Welcome

Executive Summary: Path to Innovation

In 2015, the Science and Technology Directorate (S&T) began charting a course toward five Visionary Goals:

Responder of the Future icon
Responder of the Future
Protected, Connected, and Fully Aware
Resilient Communities icon
Resilient Communities
Disaster-Proofing Society
Enable the Decision Maker icon
Enable the Decision Maker
Actionable Information at the Speed of Thought
Trusted Cyber Future icon
Trusted Cyber Future
Protecting Privacy, Commerce, and Community
Screening at Speed icon
Screening at Speed
Security that Matches the Pace of Life

With a 20-year outlook to reaching these goals, 2015 focused on near-term solutions and on building and growing meaningful partnerships. We finished the year with great results.

We focused on solving some of the toughest homeland security challenges, such as protecting our transit systems, food supply and electrical grid. Our Screening at Speed Apex Program, groundbreaking of the National Bio-and Agro Defense Facility and the transition of the Recovery Transformer program are a testament to our success in these areas.

We helped firefighters, EMTs and law enforcement with personal protective equipment such as improved structure fire fighter gloves and interoperable data communications technology. We developed data analytics capabilities to provide emergency managers and first responders with systems that allow them to make informed decisions when it counts. From storm modeling to crowd simulation, we helped harness data that can keep communities safe.

We saw our technologies and research make a difference in communities challenged by disaster around the world. In Nepal, S&T’s FINDER technology led rescuers to four survivors by detecting their heartbeats under rubble. We also continued to address one of the world’s largest challenges—cybersecurity. Because so much of our lives exist online, S&T focused on technologies that secure networks and mobile devices.

We know a secure future is important to the American people, and in 2015, we used our partnerships in industry, the start-up community, academia, laboratories and countries across the globe to deliver innovative solutions. We brought together industry and operators so they could learn each other’s needs and processes. We engaged these audiences in new ways opening a Silicon Valley office to be strategically positioned to find cutting-edge solutions that will keep the nation safe.

The men and women of the Science and Technology Directorate seek solutions to homeland security challenges every day so that their fellow Americans can have peace of mind in the communities in which they live, work and play.

Path To Innovation

Our Visionary Goals are our North Star that lights the path to innovation. They set a clear intention for an end state, but how do we get there? How do we put the Visionary Goals into action?

Unified icon
Unified
Because our goals are much larger than the Science and Technology Directorate (S&T), it is critical for S&T to take a unified approach with the broad mission areas of the department and focus our attention where it is most needed—on our operators protecting our borders, our communities and our critical infrastructure. They are the border patrol agent at the Southwest border, the firefighter putting out fires in your community, or a business executive securing the personal data of customers from cybercriminals.
Focused icon
Focused
S&T brings focus to our research and development efforts through our Apex programs to meet the near-term milestones for the Visionary Goals. We strategically organized our experts to provide crosscutting capabilities to our programs. By setting priorities, we are positioned to provide solutions to today’s problems and emerging threats.
Connected icon
Connected
But we can’t do this alone. That’s why we connect ourselves to the best and brightest minds across the country and around the world. In 2015, we formed collaborations, strategically and at an unprecedented rate, to leverage and develop resources and capabilities for safeguarding the nation. Our collaborations — with the DHS components, first responder community, national laboratories, industry, academia and across all levels of government — were key to our ability to discover, improve and enable a wide range of capabilities. We expanded in new directions and engaged innovators, entrepreneurs and nontraditional performers to bring fresh thinking to homeland security challenges.

S&T has come far within a short period of time. We were able to do this because we unified across the department, focused on our objectives and connected to partners.

Unity of Effort

In 2014, DHS Secretary Jeh Johnson made a formal call to action for a Unity of Effort across all of the DHS components to realize the vision of a unified Homeland Security Enterprise. The goal: to operate as one. The Science and Technology Directorate plays an integral role here, and starts by linking its mission directly to the mission of the Department. As outlined in the Quadrennial Homeland Security Review (QHSR), the Department has five mission areas that all work towards keeping the nation safe and secure.

The United States Department of Homeland Security Seal, DHS five mission areas, prevent terrorism and enhancing security, secure and manage our borders, enforce and administer our immigration laws, safeguard and secure cyberspace, ensure resilience to disasters. S&T’s role: To deliver effective and innovative insight, methods and solutions for the critical needs of the Homeland Security Enterprise.
DHS has five mission areas are to prevent terrorism and enhancing security, secure and manage our borders, enforce and administer our immigration laws, safeguard and secure cyberspace and ensure resilience to disasters. S&T’s role in these mission areas is to deliver effective and innovative insight, methods and solutions for the critical needs of the Homeland Security Enterprise.

Meeting the Mission

To meet its mission in 2015, S&T worked with Secretary Johnson and DHS components on specific initiatives to put technology in the hands of operators. This took us in new directions as we re-established integrated product teams (IPTs), connected with the newly established Joint Task Forces, and stood with components to ensure that technological advances met their needs.

Integrated Product Teams

In 2015, Secretary Johnson reintroduced IPTs to learn the needs of components and drive capability development. The IPTs convene mission-focused teams of component operators and DHS technical experts in key threat areas. The IPT process empowers the Department and components to make sound R&D investments based on a plan that comes directly from our front lines and is informed by technical experts. While the Science and Technology Directorate oversees the overall effort, the specific IPTs are led by operational components, with subject matter experts from DHS headquarters participating as members. Together, they will identify capability gaps to gain a better understanding of current and emerging needs at DHS components. The IPTs include:

ipt aviation icon
Aviation Security
ipt chembio icon
Biological Threat
ipt counterterror icon
Counterterrorism
ipt border icon
Border Security
ipt cyber icon
Cyber Security
ipt firstresponders icon
First Responders

Joint Task Force

S&T further supported components needs in 2015 through its work with DHS’ three Joint Task Forces: the Joint Task Force-East (JTF-E), JTF-West and JTF-Investigations. The JTFs were established to address challenges to the DHS borders and maritime security missions and are comprised of the U.S. Coast Guard (USCG), U.S. Immigration and Customs Enforcement (ICE) and U.S. Customs and Border Protection (CBP).

One example of our support was the rigorous requirements analysis we performed for the Common Operating Picture/Common Intelligence Picture (COP/CIP) system. The COP/CIP enables ICE, CBP and USCG to have relevant operational information in one place. Having a COP/CIP system gives officers and agents situational awareness as they protect our nation’s borders. S&T, in coordination with DHS partners, identified and analyzed information sharing requirements among the three JTF-E Component organizations to assist with the development of the initial system. In July 2015, the JTFs achieved Full Operational Capability to support the Southern Borders and Approaches Campaign Plan; the COP/CIP system played a large role in this success.

Blue 3d cylinder shape in center view with three equally spaced straight flat blue segments extending from the base, terminating with 3D blue silhoutte people standing on circles, by each silhoutte are the following acronyms: CBP, USCG, ICE
Animation depicting ICE, CBP and USCG receiving data from one central place.

Technology Validation

In addition to developing technologies, S&T ensures that technologies are viable and serve the intended purpose once deployed. For example, to ensure the National Security Cutter’s (NSC) ability to operate its capabilities in a realistic combat environment, S&T personnel participated and supported the NSC Combat System Ship Qualification Trials (CSSQT) at the Naval Air Warfare Center Point Mugu, California test range in August 2015.

The Science and Technology Directorate is the research and development (R&D) arm for the Department. In 2015, S&T focused its approach to R&D by aligning programs to visionary goals that set a 20-year outlook and designing programs that address needs in the next three to five years. Comprised of four groups, with divisions and laboratories that span a wide range of homeland security areas, S&T has a cadre of experts to tap for the biggest challenges in homeland security.

Interactive Icon Interactive Chart

DHS Science and Technology Directorate Org Chart

Visionary Goals

S&T has laid the foundation to develop a suite of solutions to strengthen our nation’s security posture for future generations. S&T’s Visionary Goals anticipate the major security challenges to the nation over the next 20 to 30 years and identify what the specific security environments for addressing those challenges should look like. These goals were honed during a collaborative process that garnered input from the DHS components, industry and academic stakeholders and partners, and members of the public.

