastructure of Cyber Security Experimentation
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
When new or updated tools and techniques are developed, the first step is to test them in a restricted environment. Testing always reveals subtleties in the environment that mandate changes to any new tool or technique. The DETER is such an environment and is required for testing, especially for Distributed Denial of Service tools and techniques as they are developed.
When new or updated tools and techniques are developed, the first step is to test them in a restricted environment. Testing always reveals subtleties in the environment that mandate changes to any new tool or technique. The DETER is such an environment and is required for testing, especially for Distributed Denial of Service tools and techniques as they are developed. less
Topic Research Type:  Type III
End Objective:

The primary objective is to have a mature testbed that can be used to test and validate claims from various projects, in particular the DDoSD projects.

The results of this topic will catalyze and support the research and development of advanced experimental research tools, technologies, and methodologies as broadly available national resources. Indicators of the success of this program objective will be the realization of experimental research capabilities and approaches that reach beyond today's state of the art.

TRL Sought:  8-9
TRL at Conclusion:  9
Transition Customer or Program:

Distributed Denial of Service (DDoSD) projects

Background Information and S&T Challenges:

Extensive testing and evaluation is required before any new tool or technique goes "live" on a real network. This testing generally starts in a testbed environment where conditions can be tightly controlled, then progresses to more realistic environments. The first step in testing is required for any project to get out of the development stage and into operations.

Transition Opportunities:

The DETER testbed is used not only by DHS projects to test and validate results, but also to train new cyber professionals in a controlled environment, where mistakes do not have operational consequences.

division icon
Securing Cyberspace
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Cyberspace (SEC CYB)
Priority R&D Need:  Network and Systems Security-Associated/Related Efforts
Topic Number:  SEC CYB 03-07
Topic Title:  IMPACT Data Catalogue
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
The Information Marketplace for Policy and Analysis of Cyber-risk & Trust (IMPACT) is a data catalogue with access protections.
The Information Marketplace for Policy and Analysis of Cyber-risk & Trust (IMPACT) is a data catalogue with access protections. less
Topic Research Type:  Type III
End Objective:

The end objective is to have data available for research, development, testing and training. The data shall be managed for access and to meet all data provider requirements.

The Information Marketplace for Policy and Analysis of Cyber-risk & Trust (IMPACT) project supports the global cyber-risk research community by coordinating and developing real world data and information sharing capabilities, tools, models, and methodologies. To accelerate solutions around cyber-risk issues and infrastructure security, the IMPACT project enables empirical data and information sharing between and among the global cybersecurity research and development (R&D) community in academia, industry, and government. Importantly, IMPACT also addresses the cybersecurity decision-analytic needs of Homeland Security Enterprise (HSE) customers in the face of high volume, high velocity, high variety, and/or high value data through its network of Decision Analytics-as-a-Service Providers (DASP). These resources are a service technology or tool capable of supporting the following types of analytics: descriptive (what happened), diagnostic (why it happened), predictive (what will happen), and prescriptive (what should happen).

TRL Sought:  8-9
TRL at Conclusion:  9
Transition Customer or Program:

Application to Cyber Security Operations, Critical Infrastructure Operations, Law Enforcement, Incident and Disaster Response, and Day-To-Day Business, Public and Private Cyber Security Researchers

Background Information and S&T Challenges:

Reproducibility of research results has been an issue for a long time for cybersecurity. The Internet is constantly changing, and running two experiments even a short time apart can lead to different results. Data sets collected for specific events, such as DDOS attack traffic, is required for research and development of tools and mitigation techniques.

Data sets are also used for training and planning purposes. In short, having good data available leads to good research, development, and tools that meet the needs of DHS.

Transition Opportunities:

Data sets are used at CISA and also by many academic and commercial researchers and developers.

division icon
Securing Cyberspace
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Cyberspace (SEC CYB)
Priority R&D Need:  Mobile Security-Associated/Related Efforts
Topic Number:  SEC CYB 04-02
Topic Title:  Mobile Security & Resiliency R&D
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
The research and development of creating or enhancing technologies to enable the secure and/or resilient use of mobile ecosystem technologies in support of the DHS mission. Areas of interest include: 5G, mobile supply chain, security analysis, mobile infrastructure resilience, emergency communications, mobile vulnerability analysis, mobile communication security protocol analysis, and security.
The research and development of creating or enhancing technologies to enable the secure and/or resilient use of mobile ecosystem technologies in support of the DHS mission. Areas of interest include: 5G, mobile supply chain, security analysis, mobile infrastructure resilience, emergency communications, mobile vulnerability analysis, mobile communication security protocol analysis, and security. less
Topic Research Type:  Type I
End Objective:

The development of technologies that secure and add resilience to the mobile ecosystem that support DHS use cases.

