id
stringlengths 15
4.64k
| text
stringlengths 0
1.02M
|
---|---|
http://www.spectrumondemand.com/tv/bet/14194296/tales_p0
|
Spectrum | On Demand Spectrum Time Warner Cable | Spectrum {{navItem.name}} TV {{provider.Name}} {{page.model.PageData.Series.DisplayTitle}} Episodes {{grouping.Name}} Manage Account Account Summary Billing TV Internet Voice Settings Get Support Support Home TV Internet Voice Account Support Watch TV Live TV Guide On Demand DVR My Library © 2019 Charter Communications Your Privacy Rights Policies Go to Assist On Demand service available to residential customers only who subscribe to Spectrum TV™ in Digital, TV Select or above. On Demand programming varies by level of service; pricing, ratings and scheduling are subject to change. Trademarks belong to their respective owners. {{page.dialogModalText}}
|
http://www.thebarleyblog.com/2007/session-3-announced-the-mysterious-misunderstood-mild/_p0
|
Session #3 Announced: The Mysterious Misunderstood Mild - The Barley Blog The Barley Blog The BarleyBlog Discussing, exploring and reviewing all things beer since 2006. Learn more Toggle Menu Beer Reviews Beer News Virginia Beer Maryland Beer D.C. Beer About Contact Apr 11, 2007 Session #3 Announced: The Mysterious Misunderstood Mild Session #3 Announced: The Mysterious Misunderstood Mild The Session #3 has been announced and I’m pretty excited since I’m not wholly familiar with the style. It’s time to do some reading and keep an eye out for something special. Update: for those like myself who aren’t all that in the know on milds, here’s plenty of information on the style. More: Share: Session #3 Announced: The Mysterious Misunderstood Mild You May Also Like Categories Advertising Beer Bourbon Commentary Maryland Beer Notes Press Reviews Site News T-shirts The Cellar/Fridge The Session Virginia Beer Washington D.C. Beer Yearly Archives 2019 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 © 2006 - 2019 The Barley Blog
|
http://www.uhbristol.nhs.uk/patients-and-visitors/your-hospitals/bristol-royal-hospital-for-children/what-we-do/paediatric-physiotherapy/services/_p0
|
Bristol Royal Hospital for Children - What we do | University Hospitals Bristol NHS Foundation Trust Skip to content Accessibility Accessibility Font Size: A A A Become a member Our charities Sign in Home Patients and visitors Your hospitals Map of our hospitals Visiting hours Bristol Eye Hospital Bristol Haematology and Oncology Centre Bristol Heart Institute Bristol Royal Hospital for Children Bristol Royal Infirmary Unity Sexual Health South Bristol Community Hospital St Michael's Hospital University of Bristol Dental Hospital Central Health Clinic Patients Preparing to visit hospital Welcome Guide Travelling to and from our hospitals About your stay at hospital Recognising our staff Facilities After your treatment Patient information Support for patients How to make a complaint Transition from children's to adult services Patient experience and involvement Overseas patients Private patients Infection control Clinical audit Visitors and carers Carers Visiting hours About us Who we are Our mission, vision and values How we are managed Our performance - how we are doing Our work - transforming care Diversity and inclusion Reports and findings relating to the children's hospital Freedom of Information Key Publications Privacy Notice - what we do with your data Sharing information for Connecting Care Our charities and fundraising Research & Innovation Research at UH Bristol Our research Information for patients and the public Information for researchers Is your study research, audit or service evaluation?
|
http://www.uhbristol.nhs.uk/patients-and-visitors/your-hospitals/bristol-royal-hospital-for-children/what-we-do/paediatric-physiotherapy/services/_p1
|
Work for us Current vacancies Why University Hospitals Bristol? What is the recruitment process? Nursing and Midwifery - Proud to Care Bank recruitment Apprenticeships Volunteering Work experience Education, learning and development Bristol Recognition and reward Reservists Love Life, Love Bristol Agency/Locum For clinicians How to refer Consultant profiles Clinical Guidelines Clinical audit UHB-HODS Occupational Health Medical Illustration Patient surveys, interviews and focus groups Medical Physics and Bioengineering Library and Information Service MEMO Clinical Engineering South West Critical Care Network Contact us Contact us home Paediatric Physiotherapy Services Paediatric Physiotherapy Barth Syndrome Haemophilia Medical Respiratory Musculoskeletal Service Multi-level Surgeries Neonatal Physiotherapy Neurodevelopmental Physiotherapy Selective Dorsal Rhizotomy (SDR) Oncology Orthotics Rheumatology Talipes Development Dysplasia of the Hips (DDH) Cystic Fibrosis Complex Movement Disorder Service Trauma Orthopaedics Limb Reconstruction Osteogenesis Imperfecta Services The physiotherapy department at the Bristol Children's hospital treat a vast range of conditions and patients in a variety of settings. We are a specialist team of therapists who work closely with a range of other professionals. Find our specialist teams below: Therapy manager Louise Lloyd - 0117 342 8525 Main Department Reception Lesley Cattell, Charelle Bond - 0117 342 8525 Services Barth syndrome Hannah Bassett - 0117 342 8525 Burns Beth Kershaw-Naylor - 0117 342 8525 Haemophilia Lucy Buckley - 0117 342 8525 Respiratory Cystic Fibrosis Kate Lindsay, Helen Mcgowan - 0117 342 8066
|
http://www.uhbristol.nhs.uk/patients-and-visitors/your-hospitals/bristol-royal-hospital-for-children/what-we-do/paediatric-physiotherapy/services/_p2
|
Medical Respiratory Sarah Hornsby - 0117 342 8525 PICU Christina Linton - 0117 342 8525 NICU Sophie Coles - 0117 342 8525 Neurosciences Selective Dorsal Rhizotomy (SDR) Jenny Smith, Alison Burchell - 0117 342 8675 Complex Movement Discorder Service (ITB & DBS) Alison Burchell - 0117 342 8675 Oncology Lucy Buckley - 0117 3342 8525 Neonatal Amy Warren - 0117 342 8525 Neurodevelopmental Amy Warren - 0117 342 8525 Neuromuscular Victoria Selby - 0117 342 8715 Neurorehabilitation Lisa Hutchens - 0117 342 8715 Orthopaedics Talipes Debbie McMillan - 0117 342 8525 Development Dysplasia of the Hips (DDH) Debbie McMilllan - 0117 342 8525 Trauma Niamh O'Mahony - 0117 342 8525 Limb Reconstruction Niamh O'Mahony - 0117 342 8525 Musculoskeletal Petre Grove - 0117 342 8525 Rheumatology Jo Walton - 0117 342 8525 Osteogenesis Imperfecta Hannah Bassett - 0117 342 8525 Multilevel Surgery Caroline Penney, Jenny Anstead - 0117 342 8525 Botulinum Toxin Caroline Penney, Jenny Anstead - 0117 342 8525 Orthotics Kevin Mann - 0117 342 8525 Scoliosis Lisa Hutchens - 0117 342 8525 About us Media centre Freedom of information Legal information Our charities Contact us Site map Accessibility Follow us Share © Copyright University Hospitals Bristol NHS Foundation Trust 2012 | Web Design Bristol
|
http://www.wtfjapanseriously.com/2011/10/mitokano.html?showComment=1319146849756_p0
|
WTF Japan Seriously: Mitokanaito skip to main | skip to sidebar Powered by Blogger. Mitokanaito Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest 16 comments: Anonymous October 20, 2011 at 7:18 AM Japan wai u not let me watch ლ(ಠ益ಠლ) ReplyDelete Replies Reply Matt Halbach October 20, 2011 at 11:39 AM This WTF is WAY BEYOND WORDS, especially when they inverted the colors of the video towards the end...that was pretty creepy. ReplyDelete Replies Reply Anonymous October 20, 2011 at 2:40 PM japan, you're not nice :'( ReplyDelete Replies Reply Anonymous October 20, 2011 at 4:36 PM Nope. Nothing weird going on here at all. Seriously though. Nothing at all. You guys are pussies. ReplyDelete Replies Reply Anonymous October 20, 2011 at 6:21 PM Is this...for children? God help our future generations. ReplyDelete Replies Reply Anonymous October 20, 2011 at 6:41 PM Video only werks in merica. ReplyDelete Replies Anonymous February 1, 2012 at 8:00 AM Not in Chicago, apparently. Delete Replies Reply Reply Anonymous October 20, 2011 at 7:20 PM all you need is laser beams and then its complete ReplyDelete Replies Reply Anonymous October 20, 2011 at 8:12 PM LOL!! catchy song! ReplyDelete Replies Reply Maekir Vilemist October 21, 2011 at 6:24 AM Um... What? ReplyDelete Replies Reply Anonymous October 21, 2011 at 4:39 PM i can't watch this fucking video, because isn't availible in my country
|
http://www.wtfjapanseriously.com/2011/10/mitokano.html?showComment=1319146849756_p1
|
ReplyDelete Replies Reply Anonymous October 22, 2011 at 1:21 AM If you want to see this in any case, I've put it on Dailymotion : http://www.dailymotion.com/video/xlt9z3_mitokanaito_fun . Have fun ^^ ReplyDelete Replies Reply Anonymous October 22, 2011 at 7:02 AM thanks for reuploading it there :D reminds me somehow of http://youtu.be/WAmvBvUz5RE ReplyDelete Replies Reply Anonymous October 22, 2011 at 10:50 PM I now know how to take off my goggles after a swim in the pool. Thank you, Japan! ReplyDelete Replies Reply Anonymous October 23, 2011 at 7:35 AM Thanks for the re-up! ReplyDelete Replies Reply Anonymous February 15, 2012 at 7:26 PM Strange that "mitocana" is Romanian for "vulgar woman"... ReplyDelete Replies Reply Add comment Load more... Newer WTFs Older WTFs Home Subscribe to: Post Comments (Atom) Search WTFJS Categories Commercials (91) Images (118) Japanese TV (49) Music Videos (56) Trailers (19) WTF Japan Seriously!? Contact us Do you have a video you'd like to see on WTFJS? Email us a link, or just say hi at [email protected]
|
https://2020nissan.com/nissan/nissan-qashqai-2020-release-date_p0
|
nissan qashqai 2020 release date | 2020 Nissan Skip to content 2020 Nissan Release date, Price, Redesign, Interior Color and Spy Photo Menu Rogue Pathfinder Altima Frontier Leaf Juke Murano Maxima Titan GTR August 1, 2018 2020 Nissan Qashqai Review, Price, And Specs By T T Qashqai 0 Comments australia nissan qashqai 2020 canada 2020 quashqai canada 2020 nissan qasqai review 2020 nissan quash quai reviews 2020 qashqai canada nissan 2020 qashqai canada reviews of nissan qashqai canada 2020... Read More July 30, 2018 2020 Nissan Maxima Redesign, Concept, And Release Date By T T Maxima 0 Comments $ 30,000. Related Post: nissan versa sr 2020 2020 nissan lineup 2020 nissan micra canada 2020 Nissan Versa Canada 2020 nissan maxima platinum reserve 2020 nissan sports car 2020 NISSAN... Read More February 27, 2019 2020 Nissan Qashqai Safety Update, Transmission Change, Redesign By T T Qashqai 0 Comments Nissan Qashqai Price and Release Date The Nissan Qashqai could attack the market place at the conclude of 2020. The new creation release will very first in 2020. Expect to... Read More July 30, 2018 2020 Nissan 370Z Price, Specs, And Release Date By T T 370Z 0 Comments the large car seats give excellent area-keeping. 2020 Nissan 370Z Interior 2020 Nissan 370Z Engine Whenever the actual 2020 Nissan 370Z appeared on the marketplace, it entirely was run by...
|
https://2020nissan.com/nissan/nissan-qashqai-2020-release-date_p1
|
Read More August 2, 2018 2020 Nissan Murano Redesign, Price, And Release Date By T T Murano 0 Comments pictures nissan murano 2020 colours 2020 murano colors 2020 nissan convertable 2020 nissan murano convertible 2020 nissan nv colors murano 2020 PRECIO 2020 murano interior colors 2020 Nissan Murano Redesign... Read More Posts navigation 1 2 3 … 105 Recent Posts 2021 Nissan Z Redesign, Release Date, Changes, Specs 2021 Nissan Kicks SR Redesign, Release Date, Changes, Price 2021 Nissan Murano V6 Engine Performance, Changes, Release Date 2021 Nissan Armada V8 Performance, Interior Changes, Release Date 2021 Nissan Sentra Redesign, Interior Changes, Release Date 2021 Nissan Altima Redesign, Release Date, Interior Changes 2021 Nissan Murano V6 Performance, Changes, Release Date, Price 2021 Nissan Juke Interior Changes, Release Date, Redesign 2021 Nissan Pathfinder Engine Performance, Redesign, Release Date 2021 Nissan Rogue Hybrid Redesign, Release Date, Specs Popular Search Terms versa 2020 2020 nissan leaf 2020 nissan sentra 2020 quashquai colors sentra 2020 2020 nissan rogue redesign 2020 nissan gtr 2020 370z [keyword] nissan sentra 2020 2020 Nissan 2021 Nissan Z Redesign, Release Date, Changes, Specs 2021 Nissan Kicks SR Redesign, Release Date, Changes, Price 2021 Nissan Murano V6 Engine Performance, Changes, Release Date Categories Categories Select Category 370Z Altima Armada Frontier GTR IDX IMQ Juke Kicks Lannia Leaf Maxima Mirca Murano Navara Note Pathfinder Patrol Qashqai Quest Rogue Sentra Silvia Teana Titan Versa Vision Gran Turismo X-Trail Xterra
|
https://2020nissan.com/nissan/nissan-qashqai-2020-release-date_p2
|
Recent Search 2020 nissan maxima 0-60 2020 nissan convertable 2020 navara stx Pages About Us Contact Cookie Policy Digital Millennium Copyright Act Notice Privacy Policy Terms of Use 2020 Nissan Copyright © 2019. Theme by MyThemeShop. Back to Top ↑
|
https://ae.pricena.com/en/home-appliances/garment-care/irons/page/48?ref=relatedproducts_p0
|
Irons UAE | Best prices Page 48 Pricena Pricena Middle East SaudiEgyptKuwaitQatar Pricena International NigeriaSouth AfricaIndia عربي Log in / Sign Up My Reviews My Favorites My History My Alerts My Reviews All categories Mobiles, Tablets & Wearables Mobile Phones Tablets & EReaders Mobile & Tablets Accessories Wearables Computers Laptops Desktop & All-in-One Computers Monitors Mice, Keyboards & Input Devices Printers and Inks Scanners Hard Drives & Storage Networking & Wireless Accessories Software Computer Parts Servers Cameras Digital Cameras Camcorders Camera Accessories Binoculars, Telescopes & Optics Drones TV & Video TV Home Theater Projectors & Screens Players TV Accessories Receivers and Amplifiers Video Games & Consoles PC & Mac Games Xbox 360 Games PlayStation 3 Games PlayStation 2 Games PSP Games PS Vita Games Wii Games Nintendo 3DS Games Nintendo DS Games Video games accessories Consoles Xbox One Games PlayStation 4 Games Nintendo Switch Games Audio Music Players Home audio Headphones & Speakers CD players & radios Satellite radios Recording equipment Audio accessories Office Supplies Desk-Phones Security Products Fax Machines Shredders Laminators Calculators Stationary Alarm systems Filing Accessories Binding Machines & Supplies Label & Barcode Printers ID Card Printer & Supplies Typewriters Cash Handling Equipment More... Time Recorder, Cards & Racks Interactive Whiteboards Safes Office Furniture & Cabinets Pantry & Janitorial Paper Products Whiteboards, Flipcharts & Bulletin Boards Projector Screens
|
https://ae.pricena.com/en/home-appliances/garment-care/irons/page/48?ref=relatedproducts_p1
|
Point of Sale Commercial Scale Machines Warehouse Equipment and Supplies Copier Home Appliances Washers & Dryers Kitchen Appliances Climate Control Home Necessities Garment Care Sewing Machines & Accessories Vacuum Cleaners Power Tools Electrical Accessories Power Supplies Weather Gadgets Personal Care & Beauty Personal Care for Women Health monitors Massagers Relaxation Weighting Scales Makeup & Accessories Personal Care for Men Dental Care Car Parts & Accessories Car Accessories Car Audio Car Navigation Car Video Tyre Pressure Gauges Batteries & Lubricants Interior Accessories Exterior Accessories Travel & Lifestyle Alloy wheels Compressor Men Fashion Men Perfumes Men Jewellery Men Shoes Men Clothing Men Sportswear Men Bags Men Accessories Unisex Perfumes Women Fashion Women Perfumes Women Jewellery Women Shoes Women Clothing Women Sportswear Women Bags Women Accessories Books Business & Investment Children Books Comics & Graphic Novels Cooking & Food Fiction Health, Mind & Body Non-Fiction Biography Parenting & Families Self Help Languages & Dictionaries Travel Religion Photography & Art More... Crafts & Hobbies Science & Technology Outdoor Education & Reference Others Best Sellers Textbooks Audio Books eBooks Medical Books Architecture Design Arabic Books Sports Equipment Football Squash Tennis Table Tennis Badminton Basketball Golf Boxing Running Cycling & Skating Swimming Hiking & Outdoor Fitness Fooseball More... Snooker & Pool Darts Board Games Sports Bottles Bands Scuba Diving Sky Diving Billiard, Pool & Snooker Cricket Hunting
|
https://ae.pricena.com/en/home-appliances/garment-care/irons/page/48?ref=relatedproducts_p2
|