Interactive Icon Interactive Chart

Stakeholder Collaboration

Basic Member Data

Interact with the pie chart for more information on each of our user groups.

user groupsPercentage
State, Local, Tribal5.4%
Federal Government45.4%
Not Specified14.3%
Academia4.1%
Private Sector25.7%
Non-Government5.2%

In 2015, S&T aligned its programs and projects under the far-reaching Visionary Goal construct supported by nearer-term Apex Programs that seek to deliver R&D solutions within three to five years. With the Visionary Goals in place and our Apex Programs in support, S&T is strategically positioned to identify and develop the technology required to make our vision of a secure future a reality.

Responder of the Future icon
Responder of the Future: Protected, Connected, and Fully Aware
The Responder of the Future is threat-adaptive and cross-functional. Armed with comprehensive physical protection, interoperable tools, and networked threat detection and mitigation capabilities, future responders will be better equipped to serve their communities.
Resilient Communities icon
Resilient Communities: Disaster-Proofing Society
Critical infrastructure of the future will be designed, built, and maintained to withstand naturally occurring and man-made disasters. Decision makers will know when a disaster is coming, anticipate the effects, and use already-in-place or rapidly deployable countermeasures to shield communities from cascading adverse impacts from compromised or failing infrastructures. Resilient communities struck by disasters will not only bounce back, but bounce forward.
Enable the Decision Maker icon
Enable the Decision Maker: Actionable Information at the Speed of Thought
Predictive analytics, risk analysis, and modeling and simulation systems will enable critical and proactive decision-making based on the most relevant information available, making it possible to transform data into actionable information. In the face of uncertain environments involving chemical, biological, radiological, or nuclear threats, accurate and credible information will empower and enable the decision maker to take swift and informed actions to mitigate adverse impacts and save lives.
Trusted Cyber Future icon
Trusted Cyber Future: Protecting Privacy, Commerce, and Community
In a future of increasing cyber connections, underlying digital infrastructure will be self-detecting, self-protecting, and self-healing. Users will trust that information is protected, illegal use is deterred, and privacy is not compromised. Security will operate seamlessly in the background.
Screening at Speed icon
Screening at Speed: Security that Matches the Pace of Life
Noninvasive screening at speed will provide for comprehensive threat protection while adapting security to the pace of life. Unobtrusive screening of people, baggage, and cargo will enable the seamless detection of threats while respecting privacy, with minimal impact to the pace of travel and speed of commerce.

Apex Programs and Engines

0:000:00

Apex Programs

Apex Programs represent a change in the way the Science and Technology Directorate manages research and development programs and projects. Apex Programs are a collection of S&T projects that represent one or more paths toward achieving an increased or improved capability for the Homeland Security Enterprise. Resulting from the visionary goals, S&T strategic priority, or an external stakeholder’s operational need, the Apex Programs take the next steps towards implementing solutions to improve the security and resilience of our nation.

link to arrow icon Apex Programs

Apex Engines

S&T’s Apex Projects are supported by Apex Technology Engine Teams (Engines) that provide expertise in focused topic areas. Engines represent a novel approach for realizing S&T’s visionary goals and powering innovation. S&T’s Engines identify and share subject matter expertise, technical solutions and tools, best practices, lessons learned, and reusable products and solutions on behalf of Apex and other S&T projects. Collaboration to leverage knowledge from the DHS enterprise and external stakeholders are core components of the Engine approach.

link to arrow icon Apex Engines

Apex Programs

S&T’s Programs identify and share subject matter expertise, technical solutions and tools, best practices, lessons learned, and reusable products and solutions on behalf of Apex and other S&T projects.
next_generation_cyber_infrastructure icon
Next Generation Cyber Infrastructure
Cyberattacks threaten national security by undermining information-dependent critical infrastructure. The Department of Homeland Security identified 16 critical infrastructure sectors designated in the Presidential Policy Directive (PPD-21) - Critical Infrastructure Security and Resilience.
Capabilitiesclose
capabilities arrow icon
The ability to detect the presence of a cyberthreat without relying on a known cyber signature
capabilities arrow icon
Being able to identify and understand how these different cyber attacks and threats impact operations
capabilities arrow icon
The capability to neutralize the threat in a manner that does not impact operations
Featuresclose
The Next Generation Cyber Infrastructure program seeks to provide technologies and tools to protect critical systems and networks.
software assurance icon
Software Assurance
dynamic defense icon
Dynamic Defense
network characterization icon
Network Characterization
malware detection icon
Malware Detection
insider threat detection icon
Insider Threat Detection
complex security icon
Complex Security

Apex Engines

S&T’s Engines identify and share subject matter expertise, technical solutions and tools, best practices, lessons learned, and reusable products and solutions on behalf of Apex and other S&T projects.
bess icon
Behavioral, Economic & Social Science Engine
Through the Apex Behavioral, Economic and Social Science Engine (BESS-E), Apex Programs will analyze the human impact of their programs and technologies early in the planning stages, increasing the probability of successful implementation and transition.
Capabilitiesclose
capabilities arrow icon
Work with Apex Programs to identify requirements and apply existing capabilities to meet immediate needs
capabilities arrow icon
Help identify facilitators and roadblocks to implantation and diffusion of new technologies or policies
capabilities arrow icon
Determine the impact that the program has on operations, how well a program meets its success metrics & any unintended consequences
Featuresclose
BESS-E analyzes social, economic, and behavioral implications of an Apex Program's research, implementation, and diffusion of new technologies, programs and policies.
technology acceptance icon
Technology Acceptance
program evaluation research icon
Program Evaluation, Research
broad research support icon
Broad Research Support
analytics development icon
Analytics Development
human factors engineering icon
Human Factors Engineering
computational social science icon
Computational Social Science
0:000:00
S&T’s Global Network

S&T meets its mission by connecting to a diverse network of partners from across the government, industry, academia, laboratories and even around the world. S&T is also building new networks with creative problem solvers — start-ups, incubators and accelerators — to find solutions. We leverage these networks to convene experts, experiment, find emerging technologies, and commercialize technologies—all with the goal of finding better ways to protect the homeland from evolving threats.

Explore S&T’s Global Network

Engaging New Audiences

The National Conversation

S&T National Conversation logo

Because we know we may find potential solutions outside of the homeland security arena, S&T cast a wide, inclusive net to capture the best thinking to inform our efforts. In 2015, S&T connected with external audiences in new ways. We hosted an online National Conversation on Homeland Security Technology, worked with an accelerator, and hosted two prize challenges with cash awards.

Kicking the year off with the National Conversation on Homeland Security, S&T invited anyone with a stake in making the nation safer to participate, from traditional partners in the government, academia and industry to non-traditional solvers and innovators. The benefit of the National Conversation was twofold; S&T drew great feedback from participants while sharing an operator’s point of view of the homeland security market with industry, innovators and non-traditional partners.

EMERGE Accelerator Program

EMERGE logo

S&T’s first accelerator, EMERGE, also proved successful. We identified more than a dozen wearable technology startups and small innovators that had a viable commercial market and could adapt the technologies for first responders. EMERGE gave entrepreneurs a first-rate education in business development from mentors around the business world, provided early market validation, test and evaluation opportunities, and a path to introduce those technologies to a variety of markets, including government sector partners. Eighteen EMERGE participants demonstrated their technology for investors, first responders, and industry in September 2015 in San Francisco, California. Roughly half have interest from investors or are working with strategic corporate partners for customer validation.

Prize Competitions

Prize ribbon

To further engage innovators to solve specific homeland security challenges, S&T hosted two prize competitions in 2015. The first was the “Where Am I, Where is My Team?” Indoor Tracking of the Next Generation First Responder challenge, with a $20,000 purse. This challenge sought an indoor tracking solution, a problem that S&T spent several years trying to solve. The second challenge was the NBAF “Think and Do Challenge,” with a $100,000 purse, aimed to find the best solutions that proposed instruments to help seed collaboration, innovation, talent or training, and enhance the National Bio and Agro-Defense Facility’s ability to establish strong bonds with related communities of interest to spur innovation and success.

Convening Experts

National Laboratories

With connections to a coordinated network of five DHS laboratories and as many as 13 Department of Energy (DOE) national laboratories, S&T has access to a tremendous amount of expertise and world-class research facilities. In 2015, S&T broke ground on the final phase of construction to its latest addition to this network, the National Bio and Agro-Defense Facility, in May 2015 in Manhattan, Kansas. The $1.25 billion state-of-the-art biocontainment facility will study foreign animal and emerging and zoonotic (transmitted from animals to humans) diseases, and will be the first U.S. facility to provide maximum biocontainment (BSL-4) capable of studying high-consequence zoonotic diseases affecting large livestock.

