Certifications

For Certification, a technology must have demonstrated confidence of continued effectiveness: i.e., it will perform as intended, conform to the seller’s specifications, and is safe for use as intended. In addition to the benefits provided under Designation, Certification allows Sellers of antiterrorism technologies to assert the Government Contractor Defense that immunizes Sellers from liability for claims arising from acts of terrorism. Technologies that receive Certification will be also placed on an Approved Products List for Homeland Security. Designation is a prerequisite for Certification.





Company/Technology

National Football League

Approved: November 14, 2013 | Expires: November 30, 2018

The National Football League provides National Football League (“NFL”) Best Practices for Stadium Security (the “Technology”). The Technology is a set of guidelines for football stadium security management designed to deter and defend against terrorist attacks at sports stadiums. It includes standards for non-game day operations, game day operations, and threat assessments and emergency plans. The Technology also includes the NFL’s Stadium Security Evaluation and Compliance Program, the hiring, vetting, qualifications, and training of the personnel used to provide the programs and services. The Technology does not include each NFL club’s or stadium owner’s or operator’s implementation of the Technology.


Smiths Detection, Inc.

Approved: November 08, 2013 | Expires: November 30, 2018

Smiths Detection, Inc. provides Smiths Detection Service Operations (the “Technology”). The Technology is support services for the maintenance of its own X-ray screening and explosive trace detection systems in use by customers. The Technology includes on-site and in-house services such as repairs, warehousing, training, spare parts and helpdesk support.


Five Star Airport Alliance, Inc.

Approved: September 17, 2013 | Expires: October 31, 2018

Five Star Airport Alliance, Inc. provides Baggage Screening Systems and Services (the "Technology"). The Technology is a set of services for the design, installation, and commissioning of automated baggage handling systems for checked baggage, including the programming necessary to achieve routing of baggage. The Technology is deployed in accordance with Transportation Security Administration (“TSA”) specifications and subject to TSA approval prior to full operations. The Technology also includes maintenance support services, associated manuals, checklists, and technical documents related to the Technology.


Emergent Protective Products USA, Inc.

Approved: August 27, 2013 | Expires: September 16, 2016

Emergent Protective Products USA, Inc. provides Reactive Skin Decontamination Lotion (the “Technology”). The Technology is a formulation for the treatment of skin that has been contaminated with toxic chemical agents. The Technology is formulated to neutralize and aid in removing chemical weapons agents, blister agents, and Trichothecene Mycotoxin (T-2) toxins. The Technology also includes support services, documentation, etc.


Phoenix International, Ltd.

Approved: August 19, 2013 | Expires: September 30, 2018

Phoenix International, Ltd. provides MagnumSpike! Tire Deflation System (the “Technology”). The Technology is a portable tire deflation system composed of an expandable array of interlocking, nylon slats from which metal alloy spikes protrude. It is intended to either to stop a moving vehicle that represents a threat or, alternatively, to detain a suspicious stopped vehicle. The Technology also includes all attendant technical manuals, hands-on training and training materials, and safety guidelines.


The Boeing Company

Approved: August 07, 2013 | Expires: September 30, 2018

The Boeing Company provides Enhanced Security Flight Deck Door Technologies (the “Technology”). The Technology is specialized flight deck doors and other features designed to protect the flight crew and certain flight critical equipment on commercial aircraft. The Technology also includes services such as design, manufacturing, installation, and retrofitting as well as training and maintenance.


L-3 Communications Security and Detection Systems, Inc.

Approved: August 05, 2013 | Expires: October 31, 2016

L-3 Communications Security and Detection Systems, Inc. provides Security X-ray Inspection and Screening System (the “Technology”). The Technology is an x-ray inspection and screening system which detects threat objects, including explosives, weapons, narcotics, and other contraband in baggage and packages. The Technology also includes installation, maintenance, customer service and support, and technical documents.


Trinity Technology Group, Inc.

Approved: July 12, 2013 | Expires: July 31, 2018

Trinity Technology Group, Inc. provides Private Screening Services (the “Technology”). The Technology consists of the provision of trained and skilled personnel to operate screening equipment, conduct pre-board passenger screening, and carry-on and checked luggage and accessible property screening to prevent prohibited items from entering the sterile area of an airport.


Brookfield Office Properties, Inc.

Approved: July 09, 2013 | Expires: July 31, 2018

Brookfield Office Properties, Inc., a subsidiary of Brookfield Asset Management, Inc., provides its WFC Security and Emergency Program (the "Technology"). The Technology is a set of policies, procedures, and personnel which, when used together, are designed to deter, delay, and mitigate terrorist activity at the World Financial Center located in New York, New York.


Raytheon Company and Raytheon Technical Services Company LLC

Approved: June 11, 2013 | Expires: June 30, 2018

Raytheon Company and its wholly owned subsidiary, Raytheon Technical Services Company LLC provide Criminal Information Sharing Services. The Technology is a set of systems engineering and integration services used to aid in the creation of a secure network system that enables law enforcement agencies to share cross jurisdictional information to provide assistance in the prevention or investigation of Acts of Terrorism. The Technology also includes a number of components which assist in the design and construction of an environment allowing for information sharing, integration of existing information into the collaborative environment, and migration of existing systems into an architecture that will enhance sharing of criminal or terrorist information.