Certifications

For Certification, a technology must have demonstrated confidence of continued effectiveness: i.e., it will perform as intended, conform to the seller’s specifications, and is safe for use as intended. In addition to the benefits provided under Designation, Certification allows Sellers of antiterrorism technologies to assert the Government Contractor Defense that immunizes Sellers from liability for claims arising from acts of terrorism. Technologies that receive Certification will be also placed on an Approved Products List for Homeland Security. Designation is a prerequisite for Certification.





Company/Technology

Bank of America Corporation

Approved: March 08, 2013 | Expires: March 31, 2018

Bank of America Corporation provides its Critical Infrastructure Protection and Security Services to protect and secure critical infrastructure and to keep safe customers, employees, contractors and visitors at Bank of America facilities. The Technology is an integrated security system consisting of policies, procedures, services and component systems designed to provide a centralized capability to assess changing threat conditions and activities which could pose a threat to the bank’s enterprise and to take actions to mitigate and respond to such risks. The Technology includes services performed by Bank of America Corporation’s Protective Services Group and Security Operations Analysis and Command Center (“SOACC”).


Cross Match Technologies, Inc.

Approved: January 25, 2013 | Expires: January 31, 2018

Cross Match Technologies, Inc., and Cross Match Technologies GmbH provide the Cross Match Live Scan Suite. The Technology is a range of optical technologies for the capturing of finger, palm, and full-hand prints, iris scans, and facial images for identification purposes. The Technology also consists of a customer-selected combination of the software and service components.


Microsemi Corporation

Approved: December 03, 2012 | Expires: December 31, 2017

Microsemi Corp. – RF Integrated Solutions provides BIS-WDS™ (Brijot Imaging Systems Weapons Detection System) (the "Technology"). The Technology is a concealed threat detection system consisting of two models, the Prime 1603 and GEN2 (and GEN 2A). Both versions of the BIS-WDS™ use passive millimeter wave technology to identify concealed weapons. The Technology is capable of detecting concealed objects on a subject as they walk and performs best under specific environmental conditions outlined in the unit’s specifications. The Technology also includes warranty services, technical documentation, maintenance, and spare parts available from the manufacturer.


Rapiscan Systems, Inc.

Approved: November 14, 2012 | Expires: December 31, 2017

Rapiscan Systems, Inc. provides Cargo and Vehicle Inspection Systems ("CVIS" or the "Technology"). The Technology consists of two product lines, the Rapiscan GaRDS and Eagle which use either X-ray or Gamma-Ray radiation to scan vehicles, containers, rail cars, cargo and the like. The Technology also includes safety trianing, installation, maintenance, warranty services, and user manuals.


Raytheon Company

Approved: September 25, 2012 | Expires: March 31, 2013

Raytheon Company and Raytheon Technical Services Company, LLC provide Criminal Information Sharing Services (the "Technology"). The Technology is a set of systems engineering and integration services that are used to aid the creation of a secure network system that enables law enforcement agencies to share cross jurisdictional information to provide assistance in the prevention or investigation of Acts of Terrorism.


Accenture LLP

Approved: September 24, 2012 | Expires: October 31, 2017

Accenture LLP provides Holds Notification Capabilities. The Technology is a software component used by United States Postal Service’s ("USPS") Global Business Systems Solutions ("GBS") software (the "Technology"). The Technology is used to place holds/alerts on mail/packages within the USPS system for further inspection. The Technology also includes Accenture LLP’s personnel who conduct the attendant services, personnel training, as well as reports and recommendations, manuals, checklists, and technical documents related to the Technology.


International Business Machines ("IBM")

Approved: August 31, 2012 | Expires: September 30, 2017

International Business Machines ("IBM") provides Global Name Management (the "Technology"). The Technology is a software solution designed to improve the accuracy of name searching, transliteration and the quality of identity verification initiatives by providing ranked search results of names based on linguistic, phonetic, and specific cultural variation patterns. The Technology also includes several ancillary services such as installation, maintenance, and training.


MorphoTrust USA Inc.

Approved: August 22, 2012 | Expires: September 30, 2014

MorphoTrust USA, Inc., provides Document Authentication. The Technology comprises a suite of hardware and software products that, taken together, allow for the acquisition of information contained in personal identity documents and comparison of the information against relevant document databases. The Technology is used to aid in screening and authenticating a variety of identity documents such as might be presented to gain access to secure areas or information. Included in the Technology are software and document database upgrades as well as product-related technical documents, training materials, and manuals. This Designation and Certification will expire on September 30, 2014.


Integrated Security Services, Inc

Approved: August 20, 2012 | Expires: September 30, 2017

Integrated Security Services, Inc. provides Cargo Screening Services at Certified Cargo Screening Facilities (the "Technology"). The Technology consists of screeners and programmatic personnel for the screening of cargo in accordance with the Transportation Security Administration's ("TSA’s") Certified Cargo Screening Program at TSA-approved Certified Cargo Screening Facilities. The Technology includes, in accordance with TSA directives, maintaining a security plan that limits access to secure cargo screening areas, training and vetting employees in accordance with TSA guidance, adherence to all TSA-specified chain of custody rules for this cargo, and use of TSA-approved methods and/or equipment for the screening of cargo. The Technology is limited to only those locations in possession of current TSA certifications for cargo screening facilities.


Defense Group Inc.

Approved: August 14, 2012 | Expires: September 30, 2017

Defense Group Inc. provides the CoBRA® Software Package (the "Technology"). The Technology is a software package that provides first responders with a decision support tool for emergency response, planning, management, training, and exercises. The tools, databases, checklists, and incident reporting capabilities can facilitate the coordination of response to all hazard incidents by first responders. The Technology also includes all support materials, technical support, product updates, and optional user training.