Fishing Volleyball Sports Supplements More... Furniture, Home and Garden Home Decor and Accessories Furniture Outdoor Kitchenware Textile Pet Accessories Bar Accessories Travel and Luggage Carry-ons Travel Accessories Luggage Travel Packages Umbrellas Baby & Kids Toys Strollers, Gear & Accessories Diapers, Bath & Skincare Nursery Feeding & Nursing Baby Monitors Girls Clothing Girls Shoes Girls Accessories Boys Clothing Boys Shoes Boys Accessories Baby Shoes Baby Walkers More... Baby Cribs Health & Medical Nutrition Vitamins & Herbals Cold, Cough & Flu Mouth Care Pain & Sleep Medicine Stomach & Digestion Aromatherapy Appliances Sexual Wellness Watches Men Watches Women Watches Watch Accessories Kids Watches Musical Instruments Guitars Bass Ouds Strings, Bags & Other Accessories Amplifiers & Effects Drums & Percussions Folk & Woodwind Keyboards & Midi Pro Audio Orchestral Strings Arts & Crafts Paintings and Mediums Air Brushes & Accessories Brushes & Accessories Easel and Canvas Art Tools and Accessories Drawing and Illustration Calligraphy/Lettering Sets Portfolios and Art Storage Art Books & Videos Engineering Supplies Hobbies and Craft Mosaic Tiles and Leathercraft Metal / Glass and Wood Craft Silk and Fabric Painting More... Decorative Paints and Decoupage Printing and Stenciling Materials Moulding and Modeling Stamp/Coin Albums & Refills Gift Wrapping and Accessories Bookmarks Papers and Boards Antiques Handcrafts, Sculptures & Carvings Islamic, Ethnic and Digital Art Groceries Fresh Food Cheese Fresh Juice Fruits & Vegetables
|
https://ae.pricena.com/en/home-appliances/garment-care/irons/page/48?ref=relatedproducts_p3
|
Meat & Fish Milk, Butter & Eggs Yogurts & Desserts Food Cupboard Breakfast Chocolate, Sweets & Biscuits Cooking Ingredients Crisps, Snacks & Nuts Home Baking, Sugar & Desserts International More... Rice, Pasta & Noodles Sauces, Soup, Meal kits & Mixes Tins & Cans Free From Drinks Pet Foods Baby Food See all categories iPhone 11HOT Note 10 Galaxy S10 iPhone 11 ProHOT Huawei P30 iPhone XS Top Sellers Price drops Browse By Store Review a store Coupons & Offers Refine Search Category Brand Price (AED) Show out of stock Online Shop 1500+ results Sort Featured Price Low to High Price High to Low Price Drop Price Drop % Popular New Rating View Home AppliancesGarment CareIrons AdBlack + Decker - 15 in 1 Steam Mop with SteaMitt AED 759 Mumzworld Go to Shop AdBlack + Decker - Power Steam Iron with Spray function - Red AED 89 Mumzworld Go to Shop AdBlack + Decker - SteaMitt Pro Handheld Steam Cleaner AED 419 Mumzworld Go to Shop Home Decor CHENGZ Wood Beads Ornament Star Heart Shape Kids Nursery Tent Wall Hanging Decor AED 8 from Amazon AE Go to Shop +10.00 Shipping Home Decor CHENGZ Geometric Marble Texture Throw Pillow Case Cushion Cover Sofa Home Decor AED 9 from Amazon AE Go to Shop +10.00 Shipping Home Decor CHENGZ Super Soft Velvet Pillow Sofa Waist Throw Cushion Cover Home Decor Cushion
|
https://ae.pricena.com/en/home-appliances/garment-care/irons/page/48?ref=relatedproducts_p4
|
AED 9 from Amazon AE Go to Shop +10.00 Shipping Home Decor CHENGZ Coffee Mugs Tea Coffee Art Decal Vinyl Wall Stickers Kitchen Pub Deor AED 5 from Amazon AE Go to Shop +10.00 Shipping CHENGZ Handmade Dream Catcher Feathers Night Light Car Wall Hanging Room Home Decor AED 53 from Amazon AE Go to Shop +10.00 Shipping CHENGZ Dinosaur LED 3D Illuminated Lamp Optical Desk Night Light With 7 Color Changing AED 71 from Amazon AE Go to Shop +10.00 Shipping CHENGZ Side Brush&Hepa Filters&Rolling Brush for iRobot Roomba i7 i7+ i7Plus Cleaner AED 77 from Amazon AE Go to Shop +10.00 Shipping CHENGZ Unique Proprietary Saw Chain Sharpening Tool Fast Sharpen Their Chain On The Job AED 77 from Amazon AE Go to Shop +10.00 Shipping CHENGZ Self Centering 6 8 10mm Dowel Jig Wood Panel Hole Puncher Hole Locator Beech Ce AED 99 from Amazon AE Go to Shop +10.00 Shipping CHENGZ Voile Curtain Swags All Colours Pelmet Valance Net Curtains Voile Swag AED 58 from Amazon AE Go to Shop +10.00 Shipping CHENGZ Mini LCD Digital Thermometer Fridge Freezer Tester Temperature Humidity Meter AED 47 from Amazon AE Go to Shop +10.00 Shipping CHENGZ Luminous Tape Self-adhesive Glow In The Dark Safety Stage Home Warning Tape 2PCS AED 46 from Amazon AE Go to Shop +10.00 Shipping
|
https://ae.pricena.com/en/home-appliances/garment-care/irons/page/48?ref=relatedproducts_p5
|
CHENGZ 7 Sizes Stainless Steel Wire Fine Mesh Oil Strainer Flour Sifter Sieve Colander AED 45 from Amazon AE Go to Shop +10.00 Shipping CHENGZ 2PC DIY Embroidered Roses Floral Collar Sew Patch Sticker Applique Badge AED 39 from Amazon AE Go to Shop +10.00 Shipping Olympia OE-29 Non-Stick Sole Plate 1200 Watts Multi-Function With Water Spray Dry Iron Pink AED 50 from Amazon AE Go to Shop +10.00 Shipping Olympia Non-Stick Sole Plate 1200 Watts OE-29 Multi-Function With Water Spray Dry Iron, Blue AED 100 from Amazon AE Go to Shop +10.00 Shipping Olympia OE-29 Non-Stick Sole Plate 1200 Watts Multi-Function With Water Spray Dry Iron, Pink AED 45 from Amazon AE Go to Shop +10.00 Shipping Emjoi Power Emjoi Uei-408 Steam Iron AED 125 from Amazon AE Go to Shop +10.00 Shipping Havells Jio Heritage Dry Iron Blue AED 40 from Amazon AE Go to Shop +10.00 Shipping Saachi Foldable Travel Iron Teflon Sole Plate AED 60 from Amazon AE Go to Shop +10.00 Shipping IBlack Heavy Duty Dry Iron IB-2000 AED 46 from Amazon AE Go to Shop +10.00 Shipping Nobel Nsi-246 Steam Iron AED 142 from Amazon AE Go to Shop +10.00 Shipping Emjoi Uei-401 Steam Iron AED 109 from Amazon AE Go to Shop +10.00 Shipping Emjoi Power Emjoi Uei-407 Steam Iron AED 129 from Amazon AE
|
https://ae.pricena.com/en/home-appliances/garment-care/irons/page/48?ref=relatedproducts_p6
|
Go to Shop +10.00 Shipping Emjoi Power Emjoi Uei-400 Steam Iron AED 119 from Amazon AE Go to Shop +10.00 Shipping Infapower X601 Iron, Blue AED 680 from Amazon AE Go to Shop +10.00 Shipping Hoover PRB2500B00 Steam Generator 2500 W, 2 Litre Tank Capacity, Blue AED 900 from Amazon AE Go to Shop +10.00 Shipping Bosch 2300W SENSIXX QuickFill Steam Iron with Easy Glide Soleplate, Purple - TDS2651GB AED 156 from Amazon AE Go to Shop +10.00 Shipping Panasonic Dry Iron Ni22awt White AED 92 from Amazon AE Go to Shop +10.00 Shipping Geepas Gsi7783 Ceramic Steam Iron AED 59 20% from Amazon AE Go to Shop +10.00 Shipping Olsenmark Omgs1514 Garment Steamer AED 148 from Amazon AE Go to Shop +10.00 Shipping Olsenmark Omdi1590 Dry Iron, White AED 97 22% from Amazon AE Go to Shop +10.00 Shipping Konka Hand-held Hanging Ironing Machine Household Steam Iron Mini-portable Hanging Ironing Machine AED 160 from Amazon AE Go to Shop +10.00 Shipping Nikai Garment Steam Press - Ngs 566 AED 399 from Amazon AE Go to Shop +10.00 Shipping Electrolux EDBS7135AR Steam Iron, Blue AED 797 from Amazon AE Go to Shop +10.00 Shipping Chigo master's holding hot ironing machine, household steam ironing Mini Mini ironing clothes ironing machine, hot iron hanger. AED 98 26% from Amazon AE Go to Shop
|
https://ae.pricena.com/en/home-appliances/garment-care/irons/page/48?ref=relatedproducts_p7
|
+10.00 Shipping Nobel Nsi-243 Steam Iron AED 49 from Amazon AE Go to Shop +10.00 Shipping WLNKJ Handheld Steamer, Portable Mini Travel Ironing Machine Humidification Wrinkle Removal Dry Hot Wet Hot Real-Time Steam260ml - Suitable for Home and Travel AED 549 from Amazon AE Go to Shop +10.00 Shipping WLNKJ Portable Steam Iron, Handheld Mini Travel Ironing Machine Wrinkle Removal 140C Dry Steam Flat Hot Hanging Hot Reverse Hot 130Ml - Suitable for Home and Travel AED 481 from Amazon AE Go to Shop +10.00 Shipping WLNKJ Steamer for Clothes, Handheld Mini Travel Ironing Machine Foldable and Portable Quick Wrinkle Removal for Multiple Fabrics 250Ml - Suitable for Family and Travel AED 441 from Amazon AE Go to Shop +10.00 Shipping Show More Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7 Page 8 Page 9 Page 10 Page 11 Page 12 Page 13 Page 14 Page 15 Page 16 Page 17 Page 18 Page 19 Page 20 Page 21 Page 22 Page 23 Page 24 Page 25 Page 26 Page 27 Page 28 Page 29 Page 30 Page 31 Page 32 Page 33 Page 34 Page 35 Page 36 Page 37 Page 38 Page 39 Page 40 Page 41 Page 42 Page 43 Page 44 Page 45 Page 46 Page 47 Page 49 Page 50 Page 51 Page 52 Page 53 Page 54 Page 55 Page 56 Page 57 Page 58 Page 59 Page 60 Page 61 Page 62 Page 63 Page 64 Page 65
|
https://ae.pricena.com/en/home-appliances/garment-care/irons/page/48?ref=relatedproducts_p8
|
Categories Mobile Phones Tablets Smart Watches TVs Computers Cameras Gaming Consoles Home Appliances Women Fashion Men Fashion Fifa 17 UAE Samsung TVs Michael kors Bags All Categories Popular on Pricena LG G6 OnePlus 3T OnePlus Two Samsung Galaxy Note 5 Huawei Mate 9 Samsung Galaxy S8 UAE Google Pixel UAE Iphone 7 Plus UAE Iphone 8 UAE Samsung Galaxy S7 UAE Apple AirPods Pro Google Pixel 4 Huawei Mate 30 OnePlus 7T Samsung Galaxy S10 Lite Samsung Galaxy S11 Pricena About Us How to use Pricena Pricena video Terms and Conditions Privacy Policy Contact Us Online Shops Account Login List Your Online Shop Online Shops on Pricena News & Reviews Pricena Reviews Pricena Blog Press Releases Live Search Newsletter Subscribe to our newsletter to receive news & special offers Sign up Follow us Mobile Apps Pricena Middle East Saudi Pricena Saudi Egypt Pricena Egypt Kuwait Pricena Kuwait Qatar Pricena Qatar Pricena International Nigeria Pricena Nigeria South Africa Pricena South Africa India Pricena India Disclaimer: Pricena.com only acts as online price comparison website, all product names, trademarks, service marks, logos, brands, industrial models and designs featured or referred to within this site are the sole property of their respective owners and/or right holders and are only provided for the purpose of this site. Pricena.com acts as independent party and shall not be considered the representative, agent, employee, sponsor, joint venture partner or otherwise of such owners or right holders. © 2019 Pricena FZ LLC. All rights reserved.
|
https://ae.pricena.com/en/home-appliances/garment-care/irons/page/48?ref=relatedproducts_p9
| |
https://alyssaroyse.wordpress.com/_p0
|
Just Alyssa | …everything you need to know about Alyssa Royse, and a lot of stuff you don't… Skip to content Just Alyssa …everything you need to know about Alyssa Royse, and a lot of stuff you don't… Home About Alyssa Public Speaking Contact My Busted Body and CrossFit November 29, 2018 Today was “one of those days” in the gym. It was full of lessons and reflections. Today, I was proud of myself for stopping half way through a workout. While I cheered others on to their respective finish lines, I had lots of time to think about how awesome it was that I stopped half way. And really, that I was there at all. And what CrossFit is all about. CrossFit is about figuring out what you CAN do, not fixating on what you can’t. It’s hard to find the actual starting point of the improbability of my being in a CrossFit gym at all (much less owning one.) I could be 9 days ago when I was rowing in the gym, and my back went the kind of “out” that involved my screaming in quick pain, tumbling to the floor and staying there (singing to 80’s pop tunes while others worked out) and waiting for my husband to come get me. Or it could be a few years ago when I had both shoulders surgically repaired, a year apart, from torn rotator cuffs that happened before CrossFit was even a thing. Or it could be the moment that I broke my neck in a car wreck and didn’t die, but was told I’d never be athletic again…..
|
https://alyssaroyse.wordpress.com/_p1
|
My body is broken in so many ways. And if it weren’t for CrossFit, my spirit would be also. Read more… Leave a comment from → Uncategorized Seven Years of Owning a CrossFit Gym Has Taught Me….. September 7, 2018 7 years ago. I finished Blast Off and made Celia touch a barbell for the first time. She hated it. Okay, it’s been 7 years. SEVEN YEARS that Rocket CrossFit has been open. That’s amazing to me. I can’t count (mostly because we’ve changed software systems a few times) how many people have been through our doors. It’s humbling. I’m even more humbled by the ones who walked through when we first opened, and are still with us. I’ve learned a lot of life lessons. None of which are specific to running a gym, all of which seem to be good life rules in general. Read more… 1 Comment from → Uncategorized Doctors, Stop Telling People Not To Do CrossFit July 15, 2018 This screen shot was shared by Rob Attenborough, frustrated owner of Fraser Coast CrossFit. “My doctor says I need to do something else, that I’m not ready for CrossFit.” As a CrossFit gym owner, I’ve heard this so many times, and I want to scream every time I do. It’s one of the most commonly discussed things in various Facebook groups for gym-owners. We’re sitting here looking at a massive epidemic in lifestyle-related illness, which can be ameliorated with fitness and nutrition, and doctors are telling patients that CrossFit is too hard for them.
|
https://alyssaroyse.wordpress.com/_p2
|
It feels like just another way for a doctor to tell a struggling patient that they aren’t good enough. It’s another way that a doctor will ignore a patient’s holistic health, writing them off as “fat” and therefore ignoring everything else. It’s a total absence of faith, trust and respect for what that patient is capable of. What they are worth as a person. And it’s the exact (fucking) opposite of what we do in CrossFit gyms across the country. You come into a CrossFit gym and 99% of us will look at you and say, “I’m so glad you’re here, let’s get started.” (I’m allowing for 1% of people who are just assholes, I assume we’ve got those too.) Read more… 1 Comment from → Uncategorized What Is The CrossFit Type, Anyway? June 12, 2018 “You don’t seem like the CrossFit type.” I hear it all the time. Honestly, I think it’s code for “you don’t look like you’re in that great shape,” or something like that. But I also hear it when I say that I don’t usually feel like working out. Or that I don’t care about the Games. Or we don’t sell some MLM magic powder that will make you yoked. Or that we run our gym in some way that people think is totally not “like CrossFit.” You guys, we’ve never done a workout off of mainsite and we don’t even use “RX” weights in our workouts.
|
https://alyssaroyse.wordpress.com/_p3
|
So does that make me “not the CrossFit type?” Does that make Rocket not a “real CrossFit gym?” No. It makes us precisely and exactly the CrossFit type. If you think that CrossFit is about following some sort of orthodoxy and giving a fuck what other people think of you, I think you’ve got it all wrong. Read more… Leave a comment from → Uncategorized Infiltrate CrossFit With Love June 7, 2018 Yesterday, CrossFit fired Russell Berger just a few hours after he released a homophobic Tweet using his title, corporate platform, and tagging the company in it. That is the speed of light, in corporate time. That morning, Berger referred to celebrating gay pride a as a “celebration of sin.” By the end of the workday, there was a 2-Tweet statement from CrossFit in which they acknowledged the issue, made a clear stand in favor of inclusion and then took decisive action. Russell Berger was fired from his very public position at CrossFit by the end of the day. Read more… 1 Comment from → Uncategorized CrossFit and Rhabdo May 21, 2018 I’m not saying that Popeye cut his lawn with a pair of scissors and gave himself, rhabdo in the forearm, but….. There are few words that are more fun to toss into a room full of CrossFitters than “rhabdo.” I mean, “paleo” is fun, “zone” will start a lively debate, and “kipping” is a classic. But really, “rhabdo” is where feathers will start flying.
|
https://alyssaroyse.wordpress.com/_p4
|
But, as we approach Memorial Day, when, along with a bajillion other folks, we will be doing “Murph,” I always want to talk about rhabdo with our members. It is real. It’s also really unlikely to happen to you, but if it does, I want you to know what it looks like so that you can get medical attention immediately. Because it can kill you. I don’t mean that metaphorically. It can literally, kill you. So, while it’s unlikely to happen, it’s super important that you recognize it if it does. All that said, yes, it has happened in our gym. It has happened a few times, and in every single case, it was the last person and reason you’d ever expect. It happened with good programming and good coaching. So let’s dispel a few myths first… Read more… 1 Comment from → Uncategorized Dating Is Not Supposed To Be Predatory January 19, 2018 I’m not really unstable, this was just the “maddest” looking photo I could find of myself. So many people have sent me every think piece written about the Aziz Ansari incident, asking my opinion. I want to scream ISN’T IT FUCKING OBVIOUS? But I guess not, so here it is. This happens EVERY DAY and is not okay. This is our culture. This is rape culture. If you want to be all like “but it’s not rrreeeeaaalllllyyyyy rape,” go for it. You could probably get away with saying that Ansari isn’t a rapist (I might agree with you sometimes, depending on my mood.) But what you have to admit is that the fact that we’re even parsing the details of it is rape culture. That many of us think it’s no big deal is rape culture. This is who we are.