TRL Sought:  3
TRL at Conclusion:  7
Transition Customer or Program:

CISA, CBP, FEMA, TSA, Civilian Federal Government, DoD

Background Information and S&T Challenges:

The DHS Study on Mobile Device Security identified threats to, and security challenges in, mobile network infrastructure that could negatively impact the Government's use of mobile technologies. It also identified the need for government research and development (R&D) to address the risks. R&D is still needed to develop and implement improvements in security and resilience of critical mobile communications networks to enable DHS use-cases.

Transition Opportunities:

The Mobile Security R&D program is partnering with all DHS components and collaborating with several organizations to facilitate piloting, transition, and adoption of the technologies developed under the program. This provides an opportunity to fine-tune requirements, align to and influence development of federal standards or criteria, and conduct pilots with real-world applications. The partners will provide support in developing requirements and use cases, providing information, insights, and access to information technology architecture, offering feedback and evaluation of developed R&D, and contributing in-kind resources associated with testing.

division icon
Securing Cyberspace
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Cyberspace (SEC CYB)
Priority R&D Need:  Software Assurance - Associated/Related Efforts
Topic Number:  SEC CYB 06-01
Topic Title:  Software Assurance
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
The research and development of tools and techniques to reduce vulnerabilities in software and improve how security is addressed in the process of developing and vetting software applications.
The research and development of tools and techniques to reduce vulnerabilities in software and improve how security is addressed in the process of developing and vetting software applications. less
Topic Research Type:  Type III
End Objective:

Develop or provide software assurance tools, including making combinations of tools easier to use and to understand the results of such tools. This may be provided as a cloud service or as a stand-alone product. Both static and dynamic analysis tools or access to tools are desired. Code coverage metrics should be provided for any tools proposed or supported.

Additional desired activities include improving the software assurance ecosystem in novel or unique ways. This allows for a broad spectrum of activities, limited only by the creativity of the proposer.

TRL Sought:  6 or higher
TRL at Conclusion:  9
Transition Customer or Program:

National Risk Management Center (NRMC)

Background Information and S&T Challenges:

Software errors remain prominently in cybersecurity breaches; even in good to excellent code, there are thousands of errors that may be exploited for every million lines of code. There is much work to be done in this area, from training students to security when coding, encouraging software developers to actually use software assurance tools, and ensuring the tools themselves are effective in discovering errors that need correction.

Transition Opportunities:

Cybersecurity and Infrastructure Security Agency (CISA) has listed software assurance as an area of interest.

division icon
Securing Cyberspace
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Securing Cyberspace (SEC CYB)
Priority R&D Need:  Cyber Security Outreach - Associated/Related Efforts
Topic Number:  SEC CYB 07-01
Topic Title:  Cyber Security Education
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Applied research in key education and training areas, to help ensure the nation has a highly skilled cybersecurity workforce is important to maintaining its systems and networks and combating future cyberattacks. Other areas of interest include:

  • The coupling of operations with education and training;
  • Abstract learning versus learning with context;
  • Bayesian learning (prior knowledge) and where and how it might be applicable;
  • more
Applied research in key education and training areas, to help ensure the nation has a highly skilled cybersecurity workforce is important to maintaining its systems and networks and combating future cyberattacks. Other areas of interest include:

  • The coupling of operations with education and training;
  • Abstract learning versus learning with context;
  • Bayesian learning (prior knowledge) and where and how it might be applicable;
  • Incident response feedback systems, that drive subsequent training/learning directions;
  • Regional education and learning models coordinating efforts across different kinds of organizations.
less
Topic Research Type:  Type II
End Objective:

The objective is to develop, demonstrate, and transition substantive and adaptive cyber security education models that impact organizations and infrastructures/sectors for the better. These models should address key dimensions of the challenge, such as multiple age levels, cyber security across multiple operational domains, and different kinds of threats. An overarching objective of this work is to support development of "learning organization" capabilities across all kinds of organizations and infrastructures/sectors. The models and associated technologies need to support cybersecurity competitions, education and curriculum development, and workforce training and development needs.