0:000:00

International Partners

Around the world, S&T has bilateral agreements with 12 nations and the European Union that allow us to leverage the knowledge of international partners who have faced the same homeland security challenges that we do. In 2015, we worked with our partners to solve problems that range from first response to cybersecurity. These foreign governments and international organizations enhance scientific and technical knowledge for the global community, helping both partners meet their mission. The value of these partnerships is to provide access to innovative research and development knowledge, funding and other unique capabilities and resources.

Academia

S&T’s Centers of Excellence (COEs) that extend to a consortium of hundreds of universities are an invaluable resource in our network. In 2015, students not only demonstrated how they represent the future of R&D, but many of them are doing things that are making a difference today.

Accomplishments

2015 marked a year of unprecedented change, progress, and purpose for the Department of Homeland Security Science and Technology Directorate. This year we collaborated with new partners, developed new technologies, and reached new heights for government research and development such as we've never seen before. From firefighter gloves, to anti-hacker capabilities, to technology used to save lives after catastrophic events, we are changing the way the homeland security enterprise approaches research and development. We are, as we have always been, dedicated to preparing and protecting our nation and its people. Today, tomorrow, and always.  We are the innovators, but our nation's security is our ever-present, unwavering mission, and this is only the beginning.

Responder of the Future icon
Responder of the Future
Protected, Connected, and Fully Aware
Resilient Communities icon
Resilient Communities
Disaster-Proofing Society
Enable the Decision Maker icon
Enable the Decision Maker
Actionable Information at the Speed of Thought
Trusted Cyber Future icon
Trusted Cyber Future
Protecting Privacy, Commerce, and Community
Screening at Speed icon
Screening at Speed
Security that Matches the Pace of Life
Responder of the Future icon
Responder of the Future
2015 proved to be a pivotal year for advancing fundamental technologies and tools for first responders. S&T’s Improved Structure Firefighting Gloves are lightweight, dexterous, water resistant, but still as strong as ever, allowing firefighters to move their hands safely without a bulky hindrance. The lost person locator tool is making every minute count by helping first responders to visualize where a lost person is likely to be in order to help advance ground search and rescue operations. The REDOPS program is assisting providing key assistance with bomb squads in pursuing and their extremely vital mission. Whether it’s to protect, to inform, to defend or to connect, S&T is dedicated to providing the first responder of the future with the tools and technology they need to help protect and defend communities.
0:000:00

Improved Structure Firefighting Gloves

Firefighters need protective gloves in the field that fit properly, improve dexterity and aren’t bulky while still meeting the heat and water-resistance criteria.

When firefighters are required to perform tasks that involve fine motor skills, they often remove their gloves to complete the task. This exposes their hands to the dangerous conditions of a fire.

The Improved Structure Firefighting Glove uses new materials that greatly enhance its performance, providing critical protection for fire fighters facing challenging situations.
Greg Price, Director of S&T’s Responder Technology Development group.

In 2015, S&T’s First Responder Technologies Division developed the Improved Structure Firefighting Glove—a less bulky, updated glove that merges the needs of firefighters with available technology and improved materials.

The goal was to make sure firefighters can perform their duties while keeping their hands protected. The new material and design allows firefighters to make more precise movements without having to remove their gloves. The improved form, fit, dexterity and water repellant features provide the protection firefighters need.

The improved glove received National Fire Protection Association (NFPA) certification and is available for purchase from Shelby Glove.

Radio Internet-Protocol Communications Module

Keeping everyone connected could mean the difference between life and death in an emergency. That’s why S&T developed the Radio Internet-Protocol Communications Module (RIC-M), a new low-cost interoperability solution that could save the first responder community millions of dollars.

RIC-M is a low-cost, external, stand-alone, interface device that connects radio frequency (RF) system base stations, consoles and other RF equipment—regardless of brand—over the Internet or Private Internet Protocol network. RIC-M converts from a commonly used V.24 serial communications protocol to an open-standard Voice-over-Internet-Protocol.

0:000:00

Both encrypted and unencrypted Project 25 digital communications are supported, and it can also operate with analog communication equipment. RIC-M also allows agencies to easily upgrade and reconfigure new and legacy systems at a low cost. This means effectiveness as well as affordability. Many older base station systems can continue to be used for another 10 to 20 years.

S&T maintains the intellectual property rights to the technology and licensed it to two companies, Christine Wireless Inc. and Avtec Inc. A third licensing agreement is being developed, and will be finalized in 2016. S&T will receive royalties on all sales, and the funds will be used to drive new technology development for first responders.

Enable the Decision Maker icon
Enable the Decision Maker

Lost Person Locator

In the moments after someone goes missing, every minute counts. S&T has initiated a program to develop guidance, protocols and strategies responders can employ while searching for lost individuals. It’s called the Lost Person Locator, and it could change the way we seek—and find—lost people.

The Lost Person Locator is a software program that allows first responders to visualize where a lost person is likely to be to help advance ground search and rescue operations.

Within the search area, responders can visualize the most likely areas to begin their search based on accumulated data. The Lost Person Locator software will save resources, time and potentially more lives.

illustration of city setting, mountains in the background, buildings, vehicles and streets in the foreground.
City zoom animation ending with interactive data points
Of the 334,227 missing individuals not considered runaways in 2013, it is estimated that more than 100,000 of the disappearances resulted in searches in wilderness, rural and urban settings.
In 2013, the FBI’s National Crime Information Center reported 627,911 individuals as missing.
Runaways account for 293,684 of those individuals reported missing in 2013.

Under SBIR Phases I and II, S&T and dbS Productions will determine the feasibility of the Lost Person Locator concept; develop a field-operating guide and software application; and test the technology with first responders. The project is currently in the second phase of development. The prototype search wheel, field guide, Search and Rescue, and Lost Person Behavior App were delivered in 2015.

By July 2016, dbS Productions will develop a FIND App and deliver to S&T to conduct operational field assessments with search and rescue first responders.

Enable the Decision Maker icon
Enable the Decision Maker

Electronic Recovery and Access to Data Prepaid Card Reader

During arrests of criminal couriers, law enforcement officers rarely find bundles of cash wrapped in rubber bands anymore. Instead, they find stacks of plastic cards — bank credit and debit cards, retail gift cards, library cards, hotel key cards, even magnetic-striped Metrorail cards — that have been turned into prepaid cards.

credit card reader with credit card ready to be swiped
Animation: Card reader swipes credit card
When we found out about the need for this technology from one of our DHS agency partners, we worked to develop the technology necessary to address this critical issue. They were seeing large numbers of prepaid cards during the performance of their duties, but had no way to check the balances on the cards. The ERAD Prepaid Card Reader now provides law enforcement personnel with this capability.
FRG Program Manager Bill Deso

To address this problem and stop criminals in their digital tracks, S&T created the prepaid card reader, which is becoming a vital tool for law enforcement efforts to seize these cards and funds associated with criminal activity.

The Card Reader is a small, handheld device that uses wireless connectivity to allow law enforcement officers in the field check the balance of cards. This allows for identification of suspicious prepaid cards and the ability to put a temporary hold on the linked funds until a full investigation can be completed. FRG transitioned the card reader to the commercial market, and it is now available for law enforcement use.

X-Ray Scanning Rover

From conflict zones to airports to sporting events, bombs pose a danger in any situation. That’s why S&T’s First Responders Group is developing the X-ray Scanning Rover (XSR) to be a responder’s eyes when the going gets dangerous.

The XSR is a portable, remote maneuverable imaging system advanced enough to capture high-resolution images to easily identify and characterize critical Improvised Explosive Device components such as power sources, detonators and electronic circuitry.

One of the advantages of this system is that it can process images at a very fast speed. The X-Ray Scanning Rover takes one continuous scan, and then responders have a clear, high resolution picture of any potential threats in real time. This saves valuable time in scanning objects during critical situations.
FRG XSR Program Manager Christine Lee

The XSR provides a complete 3-D, multi-view picture of the entire object being scanned in real-time, saving first responders’ precious time. This technology offers an alternative to large, bulky, expensive options that may have limited ability to operate in remote areas or rough terrain. Whether being used at a roadside checkpoint, a national landmark or at a public gathering, the XSR deploys easily in multiple environments to provide security screening when needed.