|
https://alyssaroyse.wordpress.com/_p5
|
Read more… 2 Comments from → Uncategorized Resolve Not To Make Resolutions December 19, 2017 On top of Mount Adams. While I never want to do this again, training for it changed my life. It’s January, and I own a gym. I should LOVE resolution season. When loads of people swear that this is the year they’re going to “get into shape,” whatever the hell that means. When people pour into the gyms across the country, proclamations waved high, spirits soaring. But I don’t love it. I hate it. All I see is wave after wave of shame and guilt, and spirits that I know are, for the most part, going to crash onto jagged cliffs of disappointment and failed expectations. That will make it even harder to try again, next year. Resolution season is the siren song of a toxic culture determined to trap you with shame and a crippling inferiority complex. Fuck that. Read more… 2 Comments from → Uncategorized Instructions for my funeral September 3, 2017 A whole lotta people in my life died this summer. Seriously, more than usual. Earlier this week, I sent a weird text to someone I love, asking “what’s the dress code for this service?” It was, admittedly, for the service of someone I didn’t know all that well, but who was dearly loved by some of the people I love most in this world. (The death season started this year with losing someone I loved most in the world, and I’m still reeling and pissed about it, honestly.)
|
https://alyssaroyse.wordpress.com/_p6
|
Anyway, me being me, I’d like to be very clear up front about what I want at my funeral. Read more… 1 Comment from → Uncategorized Nutritional Challenges at Rocket August 11, 2017 It’s that time of year again. Three times a year, we do a nutritional challenge at Rocket. It’s changed a bit over the last 6 years, but the basics have stayed the same. And this time, we’re trying something new, a “scaled” division. When we began, we always did a Whole 30. After Brady and I discovered Keto, we let people choose between a Whole 30 and strict Keto. But there were always people who asked for a “half-assed 30.” We scoffed, because we were some combination of clueless and sanctimonious. But really, that was incongruent with who we are as a gym, and what we love about CrossFit. If the idea is that we’ll meet you where you’re at, and can scale anything, why would we leave nutrition out of that? So, because I am constantly explaining to both members and other gym owners how and why we do our nutritional challenges, I’m gonna spell it all out here. My hope is to inspire others to do their version. Even if you’re not a member of Rocket, get a group of friends together and commit to nutrition for 30 days. Read more…
|
https://alyssaroyse.wordpress.com/_p7
|
1 Comment from → Uncategorized « Older Entries Search in Alyssa! Top Posts & Pages Give Lard A Chance Engineering Toys For Kids My Daughter Wears Booty-Shorts, And I Learned To Love Them. Can We Stop With This "Divine Feminine" Stuff Now? Nutritional Challenges at Rocket What’s The Difference Between “Keto” and Whole 30? What To Say When You Find Out Your Kid's A Rapist My Boobs Are Conspiring Against Me Recent Comments Monique Dayries on Hero WODs & The Politics Of Our Gym SM on Sweat and Happy Thoughts Can’t Cure Depression calibra on Seven Years of Owning a CrossFit Gym Has Taught Me….. Seven Years of Owning a CrossFit Gym Has Taught Me….. | Just Alyssa on CrossFit, It’s Time To Fix Your Ways Seven Years of Owning a CrossFit Gym Has Taught Me….. | Just Alyssa on CrossFit, Sports, Leaderboards and Gender Identity. Tweet With Me! RT @KristinMinkDC: Oh and by the way, one of the biggest sponsors of this Federalist Society black-tie dinner HONORING BRETT KAVANAUGH — th… 18 hours ago Also, you know, management at Bain Capital (Romney) and generally pushing to privatize everything with VC money, so… twitter.com/i/web/status/1… 1 day ago While giving big corporations a whole lot of data about you. No thanks. https://t.co/l10tQOy2XU 1 day ago RT @ECMcLaughlin: And there it is: Taylor testifies that Sondland told him that Trump was withholding aid until Zelensky made it clear that… 3 days ago
|
https://alyssaroyse.wordpress.com/_p8
|
RT @ZackBornstein: Every billionaire could wake up, make 4 phone calls, and solve global hunger, and every day they just decide not to 5 days ago Follow @alyssaroyse Categories Business Things CrossFit Things Doing Things Family Things JUST CAUSE Making Things Published Things Random Things Relationship Things Sex Things SocioPolitical Things Uncategorized Follow me on Instagram There was an error retrieving images from Instagram. An attempt will be remade in a few minutes. Subscribe (so you don’t miss anything!) RSS - Posts Archives Archives Select Month November 2018 September 2018 July 2018 June 2018 May 2018 January 2018 December 2017 September 2017 August 2017 June 2017 March 2017 February 2017 January 2017 December 2016 November 2016 October 2016 September 2016 July 2016 June 2016 March 2016 February 2016 January 2016 December 2015 November 2015 October 2015 September 2015 August 2015 July 2015 June 2015 May 2015 April 2015 March 2015 February 2015 January 2015 December 2014 November 2014 October 2014 September 2014 August 2014 July 2014 May 2014 April 2014 March 2014 February 2014 December 2013 November 2013 October 2013 September 2013 July 2013 June 2013 May 2013 April 2013 November 2012 October 2012 September 2012 August 2012 May 2012 April 2012 March 2012 February 2012 January 2012 December 2011 November 2011 October 2011 September 2011 August 2011 July 2011 June 2011 May 2011 April 2011 March 2011 February 2011 January 2011 December 2010 November 2010 October 2010 September 2010 August 2010 July 2010 June 2010 May 2010 April 2010 March 2010 February 2010 January 2010 December 2009 November 2009 October 2009 September 2009 August 2009 July 2009 June 2009 May 2009 April 2009 December 2008 October 2008 August 2008 May 2008 March 2008 January 2008
|
https://alyssaroyse.wordpress.com/_p9
|
MY WISH LIST No, I don't make any money writing this stuff. If it speaks to you and you love it, feel free to buy me stuff on my Amazon Wish List: http://amzn.com/w/3TN76QE3TEU6C . I love it when treats magically arrive. ;) Recent Posts My Busted Body and CrossFit Seven Years of Owning a CrossFit Gym Has Taught Me….. Doctors, Stop Telling People Not To Do CrossFit What Is The CrossFit Type, Anyway? Infiltrate CrossFit With Love Blog at WordPress.com. Post to Cancel Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use. To find out more, including how to control cookies, see here: Cookie Policy
|
https://applypk.com/job-category/it/_p0
|
IT - ApplyPk For Scholarships and Conferences: FullOpportunities.org Navigation Home Jobs Internships Search Job Now: Location: All locations Baluchistan Islamabad KPK Peshawar Pakistan Punjab Faisalabad Lahore Multan Rawalpindi Sindh Badin Dadu Hyderabad Karachi Mithi Sukkur Umerkot Search Keywords: Html, Css, WordPress Email Me Jobs Like These × New Job Alert Never miss a chance! Let us know your job expectations, so we can find you jobs better! Email Keywords Job Locations All Job locations Baluchistan Islamabad KPK Peshawar Pakistan Punjab Faisalabad Lahore Multan Rawalpindi Sindh Badin Dadu Hyderabad Karachi Mithi Sukkur Umerkot Job Category Accounting Banking Customer Service Designing Engineering Finance Government HR IT Management Marketing Jobs Media Medical Teaching Technical Trainee Writer Jobs Job Type All Job Type Contract Freelance Full Time Home Based Internship Office based Part Time Email Frequency Daily Weekly Fortnightly Monthly Save Showing 1–2 of 2 jobs Multiple Positions in Silk Bank for IT Person Full Time Multiple Positions in Silk Bank for IT Person Pakistan, Karachi, Sindh Pakistan, Karachi, Sindh, July 19, 2019 IT Total Years Experience: Not Mentioned Send to friend Share View more 4 months ago Jobs In UET Peshawar 2019 Full Time Jobs In UET Peshawar 2019 KPK, Pakistan, Peshawar KPK, Pakistan, Peshawar, April 24, 2019 IT - Technical - Trainee Address: UET Peshawar: Sector B/3, Plot D, Near Sui Gas Office, Opposite ILM School, Hayatabad, Phase 5, Peshawar, Khyber Pakhtunkhwa, Pakistan
|
https://applypk.com/job-category/it/_p1
|
Send to friend Share View more 7 months ago Search Job Keyword Job Category Accounting Banking Customer Service Designing Engineering Finance Government HR IT Management Marketing Jobs Media Medical Teaching Technical Trainee Writer Jobs Job Type All Job Type Contract Freelance Full Time Home Based Internship Office based Part Time Job Location All Job Location Baluchistan Islamabad KPK Peshawar Pakistan Punjab Faisalabad Lahore Multan Rawalpindi Sindh Badin Dadu Hyderabad Karachi Mithi Sukkur Umerkot Salary Offer All Salary Offer Not Mentioned 0 ~ 5000 5000 ~ 10,000 10,000 ~ 20,000 20,000 ~ 50,000 50,000 ~ 1,00,000 1,00,000 ~5,00,000 Experience Level Junior Senior Manager Publishing Date Search Reset Job Categories Accounting (1) Banking (3) Customer Service (2) Engineering (2) Finance (2) Government (1) IT (2) Management (8) Media (1) Medical (1) Teaching (1) Technical (1) Trainee (1) Job Types Contract(1) Freelance(0) Full Time(9) Home Based(0) Internship(5) Office based(6) Part Time(0) Job Location Pakistan (11) Sindh (5) Karachi (7) Islamabad (4) Rawalpindi (2) About US Terms Conditions Cookies Policy Privacy Policy DMCA Jobs By Category Accounting Banking Customer Service Engineering Finance Government IT Management Media Medical Teaching Technical Trainee Jobs By Location Pakistan Sindh Karachi Islamabad KPK Peshawar Punjab Rawalpindi © 2019 ApplyPk. Partners with FullOpportunities.Org × Send to a friend Your full name Your friend email Content Send × Login Username Password Remember Me
|
https://applypk.com/job-category/it/_p2
|
Sign In Forgot Password? × Sign Up Username Email Password Retype your password You are -Select- I'm an employer looking to hire I'm a candidate looking for a job I agree with the Terms of use Sign Up Already have an account? Login Now × Sign Up Please let us know who you are to finish the registration I'm an employer looking to hire I'm a candidate looking for a job Sign Up
|
https://assuredautomation.com/PTP/index.php?p=buy&pn=EPTPVND06S2_p0
|
1 inch NPT PVC 3-way Ball Valve (flow plan D) with Spring Return , Dual Scotch Yoke, 60 psi Pneumatic Actuator - PN: EPTPVND06S2 best live chat Live Chat Order Online or Call Toll-Free 1-800-899-0553 Log-in/Create Account $0 Search We Make Valve Automation Easy (0) We Make Valve Automation Easy Home My Account Products Configurators Documents Service & Support News & Training Videos Resellers Custom Valves About Us Site Map NEMA 4 Weatherproof V4 Series - Low-cost industrial, epoxy coated aluminum, on/off or modulating Only available on sizes up to 1 1/2" Voltage 120VAC 24VDC 12VDC V4 Actuator Accessories 2 Extra Limit Switches 2 additional SPDT dry contact mechanical switches Modulating Positioner Positioner board allows for modulating control of the valve with either a 4-20mA or 0-10VDC control signal. If control signal is lost and main power is present, actuator will move the valve to the position corresponding to the low end of signal. Choose your control input signal: EP420: 4-20mA EP010: 0-10VDC Move to High End of Signal (upon control signal failure) R4 Series General duty industrial, plastic, on/off Only available on sizes up to 2" Voltage 120VAC 24VDC 12VDC R4 Actuator Accessories 2 Extra Limit Switches 2 additional SPDT dry contact mechanical switches S4 Series Multi-voltage, heater & thermostat, on/off or modulating, battery failsafe Voltage Universal Voltage (24 to 240 VAC or DC)
|
https://assuredautomation.com/PTP/index.php?p=buy&pn=EPTPVND06S2_p1
|
Low Voltage (12 VAC / DC) Available on special request - call 1-800-899-0553 S4 Actuator Accessories Modulating Positioner The DPS is a digital positioning system that uses a microprocessor to modulate the actuator in proportion to an anolog input signal (4-20mADC or 0-10VDC). Choose your control input signal: 4-20mA (4 = Closed, 20 = Open) 0-10VDC (0 = Closed, 10 = Open) Reverse control signal Battery Fail Safe The BSR is a battery fail-safe module where an internal battery pack powers the actuator to the preset failure position "open or closed" upon loss of power. The BSR can be used with the DPS positioner. Choose the failure position: BSRC: fail CLOSED BSRO: fail OPEN Alternate DIN Connectors Actuator ships with Cord Grip (cable gland) DIN Connectors installed.These additional connectors will be included loose in shipment. Simple one screw changeout for each connector. Cord Grip (standard) 1/2" NPT Conduit Corded Choose the additional Connector Style: 1/2" NPT Conduit 15 foot Cord K4 Series Industrial worm gear, epoxy coated aluminum, on/off or modulating Voltage 120VAC K4 Actuator Accessories Modulating Positioner Positioner board allows for modulating control of the valve with either a 4-20mA or 0-10VDC control signal. If control signal is lost and main power is present, actuator will move the valve to the position corresponding to the low end of signal. Choose your control input signal:
|
https://assuredautomation.com/PTP/index.php?p=buy&pn=EPTPVND06S2_p2
|
EP420: 4-20mA EP010: 0-10VDC Move to High End of Signal (upon control signal failure) NEMA 7 Explosion Proof B7 Series Heavy duty, epoxy coated aluminum, on/off or modulating Voltage 120VAC 24VDC B7 Actuator Accessories 2 Extra Limit Switches 2 additional SPDT dry contact mechanical switches Modulating Positioner Positioner board allows for modulating control of the valve with either a 4-20mA or 0-10VDC control signal. If control signal is lost and main power is present, actuator will move the valve to the position corresponding to the low end of signal. Choose your control input signal: EP420: 4-20mA EP010: 0-10VDC Move to High End of Signal (upon control signal failure) Basic Manual Lever Basic Manual Tee Handle Summary of Step 2 selections will go here Hide Step 2 Edit Step 2 Step 3: Select Qty. & Add to Cart Model: ????????? PTP Series PVC, full port, 3-way ball valve description Unit Price: $ ??.?? Accessories accessories description Accessories Price: $ ??.?? Quantity: Total: $ ??.?? Add to Cart Links for Model: ABCDEFG CAD Model Dimension Drawing Wiring Diagram Share this Configuration About CAD, Dimensions, and Images Documentation PTP Series Datasheet PTP Series Price Lists Stay Connected with Us Order Online or call Toll-Free 1-800-899-0553 Main Menu: Home Products Configurators Documents Service & Support News & Training Videos Resellers Custom Actuated Valves About Us
|
https://assuredautomation.com/PTP/index.php?p=buy&pn=EPTPVND06S2_p3
|
Site Map Valves By Type: Compact On/Off Valves Ball Valves 3-way Valves Butterfly Valves Plug Valves Globe Valves Manual Valves Thermal Shut-off Valves Fire-Safe Valves Valves By Material: Brass Valves Lead Free Brass Valves Stainless Steel Valves Carbon Steel Valves Ductile Iron Valves PFA Lined Valves PVC & Plastic Valves Silicone Free Valves Valve Actuators: All Valve Actuators Pneumatic Valve Actuators Electric Valve Actuators Valve & Actuator Accesories: All Accessories Limit Switches (Position Indicators) Positioners Air Filter-Dryers Coalescing Filter-Dryers NAMUR Solenoid Valves Control Boxes Contact Us: Contact Information Request Literature Privacy Policy © Assured Automation. We reserve the right to make technical changes at any time. Please contact us to verify any information that is critical to your application. Configurator Help helpViewer iFrame
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p0
|
Funding Opportunities | DHS BAA Skip Navigation Official website of the Department of Homeland Security Portal Login Homeland Security Broad Agency Announcements (BAA) Program Portal Home Funding Open Funding Opportunities Closed Funding Opportunities Current Solicitations Past Solicitations News & Events Awards Statistics by Solicitation Resources Funding Opportunities Topic Area Focus Research Area Focus FUNDING TOPICS: Open Closed FILTER BY: YEAR 2019(0) 2018(0) 2017(0) 2016(0) 2015(0) 2014(0) 2013(0) 2012(0) 2011(0) 2010(0) DIVISION BMD(0) CBD(0) CSD(0) EXD(0) FRG(0) DAE(0) HFD(0) IDD(0) STN(0) OTHER(0) RSD(0) TECHNICAL AREAS ALGORITHMS ANALYSIS ASSESSMENT BIO_RADIO BIOMETRICS BORDERS CLASSIFY COMMUNICATIONS CYBER DATA_ANALYTICS DENIAL_OF_SERVICE DETECTION DIGITAL_IMAGING EXPLOSIVES FIRST_RESPONDER_TECH FORENSICS IDENTITY INFRASTRUCTURE INTERNET INTERNET_OF_THINGS LOCATE MARITIME MITIGATION MODELING_SIMULATION NETWORK PHYSICAL_SECURITY PREDICTION PRIVACY PROTOCOLS RECOGNITION RESILIENCE SCREENING SECURITY SENSOR SITUATIONAL_AWARENESS SOCIAL_MEDIA SOFTWARE STANDARDS TRACK UNMANNED_AERIAL VISUALIZATION Research Topics: Research Area Securing Aviation Protecting from Terrorist Attacks Securing Borders Securing Cyberspace Preventing Terrorism Managing Incidents Securing Critical Infrastructure Priority R&D Need High-Throughput Cargo Screening Cost-effective Electronic Imaging for Bulk Air Cargo Passenger Identification and Vetting Rapid Detection and Alarming of Explosives Distinguishing Threats from Non-threats on Passengers Efficient and Accurate Detection of Complex Threat Concealment on Passengers and Carried Property Personal Protective Equipment for all CBRNE Hazards Modeling and Predictive Analytics for Decision Making Disease and Biological Threat Detection, Identification, and Classification in Field Operational Environments Biological Attack Verification Cross-border Tunnel Detection, Surveillance, and Forensics
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p1
|
Infrastructure Tunnel Surveillance Integrated and Improved Sensors, Systems, and Data Actionable Intelligence Gathering and Sharing Dark Aircraft and Vessel Detection, Tracking, and Interdiction Expedited People Screening Maritime Surveillance and Communications in Remote Environments Distributed Cloud-based Communications and Monitoring - Associated/Related Efforts Human Aspects of Cybersecurity-Associated/Related Efforts Network and Systems Security-Associated/Related Efforts Mobile Security-Associated/Related Efforts Critical Infrastructure - Associated/Related Efforts Software Assurance - Associated/Related Efforts Cyber Security Outreach - Associated/Related Efforts Cybersecurity for Law Enforcement-Associated/Related Efforts Cyber Enabled Networked Physical Systems Security Organic Explosive Compound and Homemade Explosives Detection Improvised Explosive Device-related Anomaly Detection Automated Machine Learning Prevention Advanced Analytics Situational Awareness Communications Command, Control, Communications Training and Exercises Responder Health, Safety, Performance Logistics and Resource Management Casualty Management Risk Assessment and Planning Intelligence and Investigation Dependency and Interdependency Analysis Risk-Informed Prioritization Topic Keywords Agricultural Pathogen Algorithms All-Hazard Analysis Big Data Biometrics Border Protection Canine Cargo Checked Baggage Child Exploitation Classify Communications Contraband Critical Infrastructure Crowdsourcing Cyber Data Data Analytics Denial of Service Detection Diagnostics Disaster Explosives Flood Forensics Human Trafficking Identity Incident Management Infrastructure Interdiction Internet Internet of Things LMR LTE Locate Managing Incidents Mission Critical Voice Mitigation Mobile Modeling & Simulation Narcotics Network Opioids P25 Physical Security Policy Position Navigation & Timing Preventing Terrorism Prevention Privacy Protection-Terrorist Attacks Recognition Resilience Risk Screening Securing Aviation Securing Borders Securing Cyber Security Sensor
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p2
|
