Approved Technologies

The SAFETY Act provides two levels of liability protections for approval: Designation and Certification. By obtaining either Designation or Certification, companies obtain a level of legal protection in case their technology is ever put to use during a terrorist attack. See below for a list of approved technology certifications.





Company/Technology

Reveal Imaging Technologies, Inc.

Approved: January 25, 2011 | Expires: February 29, 2016

Reveal Imaging Technologies, Inc., and Science Applications International Corporation provide the CT-80 and CT-80DR Explosives Detection Systems (EDSs). The Technology is used to screen items, such as checked airline baggage, for the presence of explosives. It is based on compact, dual-energy computed tomography (CT). Additionally, algorithms used in the Technology software reconstruct an item's contents and analyze the contents for the presence of explosives in an automated manner. SAFETY Act protections apply to models of the Technology that the U.S. Transportation Security Administration has certified as EDSs.


DHL Global Forwarding and DHL Express

Approved: January 18, 2011 | Expires: February 29, 2016

DHL Global Forwarding and DHL Express, and their parent entity DPWN Holdings, Inc., provides Certified Cargo Screening Facilities. The Technology, Certified Cargo Screening Facilities, are secure facilities established in accordance with directives issued by the Transportation Security Administration (TSA) for the screening and securing of cargo which will be transported on passenger aircraft. The Technology includes, in accordance with TSA directives, maintaining a security plan that limits access to secure cargo screening areas, training and vetting employees in accordance with TSA guidance, adherence to all TSA-specified chain of custody rules for this cargo, and use of TSA-approved methods and/or equipment for the screening of cargo. The Technology is limited to only those locations in possession of current TSA certifications for cargo screening facilities.


Alclear, LLC

Approved: December 21, 2010 | Expires: January 31, 2016

Alclear, LLC provides CLEAR, which is a voluntary, biometrically secured, identification and access system. The Technology is intended to be used to expedite the screening process at airports. The Technology also includes support services necessary to install the Technology.


The Turner Corporation.

Approved: December 16, 2010 | Expires: January 31, 2016

The Turner Corporation and its subsidiaries provide Checked Baggage Screening Services (CBSS Services). The Technology is a set of services that includes the development, installation, and maintenance of checked baggage screening systems at airports. The Technology also includes maintenance training, maintenance manuals, system warranties, maintenance management, and the qualifications of the personnel.


NABCO, Inc.

Approved: December 13, 2010 | Expires: January 31, 2016

NABCO, Inc. provides NABCO Explosive Containment Vessels (ECVs). The Technology is a series of vessels allowing for the safe containment, transport, and disposal of explosive devices. The Technology is designed to be used by experienced, trained emergency response personnel such as Explosive Ordnance Disposal (EOD) or Bomb Squad personnel. Included in the Technology are all related manuals and documentation.


Service Source, Inc.

Approved: December 13, 2010 | Expires: November 30, 2014

Service Source, Inc., provides a Mail Processing, Screening, and Distribution Service. The Technology is an integrated set of processes, procedures, equipment, and personnel designed to safeguard facilities, their occupants, and addressees against mail-borne chemical, biological, radiological, nuclear, and explosive threats. The Technology includes the receipt, screening, processing, and distribution of incoming mail and parcels. It is deployed in accordance with operational requirements set forth by the Department of Homeland Security. Included in the Technology are all manuals and technical documents associated with deployment of the Technology as well as the underlying process.


Shipco Tranport, Inc.

Approved: November 12, 2010 | Expires: December 31, 2015

Shipco Tranport, Inc., Inc. provides Certified Cargo Screening Facilities. The Technology, Certified Cargo Screening Facilities, are secure facilities established in accordance with directives issued by the Transportation Security Administration (TSA) for the screening and securing of cargo which will be transported on passenger aircraft. The Technology includes, in accordance with TSA directives, maintaining a security plan that limits access to secure cargo screening areas, training and vetting employees in accordance with TSA guidance, adherence to all TSA-specified chain of custody rules for this cargo, and use of TSA-approved methods and/or equipment for the screening of cargo. The Technology is limited to only those locations in possession of current TSA certifications for cargo screening facilities.


IPC International Corporation

Approved: November 12, 2010 | Expires: December 31, 2015

-IPC International Corporation provides Security Services. The Technology is unarmed physical security services at commercial facilities. The Technology also includes support services, documentation, etc.


Fisher Research Labs, Inc.

Approved: November 03, 2010 | Expires: November 30, 2013

Fisher Research Labs, Inc. provides the M-Scope. The Technology is portable walk-through metal detection system designed to alert operators to the presence of threat objects located on a person's body.


URS Corporation (Delaware), URS Group, Inc.

Approved: October 22, 2010 | Expires: November 30, 2015

URS Corporation (Delaware), URS Group, Inc., URS Corporation (Nevada), and URS Corporation Southern provide Threat and Vulnerability Assessment Services. The Technology provides threat and vulnerability assessment services including analyses of threats; modeling and analysis of threats to structures; prioritization of threats as a function of probability and magnitude of impact; defining mitigation strategies; developing security plans and guidelines, and security system designs; and other support services for security operations.