Protecting You, Protecting U.S. Mark E. Rosen Associate General Counsel Science and Technology Directorate Department of Homeland Security

Similar documents
Source:

Effective Deployment of the Integrated Wireless Network Video Systems for the Homeland Security & Government Sectors

Domestic Nuclear Detection Office (DNDO)

Border Security: Preventative Rad/Nuc Detection PRND

Domestic Nuclear Detection Office (DNDO)

Domestic Nuclear Detection Office (DNDO)

Integrated Security and Building Automation Technology Solutions and Services. SDI Security Center of Excellence Charleston, SC

SOS Technology Group

DHS S&T Collaborative Projects

The Transportation Security Laboratory (TSL): A Test & Evaluation Perspective

SAFETY ON A BROADER SCALE Safety and security for people, processes, plants, communities and environment

Perimeter security summit Washington, 17 May 2005

The 2011 Global Congress on Travel Risk Management

Transportation 1 Security. Administration. Transportation

Standoff CWA/TIC Detection. Innovation with Integrity. Toxic Gas/Vapour Threat Mitigation RAPIDplus CBRNE

Chapter 1 Introduction

An affiliate company of AR Challenges, Ltd. ISRAEL

Ten Tips for Completing a Site Security Plan

SOCIETY OF FIRE PROTECTION ENGINEERS POSITION STATEMENT P THE ROLE OF THE FIRE PROTECTION ENGINEER IN THE CONSTRUCTION DESIGN PROCESS

Overview. Executive Summary. Solution Description CHAPTER

Chemical/Radiological Threat Detection. Innovation with Integrity. Combined NC Detection: Bruker RAID-XP Series CBRNE

Presented by: Dr. Francesco Pellegrino Lockheed Martin Corporation Maritime Systems and Sensors Mitchel Field, New York

Trust the experts - keep people safe and threats out with airport quality from Smiths Detection.

Physical and Environmental Security. CISSP Guide to Security Essentials Chapter 8

NEXT GENERATION EDS CT SYSTEMS. George L Zarur, PhD Science Advisor S&T DHS

Domestic Nuclear Detection Office (DNDO)

FINAL DRAFT INTERNATIONAL STANDARD

Technological Innovation for a Safer World. Quantum Sniffer QS-H150

IAFF DIVISION OF OCCUPATIONAL HEALTH, SAFETY AND MEDICINE

Take Control. > Your partner to protect people, property and the environment.

SIMPLY MORE SECURITY MOSRO

Public Safety Analytics

INDEX INDEX 2 FOREWARD 3 SECTION 1 COMPANY INFORMATION 4 SECTION 2 GRADING AND CERTIFICATION 5 SECTION 3: ADDITIONAL REQUIREMENTS 6 7

Industrial Security Capabilities. Honeywell Proprietary

INNOVATION THAT LEAVES RISK BEHIND.

ASSEMBLY, No. 475 STATE OF NEW JERSEY. 218th LEGISLATURE PRE-FILED FOR INTRODUCTION IN THE 2018 SESSION

Aviation Solutions. Why Tyco for airports? Our systems help protect over 110 airports. Secures over 80% of UK Airports and more than 60 US Airports

Today s world has more risk than ever. Today s G4S has more ways to protect you.

PENALTIES. All imported products are required to meet the same standards as domestic goods. National Safety Requirements. Customs Requirements

System Requirements and Supported Platforms for Oracle Real-Time Decisions Applications. Version May 2008

Suicide Bomb and Vehicle Borne Improvised Explosive Device Detection and Defeat Program

Vision: To provide world-class detection technologies and services enabling integrated solutions to protect people, assets and communities.

For Building Managers: outsourcing the maintenance of fire safety and security systems

CEN/TC 391 Business Plan Revision Nov 2010 Page 1 EXECUTIVE SUMMARY

ADT Security Website Terms of Use

YOUR TRUSTED PARTNER IN RETAIL SECURITY

FIRE PROTECTION PROGRAM

Using Technology to Address the Security Challenges of Today and Tomorrow

FALCON EYE Land Based Surveillance System

ISO What are the Benefits of working with a company that has received an ISO 9001:2015 Certification

TetraTek, Inc. Regulatory. Compliance. Emergency Response. Nuclear Facility Compliance. Compliance. Fire Protection.