Situational Awareness Social Media Software Terrorism Test & Evaluation Track Training UAS Vaccine Video Virus LRBAA TOPIC SEARCH RESULTS Show 5 10 25 50 topics Research Area: Securing Aviation (SEC AVN) Priority R&D Need: Cost-effective Electronic Imaging for Bulk Air Cargo Topic Number: SEC AVN 02-01 Topic Title: Detect Explosives and Contraband in Air Cargo- Detect explosives and other contraband in Cargo skids and pallets Solicitation: ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 ) Topic Description: Air cargo screening is challenging because of the diversity in the commerce transported and the complexity of the supply chain. Some air cargo is transported on dedicated cargo aircraft, but a significant amount is transported on passenger aircraft. Cargo diversity presents screening challenges because systems must be capable of screening a variety of items from organic material such as flowers, fresh or frozen meats, to metal parts or metal drums containing liquids. Sk ... more Air cargo screening is challenging because of the diversity in the commerce transported and the complexity of the supply chain. Some air cargo is transported on dedicated cargo aircraft, but a significant amount is transported on passenger aircraft. Cargo diversity presents screening challenges because systems must be capable of screening a variety of items from organic material such as flowers, fresh or frozen meats, to metal parts or metal drums containing liquids. Skids of cargo may be homogeneous, or could contain tens of small parcels or boxes from multiple vendors. Cargo screening is performed by private companies, so cost effective solutions are essential and software tools to assist the system operators to better detect anomalies in the cargo are important. Submitters must provide their development plan to produce mature systems which can scan full-size air cargo skids (48" x 48" x 65") at operational speed (at least 24 skids per hour), and ultimately cost under $500,000 as production units once development is completed. Proposed scanners must be able to cope with the wide varieties of air cargo, as described above. Standards for screening air cargo require updating and additional definition based on the diversity or types of air cargo. Submitters must provide a plan to develop appropriate test standards for testing cargo screening equipment. less
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p3
|
Topic Research Type: Type II, Type III Cargo Contraband Detection Explosives Narcotics Opioids Screening Securing Aviation Topic Details/Information (Click here to expand) End Objective: Develop low cost screening systems that can detect explosives and other contraband in air cargo skids and pallets. TRL Sought: 3-4 TRL at Conclusion: 6-7 Background Information and S&T Challenges: Non-availability of a low cost 3D skid scanning systems; Increasing volume of goods due to e-commerce that necessitate faster screening without losing detection ability; Poor environmental factors for location of screening equipment; and Extended operational hours, need for high MTBF and low MTTR factors Transition Opportunities: Air cargo screening solutions must complete Operational Test and Evaluation (OT&E) at Government facilities. Systems that pass TSA tests will be added to their Air Cargo Screening Technology List (ACSTL). Private Air Cargo screening companies are only allowed to use systems on the ACSTL. Supporting Information and Links: https://www.tsa.gov/for-industry/cargo-programs https://www.dhs.gov/external/air-cargo-security-programs-tsa https://www.tsa.gov/sites/default/files/non-ssi_acstl.pdf Securing Aviation Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps Submit Industry Engagement Materials Research Area: Securing Aviation (SEC AVN) Priority R&D Need: Cost-effective Electronic Imaging for Bulk Air Cargo Topic Number: SEC AVN 02-02 Topic Title: Detect Explosives and Contraband in Air Cargo- High Penetration Screening Capability for Dense (consolidated) Air Cargo Skids Solicitation: ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p4
|
Topic Description: Air cargo screening is challenging because of the diversity in the commerce transported and the complexity of the supply chain. Some air cargo is transported on both dedicated cargo aircraft, but a significant amount is also transported on passenger aircraft. Cargo diversity presents screening challenges because systems must be capable of screening a variety of items from organic material such as flowers, fresh or frozen meats, to metal parts or metal drums of liquids. S ... more Air cargo screening is challenging because of the diversity in the commerce transported and the complexity of the supply chain. Some air cargo is transported on both dedicated cargo aircraft, but a significant amount is also transported on passenger aircraft. Cargo diversity presents screening challenges because systems must be capable of screening a variety of items from organic material such as flowers, fresh or frozen meats, to metal parts or metal drums of liquids. Skids of cargo may be homogeneous, or could contain tens of small parcels or boxes from multiple vendors. Cargo screening is performed by private companies, so cost effective solutions are essential and software tools to assist the system operators to better detect anomalies in the cargo are important. Submitters must provide their development plan to produce systems which can scan full-size air cargo skids (48" x 48" x 65") at speeds exceeding 24 skids per hour and which will provide imaging of dense cargo. Proposed scanners must be able to cope with the wide varieties of air cargo as described above. Proposals for automated explosive threat recognition algorithms to be hosted on these cargo skid scanners are also invited. less
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p5
|
Topic Research Type: Type II, Type III Cargo Contraband Detection Explosives Narcotics Opioids Screening Securing Aviation Topic Details/Information (Click here to expand) End Objective: Air cargo skid screening solutions which are less than $500,000.00 (US) in production quantities. TRL Sought: 3-4 TRL at Conclusion: 6-7 Background Information and S&T Challenges: Non-availability of a low cost 3D skid scanning systems; Increasing volume of goods due to e-commerce that necessitate faster screening without losing detection ability; Poor environmental factors for location of screening equipment; Extended operational hours, need for high MTBF and low MTTR factors Transition Opportunities: Air cargo screening solutions must complete Operational Test and Evaluation (OT&E) at Government facilities. Systems that pass TSA tests will be added to their Air Cargo Screening Technology List (ACSTL). Private Air Cargo screening companies are only allowed to use systems on the ACSTL.. Supporting Information and Links: https://www.tsa.gov/for-industry/cargo-programs https://www.dhs.gov/external/air-cargo-security-programs-tsa https://www.tsa.gov/sites/default/files/non-ssi_acstl.pdf> Securing Aviation Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps Submit Industry Engagement Materials Research Area: Securing Aviation (SEC AVN) Priority R&D Need: Cost-effective Electronic Imaging for Bulk Air Cargo Topic Number: SEC AVN 02-03 Topic Title: Detect Explosives and Contraband in Air Cargo- Algorithms and Detection Systems Solicitation: ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 ) Topic Description: Air cargo screening is challenging because of the diversity in the commerce transported and the complexity of the supply chain. Some air cargo is transported on both dedicated cargo aircraft, but a significant amount is also transported on passenger aircraft. Cargo diversity presents screening challenges because systems must be capable of screening a variety of items from organic material such as flowers, fresh or frozen meats, to metal parts or metal drums of liquids. S ... more
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p6
|
Air cargo screening is challenging because of the diversity in the commerce transported and the complexity of the supply chain. Some air cargo is transported on both dedicated cargo aircraft, but a significant amount is also transported on passenger aircraft. Cargo diversity presents screening challenges because systems must be capable of screening a variety of items from organic material such as flowers, fresh or frozen meats, to metal parts or metal drums of liquids. Skids of cargo may be homogeneous, or could contain tens of small parcels or boxes from multiple vendors. Cargo screening is performed by private companies, so cost effective solutions are essential and software tools to assist the system operators to better detect anomalies in the cargo are important. Submitters must provide their development plan to produce systems which can scan full-size air cargo skids (48" x 48" x 65") at speeds exceeding 24 skids per hour and which will provide imaging of dense cargo. In addition to explosives, there is a growing interest in detecting contraband such as opioids which may be hidden in air cargo. The government is interested in developing dual-use systems which may detect both explosives and illicit cargo. Proposals for automated explosive threat recognition algorithms to be hosted on these cargo skid scanners are also invited. less Topic Research Type: Type II, Type III
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p7
|
Cargo Contraband Detection Explosives Narcotics Opioids Screening Securing Aviation Topic Details/Information (Click here to expand) End Objective: High penetration screening capability for dense (consolidated) air cargo skids. TRL Sought: 3-4 TRL at Conclusion: 6-7 Background Information and S&T Challenges: Non-availability of a low cost 3D skid scanning systems; Increasing volume of goods due to e-commerce that necessitate faster screening without losing detection ability; Poor environmental factors for location of screening equipment; Extended operational hours, need for high MTBF and low MTTR factors> Transition Opportunities: Air cargo screening solutions must complete Operational Test and Evaluation (OT&E) at Government facilities. Systems that pass TSA tests will be added to their Air Cargo Screening Technology List (ACSTL). Private Air Cargo screening companies are only allowed to use systems on the ACSTL. Supporting Information and Links: https://www.tsa.gov/for-industry/cargo-programs https://www.dhs.gov/external/air-cargo-security-programs-tsa https://www.tsa.gov/sites/default/files/non-ssi_acstl.pdf Securing Aviation Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps Submit Industry Engagement Materials Research Area: Securing Aviation (SEC AVN) Priority R&D Need: Passenger Identification and Vetting Topic Number: SEC AVN 03-01 Topic Title: Screening at Speed- Passenger Screening Technologies Solicitation: ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 ) Topic Description: The Apex Screening at Speed Program is pursuing transformative R&D activities that support a future vision for increasing security effectiveness while dramatically reducing wait times and improving the passenger experience. These future capabilities will be interconnected through non-proprietary interfaces in a system of systems that is more secure, efficient, flexible, and adaptable than currently deployed sensors.
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p8
|
S&T seeks hardware and software technologies ... more The Apex Screening at Speed Program is pursuing transformative R&D activities that support a future vision for increasing security effectiveness while dramatically reducing wait times and improving the passenger experience. These future capabilities will be interconnected through non-proprietary interfaces in a system of systems that is more secure, efficient, flexible, and adaptable than currently deployed sensors. S&T seeks hardware and software technologies that assist in screening three hundred or more passengers per hour with minimal need for divestiture of headwear, footwear or personal items. Technologies shall contribute to a system of systems that provides detection at TSA's highest security detection standards. Technologies would ideally be capable of adapting or upgrading quickly to respond to emerging threats. Of highest interest are technologies that contribute to a system of systems that can adapt dynamically to TSA-provided individual risk assessments. Technologies shall be networkable and support cybersecurity best practices. less Topic Research Type: Type II, Type III Detection Explosives Physical Security Screening Securing Aviation Sensor Software Topic Details/Information (Click here to expand) End Objective: The checkpoint of the future seeks to improve the passenger experience while enhancing detection capabilities. While the primary focus of the portfolio is on aviation security, technologies that also apply to other checkpoint scenarios (other modes of transportation, special events, etc.) are of interest as well. S&T understands that 'silver bullet' technologies that solve all possible threat scenarios are unlikely, and welcomes unique research materials regarding new capabilities that address specific threats within a broader system-of-systems security architecture.
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p9
|
TRL Sought: 4-7 TRL at Conclusion: 7-8 Transition Customer or Program: Transportation Security Administration (TSA) Background Information and S&T Challenges: S&T is especially interested in technology that minimizes the Government's lifecycle costs and facilitates integration in a modular fashion. As such, S&T may prioritize the development of technology that better leverages open architectures, interfaces, and standards, or has additional utility in other markets that drive more favorable economies of scale. Technology that can readily adapt to multiple concepts of operations (e.g., to different threat environments, requirements for throughput, passenger risk assessments, etc.) is of special interest. Transition Opportunities: Systems that meet or exceed TSA's demanding security standards for aviation may be acquired through TSA's Passenger Screening Program. These systems may also be candidates for venues such as critical buildings, stadiums, and other modes of transportation. Additionally, TSA-qualified screening systems may adapt with minimal modification to aviation security needs in other nations. Supporting Information and Links: Apex Screening at Speed Apex Screening at Speed Infographic Securing Aviation Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps Submit Industry Engagement Materials Research Area: Securing Aviation (SEC AVN) Priority R&D Need: Rapid Detection and Alarming of Explosives Topic Number: SEC AVN 04-01 Topic Title: Detection Canines- Canine Structure and Function Solicitation: ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p10
|
Topic Description: Canine R&D Structure and Function, part of the program focusing on the more basic understanding of canine behavior, genetics, olfaction and cognition of this detector to improve operational efficiencies and training methods. Canine R&D Structure and Function, part of the program focusing on the more basic understanding of canine behavior, genetics, olfaction and cognition of this detector to improve operational efficiencies and training methods. less Topic Research Type: Type I Canine Detection Explosives Narcotics Securing Aviation Test & Evaluation Topic Details/Information (Click here to expand) End Objective: Tools, techniques, and knowledge to better understand, train, and utilize the detection canine, and improve proficiency of the DHS/Homeland Security Enterprise (HSE) detection canine teams. TRL Sought: 4-6 TRL at Conclusion: 7 Background Information and S&T Challenges: Detection Canine Technologies: Development of non-hazardous emerging threat and conventional explosive training aids with a specific focus on pure odor materials, not pseudo scents. Detection focus not limited to explosive threats but to include all detection canine threat vectors including narcotics, human detection, cadaver detection, infectious disease detection, and currency, for example. Operational efficacy, safety and cost are major metrics of success. Technologies and methodologies that advance detection canine performance in controlled and operational environments representative of the Homeland Security Enterprise at the federal, state and local level and facilitate scientifically significant data capture through independent operational test and evaluation. Specific focus on studies and training protocols that facilitate the reduction in the number of trained odors required for comprehensive canine detection proficiency. Canine R&D to support better understanding of the canine structure and function to include canine behavior, genetics, olfaction and cognition of the detector to improve operational efficiencies and training methods.
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p11
|
S&T goals are to provide our customer base - TSA and the Homeland Security Enterprise (HSE) - with the tools, techniques, and knowledge to better understand, train, and utilize the detection canine, and improve proficiency of the DHS/HSE detection canine teams. Provide an enduring research and development capability to the Homeland Security Enterprise with a unique focal point and knowledge base for detection canines by establishing a scientifically rigorous, statistically significant approach for the detection canine community that is currently absent in the industry. Transition Opportunities: The potential exists for licensing and commercialization of non-hazardous canine training aids that may serve the over 16,000 detection canine teams nationwide across all threat disciplines. Knowledge products and methodologies have been successful in receiving patents and facilitated various levels of commercialized products. Supporting Information and Links: https://www.dhs.gov/science-and-technology/Explosives-Detection-Canine-Program Securing Aviation Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps Submit Industry Engagement Materials Research Area: Securing Aviation (SEC AVN) Priority R&D Need: Rapid Detection and Alarming of Explosives Topic Number: SEC AVN 04-02 Topic Title: Detection Canines- Development and Testing of Canine Training Aids Solicitation: ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 ) Topic Description: Development and Testing of Canine Training Aids, specifically targeting the creation of low cost, non-hazardous emerging threat and conventional explosive training aids, with state-of-the-art laboratory technology for odor validation to the level of canine detection. The program is also interested in odor generalization analysis studies to reduce requisite numbers of trained odors.
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p12
|
Development and Testing of Canine Training Aids, specifically targeting the creation of low cost, non-hazardous emerging threat and conventional explosive training aids, with state-of-the-art laboratory technology for odor validation to the level of canine detection. The program is also interested in odor generalization analysis studies to reduce requisite numbers of trained odors. less Topic Research Type: Type II Canine Detection Explosives Narcotics Securing Aviation Test & Evaluation Topic Details/Information (Click here to expand) End Objective: Tools, techniques, and knowledge to better understand, train, and utilize the detection canine, and improve proficiency of the DHS/Homeland Security Enterprise (HSE) detection canine teams. TRL Sought: 4-6 TRL at Conclusion: 7 Background Information and S&T Challenges: Detection Canine Technologies: Development of non-hazardous emerging threat and conventional explosive training aids with a specific focus on pure odor materials, not pseudo scents. Detection focus not limited to explosive threats but to include all detection canine threat vectors including narcotics, human detection, cadaver detection, infectious disease detection, and currency, for example. Operational efficacy, safety and cost are major metrics of success. Technologies and methodologies that advance detection canine performance in controlled and operational environments representative of the Homeland Security Enterprise at the federal, state and local level and facilitate scientifically significant data capture through independent operational test and evaluation. Specific focus on studies and training protocols that facilitate the reduction in the number of trained odors required for comprehensive canine detection proficiency. Canine R&D to support better understanding of the canine structure and function to include canine behavior, genetics, olfaction and cognition of the detector to improve operational efficiencies and training methods.