TRL Sought:  2-5
TRL at Conclusion:  6
Transition Customer or Program:

Cybersecurity and Infrastructure Security Agency (CISA), Homeland Security Enterprise, Other DHS Components

Background Information and S&T Challenges:

This topic is seeking to address various challenges faced by Federal government entities and the Homeland Security Enterprise in regards to addressing the Nation's shortage of skilled cybersecurity professionals.

Transition Opportunities:

Developed solutions should transition to federal and Homeland Security Enterprise end users.

division icon
Securing Cyberspace
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Preventing Terrorism (PREV)
Priority R&D Need:  Prevention
Topic Number:  PREV 04-02
Topic Title:  Vehicle Ramming Mitigation Technology
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Terrorists and other violent extremists have demonstrated an interest in leveraging simple and less sophisticated methods to inflict harm and disrupt infrastructure operations. As highlighted by incidents both domestically and abroad, vehicle ramming has become a common attack vector that is difficult to prevent given there are few to no identifiable indicators.
Terrorists and other violent extremists have demonstrated an interest in leveraging simple and less sophisticated methods to inflict harm and disrupt infrastructure operations. As highlighted by incidents both domestically and abroad, vehicle ramming has become a common attack vector that is difficult to prevent given there are few to no identifiable indicators. less
Topic Research Type:  Type I
End Objective:

This project aims to develop a capability that can be commercialized to enhance security against the vehicle ramming threat, with particular emphasis on special events.

TRL Sought:  2
TRL at Conclusion:  5
Transition Customer or Program:

CISA and public and private sector owners and operators of critical infrastructure and manufacturers, distributors, and retailers of commercial vehicle ramming mitigation technology

Background Information and S&T Challenges:

Through CISA's partnership, it is apparent that there is no cost effective, easy to use, and commercially available vehicle ramming mitigation technologies that can be leveraged as part of security procedures. As a result, security planners have to use larger vehicles or expensive, immobile barriers to create perimeters around a special event. There are also significant limitations on budgetary impacts from liability and restoration.

Transition Opportunities:

The end users would be public and private sector stakeholders responsible for security during special events. These events include sporting events, festivals, parades, and many other events often limited in the level of support received from local law enforcement and other levels of government, making the implications of this technology extremely vast. The number of potential lives saved can amount to hundreds or thousands depending on the type of event, support received from local law enforcement and federal government if identified as a National Special Security Event (NSSE) or Special Events Assessment Rating (SEAR) 1-5, and location of the venue.

division icon
Preventing Terrorism
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Preventing Terrorism (PREV)
Priority R&D Need:  Advanced Analytics
Topic Number:  PREV 05-01
Topic Title:  Advanced Analytics for Next Generation Homeland Security Missions
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 

The Data Analytics Technology Center (DA-TC) invests in research, innovative solutions, and emerging technologies to enable advanced analytics for Next Generation Homeland Security Missions. Facilitating data driven solutions demands cross-cutting work on computation, data management, advanced analytics, technical architecture, and the underlying policy and for using enterprise data sets for cross mission applications.

Areas of interest to DA-TC that focus ... more

The Data Analytics Technology Center (DA-TC) invests in research, innovative solutions, and emerging technologies to enable advanced analytics for Next Generation Homeland Security Missions. Facilitating data driven solutions demands cross-cutting work on computation, data management, advanced analytics, technical architecture, and the underlying policy and for using enterprise data sets for cross mission applications.

Areas of interest to DA-TC that focus on technical architecture include distributed storage systems, block chain applications for privacy protecting information sharing and analytics, and secure multi-party computation. Effective data analytics requires reliable data, so that DA-TC is also focused on solutions to enable data wrangling and preparation as well as entity resolution.

DA-TC investigates the potential of advanced and emerging analytics capabilities to support the Homeland Security Mission, including advanced computational concepts, analytics and visualization, machine learning and deep learning, human centered systems, analytics for the Internet of Things (IOT), large-scale analytics on publicly available information including social media, real-time analytics for multi-party, multi-latency, metro-scale networks, human-centered systems, and quantum information science.

Nearly all DA-TC research and development undertakings also have important policy implications. A few of DA-TC's areas of interest highlight the cross-cutting nature of technical and policy considerations such as countering foreign influence, cyber security and cyber-physical security, election security, infrastructure protection, emergency management, and decision support and business processes, advanced privacy and security concepts, and adversarial machine learning.

less
Topic Research Type:  Type I
End Objective:

Develop capabilities that will increase the Department's ability to leverage data for decision-making.