L o u i s N o r i e g a A u tomated Po r t S o l u t i o n s P hy s i ca l S e c u r i t y Te c h n o l o g y C o n s u l ta nt

Smart Sensing and Tracking with Video and Mote Sensor Collaboration

An Approach to First Responder Radiological Preparedness Tom O Connell and Paul Ares

Innovative Security Solutions That Increase Force Protection Effectiveness

Executive Summary of Qualifications

A FIRST RESPONDERS GUIDE TO PURCHASING RADIATION PAGERS

The European Commission s science and knowledge service. Building on core components of Technical Reachback

Standard PRC Transmission Relay Loadability

Third Quarter 2016 Results Summary

Type 5 Certifications:

Base and Deployable Automated Video Surveillance Systems

GLobAL REACh, LoCAL touch Global Account Management Global Project Management Global specification Writing About us supply Chain Efficiencies

Sustain.Ability. Adrian Fielding Integrated Safety & Security Honeywell Users Group EMEA

X-RAY SECURITY SCREENING SYSTEMS

Summary. Assessment Methodology

Chemical Threat Detection. Innovation with Integrity. Integrated CWA/TIC detection and identification: Bruker RAID-S2plus CBRNE

Developing Emergency Planning and Business Continuity Plans

Annex 2 - Shelter-in-Place

Professional Security Officer Program(PSOP)

Answer: B Objective: NFPA 472, (c), 4.2.3, 5.2.3(1); Level: Awareness, Operations Subject: Introduction; Chapter 1; Page 5

Building Integration System. Your platform for customized security and safety management.

Mobile CWA Detection and Identification. Innovation with Integrity. Mobile Mass Spectrometer MM2 CBRNE

Federal Law of the Russian Federation of December 27, 2009 N 347-FZ "Technical regulation on safety of low-voltage equipment" Part I

Mission. Vision. To set the standard for excellence and innovation in public safety. Department Description

Architectural and Engineering Specification for a Fiber Optic Perimeter Intrusion Detection System. FiberPatrol FP1150

Siemens Enterprise Security. Integrated Security Process. Airports. & Resource Management for Today s Airports. Steve Batt, Market Manager Airports

Compliance with Export Controls and Economic Sanctions

Integrated Security Solutions

Intrusion Detection Measures Against Insider Threats In Al-Tuwaitha Nuclear Site

Managing technical risks

I. Scope: II. Environmental Health and Safety Fire Alarm System Impairment Program - Guideline Revision Date: April, 2018

Explosives Trace Detection. Innovation with Integrity. Explosives Threat Mitigation: Bruker RoadRunner. Safety & Security

Dell and Lenel Grow Globally, Together

Why Should You Invest In An Access Management System?

ESF 15: EMERGENCY PUBLIC INFORMATION

The Conservation Fund The Center for Conservation and Development

Professional Perimeter Security Solutions

The Rocky Mountain Arsenal and the Northeast Greenway Corridor Project:

Instrument Standards Used in Security Applications Presented by: Leticia Pibida, Ph.D.

Technical Paper. Functional Safety Update IEC Edition 2 Standards Update

STATEMENT OF WORK. Physical Protection Equipment Upgrades for Al-Tuwaitha Site in Iraq

Chem-Bio Protection Without Chem- Bio Sensors:

Commentary from a Certification Body. Mike Violette Director American Certification Body

Architectural and Engineering Specification for a Fiber Optic Perimeter Intrusion Detection System. FiberPatrol FP1100X

CBSA s Radiation Detection Program (RADNET)

The ODP/OLES 5-Year Plan for CBRNE Standards

Department of School Safety and Security MONTGOMERY COUNTY PUBLIC SCHOOLS Rockville, Maryland

CBRNE solutions to safeguard society.

Your Partner in Safety Solutions

Transcription:

Protecting You, Protecting U.S. Mark E. Rosen Associate General Counsel Science and Technology Directorate Department of Homeland Security 1 1

A Summary of the SAFETY Act The Support Anti-terrorism by Fostering Effective Technologies Act of 2002 (SAFETY Act) was enacted as part of the Homeland Security Act of 2002 (Title VIII, Subtitle G) Intended to facilitate the development and deployment of anti-terrorism technologies by creating systems of risk management and litigation management Protections apply only to claims arising out of, relating to, or resulting from an Act of Terrorism 2 2

What is considered an Anti-Terrorism Technology? Any technology that is designed, developed, modified or procured for preventing, detecting, identifying, or deterring acts of terrorism or limiting the harm such acts might otherwise cause 3 3

