Approved Technologies

The SAFETY Act provides two levels of liability protections for approval: Designation and Certification. By obtaining either Designation or Certification, companies obtain a level of legal protection in case their technology is ever put to use during a terrorist attack. See below for a list of approved technology certifications.





Company/Technology

Worldwide Flight Services, Inc.

Approved: November 04, 2009 | Expires: November 30, 2014

Flight Services, Inc. provides Certified Cargo Screening Facilities. The Technology, Certified Cargo Screening Facilities, are secure facilities established in accordance with directives issued by the Transportation Security Administration (TSA) for the screening and securing of cargo which will be transported on passenger aircraft. The Technology includes, in accordance with TSA directives, maintaining a security plan that limits access to secure cargo screening areas, training and vetting employees in accordance with TSA guidance, adherence to all TSA-specified chain of custody rules for this cargo, and use of TSA-approved methods and/or equipment for the screening of cargo. The Technology is limited to only those locations in possession of current TSA certifications for cargo screening facilities.


Explosive Countermeasures International, Inc

Approved: September 16, 2009 | Expires: October 31, 2014

Explosive Countermeasures International, Inc provides Explosive Detection Canine Teams. The Technology is canine teams consisting of one handler and one canine used for detecting explosive devices. The Technology also includes training and operations manuals.


ARES Corporation

Approved: September 16, 2009 | Expires: October 31, 2014

ARES Corporation provides Automated Vulnerability Evaluation for Risks of Terrorism® (AVERT). The Technology provides a computerized 3-D site map, quantitative, qualitative, and visual vulnerability reports and related outputs to estimate the probability of successful attack completion for scenarios as defined by the customer. The Technology also includes associated manuals, related training, and technical support.


Raytheon Company

Approved: September 16, 2009 | Expires: October 31, 2014

Raytheon Company provides the Advanced Spectroscopic Portal – L (ASP-L). The Technology is a passive radiation detection system designed to be integrated into a sports utility vehicle. The Technology also includes attendant installation, training, and maintenance services as well as a warranty and all attendant documentation and manuals.


Rapiscan Systems Inc.

Approved: August 27, 2009 | Expires: March 31, 2013

Rapiscan Systems Inc. provides the Cargo and Vehicle Inspection Systems (CVIS). The Technology is designed to scan vehicles and cargo with a radiation source and produce an image of the interior that would help personnel monitor what goes into and out of an area. There are two lines, Eagle and GaRDS, which use X-ray radiation and Gamma-ray radiation respectively. Both lines can be deployed in multiple configurations. The Technology also includes installation, training (operation, maintenance and safety), manuals, maintenance, and warranty services.


FirstLine Transportation Security, Inc

Approved: August 27, 2009 | Expires: February 25, 2010

FirstLine Transportation Security, Inc.'s Airline Passenger and Baggage Screening Service consists of trained and skilled personnel to operate screening equipment, conduct pre-board passenger screening, carry-on and checked luggage and accessible property screening to prevent prohibited items from entering the sterile area of the airport.


Smiths Detection, Inc.

Approved: August 27, 2009 | Expires: August 31, 2013

Smiths Detection, Inc. provides Smiths Detection Service Operations. The Technology is a set of services provided to maintain the explosive trace and X-ray scanning/screen and surveillance and sensor systems used at many venues. The Technology includes in-house services such as: management of maintenance services, spare parts, and technical support. It also includes on-site services such as: system installation, preventive maintenance, and operator training.


International Business Machines Corporation

Approved: August 21, 2009 | Expires: September 30, 2014

International Business Machines Corporation provides the Risk Assessment Platform (RAP). The Technology combines commercial-off-the-shelf hardware and software, proprietary software, commercial data, and associated services. This system can provide authentication and risk assessment information to the United States Government Customer for analysis and possible action regarding terrorist threats. The Technology also includes consulting, customer workshops, user education, and training.


Mercury Aviation Services, Inc.

Approved: August 21, 2009 | Expires: September 30, 2014

Mercury Aviation Services, Inc. provides Certified Cargo Screening Facilities. The Technology, Certified Cargo Screening Facilities, are secure facilities established in accordance with directives issued by the Transportation Security Administration (TSA) for the screening and securing of cargo which will be transported on passenger aircraft. The Technology will include, in accordance with TSA directives, maintaining a security plan that limits access to secure cargo screening areas, training and vetting employees in accordance with TSA guidance, adherence to all TSA-specified chain of custody rules for this cargo, and use of TSA-approved methods and/or equipment for the screening of cargo. The Technology includes only those locations in possession of current TSA certifications for cargo screening facilities.


L-1 Identity Solutions, Inc.

Approved: August 20, 2009 | Expires: September 30, 2014

L-1 Identity Solutions, Inc., provides Document Authentication. The Technology comprises a suite of hardware and software products that, taken together, allow for the acquisition of information contained in personal identity documents and comparison of the information against relevant document databases. The Technology is used to aid in screening and authenticating a variety of identity documents such as might be presented to gain access to secure areas or information. Included in the Technology are software and document database upgrades as well as product-related technical documents, training materials, and manuals.