Certifications

For Certification, a technology must have demonstrated confidence of continued effectiveness: i.e., it will perform as intended, conform to the seller’s specifications, and is safe for use as intended. In addition to the benefits provided under Designation, Certification allows Sellers of antiterrorism technologies to assert the Government Contractor Defense that immunizes Sellers from liability for claims arising from acts of terrorism. Technologies that receive Certification will be also placed on an Approved Products List for Homeland Security. Designation is a prerequisite for Certification.





Company/Technology

L-3 Communications Security and Detection Systems, Inc. and L-3 Communications Corporation

Approved: June 11, 2013 | Expires: June 30, 2018

L-3 Communications Security and Detection Systems, Inc. and L-3 Communications Corporation provide the eXaminer System (the "Technology"). The Technology is a computed tomography-based explosives detection system that mediates the screening of checked airline baggage and parcels for explosives as well as other threat materials. The Technology also includes associated technical manuals and maintenance performed by L-3 trained personnel.


Raytheon Co. and Raytheon UTD

Approved: April 19, 2013 | Expires: April 30, 2018

Raytheon Company provides Vulnerability Assessments and Mitigation Services. The Technology provides vulnerability and threat assessments, security planning services, and technical assistance primarily to the Department of Defense (“DOD”), Defense Threat Reduction Agency (“DTRA”), and emergency management training for the U.S. Federal Emergency Management Agency (“FEMA”). The Technology also includes all technical manuals and the selection, hiring, training, and qualifications of the personnel used to perform these services.


Bank of America Corporation

Approved: March 08, 2013 | Expires: March 31, 2018

Bank of America Corporation provides its Critical Infrastructure Protection and Security Services to protect and secure critical infrastructure and to keep safe customers, employees, contractors and visitors at Bank of America facilities. The Technology is an integrated security system consisting of policies, procedures, services and component systems designed to provide a centralized capability to assess changing threat conditions and activities which could pose a threat to the bank’s enterprise and to take actions to mitigate and respond to such risks. The Technology includes services performed by Bank of America Corporation’s Protective Services Group and Security Operations Analysis and Command Center (“SOACC”).


Cross Match Technologies, Inc.

Approved: January 25, 2013 | Expires: January 31, 2018

Cross Match Technologies, Inc., and Cross Match Technologies GmbH provide the Cross Match Live Scan Suite. The Technology is a range of optical technologies for the capturing of finger, palm, and full-hand prints, iris scans, and facial images for identification purposes. The Technology also consists of a customer-selected combination of the software and service components.


Microsemi Corporation

Approved: December 03, 2012 | Expires: December 31, 2017

Microsemi Corp. – RF Integrated Solutions provides BIS-WDS™ (Brijot Imaging Systems Weapons Detection System) (the "Technology"). The Technology is a concealed threat detection system consisting of two models, the Prime 1603 and GEN2 (and GEN 2A). Both versions of the BIS-WDS™ use passive millimeter wave technology to identify concealed weapons. The Technology is capable of detecting concealed objects on a subject as they walk and performs best under specific environmental conditions outlined in the unit’s specifications. The Technology also includes warranty services, technical documentation, maintenance, and spare parts available from the manufacturer.


Rapiscan Systems, Inc.

Approved: November 14, 2012 | Expires: December 31, 2017

Rapiscan Systems, Inc. provides Cargo and Vehicle Inspection Systems ("CVIS" or the "Technology"). The Technology consists of two product lines, the Rapiscan GaRDS and Eagle which use either X-ray or Gamma-Ray radiation to scan vehicles, containers, rail cars, cargo and the like. The Technology also includes safety trianing, installation, maintenance, warranty services, and user manuals.


Raytheon Company

Approved: September 25, 2012 | Expires: March 31, 2013

Raytheon Company and Raytheon Technical Services Company, LLC provide Criminal Information Sharing Services (the "Technology"). The Technology is a set of systems engineering and integration services that are used to aid the creation of a secure network system that enables law enforcement agencies to share cross jurisdictional information to provide assistance in the prevention or investigation of Acts of Terrorism.


Accenture LLP

Approved: September 24, 2012 | Expires: October 31, 2017

Accenture LLP provides Holds Notification Capabilities. The Technology is a software component used by United States Postal Service’s ("USPS") Global Business Systems Solutions ("GBS") software (the "Technology"). The Technology is used to place holds/alerts on mail/packages within the USPS system for further inspection. The Technology also includes Accenture LLP’s personnel who conduct the attendant services, personnel training, as well as reports and recommendations, manuals, checklists, and technical documents related to the Technology.


International Business Machines ("IBM")

Approved: August 31, 2012 | Expires: September 30, 2017

International Business Machines ("IBM") provides Global Name Management (the "Technology"). The Technology is a software solution designed to improve the accuracy of name searching, transliteration and the quality of identity verification initiatives by providing ranked search results of names based on linguistic, phonetic, and specific cultural variation patterns. The Technology also includes several ancillary services such as installation, maintenance, and training.


MorphoTrust USA Inc.

Approved: August 22, 2012 | Expires: September 30, 2014

MorphoTrust USA, Inc., provides Document Authentication. The Technology comprises a suite of hardware and software products that, taken together, allow for the acquisition of information contained in personal identity documents and comparison of the information against relevant document databases. The Technology is used to aid in screening and authenticating a variety of identity documents such as might be presented to gain access to secure areas or information. Included in the Technology are software and document database upgrades as well as product-related technical documents, training materials, and manuals. This Designation and Certification will expire on September 30, 2014.