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p13
|
S&T goals are to provide our customer base - TSA and the Homeland Security Enterprise (HSE) - with the tools, techniques, and knowledge to better understand, train, and utilize the detection canine, and improve proficiency of the DHS/HSE detection canine teams. Provide an enduring research and development capability to the Homeland Security Enterprise with a unique focal point and knowledge base for detection canines by establishing a scientifically rigorous, statistically significant approach for the detection canine community that is currently absent in the industry. Transition Opportunities: The potential exists for licensing and commercialization of non-hazardous canine training aids that may serve the over 16,000 detection canine teams nationwide across all threat disciplines. Knowledge products and methodologies have been successful in receiving patents and facilitated various levels of commercialized products. Supporting Information and Links: S&T Detection Canine Webpage Securing Aviation Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps Submit Industry Engagement Materials Research Area: Securing Aviation (SEC AVN) Priority R&D Need: Rapid Detection and Alarming of Explosives Topic Number: SEC AVN 04-03 Topic Title: Detection Canines- Canine Test and Evaluation Solicitation: ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 ) Topic Description: Development and Testing of Canine Training Aids, specifically targeting the creation of low cost, non-hazardous emerging threat and conventional explosive training aids, with state-of-the-art laboratory technology for odor validation to the level of canine detection. The Program is also interested in odor generalization analysis studies to reduce requisite numbers of trained odors.
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p14
|
Development and Testing of Canine Training Aids, specifically targeting the creation of low cost, non-hazardous emerging threat and conventional explosive training aids, with state-of-the-art laboratory technology for odor validation to the level of canine detection. The Program is also interested in odor generalization analysis studies to reduce requisite numbers of trained odors. less Topic Research Type: Type III Canine Detection Explosives Narcotics Opioids Securing Aviation Test & Evaluation Topic Details/Information (Click here to expand) End Objective: Tools, techniques, and knowledge to better understand, train, and utilize the detection canine, and improve proficiency of the DHS/Homeland Security Enterprise (HSE) detection canine teams. TRL Sought: 7-8 TRL at Conclusion: 8 Background Information and S&T Challenges: Detection Canine Technologies: Development of non-hazardous emerging threat and conventional explosive training aids with a specific focus on pure odor materials, not pseudo scents. Detection focus not limited to explosive threats but to include all detection canine threat vectors including narcotics, human detection, cadaver detection, infectious disease detection, and currency, for example. Operational efficacy, safety and cost are major metrics of success. Technologies and methodologies that advance detection canine performance in controlled and operational environments representative of the Homeland Security Enterprise at the federal, state and local level and facilitate scientifically significant data capture through independent operational test and evaluation. Specific focus on studies and training protocols that facilitate the reduction in the number of trained odors required for comprehensive canine detection proficiency. Canine R&D to support better understanding of the canine structure and function to include canine behavior, genetics, olfaction and cognition of the detector to improve operational efficiencies and training methods.
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p15
|
S&T goals are to provide our customer base - TSA and the Homeland Security Enterprise (HSE) - with the tools, techniques, and knowledge to better understand, train, and utilize the detection canine, and improve proficiency of the DHS/HSE detection canine teams. Provide an enduring research and development capability to the Homeland Security Enterprise with a unique focal point and knowledge base for detection canines by establishing a scientifically rigorous, statistically significant approach for the detection canine community that is currently absent in the industry. Transition Opportunities: The potential exists for licensing and commercialization of non-hazardous canine training aids that may serve the over 16,000 detection canine teams nationwide across all threat disciplines. Knowledge products and methodologies have been successful in receiving patents and facilitated various levels of commercialized products. Supporting Information and Links: S&T Detection Canine Webpage Securing Aviation Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps Submit Industry Engagement Materials Research Area: Securing Aviation (SEC AVN) Priority R&D Need: Rapid Detection and Alarming of Explosives Topic Number: SEC AVN 04-04 Topic Title: Explosive Detection in Checked Baggage- Advanced Algorithms and System Integration Solicitation: ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 ) Topic Description: Development and maturation of threat detection and false alarm reduction algorithms, for explosives, their precursors, and/or other prohibited items; the integration of these algorithms into operational or prototype systems; and demonstration of these algorithms in real time operation. The algorithms should be deployable to improve performance of existing or future EDS systems.
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p16
|
Development and maturation of threat detection and false alarm reduction algorithms, for explosives, their precursors, and/or other prohibited items; the integration of these algorithms into operational or prototype systems; and demonstration of these algorithms in real time operation. The algorithms should be deployable to improve performance of existing or future EDS systems. less Topic Research Type: Type I, Type II Detection Explosives Narcotics Screening Securing Aviation Security Sensor Software Topic Details/Information (Click here to expand) End Objective: The Checked Baggage Program seeks to improve detection capabilities of currently deployed EDS systems as well as create novel approaches to solve explosive detection. While the primary focus of the portfolio is on aviation security, technologies that also apply to other checked baggage scenarios (check point scenarios, other modes of transportation, special events, etc.) are of interest as well. S&T understands that 'silver bullet' technologies that solve all possible threat scenarios are unlikely, and welcomes unique research materials regarding new capabilities that address specific threats within a broader system-of-systems security architecture. TRL Sought: 3-4 TRL at Conclusion: 6-7 Background Information and S&T Challenges: S&T is especially interested in technology that minimizes the Government's lifecycle costs and facilitates integration in a modular fashion. As such, S&T may prioritize the development of technology that better leverages open architectures, interfaces, and standards, or has additional utility in other markets that drive more favorable economies of scale. In particular, reductions in false alarm rate are a huge opportunity for operational cost savings. Technology that can readily adapt to multiple concepts of operations (to different threat environments, requirements for throughput, passenger risk assessments, etc.) is of special interest.
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p17
|
Transition Opportunities: Successfully developed algorithms and software that meet or exceed TSA's demanding security standards for aviation may be candidates for usage at over 5,000 airports, scanning over 1.3 million pieces of checked luggage daily, across the country. As even small improvements in false alarm rates can save TSA millions of dollars annually, transition of successful developments is well-motivated. Transition would be to TSA's Office of Requirements and Capabilities Analysis (ORCA) or other appropriate office. Additionally, TSA-qualified screening systems may adapt with minimal modification to aviation security needs in other nations. Screening solutions must complete Operational Test and Evaluation (OT&E) at Government facilities. Supporting Information and Links: https://www.dhs.gov/science-and-technology/checked-baggage https://www.tsa.gov/blog/tags/checked-baggage-screening https://www.tsa.gov/travel/security-screening Securing Aviation Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps Submit Industry Engagement Materials Research Area: Securing Aviation (SEC AVN) Priority R&D Need: Rapid Detection and Alarming of Explosives Topic Number: SEC AVN 04-05 Topic Title: Explosive Detection in Checked Baggage- Development and Maturation of System Components and Subsystems Solicitation: ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 ) Topic Description: Development and maturation of system components (such as X-ray Sources and Detectors) with performance and advanced characteristics necessary to evolve laboratory and experimental prototypes into full up X-ray system designs able to meet the Advanced X-ray Systems requirements. This includes multi-energy and spectroscopic array-capable detectors, sources which support adaptive and diffractive imaging, and general improvements in efficiency and resolution. Components ma ... more
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p18
|
Development and maturation of system components (such as X-ray Sources and Detectors) with performance and advanced characteristics necessary to evolve laboratory and experimental prototypes into full up X-ray system designs able to meet the Advanced X-ray Systems requirements. This includes multi-energy and spectroscopic array-capable detectors, sources which support adaptive and diffractive imaging, and general improvements in efficiency and resolution. Components may be used upgrade existing systems or serve as key elements of novel system design. less Topic Research Type: Type I, Type II Detection Explosives Screening Securing Aviation Security Sensor Software Topic Details/Information (Click here to expand) End Objective: The Checked Baggage Program seeks to improve detection capabilities of currently deployed EDS systems as well as create novel approaches to solve explosive detection. While the primary focus of the portfolio is on aviation security, technologies that also apply to other checked baggage scenarios (check point scenarios, other modes of transportation, special events, etc.) are of interest as well. S&T understands that 'silver bullet' technologies that solve all possible threat scenarios are unlikely, and welcomes unique research materials regarding new capabilities that address specific threats within a broader system-of-systems security architecture. TRL Sought: 3-4 TRL at Conclusion: 6-7 Transition Customer or Program: Transportation Security Administration (TSA) Background Information and S&T Challenges: S&T is especially interested in system components which minimize the Government's lifecycle costs and facilitates integration in a modular fashion. As such, S&T may prioritize the development of technology that better leverages open architectures, interfaces, and standards, or has additional utility in other markets that drive more favorable economies of scale. Technology that can readily adapt to multiple concepts of operations (e.g., to different threat environments, requirements for throughput, passenger risk assessments, etc.) is of special interest.
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p19
|
Transition Opportunities: System components that meet or exceed TSA's demanding security standards for aviation may be candidates for inclusion in systems at over 5,000 airports, scanning over 1.3 million pieces of checked luggage daily, across the country. As even small improvements in false alarm rates can save TSA millions of dollars annually, transition of successful developments is well-motivated. Transition would be to TSA's Office of Requirements and Capabilities Analysis (ORCA) or other appropriate office. Additionally, TSA-qualified screening systems may adapt with minimal modification to aviation security needs in other nations. Screening solutions must complete Operational Test and Evaluation (OT&E) at Government facilities. Supporting Information and Links: https://www.dhs.gov/science-and-technology/checked-baggage https://www.tsa.gov/blog/tags/checked-baggage-screening https://www.tsa.gov/travel/security-screening Securing Aviation Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps Submit Industry Engagement Materials Research Area: Securing Aviation (SEC AVN) Priority R&D Need: Rapid Detection and Alarming of Explosives Topic Number: SEC AVN 04-06 Topic Title: Explosive Detection in Checked Baggage- Advanced X-Ray System Development Solicitation: ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 ) Topic Description: Development and testing of full up system engineering design models (EDMs) (TRL 6-7 level of maturity). The goal is to achieve a significantly enhanced capability to robustly detect explosive threats, reduce primary baggage screening false alarm rates on all explosive threat classes, and increase passenger baggage screening throughput under real life operating conditions. The government seeks novel system concepts or novel improvements to existing system designs which w ... more
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p20
|
Development and testing of full up system engineering design models (EDMs) (TRL 6-7 level of maturity). The goal is to achieve a significantly enhanced capability to robustly detect explosive threats, reduce primary baggage screening false alarm rates on all explosive threat classes, and increase passenger baggage screening throughput under real life operating conditions. The government seeks novel system concepts or novel improvements to existing system designs which will deliver enhanced operational performance. less Topic Research Type: Type I, Type II Detection Explosives Narcotics Screening Securing Aviation Security Sensor Software Topic Details/Information (Click here to expand) End Objective: The Checked Baggage Program seeks to improve detection capabilities of currently deployed systems as well as create novel approaches to solve explosive detection. While the primary focus of the portfolio is on aviation security, technologies that also apply to other checked baggage scenarios (check point scenarios, other modes of transportation, special events, etc.) are of interest as well. S&T understands that 'silver bullet' technologies that solve all possible threat scenarios are unlikely, and welcomes unique research materials regarding new capabilities that address specific threats within a broader system-of-systems security architecture. TRL Sought: 3-4 TRL at Conclusion: 6-7 Transition Customer or Program: Transportation Security Administration (TSA) Background Information and S&T Challenges: S&T is especially interested in technology that minimizes the Government's lifecycle costs and facilitates integration in a modular fashion. As such, S&T may prioritize the development of technology that better leverages open architectures, interfaces, and standards, or has additional utility in other markets that drive more favorable economies of scale. Technology that can readily adapt to multiple concepts of operations (e.g., to different threat environments, requirements for throughput, passenger risk assessments, etc.) is of special interest.
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p21
|
Transition Opportunities: Systems that meet or exceed TSA's demanding security standards for aviation may be candidates for airport usage across the country. Additionally, TSA-qualified screening systems may adapt with minimal modification to aviation security needs in other nations. Screening solutions must complete Operational Test and Evaluation (OT&E) at Government facilities. Supporting Information and Links: https://www.dhs.gov/science-and-technology/checked-baggage https://www.tsa.gov/blog/tags/checked-baggage-screening https://www.tsa.gov/travel/security-screening Securing Aviation Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps Submit Industry Engagement Materials Research Area: Securing Aviation (SEC AVN) Priority R&D Need: Rapid Detection and Alarming of Explosives Topic Number: SEC AVN 04-07 Topic Title: Explosive Detection in Checked Baggage- Test and Evaluation Solicitation: ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 ) Topic Description: Third-party test and evaluation capabilities relevant to aviation security and similar environments. Test articles which provide meaningful simulation of the checked baggage explosive detection environment. Analytical capabilities which will allow rapid, meaningful determination of system performance and provide direction for future system development. Specialized modeling and simulation capabilities that inform and support testing and evaluation activities are also of ... more Third-party test and evaluation capabilities relevant to aviation security and similar environments. Test articles which provide meaningful simulation of the checked baggage explosive detection environment. Analytical capabilities which will allow rapid, meaningful determination of system performance and provide direction for future system development. Specialized modeling and simulation capabilities that inform and support testing and evaluation activities are also of interest. less
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p22
|
Topic Research Type: Type III Detection Explosives Screening Securing Aviation Security Sensor Software Topic Details/Information (Click here to expand) End Objective: The Checked Baggage Program seeks to improve detection capabilities of currently deployed EDS systems as well as create novel approaches to solve explosive detection. While the primary focus of the portfolio is on aviation security, technologies that also apply to other checked baggage scenarios (check point scenarios, other modes of transportation, special events, etc.) are of interest as well. S&T understands that 'silver bullet' technologies that solve all possible threat scenarios are unlikely, and welcomes unique research materials regarding new capabilities that address specific threats within a broader system-of-systems security architecture. TRL Sought: 9 TRL at Conclusion: 9 Transition Customer or Program: Transportation Security Administration (TSA) Background Information and S&T Challenges: S&T routinely performs feasibility analysis and developmental testing at a small number of locations. As these locations have to prioritize operational evaluation of equipment as directed by TSA, testing availability for S&T projects and vendors is sometimes limited. S&T is interested in technological developments that expands third-party testing opportunities in a regular and standardized fashion. S&T may prioritize the development of technology that better leverages open architectures, interfaces, and standards, or has additional utility in other markets that drive more favorable economies of scale. Technology that can readily adapt to the testing of multiple concepts of operations (e.g., to different threat environments, requirements for throughput, passenger risk assessments, etc.) is of special interest.
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p23
|
Transition Opportunities: Systems or test articles that allowing meaningful testing to occur may transition to TSL or be used by the government on a routine recurring basis consistent with program development cycles and test opportunities. Additionally, qualified test articles and system may adapt with minimal modification to aviation security development needs in other nations. Solutions must complete Operational Test and Evaluation (OT&E) at Government facilities. Supporting Information and Links: https://www.dhs.gov/science-and-technology/checked-baggage https://www.tsa.gov/blog/tags/checked-baggage-screening https://www.tsa.gov/travel/security-screening Securing Aviation Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps Submit Industry Engagement Materials Research Area: Securing Aviation (SEC AVN) Priority R&D Need: Distinguishing Threats from Non-threats on Passengers Topic Number: SEC AVN 05-01 Topic Title: Screening at Speed- Passenger Analysis Solicitation: ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 ) Topic Description: The Apex Screening at Speed Program is pursuing transformative R&D activities that support a future vision for increasing security effectiveness while dramatically reducing wait times and improving the passenger experience. These future capabilities will be interconnected through non-proprietary interfaces in a system of systems that is more secure, efficient, flexible, and adaptable than currently deployed sensors. S&T seeks hardware and software technologies t ... more The Apex Screening at Speed Program is pursuing transformative R&D activities that support a future vision for increasing security effectiveness while dramatically reducing wait times and improving the passenger experience. These future capabilities will be interconnected through non-proprietary interfaces in a system of systems that is more secure, efficient, flexible, and adaptable than currently deployed sensors.
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p24
|
S&T seeks hardware and software technologies that identify and assess the security risk presented by passengers at the aviation checkpoint. These technologies may be intended for deployment within the immediate checkpoint, or in a more distributed fashion throughout an airport or similar venue. All systems should conform to cybersecurity best practices and support capabilities to enable risk-based screening as well as TSA's Security Technology Integration Program (STIP). less Topic Research Type: Type II, Type III Detection Explosives Physical Security Securing Aviation Sensor Software Topic Details/Information (Click here to expand) End Objective: The checkpoint of the future seeks to improve the passenger experience while enhancing detection capabilities. While the primary focus of the portfolio is on aviation security, technologies that also apply to other checkpoint scenarios (other modes of transportation, special events, etc.) are of interest as well. S&T understands that 'silver bullet' technologies that solve all possible threat scenarios are unlikely, and welcomes proposals regarding new capabilities that address specific threats within a broader system-of-systems security architecture. TRL Sought: 4-7 TRL at Conclusion: 7-8 Transition Customer or Program: Transportation Security Administration (TSA) Background Information and S&T Challenges: S&T is especially interested in technology that minimizes the Government's lifecycle costs and facilitates integration in a modular fashion. As such, S&T may prioritize the development of technology that better leverages open architectures, interfaces, and standards, or has additional utility in other markets that drive more favorable economies of scale. Technology that can readily adapt to multiple concepts of operations (e.g., to different threat environments, requirements for throughput, passenger risk assessments, etc.) is of special interest.
