Certifications

For Certification, a technology must have demonstrated confidence of continued effectiveness: i.e., it will perform as intended, conform to the seller’s specifications, and is safe for use as intended. In addition to the benefits provided under Designation, Certification allows Sellers of antiterrorism technologies to assert the Government Contractor Defense that immunizes Sellers from liability for claims arising from acts of terrorism. Technologies that receive Certification will be also placed on an Approved Products List for Homeland Security. Designation is a prerequisite for Certification.





Company/Technology

The Boeing Company

Approved: August 07, 2013 | Expires: September 30, 2018

The Boeing Company provides Enhanced Security Flight Deck Door Technologies (the “Technology”). The Technology is specialized flight deck doors and other features designed to protect the flight crew and certain flight critical equipment on commercial aircraft. The Technology also includes services such as design, manufacturing, installation, and retrofitting as well as training and maintenance.


L-3 Communications Security and Detection Systems, Inc.

Approved: August 05, 2013 | Expires: October 31, 2016

L-3 Communications Security and Detection Systems, Inc. provides Security X-ray Inspection and Screening System (the “Technology”). The Technology is an x-ray inspection and screening system which detects threat objects, including explosives, weapons, narcotics, and other contraband in baggage and packages. The Technology also includes installation, maintenance, customer service and support, and technical documents.


Trinity Technology Group, Inc.

Approved: July 12, 2013 | Expires: July 31, 2018

Trinity Technology Group, Inc. provides Private Screening Services (the “Technology”). The Technology consists of the provision of trained and skilled personnel to operate screening equipment, conduct pre-board passenger screening, and carry-on and checked luggage and accessible property screening to prevent prohibited items from entering the sterile area of an airport.


Brookfield Office Properties, Inc.

Approved: July 09, 2013 | Expires: July 31, 2018

Brookfield Office Properties, Inc., a subsidiary of Brookfield Asset Management, Inc., provides its WFC Security and Emergency Program (the "Technology"). The Technology is a set of policies, procedures, and personnel which, when used together, are designed to deter, delay, and mitigate terrorist activity at the World Financial Center located in New York, New York.


Raytheon Company and Raytheon Technical Services Company LLC

Approved: June 11, 2013 | Expires: June 30, 2018

Raytheon Company and its wholly owned subsidiary, Raytheon Technical Services Company LLC provide Criminal Information Sharing Services. The Technology is a set of systems engineering and integration services used to aid in the creation of a secure network system that enables law enforcement agencies to share cross jurisdictional information to provide assistance in the prevention or investigation of Acts of Terrorism. The Technology also includes a number of components which assist in the design and construction of an environment allowing for information sharing, integration of existing information into the collaborative environment, and migration of existing systems into an architecture that will enhance sharing of criminal or terrorist information.


L-3 Communications Security and Detection Systems, Inc. and L-3 Communications Corporation

Approved: June 11, 2013 | Expires: June 30, 2018

L-3 Communications Security and Detection Systems, Inc. and L-3 Communications Corporation provide the eXaminer System (the "Technology"). The Technology is a computed tomography-based explosives detection system that mediates the screening of checked airline baggage and parcels for explosives as well as other threat materials. The Technology also includes associated technical manuals and maintenance performed by L-3 trained personnel.


Raytheon Co. and Raytheon UTD

Approved: April 19, 2013 | Expires: April 30, 2018

Raytheon Company provides Vulnerability Assessments and Mitigation Services. The Technology provides vulnerability and threat assessments, security planning services, and technical assistance primarily to the Department of Defense (“DOD”), Defense Threat Reduction Agency (“DTRA”), and emergency management training for the U.S. Federal Emergency Management Agency (“FEMA”). The Technology also includes all technical manuals and the selection, hiring, training, and qualifications of the personnel used to perform these services.


Bank of America Corporation

Approved: March 08, 2013 | Expires: March 31, 2018

Bank of America Corporation provides its Critical Infrastructure Protection and Security Services to protect and secure critical infrastructure and to keep safe customers, employees, contractors and visitors at Bank of America facilities. The Technology is an integrated security system consisting of policies, procedures, services and component systems designed to provide a centralized capability to assess changing threat conditions and activities which could pose a threat to the bank’s enterprise and to take actions to mitigate and respond to such risks. The Technology includes services performed by Bank of America Corporation’s Protective Services Group and Security Operations Analysis and Command Center (“SOACC”).


Cross Match Technologies, Inc.

Approved: January 25, 2013 | Expires: January 31, 2018

Cross Match Technologies, Inc., and Cross Match Technologies GmbH provide the Cross Match Live Scan Suite. The Technology is a range of optical technologies for the capturing of finger, palm, and full-hand prints, iris scans, and facial images for identification purposes. The Technology also consists of a customer-selected combination of the software and service components.


Microsemi Corporation

Approved: December 03, 2012 | Expires: December 31, 2017

Microsemi Corp. – RF Integrated Solutions provides BIS-WDS™ (Brijot Imaging Systems Weapons Detection System) (the "Technology"). The Technology is a concealed threat detection system consisting of two models, the Prime 1603 and GEN2 (and GEN 2A). Both versions of the BIS-WDS™ use passive millimeter wave technology to identify concealed weapons. The Technology is capable of detecting concealed objects on a subject as they walk and performs best under specific environmental conditions outlined in the unit’s specifications. The Technology also includes warranty services, technical documentation, maintenance, and spare parts available from the manufacturer.