What is Eligible for SAFETY Act Protections? Examples of eligible technologies: The SAFETY Act liability protections apply to a vast range of technologies, including: Products Services Software and other forms of intellectual property Threat and vulnerability assessment services Detection Systems Blast Mitigation Materials Screening Services Sensors and Sensor Integration Threatening Object Detectors Decision Support Software Security Services Crisis Management Systems 4 4

Snapshot of the Distinction Certification: High confidence it will continue to be effective. Designation: Proven effectiveness. DTED: Additional evidence of effectiveness needed. Shows potential. 5 5

Benefits of SAFETY Act Designation Liability = Insurance required by DHS Exclusive action in Federal court No joint and several liability for non-economic damages No punitive damages or prejudgment interest Plaintiff's recovery reduced by amounts from collateral sources 6 6

The Safety Act Insurance Requirement Maximum Amount. For the total [otherwise compensable third party] claims related to 1 such act of terrorism, the Seller is not required to obtain liability insurance of more than the maximum amount of liability insurance reasonably available from private sources on the world market at prices and terms that will not unreasonably distort the sales price of Seller s anti-terrorism technologies. 7 7

SAFETY Act Protections Extend to Users Such cause of action may be brought only against the Seller of the QATT and may not be brought against the buyers, the buyers contractors, downstream users of the QATT, the Seller s suppliers or contractors, or any other person or entity Preamble to Final Rule, 6 CFR Part 25, at 33150. 8 8

Criteria for SAFETY Act Designation Prior United States Government use or demonstrated substantial utility and effectiveness Availability of the Technology for immediate deployment in public and private settings Existence of extraordinarily large or unquantifiable potential third party liability risk exposure to the Seller or other provider of the technology Substantial likelihood that the Technology will not be deployed unless SAFETY Act risk management protections are extended Magnitude of risk exposure to the public if the Technology is not deployed Evaluation of scientific studies that can be feasibly conducted in order to assess the capability of the Technology to substantially reduce risks of harm Whether the Technology is effective in facilitating the defense against Acts of Terrorism ATT determination made by Federal, State, or Local officials Red=Technical criterion Blue=Economic criterion 9 9

What Do We Look for in Terms of Effectiveness in a SAFETY Act Application? Successful testing in operational environment Operational testing Evidence of performance metrics, including: o Probability of Detection o False Positive and False Negative Rates o Limits of Detection (and why that limit is relevant) o Interferrents o Maintenance and Training Suitable performance of past deployments documented Domain expertise appropriate and available In/external audits favorable Customer feedback favorable QA plans documented Repeatability proven 10 10

What Are the Benefits of SAFETY Act Certification? In addition to the benefits provided under Designation, Certification allows a Seller to: Assert the Government Contractor Defense for claims arising from acts of terrorism Be placed on DHS s Approved Products List for Homeland Security Certificate of Conformance issued to the Seller 11 11

Additional Criteria for Certification Designation is a prerequisite for granting Certification To receive Certification, a Qualified Antiterrorism Technology must also be shown to: Perform as intended Conform to the Seller s specifications Be safe for use as intended Seller is required to provide safety and hazard analyses 12 12

Certification Performs as intended: High confidence it will continue to be effective Consistent positive results (e.g., long-term low failure rates and false alarms) Reliability/Availability is high (e.g., MTBF) Performs in accordance with performance specifications Installation, use, maintenance procedures proven Documented processes (e.g., training, hiring, technology refresh) are being followed Standards are identified and met QA/QC processes are effective Note: Designation is a prerequisite 13 13

How is Your Proprietary Data Protected? Strong data protection measures that conform to DHS information security standards All application reviewers are screened for conflicts of interests, sign conflict of interest statements for each application they review, and sign general nondisclosure agreements 14 14

Pre-Application Consultation Provided at no cost (as is the rest of the program) Offer the opportunity to have a teleconference with the Office of SAFETY Act Implementation staff Receive a preliminary assessment of your product or service and its potential eligibility for SAFETY Act liability protections Obtain guidance for completing the applications for Designation and Certification Ask us questions! 15 15

Safety Act and Standards - Final Rule The Department reiterates that it intends to protect proprietary and other protected information to the maximum extent possible. No copyrighted or otherwise protected intellectual property will be distributed by the Department without the express permission of the owner. The Department has to date and will continue to work closely with standard setting organizations that have sought SAFETY Act protection for antiterrorism standards. The Secretary has discretion to decide which standards are relevant with respect to the criteria for SAFETY Act Designation and Certification, and the Department remains open to the concept that a standard itself may constitute a QATT. 16 16