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p25
|
Transition Opportunities: Systems that meet or exceed TSA's demanding security standards for aviation may also be candidates for venues such as critical buildings, stadiums, and other modes of transportation. Additionally, TSA-qualified screening systems may adapt with minimal modification to aviation security needs in other nations. Supporting Information and Links: Apex Screening at Speed Apex Screening at Speed Infographic Securing Aviation Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps Submit Industry Engagement Materials Research Area: Securing Aviation (SEC AVN) Priority R&D Need: Efficient and Accurate Detection of Complex Threat Concealment on Passengers and Carried Property Topic Number: SEC AVN 06-01 Topic Title: Screening at Speed- Accessible Property Screening Solicitation: ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 ) Topic Description: The Apex Screening at Speed Program is pursuing transformative R&D activities that support a future vision for increasing security effectiveness while dramatically reducing wait times and improving the passenger experience. These future capabilities will be interconnected through non-proprietary interfaces in a system of systems that is more secure, efficient, flexible, and adaptable than currently deployed sensors. S&T seeks hardware and software technologies t ... more The Apex Screening at Speed Program is pursuing transformative R&D activities that support a future vision for increasing security effectiveness while dramatically reducing wait times and improving the passenger experience. These future capabilities will be interconnected through non-proprietary interfaces in a system of systems that is more secure, efficient, flexible, and adaptable than currently deployed sensors.
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p26
|
S&T seeks hardware and software technologies that screen the accessible property of three hundred or more passengers per hour with minimal need for the separation of liquids, aerosols, gels, or electronics from baggage. Technologies shall contribute to a system of systems that provides detection at TSA's highest security detection standards. These technologies would be able to be certified to TSA's Accessible Property Screening System standards standalone or when integrated with other systems. Technologies would ideally be capable of adapting or upgrading quickly to respond to emerging threats. Of highest interest are technologies that contribute to a system of systems that can adapt dynamically to TSA-provided individual risk assessments. All systems should conform to cybersecurity best practices and support capabilities to enable risk-based screening as well as TSA's Security Technology Integration Program (STIP). less Topic Research Type: Type II, Type III Detection Explosives Physical Security Screening Securing Aviation Sensor Software Topic Details/Information (Click here to expand) End Objective: S&T seeks systems that can meet or exceed TSA's Accessible Property Screening System security standards, and significantly accelerate the overall throughput of accessible property. This acceleration may come from a reduction in the current need to divest certain items (electronics, liquids, aerosols, gels, etc.) from bags, a reduction of false alarms, faster processing, improved human-systems integration with Transportation Security Officers, or other means. While the primary focus of the portfolio is on aviation security, technologies that also apply to other checkpoint scenarios (other modes of transportation, special events, etc.) are of interest as well. S&T understands that 'silver bullet' technologies that solve all possible threat scenarios are unlikely, and welcomes unique research materials regarding new capabilities that address specific threats within a broader system-of-systems security architecture.
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p27
|
TRL Sought: 4-7 TRL at Conclusion: 7-8 Transition Customer or Program: Transportation Security Administration (TSA) Background Information and S&T Challenges: S&T is especially interested in technology that minimizes the Government's lifecycle costs and facilitates integration in a modular fashion. As such, S&T may prioritize the development of technology that better leverages open architectures, interfaces, and standards, or has additional utility in other markets that drive more favorable economies of scale. Technology that can readily adapt to multiple concepts of operations (e.g., to different threat environments, requirements for throughput, passenger risk assessments, etc.) is of special interest. Transition Opportunities: Systems that meet or exceed TSA's demanding security standards for aviation may also be candidates for venues such as critical buildings, stadiums, and other modes of transportation. Additionally, TSA-qualified screening systems may adapt with minimal modification to aviation security needs in other nations. Supporting Information and Links: Apex Screening at Speed Apex Screening at Speed Infographic Securing Aviation Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps Submit Industry Engagement Materials Research Area: Securing Aviation (SEC AVN) Priority R&D Need: Efficient and Accurate Detection of Complex Threat Concealment on Passengers and Carried Property Topic Number: SEC AVN 06-02 Topic Title: Screening at Speed- Enabling Capabilities Solicitation: ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 )
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p28
|
Topic Description: The Apex Screening at Speed Program is pursuing transformative R&D activities that support a future vision for increasing security effectiveness while dramatically reducing wait times and improving the passenger experience. These future capabilities will be interconnected through non-proprietary interfaces in a system of systems that is more secure, efficient, flexible, and adaptable than currently deployed sensors. S&T seeks component technologies that improve ... more The Apex Screening at Speed Program is pursuing transformative R&D activities that support a future vision for increasing security effectiveness while dramatically reducing wait times and improving the passenger experience. These future capabilities will be interconnected through non-proprietary interfaces in a system of systems that is more secure, efficient, flexible, and adaptable than currently deployed sensors. S&T seeks component technologies that improve the overall capabilities of traditional checkpoint systems and their operators. These upgrades, complements, or add-ons to systems may bolster an existing capability (such as passenger screening systems or accessible property screening systems), add a new and orthogonal capability, or improve the passenger or operator experience while maintaining current security capabilities. Unique research materials to alter existing security systems should be bolstered by engagement and support with the appropriate vendors. All systems should conform to cybersecurity best practices and support capabilities to enable risk-based screening as well as TSA's Security Technology Integration Program (STIP). less
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p29
|
Topic Research Type: Type II, Type III Detection Explosives Physical Security Screening Securing Aviation Sensor Software Topic Details/Information (Click here to expand) End Objective: The checkpoint of the future seeks to improve the passenger experience while enhancing detection capabilities. While the primary focus of the portfolio is on aviation security, technologies that also apply to other checkpoint scenarios (other modes of transportation, special events, etc.) are of interest as well. S&T understands that 'silver bullet' technologies that solve all possible threat scenarios are unlikely, and welcomes unique research materials regarding new capabilities that address specific threats within a broader system-of-systems security architecture. TRL Sought: 4-7 TRL at Conclusion: 7-8 Transition Customer or Program: Transportation Security Administration (TSA) Background Information and S&T Challenges: S&T is especially interested in technology that minimizes the Government's lifecycle costs and facilitates integration in a modular fashion. S&T's challenge is to deliver systems that can be maintained, adapted, and upgraded in an efficient manner. As such, S&T may prioritize the development of technology that better leverages open architectures, interfaces, and standards, or has additional utility in other markets that drive more favorable economies of scale. Technology that can readily adapt to multiple concepts of operations (e.g., to different threat environments, requirements for throughput, passenger risk assessments, etc.) is of special interest. Transition Opportunities: Systems that meet or exceed TSA's demanding security standards for aviation may also be candidates for venues such as critical buildings, stadiums, and other modes of transportation. Additionally, TSA-qualified screening systems may adapt with minimal modification to aviation security needs in other nations.
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p30
|
Supporting Information and Links: Apex Screening at Speed Apex Screening at Speed Infographic Securing Aviation Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps Submit Industry Engagement Materials Research Area: Securing Aviation (SEC AVN) Priority R&D Need: Efficient and Accurate Detection of Complex Threat Concealment on Passengers and Carried Property Topic Number: SEC AVN 06-03 Topic Title: Screening at Speed- Security Architecture Solicitation: ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 ) Topic Description: The Apex Screening at Speed Program is pursuing transformative R&D activities that support a future vision for increasing security effectiveness while dramatically reducing wait times and improving the passenger experience. These future capabilities will be interconnected through non-proprietary interfaces in a system of systems that is more secure, efficient, flexible, and adaptable than currently deployed sensors. Current checkpoints consist of sensors (X-ray ... more The Apex Screening at Speed Program is pursuing transformative R&D activities that support a future vision for increasing security effectiveness while dramatically reducing wait times and improving the passenger experience. These future capabilities will be interconnected through non-proprietary interfaces in a system of systems that is more secure, efficient, flexible, and adaptable than currently deployed sensors. Current checkpoints consist of sensors (X-ray systems, bottled liquid scanners, passenger screening systems, explosive trace detection systems, etc.) that operate relatively independently. S&T seeks designs and implementation plans for gaining improved performance by integrating existing or future security capabilities into a system of systems. Proposed architectures may have creative means to combine layouts, primary screening modalities, secondary screening and alarm resolution capabilities, distributed sensors, analytics, data from beyond the traditional checkpoint, and other parameters that improve the overall security posture. Performance upgrades may encompass improved security, throughput, passenger experience, reliability, or other factors. All components should conform to cybersecurity best practices and support capabilities to enable risk-based screening as well as TSA's Security Technology Integration Program (STIP). less
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p31
|
Topic Research Type: Type II, Type III Detection Explosives Physical Security Screening Securing Aviation Sensor Software Topic Details/Information (Click here to expand) End Objective: The checkpoint of the future seeks to improve the passenger experience while enhancing detection capabilities. While the primary focus of the portfolio is on aviation security, technologies that also apply to other checkpoint scenarios (other modes of transportation, special events, etc.) are of interest as well. S&T understands that 'silver bullet' technologies that solve all possible threat scenarios are unlikely, and welcomes unique research materials regarding new capabilities that address specific threats within a broader system-of-systems security architecture. The end objective includes systems that are interconnected to collect and utilize security data more effectively to meet TSA's highest security standards at throughputs of 300+ passengers per lane, per hour. The systems will also more efficiently occupy space at the checkpoint to optimize value per square foot. TRL Sought: 4-7 TRL at Conclusion: 7-8 Transition Customer or Program: Transportation Security Administration (TSA) Background Information and S&T Challenges: S&T is challenged to move from the current "standalone" architecture employed at the checkpoint to a more efficient, integrated concept. To meet the challenge, S&T needs to maintain data integrity, cybersecurity, and effective analytics in modular configurations that can be adapted, upgraded, and reconfigured based on evolving operational requirements. S&T is especially interested in technology that minimizes the Government's lifecycle costs and facilitates integration in a modular fashion. As such, S&T may prioritize the development of technology that better leverages open architectures, interfaces, and standards, or has additional utility in other markets that drive more favorable economies of scale. Technology that can readily adapt to multiple concepts of operations (e.g., to different threat environments, requirements for throughput, passenger risk assessments, etc.) is of special interest.
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p32
|
Transition Opportunities: Systems that meet or exceed TSA's demanding security standards for aviation may also be candidates for venues such as critical buildings, stadiums, and other modes of transportation. Additionally, TSA-qualified screening systems may adapt with minimal modification to aviation security needs in other nations. Supporting Information and Links: Apex Screening at Speed Apex Screening at Speed Infographic Securing Aviation Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps Submit Industry Engagement Materials Research Area: Securing Aviation (SEC AVN) Priority R&D Need: Efficient and Accurate Detection of Complex Threat Concealment on Passengers and Carried Property Topic Number: SEC AVN 06-04 Topic Title: Screening at Speed- Test and Evaluation Solicitation: ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 ) Topic Description: The Apex Screening at Speed Program is pursuing transformative R&D activities that support a future vision for increasing security effectiveness while dramatically reducing wait times and improving the passenger experience. These future capabilities will be interconnected through non-proprietary interfaces in a system of systems that is more secure, efficient, flexible, and adaptable than currently deployed sensors. S&T seeks third-party test and evaluati ... more The Apex Screening at Speed Program is pursuing transformative R&D activities that support a future vision for increasing security effectiveness while dramatically reducing wait times and improving the passenger experience. These future capabilities will be interconnected through non-proprietary interfaces in a system of systems that is more secure, efficient, flexible, and adaptable than currently deployed sensors.
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p33
|
S&T seeks third-party test and evaluation checkpoint capabilities relevant to aviation security and similar environments to accelerate the certification and deployment of checkpoint screening systems under TSA's Passenger Screening Program and Electronic Baggage Screening Program. Specialized modeling and simulation capabilities that inform, accelerate, develop and support testing and evaluation activities are also of interest. less Topic Research Type: Type II, Type III Detection Explosives Physical Security Screening Securing Aviation Sensor Software Topic Details/Information (Click here to expand) End Objective: The checkpoint of the future seeks to improve the passenger experience while enhancing detection capabilities. While the primary focus of the portfolio is on aviation security, technologies that also apply to other checkpoint scenarios (other modes of transportation, special events, etc.) are of interest as well. S&T understands that 'silver bullet' technologies that solve all possible threat scenarios are unlikely, and welcomes unique research materials regarding new capabilities that address specific threats within a broader system-of-systems security architecture. TRL Sought: 4-7 TRL at Conclusion: 7-8 Transition Customer or Program: Transportation Security Administration (TSA) Background Information and S&T Challenges: S&T is especially interested in technology that minimizes the Government's lifecycle costs and facilitates integration in a modular fashion. As such, S&T may prioritize the development of technology that better leverages open architectures, interfaces, and standards, or has additional utility in other markets that drive more favorable economies of scale. Technology that can readily adapt to multiple concepts of operations (e.g., to different threat environments, requirements for throughput, passenger risk assessments, etc.) is of special interest.
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p34
|
Transition Opportunities: Systems that meet or exceed TSA's demanding security standards for aviation may also be candidates for venues such as critical buildings, stadiums, and other modes of transportation. Additionally, TSA-qualified screening systems may adapt with minimal modification to aviation security needs in other nations. Supporting Information and Links: Apex Screening at Speed Apex Screening at Speed Infographic Securing Aviation Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps Submit Industry Engagement Materials Research Area: Protecting from Terrorist Attacks (PROT) Priority R&D Need: Disease and Biological Threat Detection, Identification, and Classification in Field Operational Environments Topic Number: PROT 03-01 Topic Title: Foreign Animal Disease Vaccines and Diagnostics. Solicitation: ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 ) Topic Description: Apply biological-based, pathogen agnostic medical countermeasure vaccine and diagnostic platforms to develop foreign animal and emerging zoonotic livestock disease vaccines and diagnostic assays candidates for testing and evaluation. Provide conceptual design and implementation strategies for modeling and analysis of foreign animal and emerging zoonotic livestock disease pathogens (at regional and national scales). Product candidates are strongly recommended to have indu ... more Apply biological-based, pathogen agnostic medical countermeasure vaccine and diagnostic platforms to develop foreign animal and emerging zoonotic livestock disease vaccines and diagnostic assays candidates for testing and evaluation. Provide conceptual design and implementation strategies for modeling and analysis of foreign animal and emerging zoonotic livestock disease pathogens (at regional and national scales). Product candidates are strongly recommended to have industry involvement, and meet USDA CVB, National Veterinary Stockpile and/or National Animal Health Laboratory Network requirements (as applicable). less
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p35
|
Topic Research Type: Type I Agricultural Pathogen Diagnostics Protection-Terrorist Attacks Vaccine Virus Topic Details/Information (Click here to expand) End Objective: Expanding countermeasure discovery and development of new and emerging animal and zoonotic infectious diseases using cutting edge broad spectrum vaccines, and metaphylactic and biotherapeutic technologies. Developing end-user friendly, rapid diagnostic platforms for agricultural pathogens. TRL Sought: 3-5 TRL at Conclusion: 6-7 Transition Customer or Program: PIADC-USDA-DHS, APHIS, NBAF Background Information and S&T Challenges: New and improved animal pathogen vaccine platforms expressing multiple antigenic determinants to reduce the scope and number of individual vaccines (i.e., covering multiple serotypes to reduce the necessary number of vaccines that are needed for agricultural linked diseases. Improved and end-user friendly, portable and hand-held rapid detection and surveillance platforms and devices are also needed to provide front-line personnel the ability to screen and detect various viral diseases in livestock. S&T Challenges and Capability Gaps include few or no efforts to develop countermeasures on new and emerging animal and zoonotic diseases, or efforts on other veterinary species of agricultural importance with respect to transboundary animal diseases (e.g., ovine, caprine, avian). There are few or no efforts to develop veterinary adjuvant, and there is a lack of robust, next-generation adjuvant development programs for lead vaccine platforms. There is also a lack of countermeasure development projects focused on lead optimization, broad spectrum metaphylactic or biotherapeutic candidates for animal diseases. Finally, there is a requirement for end-user-friendly, rapid diagnostics and detection and surveillance methods and platforms for foreign animal diseases and zoonoses.
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p36
|
Transition Opportunities: Transition opportunities include multiple Federal and State agencies with responsibilities for the monitoring, protection (vaccinations and countermeasures), detection and surveillance against foreign animal diseases. DHS-PIADC-USDA, NBAF, APHIS, State Agricultural Agencies. Supporting Information and Links: Protecting from Terrorist Attacks Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps Submit Industry Engagement Materials Research Area: Securing Borders (SEC BORD) Priority R&D Need: Actionable Intelligence Gathering and Sharing Topic Number: SEC BORD 04-01 Topic Title: Human Trafficking and Modern Slavery Solicitation: ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 ) Topic Description: Improvements in this capability can include: (1)Research, development, tools, and technologies to improve the detection, analysis, and understanding of human trafficking, including contextual factors that may influence incidences and patterns of human trafficking; (2)knowledge to better understand human trafficking as a process and its impacts on individuals, communities, the United States, and the systems within; and (3)gap analysis to identify aspects of human traffic ... more Improvements in this capability can include: (1)Research, development, tools, and technologies to improve the detection, analysis, and understanding of human trafficking, including contextual factors that may influence incidences and patterns of human trafficking; (2)knowledge to better understand human trafficking as a process and its impacts on individuals, communities, the United States, and the systems within; and (3)gap analysis to identify aspects of human trafficking (victims or perpetrators) in greatest need of empirical research. less
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p37
|
Topic Research Type: Type I Human Trafficking Securing Borders Topic Details/Information (Click here to expand) End Objective: Advance operationally-relevant, end-user focused applied social and behavioral science research that will enable decision makers, inform policy makers, and assist operational partners in mitigating the human and monetary costs of human trafficking. TRL Sought: 1-3 TRL at Conclusion: 3 Transition Customer or Program: DHS Blue Campaign, Immigrations and Customs Enforcement, Customs and Border Protection, DHS Policy/Trade Policy Background Information and S&T Challenges: The Human Trafficking and Modern Slavery program will pursue evidence-based research to address the growing phenomenon of human trafficking. Worldwide there are an estimated 20.9 million victims of human trafficking, comprising an industry worth more than $150 billion in illegal profits. Given the scale, evolving nature, and complexity of human trafficking, combatting the problem poses a significant challenge, particularly for those on the front lines. Transition Opportunities: Opportunities for higher return on investment include leveraging and integrating findings and lessons learned to improve efficiency of operational components. Supporting Information and Links: Securing Borders Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps Submit Industry Engagement Materials Research Area: Securing Borders (SEC BORD) Priority R&D Need: Actionable Intelligence Gathering and Sharing Topic Number: SEC BORD 04-02 Topic Title: Non-Intrusive Screening of Cargo and Bulk Packages to Detect Synthetic Opioids and Other Illicit Drugs
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p38
|
Solicitation: ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 ) Topic Description: The ability to non-intrusively screen cargo, containers, or bulk packaged materials to detect synthetic opioids and other illicit drugs being smuggled into the United States at Border Ports of Entry (BPE) and International Mail Facilities (IMFs). Topic seeks technologies that result in improvements to screening capabilities for end-users to include (1)advanced technologies that offer three-dimensional imaging; (2)technologies that will enable end-users to discriminate il ... more The ability to non-intrusively screen cargo, containers, or bulk packaged materials to detect synthetic opioids and other illicit drugs being smuggled into the United States at Border Ports of Entry (BPE) and International Mail Facilities (IMFs). Topic seeks technologies that result in improvements to screening capabilities for end-users to include (1)advanced technologies that offer three-dimensional imaging; (2)technologies that will enable end-users to discriminate illicit materials from lawful materials; and (3)technologies that enable end-users to continue normal operations with minimal disruption to flow of commerce. less Topic Research Type: Type II Interdiction Narcotics Opioids Screening Securing Borders Sensor Topic Details/Information (Click here to expand) End Objective: A technology that improves non-intrusive screening capabilities to detect and interdict illicit drugs with minimal disruption to the flow of commerce, is likely to be adopted by end-users, and has a path to transition and/or commercialization.
