Approved Technologies

The SAFETY Act provides two levels of liability protections for approval: Designation and Certification. By obtaining either Designation or Certification, companies obtain a level of legal protection in case their technology is ever put to use during a terrorist attack. See below for a list of approved technology certifications.





Company/Technology

Science Applications International Corporation (“SAIC”)

Approved: September 17, 2013 | Expires: October 31, 2018

Science Applications International Corporation (“SAIC”) provides the Radiation Portal Monitor System (“AT-980 System”) (the “Technology”). The Technology is a device that uses gamma-ray and neutron detection modules to passively monitor closed, moving vehicles, containers, and/or railcars for the presence of radioactive materials. In particular, it can be used to detect the presence of special nuclear material and radiological dispersal devices. The Technology also includes warranty and maintenance services, installation and operation services, and the qualification of the personnel providing the Technology.


Lauren Innovations, LLC

Approved: September 17, 2013 | Expires: October 31, 2018

Lauren Innovations, LLC provides NaviGate™ (the “Technology”). The Technology is a Web-based crisis management portal application for preventing, identifying, and deterring Acts of Terrorism and limiting the harm from such acts in a building or group of buildings. The Technology consists of online computer software tools for a facility to meet emergency planning and response requirements and to integrate the planning and response process with first responders pertaining to individual buildings. The Technology also includes hosting services through a third-party provider.


Five Star Airport Alliance, Inc.

Approved: September 17, 2013 | Expires: October 31, 2018

Five Star Airport Alliance, Inc. provides Baggage Screening Systems and Services (the "Technology"). The Technology is a set of services for the design, installation, and commissioning of automated baggage handling systems for checked baggage, including the programming necessary to achieve routing of baggage. The Technology is deployed in accordance with Transportation Security Administration (“TSA”) specifications and subject to TSA approval prior to full operations. The Technology also includes maintenance support services, associated manuals, checklists, and technical documents related to the Technology.


Port Authority of New York and New Jersey

Approved: September 12, 2013 | Expires: September 30, 2018

The Port Authority of New York and New Jersey implements the LaGuardia Airport Security Program through a variety of procedures involving physical and electronic security measures, tools and procedures. These efforts include development and enforcement of the airport’s security plan, training of police and other security personnel, conducting background checks of airport workers and overseeing security systems.


Emergent Protective Products USA, Inc.

Approved: August 27, 2013 | Expires: September 16, 2016

Emergent Protective Products USA, Inc. provides Reactive Skin Decontamination Lotion (the “Technology”). The Technology is a formulation for the treatment of skin that has been contaminated with toxic chemical agents. The Technology is formulated to neutralize and aid in removing chemical weapons agents, blister agents, and Trichothecene Mycotoxin (T-2) toxins. The Technology also includes support services, documentation, etc.


The Boeing Company

Approved: August 19, 2013 | Expires: September 30, 2018

The Boeing Company provides Security System Equipment Installation and Integration Services (the “Technology”). The Technology is a set of services intended to design, assess, evaluate, engineer, research, recommend, install, integrate, and test security technologies in support of Transportation Security Administration security programs. The Technology also includes training and qualification of those providing the services.


Phoenix International, Ltd.

Approved: August 19, 2013 | Expires: September 30, 2018

Phoenix International, Ltd. provides MagnumSpike! Tire Deflation System (the “Technology”). The Technology is a portable tire deflation system composed of an expandable array of interlocking, nylon slats from which metal alloy spikes protrude. It is intended to either to stop a moving vehicle that represents a threat or, alternatively, to detain a suspicious stopped vehicle. The Technology also includes all attendant technical manuals, hands-on training and training materials, and safety guidelines.


Smiths Detection Inc.

Approved: August 13, 2013 | Expires: September 30, 2016

Smiths Detection, Inc. provides eqo™ (the “Technology”). The Technology is a flat-panel millimeter-wave body-imaging scanner used for detecting hidden objects under clothing at security checkpoints. The Technology also includes maintenance and training services, technical documents and manuals, associated software, lifecycle support, quality control, quality assurance, and a warrantee program.


International Council of Shopping Centers, Inc.

Approved: August 12, 2013 | Expires: September 30, 2018

The International Council of Shopping Centers, Inc. provides the Shopping Center Security Terrorism Awareness Training Program (the “Technology”). The Technology is a web-based “Awareness Level” anti-terrorism training course certified by the Federal Emergency Management Agency (“FEMA”) as FEMA course number AWR304-W. The course provides security personnel with increased awareness of the various facets of terrorism and criminal activity that could occur at a retail facility. The Technology does not provide operational training for response to terrorist events.


Honeywell International Inc., doing business as Vindicator Technologies

Approved: August 07, 2013 | Expires: August 31, 2018

Honeywell International, Inc., doing business as Vindicator Technologies, provides V5 Intrusion Detection and Access Control Systems. The Technology is a system of devices that provides for remote monitoring of security cameras, access control stations, and intrusion detection sensors. The Technology also includes all attendant manuals, installation, acceptance testing, and the qualifications of those providing the services.