Additional SAFETY Act Information Online: www.safetyact.gov FAQs Help Topics Help Desk: Online form for questions requiring an individual response Email: helpdesk@safetyact.gov Toll-Free: 1-866-788-9318 17 17

SAFETY Act Award Summary Effectiveness Evaluation DTED Designation Certification Needs more proof, but potential exists Proven effectiveness (with confidence of repeatability) Consistently proven effectiveness (with high confidence of enduring effectiveness) Protection Liability cap only for identified test event(s) and for limited duration ( 3yrs) Liability cap for any and all deployments made within 5-8 year term Government Contractor of Defense (GCD) for any and all deployments made within 5-8 year term 18 18

Who are the SAFETY Act Reviewers? Approximately 420 experts available to review applications. Conflict of Interest & Non-Disclosure Agreement signed by each reviewer per application. Three Technical Reviewers and two Economic Reviewers per application. Reviewers from the FFRDCs, non-profits, Federal Government, Federal & National Labs, and Academia. 100+ already trained reviewers (SMEs) in: Cyber Economic Chemical Biological Explosive Rad/Nuc Human Services 19 19

Where are SAFETY Act Products Used? 20 20

Examples of FY 2007 SAFETY Act Designations The Boeing Company: Systems Engineering and Integration Services for SBInet Border Security The Boeing Company provides Systems Engineering and Integration Services for SBInet Border Security. These system engineering and integration services provide border, infrastructure, facility, and site security solutions for the Federal Secure Border Initiative Network (SBInet) Program. Raytheon Company: Device Relationship Management Solution Raytheon Company provides a Device Relationship Management Solution that assists customers in establishing a centralized enterprise data management system that facilitates information exchange between security equipment and those who operate the security equipment. HOK Event, Inc.: Event Security Management Services for Super Bowl XLI, Miami, Florida HOK Event, Inc., provides Event Security Management Services for Super Bowl XLI, Miami, Florida. These services include the planning and coordination of perimeter and access control stations, as well as coordination with Federal, state, and local law enforcement, NFL Security, and other agencies prior to and during the Super Bowl. Bold = emphasis added solely as an aid in summarization during presentation 21 21

Examples of FY 2007 SAFETY Act Designations American, Science & Engineering, Inc.: X-Ray Inspection Systems American, Science & Engineering, Inc. (AS&E), provides a family of X-ray Inspection Systems that utilizes transmission and backscatter X-rays in different inspection settings to search parcels, cargo, pallets, vehicles and persons. BAE Systems Information and Electronic Systems Integration, Inc.: First InterComm (First Responder Interoperable Communications) System BAE Systems Information and Electronic Systems Integration, Inc., provides the First InterComm (First Responder Interoperable Communications) System. First InterComm is a system of devices that enables communications between disparate radios and other communication devices employed by Federal, state and local public safety agencies. IBM Corporation: Automated Commercial Environment (ACE) The IBM Corporation provides the Automated Commercial Environment (ACE). ACE is an integrated system of Commercial-Off-The-Shelf (COTS) software, hardware and infrastructure merged with custom built software. ACE is designed to provide the capability to access data in the international supply chain to anticipate, identify, track, and intercept high-risk shipments. Bold = emphasis added solely as an aid in summarization during presentation 22 22

Examples of FY 2007 SAFETY Act Designations Nomadics, Inc.: Fido Nomadics, Inc., provides the Fido line of portable trace explosives detectors. The product line includes the Fido X, Fido XT, and robot-mounted variants, which are trace detection systems that detect vapors and particles from explosive compounds. Isonics Corporation: EnviroSecure Detection System models 5100 and 5700 The Isonics Corporation provides the EnviroSecure Detection System for the detection of toxic industrial chemicals and chemical warfare agents. The Technology which includes the 5100 and 5700 models, can be used as part of an existing building s heating, ventilation, and air conditioning (HVAC) system to continually monitor the air for these substances. Dow Chemical Corporation: Dow Chemical Facility Security Services The Dow Chemical Corporation provides The Dow Chemical Facility Security Services, a comprehensive set of services designed to enhance security and protect key assets. The Designation covers those Dow Chemical facilities where the Technology is deployed and that were determined by the Coast Guard to be compliant with the security guidelines established under the Maritime Transportation Security Act of 2002, P.L. 107-295, as implemented by 33 C.F.R. Part 105 (2007). Dow s Technology includes security vulnerability assessments, protection of secure assets, protection of proprietary information and cyber security, emergency preparedness and response services, and involvement of local communities in the deployment of the Technology. It also includes and ongoing security and audit process. Bold = emphasis added solely as an aid in summarization during presentation 23 23