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p39
|
TRL Sought: 5-7 TRL at Conclusion: 7-9 Background Information and S&T Challenges: The President's Commission on Combatting Drug Addiction and the Opioid Crisis final report recommended that DHS use additional technologies to detect and intercept synthetic opioids, like fentanyl, and other illicit drugs. The magnitude and urgency of the opioid crisis demands that S&T take an innovative approach to develop near-term deployable solutions that impact the supply of opioids entering the United States. The chemical and physical properties of synthetic opioids make detecting them in obscured bulk samples in an operational environment technically difficult. This topic seeks technologies that can improve the ability for end-users to rapidly scan cargo, containers, and other bulk packaged materials to detect synthetic opioids and other drugs, to include: (1)advanced technologies that offer three-dimensional imaging; (2)technologies that will enable end-users to discriminate illicit materials from lawful materials; and (3)technologies that enable end-users to continue normal operations with minimal disruption to flow of commerce. Offerors should consider the operational environment of DHS end-users at BPE and IMFs and factors that would facilitate successful transition/adoption. These factors include, but are not limited to, training and usability, ease of integration into existing operational environments, lifecycle costs, and reliability. These considerations should be part of an Offeror's transition strategy. Transition Opportunities: Opportunities for higher return on investment include patents and licenses and/or commercialization.
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p40
|
Supporting Information and Links: Securing Borders Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps Submit Industry Engagement Materials Research Area: Securing Cyberspace (SEC CYB) Priority R&D Need: Human Aspects of Cybersecurity-Associated/Related Efforts Topic Number: SEC CYB 02-01 Topic Title: Identity Management Solicitation: ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 ) Topic Description: Research and development of architectures, technologies and processes needed to enhance the security and trustworthiness of systems and services. Research and development of architectures, technologies and processes needed to enhance the security and trustworthiness of systems and services. less Topic Research Type: Type I, Type II, Type III Algorithms Biometrics Cyber Forensics Identity Internet Privacy Securing Cyber Topic Details/Information (Click here to expand) End Objective: Architectures, technologies and processes needed to enhance the security and trustworthiness of systems and services. TRL Sought: TRL at Conclusion: Transition Customer or Program: DHS Components, Homeland Security Enterprise Background Information and S&T Challenges: This topic is seeking to address challenges faced by organizations across the following identity management components: User Sign-In covering issuance, authentication, revocation and derivation to ensure that an individual is present and that digital interactions can be attributed to this same individual. Verified Person covering identity establishment, resolution, validation and verification to ensure that the individual is a real person with a real, not synthetic or fabricated, record.
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p41
|
Authorization covering consent, enrollment, delegation and authorization to ensure that the individual has provided contextually relevant consent and entitlement information to enable authorization or to appropriately delegate authorization. Digital Identity covering user experience, user notification, session risk and transaction risk to enable an electronic representation of an individual that can be relied on for high value interactions taking into account user experience and ongoing risk management. Trusted Infrastructure covering crosscutting capabilities to ensure that identity management services mitigate fraud, ensure privacy, and assure security while remaining scalable, resilient and interoperable. Transition Opportunities: Developed solutions should transition to provide availability to commercial and government end-users. Solutions may be brand new capabilities not currently available on the market or current solutions that can be modified to address specific needs. Supporting Information and Links: https://www.dhs.gov/science-and-technology/csd-idm Securing Cyberspace Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps Submit Industry Engagement Materials Research Area: Securing Cyberspace (SEC CYB) Priority R&D Need: Human Aspects of Cybersecurity-Associated/Related Efforts Topic Number: SEC CYB 02-02 Topic Title: Data Privacy Solicitation: ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 ) Topic Description: Develops, tests and evaluates technical and knowledge solutions for the management of privacy threats and vulnerabilities that arise from socio- and technical policies and operations. The project's R&D focuses on privacy risks related to:
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p42
|
Connected sensor devices, mobile computing and sensor platforms Automation and autonomous systems The delivery of digital services Develops, tests and evaluates technical and knowledge solutions for the management of privacy threats and vulnerabilities that arise from socio- and technical policies and operations. The project's R&D focuses on privacy risks related to: Connected sensor devices, mobile computing and sensor platforms Automation and autonomous systems The delivery of digital services less Topic Research Type: Type I, Type II, Type III Cyber Forensics Identity Internet Privacy Securing Cyber Topic Details/Information (Click here to expand) End Objective: The purpose of the Data Privacy Program is to help society realize the benefits of information technologies in the three stated contexts (connected devices and sensors, automation and autonomous systems, and digital services delivery) while minimizing their negative societal impact. Strategies for minimizing potential risks to privacy must consider a range of opportunities, from minimizing data collections to proper safeguarding of data once collected to controlling how data is used. To achieve this objective, Data Privacy calls for applied research and advanced development along a continuum of challenges, from how people understand privacy in different situations and how their privacy needs can be formally specified, to how these needs can be respected and how mitigation and remediation can be accomplished should privacy expectations and interests be violated. Finally, Data Privacy emphasizes the need to transition research results that address governmental and commercial stakeholder's needs so that they can improve practice as necessary and appropriate.
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p43
|
TRL Sought: 2-5 TRL at Conclusion: 6 Background Information and S&T Challenges: Cyber-threats are rapidly shifting and privacy-related breaches are increasing in frequency and impact. The Data Privacy project is aligned with National Privacy and Cyber Security Research and Development strategic initiatives to develop a targeted set of research priorities to ensure that cyberspace is safe, trustworthy and prosperous. Specifically, the project provides the R&D community expertise and resources to prevent, mitigate and recover from adverse effects of privacy threats and intrusions on privacy that arise from information system policies and processing. This work includes mitigation of risks by engineering privacy-protecting systems, educating the public, and understanding behavioral, social, organizational and policy dimensions of privacy. The Data Privacy Program is working to develop innovative solutions that ensure trusted innovation by helping to ensure that the protection of individual privacy is consistent with applicable law, policy and mission. Transition Opportunities: Data Privacy supports the development and operationalization of technical and knowledge solutions to help the Transition Customer address data privacy capability gaps. Supporting Information and Links: https://www.dhs.gov/science-and-technology/csd-privacy Securing Cyberspace Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps Submit Industry Engagement Materials Research Area: Securing Cyberspace (SEC CYB) Priority R&D Need: Human Aspects of Cybersecurity-Associated/Related Efforts Topic Number: SEC CYB 02-03 Topic Title: Cyber Risk Economics (CYRIE)
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p44
|
Solicitation: ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 ) Topic Description: Cybersecurity is a multidimensional problem that demands interdisciplinary attention. The CYRIE program supports research into the business, legal, technical and behavioral aspects of the economics of cyber-threats, vulnerabilities and controls. CYRIE R&D emphasizes empirically based measurement, modeling and evaluation of: Investment into cybersecurity controls (technology, regulatory, and legal) by private-sector, government and private actors; < ... more Cybersecurity is a multidimensional problem that demands interdisciplinary attention. The CYRIE program supports research into the business, legal, technical and behavioral aspects of the economics of cyber-threats, vulnerabilities and controls. CYRIE R&D emphasizes empirically based measurement, modeling and evaluation of: Investment into cybersecurity controls (technology, regulatory, and legal) by private-sector, government and private actors; Impact of investment on the probability, severity and consequences of actual risks and resulting cost and harm; Value of the correlation between business performance measures and evaluations of cybersecurity investments and impacts; and Incentives to optimize the investments, impacts and value basis of cyber-risk management. less Topic Research Type: Type I, Type II, Type III Analysis Cyber Data Data Analytics Infrastructure Internet Modeling & Simulation Topic Details/Information (Click here to expand) End Objective: Priority R&D needs for this program are analytics and metrics for cybersecurity effectiveness, severity, and comparison. The CYRIE program endeavors to improve value-based decision making by those who own, operate, protect, and regulate the nation's vital data assets and critical infrastructure. As such the program looks beyond the traditional economics view of incentives for cybersecurity - where individuals are assumed to be rational actors who know how to maximize their well-being - and considers a broader array of factors that include business, legal, technical, and behavioral factors. In this way CYRIE R&D can more effectively address strategy and tactics for cyber risk avoidance, acceptance, mitigation, and transfer.
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p45
|
TRL Sought: 2-5 TRL at Conclusion: 6 Transition Customer or Program: Application to Cyber Security Operations, Critical Infrastructure Operations, Law Enforcement, Incident and Disaster Response, and Businesses of all sizes. Background Information and S&T Challenges: In 2013 two Executive actions were issued, aimed at enhancing the capability of owners and operators of the nation's critical infrastructure to protect their networks and systems against cyberattack (Executive Order 13636, Improving Critical Infrastructure Cybersecurity, and Presidential Policy Directive 21, Critical Infrastructure Security and Resilience). These policy documents gave DHS a coordinating role in pursing the cybersecurity objectives outlined in each document and directed NIST to develop a voluntary framework that owner/operators could use to improve their cybersecurity posture. DHS led an interagency working group focused on cyber economic incentives, and together with the Departments of Commerce and Treasury, prepared an analysis of federal policy options for incenting adoption of the NIST framework. DHS S&T continues to maintain active engagement in the effort to understand and develop stronger cyber economic incentives, through its R&D efforts and portfolio. The working group and resulting analysis focused primarily on policy and incentives from a microeconomic-based view of marginal costs and benefits of adoption. While this analysis provided a solid start for the study of incentives in cybersecurity, a more holistic approach to research in the area of cyber risk economics is clearly needed, one that incorporate perspectives on security decisions and behavior from a wide range of social and behavioral sciences.
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p46
|
Recognizing the importance of data sharing to building capacity across the four dimensions (investment, impact, value, incentives), CYRIE supports the sharing of cybersecurity best practices, investments, incidents, and outcomes among diverse stakeholders. More collective information is needed to enable value-based risk management of the shared ecosystem. Effective information sharing can help mitigate against the often-siloed view of risk, create positive network effects, and foster "RoS" or return on sharing as an element of cyber risk management. Transition Opportunities: CYRIE supports the development and operationalization of technical and knowledge solutions to help the Transition Customer address capability gaps along any of the program's stated dimensions. The program also aims to inform the government about how it can reduce cyber risk levels through development and enforcement of policy and regulation, convening and coordination of stakeholders, adoption of technology, promulgation of standards, and facilitation of research and development. Supporting Information and Links: https://www.dhs.gov/science-and-technology/csd-cyrie Securing Cyberspace Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps Submit Industry Engagement Materials Research Area: Securing Cyberspace (SEC CYB) Priority R&D Need: Network and Systems Security-Associated/Related Efforts Topic Number: SEC CYB 03-01 Topic Title: Distributed Denial of Service Defense (DDoSD) Solicitation: ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 ) Topic Description: Distributed Denial of Service Defense - Denial of service attacks are pervasive and have the potential to disrupt critical network infrastructure. Topics of interest include:
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p47
|
Efforts that leverage existing policies and practices to mitigate DDoS attacks; Techniques that adopt existing technologies for near term DDoS protection; and Novel approaches for understanding and mitigating new forms of DDoS. Distributed Denial of Service Defense - Denial of service attacks are pervasive and have the potential to disrupt critical network infrastructure. Topics of interest include: Efforts that leverage existing policies and practices to mitigate DDoS attacks; Techniques that adopt existing technologies for near term DDoS protection; and Novel approaches for understanding and mitigating new forms of DDoS. less Topic Research Type: Type I, Type II, Type III Cyber Denial of Service Infrastructure Internet Network Securing Cyber Topic Details/Information (Click here to expand) End Objective: Results of this topic should provide new and novel capabilities and solutions to assist federal, state, and local agencies investigating cybercrimes. TRL Sought: TRL at Conclusion: Transition Customer or Program: DHS Components, Federal, State and Local Law Enforcement Agencies, Financial Institutions Background Information and S&T Challenges: This topic is seeking to address various challenges faced by Government Agencies, Law Enforcement (LE) and Financial Institutions to protect networks and prevent DDoS attacks that are used to render key resources unavailable. DDoS attacks have targeted critical sectors and government agencies, as well as the financial sector; which has been a frequent target of large-scale attacks. Transition Opportunities:
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p48
|
Developed solutions should transition to federal, state and local law enforcement end-users. Solutions may be brand new capabilities not currently available on the market or current solutions that can be modified to address specific needs. Supporting Information and Links: https://www.dhs.gov/science-and-technology/csd-ddosd Securing Cyberspace Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps Submit Industry Engagement Materials Research Area: Securing Cyberspace (SEC CYB) Priority R&D Need: Network and Systems Security-Associated/Related Efforts Topic Number: SEC CYB 03-02 Topic Title: Federated Enterprise Environments (formerly Cloud Computing Security) Solicitation: ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 ) Topic Description: Research and Development to build upon security in Federated Enterprise Environments-including secure protocols to protect data flow to, within and out of the federated environment; command and control (C2) infrastructure for federated environments; incorporation of adaptive defenses into federated environments; preserving data integrity; privacy constraints; privacy-preserving computation/contract generation; and systems to identify unauthorized activity. Research and Development to build upon security in Federated Enterprise Environments-including secure protocols to protect data flow to, within and out of the federated environment; command and control (C2) infrastructure for federated environments; incorporation of adaptive defenses into federated environments; preserving data integrity; privacy constraints; privacy-preserving computation/contract generation; and systems to identify unauthorized activity. less Topic Research Type: Type II, Type III
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p49
|
Cyber Detection Internet Network Securing Cyber Topic Details/Information (Click here to expand) End Objective: Research and development results of this topic should provide innovative technologies, techniques, and processes towards the creation, operation, and maintenance of federated enterprise environments and the related C2 infrastructure. Objectives include enabling local decision making given global knowledge, and the seamless incorporation of various cybersecurity technologies and techniques (Moving Target/Dynamic/Adaptive Defenses, privacy preserving and multi-party computing, deception, etc.) into federated enterprise environments. Results are also sought to protect any cloud-based infrastructure that enables federated enterprise environments. TRL Sought: TRL at Conclusion: Transition Customer or Program: Homeland Security Enterprise, DHS and Components with need for federated environments Background Information and S&T Challenges: This topic is seeking to address various challenges faced by Federal government entities and the Homeland Security Enterprise in the creation, operation, and maintenance of federated enterprise environments. Coordinating mechanisms are needed in order to provide reliable defenses that do not adversely affect usability or limit privacy protections. Additionally, a robust command and control capability is needed to coordinate defenses and make management of processes easier, faster, more reliable, and secure. Transition Opportunities: Developed solutions should transition to DHS Components, Federal, State and Local Government Agencies, the Homeland Security Enterprise Solutions may be brand new capabilities not currently available on the market or current solutions that can be modified to address specific needs.
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p50
|
Supporting Information and Links: https://www.dhs.gov/science-and-technology/csd-federated-security Securing Cyberspace Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps Submit Industry Engagement Materials Research Area: Securing Cyberspace (SEC CYB) Priority R&D Need: Network and Systems Security-Associated/Related Efforts Topic Number: SEC CYB 03-03 Topic Title: Application for Network Measurement Science (ANMS) Solicitation: ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 ) Topic Description: Security focused measurement and analysis for all aspects of cyberspace. This includes the Internet (e.g., Autonomous Systems, routers) or other networks (e.g. Industrial Control Systems (ICS)) that may connect to the Internet, via a static or dynamic (possibly intermittent) connection. Security focused measurement includes but is not limited to algorithms, tools, techniques, data and analysis for enabling security, from global scale to the individual user. A particular ... more Security focused measurement and analysis for all aspects of cyberspace. This includes the Internet (e.g., Autonomous Systems, routers) or other networks (e.g. Industrial Control Systems (ICS)) that may connect to the Internet, via a static or dynamic (possibly intermittent) connection. Security focused measurement includes but is not limited to algorithms, tools, techniques, data and analysis for enabling security, from global scale to the individual user. A particular application area is SEAC: Small Enterprise Assistance for Cyber (pronounced seek), which has the goal of providing a system or method for small enterprises with limited resources to improve their security posture. This is a broader effort to develop systems or provide access to tools and/or analysts for identification and remediation of cyber incidents. less
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p51
|
Topic Research Type: Type I, Type II, Type III Algorithms Cyber Data Data Analytics Detection Internet Modeling & Simulation Network Securing Cyber Topic Details/Information (Click here to expand) End Objective: Results of this topic should provide new and novel capabilities and solutions to assist federal, state, and local agencies to improve their security posture. TRL Sought: TRL at Conclusion: Transition Customer or Program: DHS Components, Federal, State and Local Government Agencies Background Information and S&T Challenges: This topic is seeking to address various challenges faced by DHS Components, Federal, State and Local Government Agencies, the Homeland Security Enterprise for situational awareness and to improve their security posture. Transition Opportunities: Developed solutions should transition to DHS Components, Federal, State and Local Government Agencies, the Homeland Security Enterprise Solutions may be brand new capabilities not currently available on the market or current solutions that can be modified to address specific needs. Supporting Information and Links: https://www.dhs.gov/science-and-technology/csd-anms Securing Cyberspace Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps Submit Industry Engagement Materials Research Area: Securing Cyberspace (SEC CYB) Priority R&D Need: Network and Systems Security-Associated/Related Efforts Topic Number: SEC CYB 03-04 Topic Title: Predictive Analytics Solicitation: ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 ) Topic Description: Predictive Analysis, as applied to cyber security, is the ability to identify potential cyber threat vectors and determine the probable course of action for each threat. These findings should be presented automatically, with human-in-the-loop if desired, but not required. Presentation should be in an easily understandable format, to allow resource management to address threats as they evolve. Predictive Analysis may be applied at any phase or stage, from fully protected ... more
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p52
|
Predictive Analysis, as applied to cyber security, is the ability to identify potential cyber threat vectors and determine the probable course of action for each threat. These findings should be presented automatically, with human-in-the-loop if desired, but not required. Presentation should be in an easily understandable format, to allow resource management to address threats as they evolve. Predictive Analysis may be applied at any phase or stage, from fully protected to compromise and recovery. All types of cyber threats may be considered. less Topic Research Type: Type I, Type II, Type III Algorithms Analysis Cyber Data Data Analytics Internet Securing Cyber Topic Details/Information (Click here to expand) End Objective: Results of this topic should provide new and novel capabilities and solutions to assist federal, state, and local agencies to use predictive analytics for network defense and situational awareness. TRL Sought: TRL at Conclusion: Transition Customer or Program: DHS Components, Federal, State and Local Law Enforcement Agencies Background Information and S&T Challenges: This topic is seeking to address various challenges faced by Government Agencies, to provide situational understanding for network and data protection. The goal is for predictive analysis to develop and place defenses prior to attacks, moving the advantage to the defender. Transition Opportunities: Developed solutions should transition to DHS Components, Federal, State and Local governments' end-users. Solutions may be brand new capabilities not currently available on the market or current solutions that can be modified to address specific needs.
