Designations

For Designation as a Qualified Anti-Terrorism Technology (QATT), a technology must demonstrate effectiveness during operational testing or through prior use. Designation provides limited liability for third-party claims arising out of the deployment of the QATT with respect to an "Act of Terrorism." The maximum liability is determined by DHS, and the Seller is required to maintain liability insurance at that level. Other protections include immunity from punitive damages. A full Designation normally lasts for 5 years and can be renewed. Any technology deployed during its period of Designation is protected for the lifetime of its deployment.





Company/Technology

Direct Computer Resources, Inc.

Approved: September 26, 2013 | Expires: October 31, 2018

Direct Computer Resources, Inc. provides DataVantage Global (the “Technology”). The Technology is a single, scalable, multi-tier enterprise-wide software solution that implements and supports obfuscation and sharing of sensitive, but unclassified, information including personally identifiable data.


The Boeing Company

Approved: September 26, 2013 | Expires: October 31, 2018

The Boeing Company provides Traffic Management Infrastructure Systems Security Services (the “Technology”). The Technology encompasses a range of services used to secure air traffic management infrastructure systems against unauthorized activities to support the safe and secure movement of goods and people. The Technology is limited to U.S. Government customers, namely, the U.S. Department of Transportation in support of the Federal Aviation Administration, and the John A. Volpe National Transportation Systems Center.


Science Applications International Corporation (“SAIC”)

Approved: September 17, 2013 | Expires: October 31, 2018

Science Applications International Corporation (“SAIC”) provides the Radiation Portal Monitor System (“AT-980 System”) (the “Technology”). The Technology is a device that uses gamma-ray and neutron detection modules to passively monitor closed, moving vehicles, containers, and/or railcars for the presence of radioactive materials. In particular, it can be used to detect the presence of special nuclear material and radiological dispersal devices. The Technology also includes warranty and maintenance services, installation and operation services, and the qualification of the personnel providing the Technology.


Lauren Innovations, LLC

Approved: September 17, 2013 | Expires: October 31, 2018

Lauren Innovations, LLC provides NaviGate™ (the “Technology”). The Technology is a Web-based crisis management portal application for preventing, identifying, and deterring Acts of Terrorism and limiting the harm from such acts in a building or group of buildings. The Technology consists of online computer software tools for a facility to meet emergency planning and response requirements and to integrate the planning and response process with first responders pertaining to individual buildings. The Technology also includes hosting services through a third-party provider.


Port Authority of New York and New Jersey

Approved: September 12, 2013 | Expires: September 30, 2018

The Port Authority of New York and New Jersey implements the LaGuardia Airport Security Program through a variety of procedures involving physical and electronic security measures, tools and procedures. These efforts include development and enforcement of the airport’s security plan, training of police and other security personnel, conducting background checks of airport workers and overseeing security systems.


The Boeing Company

Approved: August 19, 2013 | Expires: September 30, 2018

The Boeing Company provides Security System Equipment Installation and Integration Services (the “Technology”). The Technology is a set of services intended to design, assess, evaluate, engineer, research, recommend, install, integrate, and test security technologies in support of Transportation Security Administration security programs. The Technology also includes training and qualification of those providing the services.


International Council of Shopping Centers, Inc.

Approved: August 12, 2013 | Expires: September 30, 2018

The International Council of Shopping Centers, Inc. provides the Shopping Center Security Terrorism Awareness Training Program (the “Technology”). The Technology is a web-based “Awareness Level” anti-terrorism training course certified by the Federal Emergency Management Agency (“FEMA”) as FEMA course number AWR304-W. The course provides security personnel with increased awareness of the various facets of terrorism and criminal activity that could occur at a retail facility. The Technology does not provide operational training for response to terrorist events.


Honeywell International Inc., doing business as Vindicator Technologies

Approved: August 07, 2013 | Expires: August 31, 2018

Honeywell International, Inc., doing business as Vindicator Technologies, provides V5 Intrusion Detection and Access Control Systems. The Technology is a system of devices that provides for remote monitoring of security cameras, access control stations, and intrusion detection sensors. The Technology also includes all attendant manuals, installation, acceptance testing, and the qualifications of those providing the services.


U.S. Equities Asset Management, LLC, and U.S. Equities Realty Partners, LLC

Approved: July 26, 2013 | Expires: August 31, 2018

U.S. Equities Asset Management, LLC, and U.S. Equities Realty Partners, LLC, provide Willis Tower Security and Life Safety Services (the “Technology”). The Technology is a security management program designed to plan for and respond to emergencies, control access to, conduct screening of packages and parcels entering, and provide for the evacuation of Willis Tower. The Technology includes: physical security, security plans and procedures, emergency response; training, and coordination with Federal, State, and local law enforcement.


Contemporary Services Corporation

Approved: July 18, 2013 | Expires: August 31, 2018

Contemporary Services Corporation (“CSC”) provides Event Security Services (the "Technology"). The Technology is a set of core activities and a set of enhanced, customer-driven, activities including physical security, access control, and crowd management. The Technology also includes CSC’s Quality Assurance procedures that include selection, vetting, and training of employees; periodic internal, external (third-party), and Red Team assessments of CSC’s effectiveness; and an annual review process.