Approved Technologies

The SAFETY Act provides two levels of liability protections for approval: Designation and Certification. By obtaining either Designation or Certification, companies obtain a level of legal protection in case their technology is ever put to use during a terrorist attack. See below for a list of approved technology certifications.





Company/Technology

JAS Forwarding (USA), Inc.

Approved: November 05, 2012 | Expires: November 30, 2017

JAS Forwarding (USA), Inc. provides Certified Cargo Screening Facilities (the "Technology"). The Technology, Certified Cargo Screening Facilities, is designed to aid in meeting the congressional mandate that 100 percent of cargo placed on passenger airplanes be screened. The Technology includes, and provides, screeners and programmatic personnel for the screening of cargo in accordance with the Transportation Security Administration’s (“TSA’s”) Certified Cargo Screening Program at TSA-approved Certified Cargo Screening Facilities.


Northrop Grumman Security Systems, LLC

Approved: October 19, 2012 | Expires: November 30, 2017

Northrop Grumman Security Systems, LLC, Northrop Grumman Systems Corporation, and Northrop Grumman Corporation provide the Guardian™ System (the "Technology"). The Technology is an infrared countermeasures system designed to provide protection for aircraft from infrared-guided Man-Portable Air Defense Systems ("MANPADS"). The Technology also includes installation, training, and maintenance services.


Chemring Detection Systems, Inc.

Approved: October 01, 2012 | Expires: October 31, 2015

Chemring Detection Systems, Inc. provides JUNO® (the "Technology"). The Technology is a hand-held vapor detector designed to detect various Toxic Industrial Chemicals, Chemical Warfare Agents, and other potential threats. The Technology also includes optional training and a user’s manual


AlliedBarton

Approved: September 25, 2012 | Expires: October 31, 2017

Allied Security Holdings, LLC, AlliedBarton Security Services, LLC, AlliedBarton (NC) LLC, and AlliedBarton Security Services provides Physical Security Services (the "Technology"). The Technology is physical security services to commercial and government facilities, including but not limited to, various critical infrastructure locations. The Technology may include: physical security guard services that perform on-site and off-site surveillance operations; access control/perimeter control; vehicle and foot patrols; screening of persons, packages, and vehicles; alarm system monitoring and response; site supervision; emergency response operations; and security guard management. The Technology also includes its qualified personnel and its recruiting, retention, and training practices and procedures.


Raytheon Company

Approved: September 25, 2012 | Expires: March 31, 2013

Raytheon Company and Raytheon Technical Services Company, LLC provide Criminal Information Sharing Services (the "Technology"). The Technology is a set of systems engineering and integration services that are used to aid the creation of a secure network system that enables law enforcement agencies to share cross jurisdictional information to provide assistance in the prevention or investigation of Acts of Terrorism.


Accenture LLP

Approved: September 24, 2012 | Expires: October 31, 2017

Accenture LLP provides Holds Notification Capabilities. The Technology is a software component used by United States Postal Service’s ("USPS") Global Business Systems Solutions ("GBS") software (the "Technology"). The Technology is used to place holds/alerts on mail/packages within the USPS system for further inspection. The Technology also includes Accenture LLP’s personnel who conduct the attendant services, personnel training, as well as reports and recommendations, manuals, checklists, and technical documents related to the Technology.


IDV Solutions, LLC

Approved: September 18, 2012 | Expires: October 31, 2017

IDV Solutions, LLC provides Visual Fusion (the "Technology"). The Technology is a system that provides a consolidated view of data from disparate sources such as incident management and 911 dispatch systems, GPS, sensor devices, live video feeds, and access control devices to allow users to interact with and analyze the data geographically on the map, chronologically using timelines, or through interactive charts and graphs. The Technology also includes training, help-desk services, and maintenance support.


Lockheed Martin Corporation

Approved: September 07, 2012 | Expires: September 30, 2017

The Lockheed Martin Corporation provides its Integrated Coastal and Border Surveillance System and Services (“ICBSS and Services” or the "Technology"). The Technology provides a capability for the tracking of vessels in coastal maritime areas and items of interest in land border areas, to detect possible threats of harm by automating the detection of suspicious activity, providing support in the interdiction process, and by supporting post incident analysis and forensic investigations. The Technology also includes design, software development, testing, training, and maintenance support services.


The Boeing Company

Approved: August 31, 2012 | Expires: October 31, 2017

The Boeing Company provides Border Security Systems and Services (the "Technology"). The Technology comprises hardware, software, and services intended to aid personnel charged with securing borders, critical infrastructure, facilities, and sites by providing real time situational awareness and decision support capabilities. The Technology also includes data, materials, and subscription services.


The Boeing Company

Approved: August 31, 2012 | Expires: October 31, 2017

The Boeing Company provides the Risk Management Analysis Process ("RMAP") software tool to support assessment of aviation security risks. RMAP provides a structured, data-driven, risk-informed analysis of threats and countermeasures which is used to assess the effectiveness, relative change in risk, and corresponding operational and economic impact on the protected system that could result from proposed changes.