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p53
|
Supporting Information and Links: https://www.dhs.gov/science-and-technology/cyber-security-division Securing Cyberspace Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps Submit Industry Engagement Materials Research Area: Securing Cyberspace (SEC CYB) Priority R&D Need: Network and Systems Security-Associated/Related Efforts Topic Number: SEC CYB 03-05 Topic Title: Information Marketplace for Policy and Analysis of Cyber-risk and Trust Solicitation: ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 ) Topic Description: The Information Marketplace for Policy and Analysis of Cyber-risk & Trust (IMPACT) project supports the global cyber-risk research community by coordinating and developing real-world data and information-sharing capabilities-tools, models and methodologies. To accelerate solutions around cyber-risk issues and infrastructure security, the IMPACT project enables empirical data and information-sharing between and among the global cybersecurity research and development (R&D) ... more The Information Marketplace for Policy and Analysis of Cyber-risk & Trust (IMPACT) project supports the global cyber-risk research community by coordinating and developing real-world data and information-sharing capabilities-tools, models and methodologies. To accelerate solutions around cyber-risk issues and infrastructure security, the IMPACT project enables empirical data and information-sharing between and among the global cybersecurity research and development (R&D) community in academia, industry and government. Importantly, IMPACT also addresses the cybersecurity decision-analytic needs of Homeland Security Enterprise (HSE) customers in the face of high volume, high-velocity, high-variety and/or high-value data through its network of Decision Analytics-as-a-Service Providers (DASP). These resources are a service technology or tool capable of supporting the following types of analytics: descriptive (what happened), diagnostic (why it happened), predictive (what will happen) and prescriptive (what should happen). less
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p54
|
Topic Research Type: Type I, Type II, Type III Cyber Data Data Analytics Infrastructure Internet Modeling & Simulation Securing Cyber Topic Details/Information (Click here to expand) End Objective: The Department of Homeland Security (DHS) Science and Technology Directorate's (S&T) Cyber Security Division (CSD) seeks to coordinate, enhance and develop advanced data and information-sharing tools, datasets, technologies, models, methodologies and infrastructure to strengthen the capabilities of national and international cyber-risk R&D. These data-sharing components are intended to be broadly available as national and international resources to bridge the gap between producers of cyber-risk-relevant ground truth data, academic and industrial researchers, cybersecurity technology developers, and decision-makers to inform their analysis of and policymaking on cyber-risk and trust issues. TRL Sought: 2-5 TRL at Conclusion: 6 Transition Customer or Program: Application to Cyber Security Operations, Critical Infrastructure Operations, Law Enforcement, Incident and Disaster Response, and Day-To-Day Business, Public and Private Cyber Security Researchers Background Information and S&T Challenges: Cybersecurity R&D requires real-world data to develop advanced knowledge, test products and technologies and prove the utility of research in large-scale network environments. IMPACT is the only publicly available, legally collected, distributed repository of large-scale datasets containing real network and system traffic that could be used to advance state-of-the-art cybersecurity R&D. The centralized brokering and distributed provisioning between the data providers, data hosts and researchers addresses the operational, trust and administrative costs and challenges that impede sustainable and scalable data-sharing. IMPACT continually adds new data that is responsive to cyber-risk management (e.g., attacks and measurements) to provide the R&D community timely, high-value information to enhance research innovation and quality. The IMPACT model also serves as a laboratory for testing various data-sharing models, including batch transfers, newer Data Analytics as a Service (DaaS) and visualization techniques.
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p55
|
Transition Opportunities: Transition data, decision analytics and capabilities outputs to the cyber security research community Supporting Information and Links: https://www.dhs.gov/csd-impact Securing Cyberspace Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps Submit Industry Engagement Materials Research Area: Securing Cyberspace (SEC CYB) Priority R&D Need: Network and Systems Security-Associated/Related Efforts Topic Number: SEC CYB 03-06 Topic Title: National Research Infrastructure of Cyber Security Experimentation Solicitation: ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 ) Topic Description: The results of this topic will catalyze and support the research, and development of advanced experimental research tools, technologies and methodologies as broadly available national resources. Indicators of the success of this program objective will be the realization of experimental research capabilities, and approaches that reach beyond today's state of the art. The results of this topic will catalyze and support the research, and development of advanced experimental research tools, technologies and methodologies as broadly available national resources. Indicators of the success of this program objective will be the realization of experimental research capabilities, and approaches that reach beyond today's state of the art. less Topic Research Type: Type III Cyber Infrastructure Internet Internet of Things Securing Cyber Topic Details/Information (Click here to expand) End Objective: The Cybersecurity Experimentation of the Future (CEF) Testbed will provide cybersecurity researchers with the ability to run experiments on an unclassified secure "virtual internet," through contained environments that can safely test advanced defense mechanisms against live threats without endangering operational networks. The CEF Testbed will provide the cybersecurity research community with a complex test capability and infrastructure (networks, tools, methodologies, tech support) to support national-scale testing of advanced cybersecurity technologies in an open, non-proprietary environment. CEF will enable the applied/research community to share complex cybersecurity experiments, designs, lab setups, software, tools, procedures and data; this allows rapid validation of complex technical findings and avoiding redundant experimental effort.
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p56
|
TRL Sought: 2-3 TRL at Conclusion: 3 Transition Customer or Program: Transition customers include cybersecurity researchers, instructors and students. Background Information and S&T Challenges: Realization of experimental research infrastructures, capabilities, and approaches that reach beyond today's state of the art are needed. These infrastructures, together with similar broad-based objectives that transform discovery, validation, and ongoing analysis in an increasingly complex and challenging domain must provide, as examples: Support for multi-disciplinary, complex, and extreme scale experimentation; Support for emerging research areas such as specialized cyber-physical systems and cybersecurity relevant human behavior; The creation and capture of advances in scientific methodologies, experimental processes, and education; and Strategies for dynamic and flexible experimentation across user communities and infrastructure facilities. Transition Opportunities: Developed solutions should transition to federal, state and academic cybersecurity testbeds. Solutions may be brand new capabilities not currently on the market or current solutions that can be modified to address specific requirements. Supporting Information and Links: https://www.dhs.gov/science-and-technology/csd-deter Securing Cyberspace Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps Submit Industry Engagement Materials Research Area: Securing Cyberspace (SEC CYB) Priority R&D Need: Mobile Security-Associated/Related Efforts Topic Number: SEC CYB 04-01 Topic Title: Mobile Ecosystem Security Research Solicitation: ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 ) Topic Description: The research and development of tools and techniques to enable the secure use of mobile ecosystem technologies in support of the DHS mission. Areas of interest include mobile device supply chain security analysis, mobile infrastructure resilience metrics, mobile communication security protocol analysis and security.
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p57
|
The research and development of tools and techniques to enable the secure use of mobile ecosystem technologies in support of the DHS mission. Areas of interest include mobile device supply chain security analysis, mobile infrastructure resilience metrics, mobile communication security protocol analysis and security. less Topic Research Type: Type II, Type III Cyber Infrastructure Internet Mobile Network Securing Cyber Topic Details/Information (Click here to expand) End Objective: Results of this topic should provide new and novel capabilities and solutions to support operational security requirements for mobile ecosystem technologies. TRL Sought: TRL at Conclusion: Transition Customer or Program: DHS Components, Civilian Federal Government and DoD Background Information and S&T Challenges: The DHS workforce is becoming increasingly mobile, and employees expect to use mobile devices to access data and deliver mission services wherever they may be located, and at any time. DHS mobile user groups cross all Components and Offices and include executives, managers, knowledge workers, immigration and law enforcement officials, case officers, and emergency responders. The architecture, design, and use of mobile technologies to access systems, applications, and data and deliver government services is substantially different from the traditional desktop workstations and laptops used within a protected enterprise network. A new security approach is needed to protect DHS data and systems from the additional risk posed by use of consumer devices that may operate from anywhere in the world across any available network (cellular, Wi-Fi), possess features and capabilities beyond those available on desktops, and that may contain dozens of diverse mobile apps that can access data on the device.
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p58
|
Transition Opportunities: The Mobile Security Research and Development (R&D) program is partnering with all DHS components and collaborating with several organizations to facilitate piloting, transition and adoption of the technologies developed under the program. This provides an opportunity to fine-tune requirements, align to and influence development of federal standards or criteria, and conduct pilots with real-world applications. The partners will provide support in developing requirements and use cases; providing information, insights, and access to information technology architecture; offering feedback and evaluation of CSD-developed R&D; and contributing in-kind resources associated with testing. Supporting Information and Links: DHS Study on Mobile Device Security Mobile App Security Study: Securing Mobile Applications for First Responders Mobile Device Security Fact Sheet Mobile Security R&D Program Guide, Volume 1 Mobile Security R&D Program Guide, Volume 2 Securing Cyberspace Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps Submit Industry Engagement Materials Research Area: Securing Cyberspace (SEC CYB) Priority R&D Need: Critical Infrastructure - Associated/Related Efforts Topic Number: SEC CYB 05-01 Topic Title: Next Generation Cyber Infrastructure (NGCI) Solicitation: ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 ) Topic Description: The Next Generation Cyber Infrastructure Apex program addresses the cybersecurity challenges facing our nation's critical infrastructure. Cyber Apex finds, tests and transfers proven solutions to these sectors to fill cybersecurity gaps and harden critical systems and networks.
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p59
|
Currently, Cyber Apex is working to harden the cyber-defenses of the financial services sector (FSS), which is a frequent target of cybercriminals. The Cyber Apex Review Team (CART), spo ... more The Next Generation Cyber Infrastructure Apex program addresses the cybersecurity challenges facing our nation's critical infrastructure. Cyber Apex finds, tests and transfers proven solutions to these sectors to fill cybersecurity gaps and harden critical systems and networks. Currently, Cyber Apex is working to harden the cyber-defenses of the financial services sector (FSS), which is a frequent target of cybercriminals. The Cyber Apex Review Team (CART), sponsored by CSD and made up of FSS institution and Treasury Department representatives, identifies gaps and evaluates solutions. While some identified gaps are solvable by mature technology, others needed novel ideas. This finding led Cyber Apex to establish two development paths: creating a consortium to test existing solutions and partnering with the DHS Silicon Valley Innovation Program (SVIP) for early-stage solutions. The consortium focuses on operational testing of mature technologies to determine if they meet FSS needs. The program uses a consortium manager-Cyber Apex Solutions-to maintain an efficient process for foraging and building a consortium of technology owners. SVIP focuses on finding novel solutions from startups whose technologies are not mature enough for rigorous operational testing and evaluation. Solutions with promise are piloted and evaluated. Cyber Apex solicitations under SVIP-the Financial Services Cyber Security Active Defense-seeks startups that have novel solutions in the areas of moving-target defense, isolation and containment and cyber-intrusion deception. less
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p60
|
Topic Research Type: Type II, Type III Cyber Internet Securing Cyber Topic Details/Information (Click here to expand) End Objective: The results of this topic should produce new and novel technologies, techniques and approaches to help secure the nation's critical infrastructure sectors. TRL Sought: 3-6 TRL at Conclusion: 5-8 Transition Customer or Program: Homeland Security Enterprise, DHS Components, Critical Infrastructure organizations Background Information and S&T Challenges: The nation's critical infrastructure provides the essential services that underpin American society and serve as the backbone of our nation's economy, security, and health. The needs and cyber security maturity levels of the 16 sectors vary widely (e.g. different architectures, different regulatory and compliance factors), which make securing them a challenge for S&T. Transition Opportunities: Developed solutions should transition to federal and Homeland Security Enterprise end users. Supporting Information and Links: www.dhs.gov/science-and-technology/apex-ngci Securing Cyberspace Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps Submit Industry Engagement Materials Research Area: Securing Cyberspace (SEC CYB) Priority R&D Need: Critical Infrastructure - Associated/Related Efforts Topic Number: SEC CYB 05-02 Topic Title: Government Networks (.gov) Solicitation: ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 ) Topic Description: The need for government departments and agencies to have a strong security posture is abundantly clear. DHS S&T is working closely with the National Protection and Programs Directorate, federal and state civilian departments and agencies, and industry to develop and transition modern and advanced prototyped cybersecurity capabilities. Specific R&D efforts are needed that can link major requirements of existing programs (e.g. National Cyber Protection System (NCPS), Conti ... more
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p61
|
The need for government departments and agencies to have a strong security posture is abundantly clear. DHS S&T is working closely with the National Protection and Programs Directorate, federal and state civilian departments and agencies, and industry to develop and transition modern and advanced prototyped cybersecurity capabilities. Specific R&D efforts are needed that can link major requirements of existing programs (e.g. National Cyber Protection System (NCPS), Continuous Diagnostics and Mitigation (CDM), Automated Information Sharing (AIS)) with new industry capabilities, normally through impactful demonstrations, experiments and pilots. Particular areas of interest include architectural elements such as fine-grained monitoring and control, whitelist-based security policies, automated cybersecurity decision loop and continuous risk analysis, and strengthening key human roles in these systems. We also seek capabilities to characterize current and evolving threats to help drive system requirements, to include technology considerations protecting cloud and mobile services, thereby ensuring newly developed or integrated cyber defense capabilities are relevant and effective against those threats. Ultimately, this work must result in key technology and guidance that can aid chief information and information security officers in securing department and agencies. less Topic Research Type: Type II, Type III Cyber Internet Securing Cyber Topic Details/Information (Click here to expand) End Objective: The results of this topic should produce new and novel technologies, techniques and approaches to secure government networks. TRL Sought: 3-6
|
https://baa2.st.dhs.gov/portal/public/processRequest?eurl=AAAAAAEytBoAAAFt19It9wAUQUVTL0NCQy9QS0NTNVBhZGRpbmcAgAAQABAAAQIDBAUGBwgJCgsMDQ4PAAAAcMUP8ssYOu8SxeEfopmq%2F3LKvq0YMxUQ1HrP1WhtWzYxyJ2GlMVADwmK3k5GovcHYqol%2BKEZDMz8jHfpnQyRvnOkH7C1BX%2BnH2OhmBDp5JkZFieEWbpq1uRze8GhvQalWz26hAMIUPw4G8fnvjL4ugUAFMFU7G46IS1bifEEp4jD3BpJVmJP_p62
|
TRL at Conclusion: 5-8 Transition Customer or Program: Homeland Security Enterprise, DHS Components Background Information and S&T Challenges: Securing government networks is a significant challenge for DHS. S&Ts challenges supporting this activity include: the customer set (e.g. large agencies to very small agencies) and the variety of architectural approaches that each agency has developed over time, suited to their mission needs. Transition Opportunities: Developed solutions should transition to federal and Homeland Security Enterprise end users. Supporting Information and Links: https://www.dhs.gov/science-and-technology/cyber-security-division Securing Cyberspace Solicitation Dates Open Date: 06/04/2018 06/03/2023 11:59 PM EDT Close Date: 06/03/2023 11:59 PM EDT See Notice on FedBizOpps Submit Industry Engagement Materials Research Area: Securing Cyberspace (SEC CYB) Priority R&D Need: Critical Infrastructure - Associated/Related Efforts Topic Number: SEC CYB 05-03 Topic Title: Critical Infrastructure (CIDARS, CREDC, LOGIIC) Solicitation: ( DHSST-LRBAA 18-01 : Long Range Broad Agency Announcement (LRBAA) 18-01 ) Topic Description: The Critical Infrastructure Design and Adaptive Resilient Systems project is an initiative focused on enhancing the security and resilience of critical infrastructure systems consistent with Presidential Policy Directive 21 and the National Critical Infrastructure Security and Resilience (CISR) Research and Development Plan. This project is examining innovative approaches to plan and design adaptive performance into critical infrastructure systems. The goal is to create ... more The Critical Infrastructure Design and Adaptive Resilient Systems project is an initiative focused on enhancing the security and resilience of critical infrastructure systems consistent with Presidential Policy Directive 21 and the National Critical Infrastructure Security and Resilience (CISR) Research and Development Plan. This project is examining innovative approaches to plan and design adaptive performance into critical infrastructure systems. The goal is to create common capabilities and quantitative approaches to facilitate the development and implementation of integrated solutions that will enable secure and resilient service provisioning.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.