Approved Technologies

The SAFETY Act provides two levels of liability protections for approval: Designation and Certification. By obtaining either Designation or Certification, companies obtain a level of legal protection in case their technology is ever put to use during a terrorist attack. See below for a list of approved technology certifications.





Company/Technology

The Boeing Company

Approved: August 31, 2012 | Expires: October 31, 2017

The Boeing Company provides the Risk Management Analysis Process ("RMAP") software tool to support assessment of aviation security risks. RMAP provides a structured, data-driven, risk-informed analysis of threats and countermeasures which is used to assess the effectiveness, relative change in risk, and corresponding operational and economic impact on the protected system that could result from proposed changes.


International Business Machines ("IBM")

Approved: August 31, 2012 | Expires: September 30, 2017

International Business Machines ("IBM") provides Global Name Management (the "Technology"). The Technology is a software solution designed to improve the accuracy of name searching, transliteration and the quality of identity verification initiatives by providing ranked search results of names based on linguistic, phonetic, and specific cultural variation patterns. The Technology also includes several ancillary services such as installation, maintenance, and training.


Avir, LLC

Approved: August 29, 2012 | Expires: September 30, 2017

Avir Sensors, LLC provides ChemSight® (the "Technology"). The Technology is a line-of-sight, autonomous sensing system that uses a spectral analysis of the atmosphere along a collimated infra-red (“IR”) beam to detect and identify hazardous airborne chemicals (e.g., some toxic industrial chemicals and chemical warfare agents). The Technology also includes a graphical user interface for alarm monitoring.


MorphoTrust USA Inc.

Approved: August 22, 2012 | Expires: September 30, 2014

MorphoTrust USA, Inc., provides Document Authentication. The Technology comprises a suite of hardware and software products that, taken together, allow for the acquisition of information contained in personal identity documents and comparison of the information against relevant document databases. The Technology is used to aid in screening and authenticating a variety of identity documents such as might be presented to gain access to secure areas or information. Included in the Technology are software and document database upgrades as well as product-related technical documents, training materials, and manuals. This Designation and Certification will expire on September 30, 2014.


Integrated Security Services, Inc

Approved: August 20, 2012 | Expires: September 30, 2017

Integrated Security Services, Inc. provides Cargo Screening Services at Certified Cargo Screening Facilities (the "Technology"). The Technology consists of screeners and programmatic personnel for the screening of cargo in accordance with the Transportation Security Administration's ("TSA’s") Certified Cargo Screening Program at TSA-approved Certified Cargo Screening Facilities. The Technology includes, in accordance with TSA directives, maintaining a security plan that limits access to secure cargo screening areas, training and vetting employees in accordance with TSA guidance, adherence to all TSA-specified chain of custody rules for this cargo, and use of TSA-approved methods and/or equipment for the screening of cargo. The Technology is limited to only those locations in possession of current TSA certifications for cargo screening facilities.


Raytheon Company

Approved: August 16, 2012 | Expires: September 30, 2017

Raytheon Company provides the Electronic Command Board System (the "Technology"). The Technology is an electronic, wireless incident management system that allows fire departments to assess the nature of an emergency, diagram an incident, establish fire conditions, manage the locations of firefighting and emergency medical services units, and communicate situational awareness with commanders at the scene and emergency managers in operation centers. The Technology also includes system integration and customization services, training services, system warranty and maintenance, and all related technical manuals.


International Business Machines Corporation

Approved: August 16, 2012 | Expires: September 30, 2017

The IBM Corporation provides the Automated Commercial Environment ("ACE"). ACE is an integrated system of Commercial-Off-The-Shelf ("COTS") software, hardware and infrastructure merged with custom built software. ACE is designed to provide the capability to access data in the international supply chain to anticipate, identify, track, and intercept high-risk shipments.


Defense Group Inc.

Approved: August 14, 2012 | Expires: September 30, 2017

Defense Group Inc. provides the CoBRA® Software Package (the "Technology"). The Technology is a software package that provides first responders with a decision support tool for emergency response, planning, management, training, and exercises. The tools, databases, checklists, and incident reporting capabilities can facilitate the coordination of response to all hazard incidents by first responders. The Technology also includes all support materials, technical support, product updates, and optional user training.


The Boeing Company

Approved: August 13, 2012 | Expires: September 30, 2017

The Boeing Company provides Explosives Detection Canine Services (the "Technology"). The Technology includes canine teams each composed of one canine and one handler trained to provide explosives detection services, as well as associated training and documentation.


Lockheed Martin Corporation

Approved: August 13, 2012 | Expires: September 30, 2015

Lockheed Martin Transportation and Security Solutions provides the Next Generation Identification ("NGI") System and Services (the "Technology"). The Technology provides the FBI Criminal Justice Information Services Division ("CJIS") a framework for fusion of multimodal biometrics and enhancements in various identification and investigative technology. NGI delivers automated fingerprint and latent search capabilities, electronic image storage, and electronic exchange of fingerprints to law enforcement agencies and other authorized criminal justice partners.