FRG met with subject matter experts in August 2015 for a critical design review. The resulting feedback will be incorporated into two new prototypes, which are expected to be ready by summer 2016. The prototypes will be delivered to selected bomb squad units across the U.S. for user field testing and evaluation.

resilient communities icon
Resilient Communities

Non-Cooperative Biometrics Programs

In 2015, S&T developed the first face imagery database for algorithm testing in the world to include 130,000 still images and 250 videos from Homeland Security Investigations (HSI) seizure data.

Thanks to the work conducted at S&T, the Non-Cooperative Biometrics Program Child Exploitation Image Analysis and the Text Recognition Algorithm Independent Evaluation will begin to be used for facial recognition. These capabilities will help DHS Immigration and Customs Enforcement HSI to solve child sex abuse crimes.

S&T will test face recognition algorithms against this annotated data set and integrate “the best of breed” algorithms into current forensic tools by mid-2016. This will give analysts the ability to identify victims and perpetrators and expedite job performance, which will save countless lives.

Responsive and Defeat Operations Support (REDOPS)

Detecting and neutralizing improvised explosive devices is crucial to protecting lives and property. While detection technologies and strategies have received considerable attention, until recently the homeland security enterprise lacked an integrated program for developing the countermeasures for public safety bomb squads to safely and efficiently dispose of improvised explosive devices (IED). The Response and Defeat Operations Support (REDOPS) is that integrated program.

REDOPS is an S&T effort that supports domestic bomb squads. It provides a collaborative structure for addressing three capability gaps identified by the National Bomb Squad Commander’s Advisory Board (NBSCAB) in its 2011 Strategic Plan. REDOPS’ overarching goals are to make bomb squad technicians both safer and more effective in IED response operations. REDOPS balances developing new technologies with improving operational procedures and training. Specifically, REDOPS pursues capability integration, robotic capabilities and protective systems.

National-level collaborators included the FBI, the interagency Joint Program Office for Countering IEDs, the Electronic Counter Measures Steering Group, the DoD Defense Threat Reduction Agency and the Department of Defense Technical Support Working Group.

0:000:00

Work as One! Australia-U.S. Collaboration

Large scale disasters, like wildfires in the U.S. and bushfires in Australia, require complex coordination and collaboration among public safety and emergency management agencies to understand the threat, alert the public, and effectively respond to protect people, property, and the environment.

Information sharing in support of effective decision making is critical to this coordination and collaboration, which is why S&T launched the Next-Generation Incident Command System (NICS) project, which has come to be known as the Event Collaboration and Management Platform As a Service (eCOMPAS).  NICS/eCOMPAS is a partnership with the California Governor’s Office of Emergency Services (Cal OES), California Department of Forestry and Fire (CAL FIRE) and Emergency Management Victoria (EMV) in Australia—at the Massachusetts Institute of Technology Lincoln Laboratory (MIT-LL).

Work as One branded poster with logos for the Department of Homeland Security, Homeland Security, Science and Technology seal, Emergency Management Victoria, MIT Lincoln Laboratory, California Department of Forestry and Fire Protection (CAL Fire) and California Office of Emergency Services

“NICS has evolved from a stand-alone capability to an International toolset to manage events,” states Dan Cotter, Director of S&T First Responder Group. It has become a force multiplier in terms of collaboration where governments across jurisdictions and continents have come together to work collectively for a common and shared benefit.”

This is now at the center of U.S. and Australian collaborations on first responder technologies. Through a shared vision, the U.S.-Australia NICS/eCOMPAS collaboration aims to develop a collective environment with shared governance, scalable architecture, 24 x 7 worldwide support services, and operating policies. Benefits of this collaboration will include accelerated implementation of the software amongst users, shared training and operational workflows, and cost savings as increased capabilities are developed from leveraging the resources and expertise of both countries to protect our communities.

Resilient Communities icon
Resilient Communities
Critical infrastructure of the future will be designed, built, and maintained to withstand naturally occurring and man-made disasters. Resilient communities struck by disasters will not only bounce back, but bounce forward. In 2015, S&T put several landmark technologies into practice, some, notably, which saved lives that might otherwise have been lost. The FINDER technology detected the heartbeat of buried victims after the earthquake in Nepal. We worked closely with FEMA to create technology and tools that improve planning and real-time decision support for hurricane response. Our Recovery Transformer (REC-X) project was lauded in 2015 as being a “game changer” in disaster recovery. We have also explored new challenges, and ways to respond to new technologies and the threats they may pose.

Finding Individuals for Disaster and Emergency Response (FINDER)

The ability to quickly detect victims buried under rubble or other debris greatly increases their chances of rescue and survival. This is especially true in situations where there are multiple rubble piles or massive amounts of debris to search. In 2015, S&T completed the development of a technology that can help save lives.

In partnership with NASA’s Jet Propulsion Laboratory (JPL), S&T developed a technology aptly-named the Finding Individuals for Disaster and Emergency Response (FINDER).

It works using low-power microwave radar to detect small movements from breathing or the heartbeat of a buried victim. Once FINDER locates these signs of life, it can discover the vicinity where survivors may be found to help rescuers locate people who might otherwise never be found. And it’s all possible due to the ability to detect a beating heart.

Designed to detect people buried under up to 30 feet of rubble, hidden behind 20 feet of solid concrete and from a distance of 100 feet in open spaces, FINDER may be a game-changing technology for search and rescue teams responding to earthquakes and other disasters.

0:000:00
Responder of the Future icon
Responder of the Future

Recovery Transformer (RecX)

Many of the extra high-voltage (EHV) transformers installed in the U.S. are approaching or exceeding the end of their design lifetimes (approximately 30 to 40 years), making them increasingly vulnerable to failure. EHV transformers are massive, weighing hundreds of tons, which makes them difficult to transport. Typically, it takes several months to transport and install a single EHV transformer due to the size and complexity of the equipment.

S&T partnered with the electric utility industry and the DHS Office of Infrastructure Protection on the Recovery Transformer (RecX) project. Through this project, S&T developed a prototype EHV transformer that drastically reduces the time to transport, install and energize the EHV transformer to enable recovery from outages associated with transformer failures. During a previous demonstration, the prototype was able to substantially reduce the process to six days; it continues to run successfully in an operational environment.

In 2015, S&T published the final RecX report, which contains lessons learned, evaluations and considerations for a spare transformer strategy. S&T transitioned RecX to the Department of Energy, which will be able to leverage S&T's findings and recommendations in developing a national transformer reserve strategy.

Additionally, in 2015 the American Society of Civil Engineers designated S&T’s RecX project a game changer in their 2015 “Infrastructure Game Changers” report.

Researchers Conduct Tests Aboard USCG Cutter Healy

Oil spills can be economically and environmentally devastating, but thanks to the Arctic Domain Awareness Center of Excellence (ADAC), researchers are developing technology using atmospheric isotope analysis to analyze how water vapor isotopes in the atmosphere vary across different weather conditions. This means that the U.S. Coast Guard (USCG) could use this technology on unmanned systems and manned assets to “sniff out” changes in water vapor and carbon isotopes to locate fuel and oil spills for future recovery. A team of ADAC researchers and partners conducted tests for the project during the summer aboard the USCG Cutter Healy in Alaska.

0:000:00
The DHS Centers of Excellence are vital partners in conducting critical research and developing solutions to some of the most complex challenges we face in our Homeland Security mission.
Deputy Under Secretary Bob Griffin

National Hurricane Technology Modernization

The National Hurricane Program (NHP)—which links hurricane planning, hurricane forecasts and hazards, decision support tools and training—is making an effort to modernize the current systems.

In 2015, the NHP Technology Modernization effort began working closely with the Federal Emergency Management Administration (FEMA) and state and local emergency managers to improve planning and real-time decision support for hurricane response. Major advances include upgrades to the existing Hurricane Evacuation Planning Tool (HURREVAC) to a next generation decision support platform called HURREVAC–eXtended (HV-X). This new system includes evacuation decision support tools and products that increase capabilities, preparedness and efficiency in emergency management decision making during the planning and execution of evacuations.