TRL Sought:  1
TRL at Conclusion:  7
Transition Customer or Program:

Various customers throughout DHS, including the homeland security enterprise and supporting agencies.

Background Information and S&T Challenges:

The Data Analytics Technology Center (DA-TC) advises DHS and the larger Homeland Security Enterprise (HSE) on advanced data analytics tools, storage, and computational techniques that increase the effectiveness of the government's homeland security missions. DA-TC engages in rapid prototyping, independent assessments of emerging technologies, and strategic research and development.

Transition Opportunities:

Transition opportunities include DHS Components and partners in the homeland security enterprise.

Supporting Information and Links:

division icon
Preventing Terrorism
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Managing Incidents (MGMT)
Priority R&D Need:  Situational Awareness
Topic Number:  MGMT 01-01
Topic Title:  Alerts, Warnings, and Notifications Program Planning
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Research and development of Alerts, Warnings, and Notifications (AWN) tools, materials, and strategies for State, Local, Territorial, and Tribal (SLTT) alert originators that foster more effective AWN program planning and reduced alerting delays.
Research and development of Alerts, Warnings, and Notifications (AWN) tools, materials, and strategies for State, Local, Territorial, and Tribal (SLTT) alert originators that foster more effective AWN program planning and reduced alerting delays. less
Topic Research Type:  Type II
End Objective:

Conduct research and pilots; and develop Alerts, Warnings, and Notifications (AWN) program planning guidance on how to build an effective AWN Program (e.g., Standard Messaging Templates, Hazard Matrices, Training Standards, Metrics, and Advocacy Materials for key decision makers) with planning artifacts for State, Local, Territorial, and Tribal (SLTT) alert originators.

TRL Sought:  3-4
TRL at Conclusion:  7
Transition Customer or Program:

Department of Homeland Security (DHS) Federal Emergency Management Agency (FEMA) Integrated Public Alert and Warning System (IPAWS) Program Management Office (PMO)

Background Information and S&T Challenges:

S&Ts recently developed AWN program planning guidance:

  • The Report on Alerting Tactics provides recommendations on effective combinations of alerting tactics for various incident types based upon lessons learned from practitioners.
  • The Common Alerting Protocol (CAP) Assessment Guide examines the current version of the CAP standard and whether modifications are necessary for the standard to keep pace with the evolution of the alerts and warnings ecosystem.
  • Alerts, Warnings, and Notifications (AWN) Guidance Materials help agencies plan for enhanced AWN, providing both guidance for, and a measure of how to successfully address alerting issues in totality. These tools and solutions most closely align with the S&T emergency communications strategic program area.

Transition Opportunities:

Projects in support of this topic will empower FEMA to (1) increase the number of SLTT alerting authorities using the IPAWS system, and following its requirements; (2) support alert originator education and guidance on best practices for modern and accessible AWN to enhance emergency messaging; and (3) address ad-hoc public alerting procedures and processes to support standardized local, regional, or national AWN planning.

Supporting Information and Links:

division icon
Managing Incidents
Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps
Research Area:   Managing Incidents (MGMT)
Priority R&D Need:  Communications
Topic Number:  MGMT 02-01
Topic Title:  Resilient Position, Navigation, and Timing (PNT)
Solicitation:  ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
Topic Description: 
Accurate position, navigation, and timing (PNT) information is important for the functioning of many critical infrastructure sectors. Disruption of PNT services can hamper the operational capabilities of critical infrastructure operations that rely on precision timing or positioning. This topic seeks technologies that can improve resilience for PNT end-users to include:

1. disruption alerting and mitigation technologies;
2. technologies that will enabl ... more
Accurate position, navigation, and timing (PNT) information is important for the functioning of many critical infrastructure sectors. Disruption of PNT services can hamper the operational capabilities of critical infrastructure operations that rely on precision timing or positioning. This topic seeks technologies that can improve resilience for PNT end-users to include:

1. disruption alerting and mitigation technologies;
2. technologies that will enable end-users to continue normal operations through timing disruption events
3. technologies that provide novel timing capabilities.

Offerors should consider the operational environment of timing end-users in critical infrastructure and factors that would facilitate successful transition/adoption. These factors include, but are not limited to, ease of integration into existing operational environments, price, and reliability. These considerations should be part of an Offeror's transition strategy. less
Topic Research Type:  Type III
End Objective:

A technology that improves PNT resilience, is likely to be adopted by critical infrastructure PNT end-users, and has a path to transition and/or commercialization.

TRL Sought:  7-9