S&T Standardized Tests for Personal Alert Safety Systems Fact Sheet
When firefighters need rescue due to a medical or other emergency, fire department protocols and technologies help get them out, quickly and alive.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock
()
or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
When firefighters need rescue due to a medical or other emergency, fire department protocols and technologies help get them out, quickly and alive.
The public voice network has become the target of many attacks, including Telephony Denial of Service (TDoS), robocalls (automated telephone calls), SWATing (anonymously filing police reports to provoke a police raid) and bomb threats. TDoS is a flood of malicious inbound calls that target public-safety response systems such as 911. The Department of Homeland Security, Science and Technology Directorate (S&T) Distributed Denial of Service Defense (DDoSD) is working to shift the advantage from a DDoS attacker to the network administrator by developing the capability to authenticate callers and detect fraudulent call spoofing.
Mandated by the Cybersecurity Act of 2015, the “Study on Mobile Device Security” relied on significant input from mobile industry vendors, carriers, service providers and academic researchers.
Of the 114 programs on the Department of Homeland Security Master Acquisition Oversight List, 48 are subject to Director, Office of Test and Evaluation oversight.
Building confidence on homeland security technologies and enabling unity of effort through standardization
The DHS Analytic Agenda relies on comprehensive analytic modeling and requirements generation.
Homeland Security Operators expect new systems to work. Acquisition decision makers and program managers are responsible for conducting test and evaluation to determine if the capability under development satisfies the user's need in accomplishing their missions.
Two branches of one "systems thinking" team facilitate effective acquisitions.
How is CBP AMO using the Predator B to perform missions?
ERAD Prepaid Card Reader article, "Freezing Assets - New technology helps law enforcement seize funds hidden on criminals’ prepaid cards". January / February 2017.