The investment by S&T and FEMA in technology and training upgrades for NHP will improve the ability of state and local communities to protect the public during storms. It will also reduce the incidence of unnecessary evacuations and help minimize the economic impacts of an evacuation.

In 2016, S&T will transition HV-X to FEMA, providing an updated and fully operational capability to be transitioned and available to the state and local emergency management community in 2017. This includes tools for training, simulation and analysis that leverage the latest technologies, tools and methods. Integrating and improving these functions will reduce both the time and costs associated with evacuation studies, while immersive training and planning tools will improve decision-making skills and readiness.

illustration of a city setting with flooding half the height of most buildings; the result of a hurricane
Hurricane animation ending with interactive data points
Efforts to reduce the impact of hurricanes rely on the ability of state, local, and tribal emergency managers to make informed decisions if and when their jurisdictions need to evacuate.
In the United States hurricanes have caused hundreds of billions of dollars in infrastructure damage over the last 20 years.
Over the last 20 years hurricanes in the United States have resulted in more than 2,000 deaths.
Enable the Decision Maker icon
Enable the Decision Maker

Biological Threat Characterization Program (BTCP)

S&T’s Biological Threat Characterization Program (BTCP) provided subject matter expertise and laboratory experimentation to support operational responses and policy development during the 2014-2015 Ebola outbreak. S&T fielded scores of requests for data and scientific support and coordinated efforts within DHS and other federal agencies as well as with the White House, Congress, academia and the private sector. We organized and shared known information as well as identified and prioritized gaps where research could improve public health and operational responses. S&T products were adopted by the National Science and Technology Council Ebola Task Force, co-chaired by S&T’s Dr. Brothers, and were used to guide interagency communication. BTCP also directed research at the DHS National Biodefense Analysis and Countermeasures Center Laboratory to determine the stability of Ebola in blood and other bodily fluids under relevant environmental conditions on surfaces such as personal protective equipment and airline carpet. This effort, along with previous research on the Ebola virus directed by S&T’s Biological Threat Characterization Program, influenced the approach and procedures of public health organizations and multiple federal agencies when responding to the Ebola outbreak.

Enable the Decision Maker icon
Enable the Decision Maker

Underground Transport Restoration (UTR)

Although unlikely, the impact of a biological threat could be significant. To prepare, S&T partnered with the Environmental Protection Agency (EPA) to test a decontamination process for subway cars that have been contaminated by substances such as anthrax. A successful recovery process for these cars means they will be put back in service safely for future riders, train operators and maintenance personnel.

To conduct the test, the Bay Area Rapid Transit (BART) authority provided the government with a subway car. The process involved tenting and fumigating the subway car with methyl bromide gas, which is used in the commercial pest control industry. The BART car was outfitted inside and out with coupons of various materials inoculated with a safe bacterial spore surrogate for Bacillus anthracis, the causative agent for anthrax. The test results indicated the spores were successfully destroyed per EPA requirements.

Additionally, a Metropolitan Transportation Authority (MTA) New York City Transit representative observed the field test. MTA provided a sensitive and expensive electronic relay switch, which is used in their subway system to control train car traffic, to incorporate in the BART car test. The anthrax surrogate on the device was successfully destroyed during the demonstration and the switch was deemed to be unaffected by the fumigant after inspection and testing by MTA engineers.

This process could allow city subway systems to save millions of dollars in potential recovery costs for cars affected by a potential bioterrorism event. With cities like New York servicing 4,000 cars during rush hour, this could prevent crippling effects on our nation’s cities.

Jack Rabbit II

As part of S&T’s Chemical Security Analysis Center’s (CSAC) initiative to better understand atmospheric transport and dispersion (AT&D) phenomena of large-quantity releases of chlorine, CSAC successfully completed the first phase of the Jack Rabbit II project during the fall of 2015. These tests, which were conducted at Dugway Proving Ground, Utah, consisted of five to 10-ton chlorine releases in a simulated urban environment. Instrumentation and high-definition cameras were used to collect vast amounts of data, high-definition video footage, and photographs that will be critical to major advances in HazMat and emergency response, planning and AT&D hazard prediction modeling.

A primary reason for the success of Jack Rabbit II has been the involvement of numerous organizations from federal, state and local governments, academia and the private sector. Through transition plans that were successfully developed with these stakeholders, Jack Rabbit II data, videos and knowledge products will be provided and directly support mutual efforts to address the hazards and risks posed by chlorine.

The Department of Defense, Defense Threat Reduction Agency, which contributed a large portion of the total Jack Rabbit II funding, will use the data and findings to advance the Hazard Prediction & Assessment Capability and Joint Effects Model hazard prediction models to simulate, study and plan for chemical release scenarios. Data provided to the Department of Transportation’s Pipeline and Hazardous Materials Safety Administration will support the development of the 2020 Emergency Response Guidebook, which is distributed to emergency responders nationwide. Videos and findings transitioned to chemical and rail industry partners will be helpful in developing new training products and hazard and risk strategies, and in updating guidance for safety and best practices.

0:000:00

Countering UAV Threats in the National Capital Region

On April 15, 2015, a civilian flew a gyrocopter from Gettysburg, Pennsylvania to land on the West Front Lawn of the U.S. Capitol Building. The ability to land in central Washington, D.C., without being identified or intercepted underscored operational challenges to aviation security in the National Capital Region.

S&T engaged the DHS Homeland Security Development Institute (HSSEDI), a Federally Funded Research and Development Center, to help coordinate an inter-agency response to address challenges associated with Non-Traditional Aviation Technology (NTAT). To do this, HSSEDI conducted several working group sessions and interviews across DHS as well as with senior leadership from the Federal Aviation Administration, Department of Justice, Department of Defense, Capitol Police, Metro Police and Park Police.

As a result of the working sessions, HSSEDI developed and conducted two table-top exercises with stakeholders in July and September of 2015. During these exercises, NTAT threats, vulnerabilities and consequences were framed and opportunities to prevent or mitigate them were identified. The results helped prepare the Secretary of Homeland Security for an interagency meeting with senior leadership in mid-September. During the meeting, Secretary Johnson reiterated the Department’s commitment to closing gaps in security vulnerabilities.

Enable the Decision Maker icon
Enable the Decision Maker
From watching the internet for signs of danger, to testing DNA quickly, to preparing for large crowd evacuations, S&T is helping to enable the decision maker to act -- and react – in an informed and decisive manner.

Cargo Time Release Study

The efficient flow of lawful international commerce is immensely important to the U.S. economy. That’s why U.S. Customs and Border Protection (CBP) is developing an electronic system to improve how imported cargo is moved by sea, rail, air, and truck. To assist them, S&T delivered analytical products based on operational data from CBP and other government agencies to measure the length and causes of delays at Ports of Entry. S&T’s data analysis and findings are helping CBP effectively reduce delays, increasing the pace of America’s global trade.

Rapid DNA

In 2015, S&T funded Rapid DNA, a program that verifies family relationships to improve immigration efficiency for legal kinship applicants, reduce kinship fraud, provide for family reunifications and conduct DNA watch list checks. 

Rapid DNA can be used on the scene of mass fatality events, in refugee camps around the world, along the border to prevent human trafficking, or at immigration offices to verify relationships and kinship between family members. Responders have often used DNA to make familial connections, but the process typically takes days to process in a forensics laboratory and can take several months to get the results. Rapid DNA is a technology that could change all that, reducing the amount of processing time from months to minutes.

For example, this technology can be used in the field to confirm kinship between a parent and a child with 99.5 percent likelihood of relationship, and within 90 minutes.

Because of the accuracy that DNA provides, entities across the homeland security enterprise have expressed the need for this type of technology. S&T developed Rapid DNA with a “privacy by design” approach. It requires identity authentication for operators, all data is encrypted, and a log of all data actions is maintained. Furthermore, Rapid DNA looks at DNA locations required to confirm a familial match and does not evaluate physical traits, race, ethnicity or disease susceptibility.

Rapid DNA has been purchased by a few laboratories that are validating its performance and beginning to use it in trial cases. Several state crime laboratories have also purchased the technology to quickly identify persons who leave DNA behind at a crime scene, resulting in expedited arrests and convictions. S&T is also conducting field demos and tests with USCIS Refugee Affairs and CBP Border Patrol.

Tracking Tropical Storms and Hurricanes

Moving people and property out of the way of a storm surge can save lives. That’s why the Coastal Resilience Center at the University of North Carolina-Chapel Hill runs the ADvanced CIRCulation (ADCIRC) model to forecast storm surge as tropical storms and hurricanes approach the United States. The ADCIRC storm surge model combines rain, atmospheric pressure and wind forecasts to predict when, where and to what extent flooding will inundate a coastal community with greater precision than other available models. This enables federal, state and local decision makers to identify which locations will become unsafe and can plan for mitigation and response before severe storms occur. This year, ADCIRC tracked several storms, including Tropical Storm Erika and Hurricane Joaquin, and it has been used to track every hurricane to make landfall on the U.S. Gulf and East coasts for the past seven years.

Visualization of the ADCIRC Surge Guidance System (ASGS) output for Hurricane Joaquin (2015), advisory number 12, when the storm was considered a threat to the United States East coast. The Coastal Emergency Risk Assessment ADCIRC Coastal Circulation and Storm Surge Model + SWAN Wave Model, Storm Surge and Wave Guidance for the Atlantic Coast. Maximum Water Height graphic map Forcast Time Range: Wed, 30-Sept-2015, 8PM EDT - Mon, 05-Oct-2015, 8 PM EDT; Hurricane JOAQUIN, Advisory 13; Track: National Center official forecast; NHC advisory issue: Wed. 30-Sept-2015, 11PM EDT. Toolbar with Tropical Cyclone Activity options and Water height above MSL legend. Logos lining the bottom include: Sea Grant, The United States Department of Homeland Security Seal, Coastal Hazards Center, Oklahoma University, renci, Louisiana State University, ADCIRC, The University of North Carolina at Chapel Hill, Seahorse

ADCIRC model forecasting maximum water height from storm surge as Hurricane Joaquin approached the United States. Joaquin showed serious storm surge potential along the North Carolina coast in early forecasts prior to forecasts that showed the storm turning out to sea. Source: http://nc-cera.renci.org/

Your academic research and development of a user-friendly storm surge model has been invaluable to the Coast Guard... The fidelity of your model gives the Coast Guard a defensible method of determining high risk areas during major weather events.
VADM R.C. Parker USCG

New Apps Available to Monitor Animal Health and Protect our Food Supply

The threat of animal disease is significant when thinking about our food supply. Through its National Center for Zoonotic and Animal Disease Defense (ZADD) Center of Excellence, S&T is contributing to developments that could keep our food safe in the event of an outbreak.

One of the developments this year was the release of two apps in a suite of pluggable mobile and web-based applications to the Apple App and Google Play stores. ZADD’s co-lead at Texas A&M released the Biosurveillance Field Entry System (BFES) swine and revised mixed animal apps, which enable veterinarians to record visits to sick and healthy animals in the field. While the apps are free and anyone can download them, accounts are only activated for authorized participants in the Enhanced Passive Surveillance (EPS) pilot program.

BFES is part of the AgCONNECT® tool suite, a set of data integration and analysis products designed to enhance situational awareness during infectious animal disease outbreaks. Based on its compatibility with the AgCONNECT® software platform, BFES can also share animal health information with officials responsible for monitoring the herds at the state and national level.

illustration farm setting with house, pasture, barn, tractor, pigs and cows grazing
Farm animation ending with interactive data points
The BFES mixed animal app has resulted in more than 24,000 veterinary reports since the first EPS pilot began in July 2012.
The veterinary reports generated using the BFES mixed animal app represent the health status of over 1.1 million animals in four states: Arizona, Colorado, New Mexico and Texas.
As of October 2015, seven swine companies or clinics (22 participants across 11 states) enrolled to use the BFES swine application.

Sensor-Smart Affordable Autonomous Robotic Platform

When disaster strikes, the need for robotic capabilities can range greatly—from aerial support to sensors in tunnels—depending on the specific challenges for first responders. The location and varying disaster scenarios make it very difficult to pre-position robotic supports without knowing the specific requirements of the response. Additionally, limited storage space and funding compound the ability to prepare for all disaster response needs.

As a result, S&T is developing a robotic “App Store” that enables first responders to print robots in 3-D and assemble on site using standard electronic parts. This means that first responders will only need to deliver one trailer that is fully equipped with appropriate robotic options to a disaster area instead of pre-positioning pre-built supplies.

Known as the Sensor-Smart Affordable Autonomous Robotic Platform or SAARP this capability makes a library of validated robotic solutions available to responders at the scene of a disaster and prepares them to meet future challenges. Furthermore, the 3-D printing components will allow response teams to deploy these customized tools in a fraction of the time.

Small Dark Aircraft

Criminal and drug trafficking organizations often use aircraft that can deliver illicit cargo and contraband across remote sections of the U.S. border. This poses a challenge for border agents in their mission to interdict illegal substances coming across the border. To assist U.S. Customs and Border Protection (CBP), S&T developed a capability to detect small aircraft at low altitudes in remote locations. The final system transitioned to CBP in 2015. The system is mobile, uses renewable energy sources, and is fully integrated with a high degree of autonomy, performance and reliability. It uses innovative sensor technologies, detection, tracking and classification methods, and robust power and communications. The project also developed a method to map the terrain of the border and select sensor type and location to optimize performance.

0:000:00

Screener’s Auto-Diagnostic Adaptive Precision Training (ScreenADAPT)

S&T developed the Screener’s Auto-Diagnostic Adaptive Precision Training (ScreenADAPT) system to address the Transportation Security Administration’s (TSA) need for enhanced training of checkpoint screeners. ScreenADAPT is an innovative and adaptive simulation-based training system that uses eye tracking to capture and visualize the search process for X-ray image analysis. The information captured by eye tracking is used to 1) diagnose deficiencies and inefficiencies in visual searches, and 2) adapt training in real-time to help the trainee overcome identified deficiencies, resulting in a targeted, individualized training solution.

ScreenADAPT can vary the training method and delivery, threat type and threat difficulty in real–time, based upon the trainee’s needs. Recent field testing with ScreenADAPT showed that transportation security officers achieved a 45 percent reduction in search time to find threats and clear bags while maintaining threat detection accuracy. We officially transitioned the system to TSA in April 2015, where it is a part of TSA’s Action Plan. S&T is continuing to expand the functionality of ScreenADAPT to include dual-monitor capabilities and moving-belt simulation.

The Wind Farm Mitigation Agreement

S&T’s Interagency Office, with U.S. Customs and Border Protection’s Office of Air and Marine Operations Center, Long Range Radar Joint Program Office, led a team comprised of Department of Defense and Javelina Wind Energy, LLC, a private wind farm developer that culminated in a technical solution and mitigation agreement signed on August 21, 2015. The agreement supports the President’s All-of-the-Above Energy Strategy, and the DHS Policy and Management Directive for Evaluation of Wind Farms as they impact homeland security, preserving the nation’s southern border situational awareness picture and provides, at no cost to the federal government, a technological solution to mitigate wind turbine radar interference against DHS’ southern boundary air surveillance capability, with a cost savings of over $3M to the federal government and DHS.

desert setting with rolling hills of sand, cacti and several white three blade wind mills
Wind farm animation ending with interactive data points
Through the Wind Farm Mitigation Agreement, the state of Texas will see an economic impact of approximately $400M over 16 years and 567 jobs.
The Wind Farm Mitigation Agreement permits construction of up to 130 wind turbines located near a critical southern border long-range surveillance radar system.
DHS received a contribution of more than $2.8M from the wind farm developer, with a land lease agreement that covers infrastructure costs for a 20-year term.
vg cyber nocircle icon
Trusted Cyber Future
Our future is a cyber future. We’re more connected and integrated digitally than ever before. From competitions, to mobile device security, 2015 was a year of advancement and progress. The Secure Mobile Device Replacement program broke ground on their plans to create classified-capable mobile devices. In 2015, S&T continued an ongoing project with Kryptowire to improve mobile application security by notifying companies of vulnerabilities in code. The SoftWare Assurance Market Place, or SWAMP, will reduce the number of vulnerabilities present in software deployed in the marketplace. S&T developed the TTP Program to transition federally funded cybersecurity technologies, from laboratories to enterprise organization consumers and into broader use. As the environment evolves, S&T continues to evolve along with it, in order to make a safer, and more resilient cyber environment.
0:000:00

Cyber Competitions

A critical element of a robust cybersecurity strategy is having the right personnel with the right skills. To fulfill this need, S&T uses competitions to give students practical real-world experience with current and emerging technologies.

In 2015, S&T continued to fund the U.S. Cyber Challenge (USCC), which ran online Cyber Quest competitions and organized numerous summer camps that featured one week of specialized training and instruction. More than 1,400 individuals participated in Cyber Quest competitions in 2015, and camps were held at Virginia Tech, Delaware Technical Community College, Moraine Valley Community College and Southern Utah University. USCC, in collaboration with Monster Government Solutions, also relaunched the CyberCompEx.org, an online portal that provides tools to the next generation cyber workforce to develop essential skills, and to connect with the cybersecurity industry.

S&T also funded scenario and environment development for the National Collegiate Cyber Defense Competition (NCCDC). NCCDC is a college-level competition where teams of eight students compete against each other to defend a small business network and associated services from persistent attack. In 2015, more than 200 colleges and universities participated. Twenty-six organizations across government and industry sponsored the national finals in San Antonio, Texas.

0:000:00

Cyber Security Forensics

Because devices such as computers, cell phones and navigation systems may contain valuable evidence, in 2015 S&T sought capabilities and solutions to analyze user information, call logs, location information, text messages, emails and audio and video recordings.

One of these technologies is the Infotainment and Vehicle System Forensics (iVe), which helps law enforcement find key evidence in vehicles seized during an investigation. The iVE digital forensic technology allows investigators to acquire data from in-vehicle information systems, including recent destinations, call logs and staff management system messages. S&T funding helped extend the capability of the tool to acquire user data from more than 4,000 vehicle models. Now commercially available, iVe is in use at numerous law enforcement agencies internationally.

An in vehicle navigation system within a car

Similarly, S&T saw value in Autopsy, an open source forensics platform. Autopsy allows law enforcement officials operating with tight budgets to analyze seized hard drives or smart phones for free. In 2015, S&T concentrated on modules that were focused on image and video analysis, timeline analysis, structured cyber data language for threat reporting and observable system and network properties, all of which added significant capabilities to aid law enforcement in a variety of investigations, including child exploitation and cyber threat reporting.

Mobile Device Security

For most people, our phones could reveal a good deal about who we are, and this goes beyond just social networking. With complex interfaces like cellular, Wi-Fi, Bluetooth and GPS, mobile devices provide many opportunities for attack. Cybercriminal activity targeting mobile devices and data privacy can have dire consequences, including tracking users, stealing mission critical data and denying users access to their devices. To help protect these devices – both for public and government use – S&T takes a mobile-centric rather than the traditional desktop-centric approach to mobile device security.

Animation of a handheld tablet with cyber security symbols rotating around the device.

Two S&T efforts in 2015 improved the overall security of mobile devices used by both the public and the government. S&T continued an ongoing project with Kryptowire to improve mobile application security by notifying companies of vulnerabilities in code. The technology developed in 2015 makes mobile applications safer for personal use and has been used heavily across the government to ensure the security of applications used for the mission. Additionally, the joint DHS and In-Q-Tel work program, MobileIron, was adopted by select agencies in DHS during 2015 as their solution of choice. MobileIron’s policy enforcement technology improves the security and management of an organization’s data and devices by ensuring the user is protected with a set of configurations and rules not only when connected to a network, but also when the device is offline.

Transition to Practice Program

Although a number of transition paths exist for research funded by the federal government, how these research projects become commercialized is too often left to chance, with little regard for the federal government’s return on investment. To address this issue, S&T developed the Transition to Practice (TTP) Program to transition federally funded cybersecurity technologies, from laboratories to enterprise organization consumers and into broader use across the Homeland Security Enterprise.

The best technology ideas remain just ideas until they can be commercialized and put to use... I am proud that S&T’s Transition-to-Practice program has facilitated getting another outstanding research project out of the lab and into the marketplace.
DHS Under Secretary for Science and Technology Dr. Reginald Brothers

In 2015, TTP transitioned three technologies to the marketplace: Hyperion, Network Mapping System (NeMS) and PathScan.

Hyperion icon
Hyperion is a malware forensics detection and software assurance technology that calculates the behavior of software, including malware, and provides a repeatable, cost effective means to achieve assured software.
NeMS icon
NeMS is a software-based network characterization and discovery tool that helps users understand what is on their network so they know how to better protect it.
Pathscan icon
Pathscan is a network anomaly-detection tool that quickly detects the movement of hackers once they breach the network, allowing operational teams to quickly defend important network information.

Security Mobile Device Replacement

In 2015, S&T engaged HSSEDI, the Homeland Security Systems Engineering and Development Institute, a Federally Funded Research and Development Center, which identified an emerging need for mobile devices that would support classified communications for DHS. As a result, HSSEDI executed a project on classified mobility that produced an architecture based on the National Security Agency (NSA) Commercial Solutions for Classified (CSfC) Program. Using the DHS Advanced Network Integration and Experimentation Lab, known as DANIEL, HSSEDI developed and tested the DHS Classified Mobile Access Reference Architecture, which served as the basis for the approved design. The architecture secures the information and necessary capabilities to provide the classified mobility solution.

Instead of accrediting a specific device, such as the secure mobile environment-portable electronic device (SME-PED), HSSEDI’s solution uses commercial off-the-shelf devices. Using Mobile Device Management, the devices will be appropriately locked down. For example, the native voice capability on the phones will be disabled. As part of the authentication, the Mobile Device Manager will verify that the device has not been tampered with or modified. If it has, a connection will not be allowed.

In the first quarter of fiscal year 2015, the SME-PED replacement initiative achieved NSA acceptance and registration of the DHS Classified Mobile Access design. This approval is the second-ever NSA-approved mobile access design.

DHS implementation of CSfC will enable DHS headquarters to provision other classified services more efficiently. Additionally, the architecture can be adapted for Sensitive but Unclassified remote services, providing much more secure and available connectivity for traffic designated For Official Use Only as well.

SoftWare Assurance Market Place (SWAMP)

SoftWare Assurance Market Place (SWAMP) provides opportunities through continuous assurance services, which helps narrow the gap that exists between software and how it is tested and evaluated for security weaknesses and vulnerabilities. SWAMP addresses the critical need for improved software security by providing a collaborative research facility where organizations and the software assurance community can test their software for potential security issues.  By providing software assurance, SWAMP will reduce the number of vulnerabilities present in software deployed in the marketplace.

By the end of 2015, SWAMP was approaching 800 users, including 70 accounts attributed to international users representing 24 countries. On average, SWAMP processes over 1,500 assessments per week and now offers a broad range of open-source and commercial software analysis tools (mobile and static analysis) to help improve the detection of security issues in software. To keep pace with modern software, SWAMP exposed software assurance researchers and tool developers to more than 750 software packages and test cases to find new techniques and capabilities to advance the state-of-the art in software analysis.

By the end of 2015, SWAMP was approaching 800 users, including 70 accounts attributed to international users representing 24 countries. On average, SWAMP processes over 1,500 assessments per week.
vg screeningatspeed nocircle icon
Screening at Speed
Making sure people are safe, while also providing quality, effective security is the focus S&T took to this goal in 2015. S&T transitioned the Aviation Scanner, a technology that can quickly scan commercial and noncommercial aircraft for illegal smuggling activities. Additionally, the Explosives Detection Canine program delivered a breakthrough method, allowing researchers to “see” the details in a scent picture with canine sensitivity. Two portable environmental monitoring systems (PEMS) were developed which contain several sensors designed to monitor the environment for chemical and radiological threats. Baseball stadiums have begun using a technology called Fast Access, which allows enrolled fans to move through the entry process quicker—similar to the TSA Pre-check Enrollment program at airports. From large crowds, to airport throughways, S&T is taking screening at speed to new heights.

Aviation Scanner

Criminals often engineer hidden compartments to smuggle drugs and other illicit materials undetected. In 2015, S&T finalized and transitioned a capability to U.S. Customs and Border Protection (CBP) that can quickly scan commercial and noncommercial aircraft for illegal smuggling activities. The Aviation Scanner unit incorporates a miniaturized backscatter X-ray system that can penetrate the wings, fuselage and tail section of an aircraft and detect anomalies. This system is currently in operation at the CBP port of entry at Laredo Airport in Texas.

illustration of the side-view tail end of a plane, x-ray vision in dark blue with white outlines and cargo in the cargo hold highlighted in orange
Suspicious package shown in the wall of an aircraft

Fiber Optic Distributed Sensing (FODS)

Monitoring 7,000 miles of land poses a challenge for border patrol agents, especially at night, or in traversing stretches of rugged terrain. In 2015, S&T demonstrated an unattended ground sensor that provides a high probability of detection and an enhanced classification capability to discriminate between humans, animals, vehicles and aircraft without the use of thermal imaging systems. This technology, which is planned for transition to CBP in 2017, will improve their ability to secure U.S. terrestrial borders. It will also increase the probability of detecting targets with fewer false alarms, with no limitation on battery life and centralized processing to enable simple detection upgrades of detection and classification routines. The system will also have low maintenance costs and no profile once installed.

Explosives Detection Canine Program

Led by the Explosives Detection Canine Program, S&T is working on several efforts, from a non-invasive method to “read the dog’s mind” with an international partner, to a soon-to-be commercialized, non-explosive training aid for a sensitive homemade explosive. In 2015, the program delivered a breakthrough laboratory analysis method, allowing researchers to “see” the details in a scent picture with canine sensitivity. S&T has been called upon to test canine detection on emerging threats and novel concealment techniques. In FY 2016, the program will show how canines trained with a unique ability to detect firearms and explosives in large crowds.

The program’s focus has been on the explosive detection community, with applications for the entire homeland security enterprise canine detection community. Future investment is centered on filling key knowledge gaps in canine sensing to allow for more efficient training and a better understanding of the detection canine. The Transportation Security Administration (TSA) National Explosive Detection Canine Team Program is a primary customer, with key partnerships at state and local law enforcement agencies.

0:000:00

Surface Transportation Explosives Threat Detection Program

S&T, working with the leadership of the Washington Metropolitan Area Transit Authority Police Department, deployed the Video Summarization Tool during the Pope's visit to Washington, DC in September 2015. The mission of the Surface Transportation Explosives Threat Detection Program is to provide the mass transit community with an integrated capability to detect and mitigate an explosive threat.

As part of this program, the Massachusetts Institute of Technology Lincoln Laboratory has developed a suite of Video Forensic Tools to monitor indicators of terrorist threats as well as other suspicious behaviors. The tools include: 1). The Fast Event Review, which is capable of the rapid review of key events surrounding a situation to determine the potential of leave-behind improvised explosive devices; 2). Video Summarization, which is capable of transforming long durations of surveillance video into much shorter summary clips for creating an easy-to-view index of all events in a given scene; and 3). Path Reconstruction, which can track an individual of interest across multiple camera views allowing reconstruction in chronological order of the path taken within a venue. This suite of tools will be an integral part of S&T’s goal of screening individuals, baggage and other items entering large stadiums, special event sites and mass transit systems.

0:000:00

Recapitalization of Radiation Portal Monitors (RPM)

S&T’s Homeland Security Studies and Analysis Institute, a Federally Funded Research and Development Center, was tasked with conducting a study of a pending recapitalization of radiation portal monitors (RPMs) at all U.S. ports of entry through an Analysis of Alternatives and recommending candidate replacement systems. Initial findings of this study showed that current maintenance and the support concept were sufficient to defer the need to fully recapitalize the RPMs. The analysis was then restructured to look at opportunities to optimize screening performance at different ports of entry, with different technologies and prospective funding levels at each location. The study provided a strong justification to support partial fleet capitalization. For example, an added capability for remote operation of the detection equipment. The analysis took on a highly visible challenge for DHS that resulted in options for improving screening efficiency through effective and targeted technology deployment.

Fast Access

In recent months, baseball stadiums have begun using a technology called Fast Access, which allows enrolled fans to move through the entry process quicker—similar to the TSA Pre-check Enrollment program at airports. S&T collaborated with Clear, a technology company, to develop TSA Pre-check and Fast Access. To develop Fast Access, S&T leveraged its engines, which are capabilities that can be used in a variety of similar scenarios. In this instance, the engine is the risk assessment algorithm that enabled Clear to develop its own algorithm and performance refinement of Fast Access. Clear now has SAFETY Act Designation and Certification, thanks to S&T’s assistance in refining this technology.

illustration of stadium, "ENTRANCE" sign on stadium, a fence around the stadium having two gates, one labelled "fast access" has a short line of silhouette people, the second gate has silhoutte people line extending around the stadium
Two entrance lines to stadium. One shorter than other, showing faster access to stadium.
Enable the Decision Maker icon
Enable the Decision Maker

Explosives Threat Mitigation Unit (TMU)

In 2015, S&T’s Commercial Aircraft Vulnerability Program and Transportation Security Laboratory initiated the Explosive Threat Mitigation Unit (TMU) project. TMUs are designed to safely mitigate or remove unidentified items or packages to help protect people and assets from potential explosions or their threats. The TMUs, which are intended for U.S. Secret Service (USSS) security screening checkpoints, will be used to temporarily provide safe, secured storage for items obtained from visitors passing through a checkpoint in the unlikely event that an item contains an explosive-based threat.

The TMU is being designed by the Army Research Laboratory’s Weapons and Materials Response Directorate under an interagency agreement with S&T. The TMU design under development incorporates advanced composite materials that are lighter weight and provide increased operational mobility compared to explosive TMUs currently used by the USSS.

To date, S&T has completed preliminary live fire explosive testing on a series of full-scale TMU prototypes at Aberdeen Proving Grounds in Maryland. The final TMU prototype design is currently under construction and scheduled for explosive testing during 2016.

Budget Highlights

Budget Highlights

In Fiscal Year 2015 (FY15), S&T was appropriated a $1.1 billion dollar budget.

This budget is divided into five main areas:

AreasFY11FY12FY13FY14FY15
M&A140918135000126519129000129993
AOS4708054154459914170341703
Labs140000181500158083143785134989
UP3989036563383393972439724
RDI459690265783425294462000457499

In addition to reshaping S&T’s R&D portfolio - to focus on the highest priority needs - S&T’s Apex Projects are supported by a new category of projects called Apex Technology Engine Teams (Engines) that provide expertise in focused topic areas. Engines represent a novel approach for realizing S&T’s visionary goals and powering innovation. S&T’s Engines identify and share subject matter expertise, technical solutions and tools, best practices, lessons learned, and reusable products and solutions on behalf of Apex and other S&T projects.

To fund the new Apex projects and engines, S&T realigned approximately $54 million of its FY15 RDI budget. The Apex projects are organized around the following areas of application:

Areas of applicationPercentage
Borders and Maritime Security Division9.7%
Chemical and Biological Defense Division22.9%
Cyber Security Division15.1%
Explosives Division20.9%
Resilient Systems Division9.7%
First Responders7.5%
APEX14.3%

In the current budget environment, S&T is also leveraging resources from others areas within DHS. This cross-component collaboration has resulted in the ability to leverage direct resourcing, as well as capitalize on the work of others. For example, in FY 2015, DHS components contributed more than $126 million to S&T projects, ensuring that priority R&D areas are adequately funded.

An important aspect of the S&T budget is the amount of funding that is not discretionary R&D. For S&T, there are a significant number of must fund projects that greatly benefit the Department and the Homeland Security Enterprise, but require various minimum year to year investments to sustain. In fact, the total amount of discretionary R&D funding is approximately 50 percent.

Examples of must fund projects are the Defense Technology Experimental Research (DETER) testbed, which S&T’s Cyber Security Division operates; terrorism risk assessments in chemical, biological, radiological and nuclear areas, which are foundational elements for government-wide planning and policy development to effectively prevent, respond to, and recover from possible terrorist attacks; and infrastructure upgrades for our five laboratory facilities.

This stable funding is critical to the success of R&D organizations due to the complex nature of R&D projects. The projects typically operate on longer timelines with progress measured over several years. The inability to consistently fund R&D projects across their lifespan has adverse consequences that disproportionately reduce or prevent return on R&D investments. S&T has created a collaborative atmosphere that leverages capabilities and dedicates funding to the support of R&D missions. In keeping with our visionary goals, S&T allocates resources to help protect the security of the nation, and the defense and strengthening of our communities.

The Way Ahead