Examples of FY 2007 SAFETY Act Designations Brijot Imaging Systems, Inc.: BIS-WDS Prime Brijot Imaging Systems, Inc., provides BIS-WDS Prime, a passive millimeter wave concealed threat detection system. The Technology, which includes the Prime 1603 and the GEN 2 models, uses millimeter wave detectors to image suspicious objects made of metal, plastic, ceramic, composite, liquid, and other materials present on a subject person from a stand-off distance. BIVAC N.A.: Third Party Validation Services for C-TPAT BIVAC North America, Inc., the Bureau Veritas Group, BIVAC International, and BIVAC Asian, provide Third Party Validation Services, offered exclusively as part of the Customs-Trade Partnership Against Terrorism (C-TPAT) Third Party Validators Pilot Program. These services are designed to identify foreign companies that meet C-TPAT Minimum Security Requirements and transmit these findings to Customs and Border Protection (CBP). Bold = emphasis added solely as an aid in summarization during presentation 24 24

Examples of FY 2007 SAFETY Act Certifications Northrop Grumman Space & Mission Systems Corporation: Tactical Automated Security System Northrop Grumman Space & Mission Systems Corporation provides its Tactical Automated Security System (TASS). The TASS provides planning services for the development and integration of perimeter access security measures and responses. ADT Security Services, Inc.: Electronic Security Services ADT Security Services, Inc., provides Electronic Security Services. These services include access control and credentialing, perimeter monitoring, motion detection, alarm system notification and monitoring, security patrols, emergency response reporting, video monitoring and recording, and automatic fire and smoke detection and monitoring. The services are intended to help secure public and private facilities and infrastructure. Lockheed Martin Corporation: MetroGuard Lockheed Martin Corporation's MetroGuard, for public facility protection applications, provides an early warning of chemical, biological or radiological agent release through the use of a network of single-point Remote Detector Units (RDU). The release event is communicated by the RDU to one or more base station control computers which receive and process sensor data for system operators and first responders, thus enabling implementation of response protocols. Bold = emphasis added solely as an aid in summarization during presentation 25 25

Examples of FY 2007 SAFETY Act Certifications MadahCom, Inc.: Wireless Audio Visual Emergency System (WAVES) MadahCom, Inc., provides a fixed Wireless Audio Visual Emergency System (WAVES) and a portable Tactical WAVES (TACWAVES) (collectively, WAVES). WAVES provides mass notification to alert, warn and inform people of actions to take in the event of a terrorist attack. Insitu Group, Inc.: A20 Unmanned Aerial System (ScanEagle ) The Insitu Group, Inc., provides the A20 Unmanned Aerial System (ScanEagle ), an autonomous aerial vehicle system designed to provide intelligence, surveillance and reconnaissance data. Quatrotec Inc.: Baggage and Cargo Handling System (BCHS) Quatrotec, Inc., provides its Baggage and Cargo Handling System. The Technology is used to develop, design, construct, and commission in-line baggage and cargo handling systems at airports. The Technology aids in the screening of plane-bound baggage and cargo for concealed weapons or explosives through the use of advanced technologies including, but not limited to, X-ray, millimeter wave, computed tomography (CT), and explosive trade detection devices. Bold = emphasis added solely as an aid in summarization during presentation 26 26

Examples of FY 2007 SAFETY Act Certifications Kollsman, Inc.: LORROS Mk II Kollsman, Inc.., provides the Long Range Reconaissance and Observation System (LORROS) MkII, a remote observation system capable of providing 24-hour video surveillance in all weather and lighting conditions. This Technology includes the hardware selection process, and hardware and software installation and integration services. Bold = emphasis added solely as an aid in summarization during presentation 27 27

Examples of FY 2007 SAFETY Act DT&E Designations MindCo, Inc.: MINDS MindCo, Inc., provides the MINDS, a security system that monitors the environment for the presence of nuclear spectra. It is designed to detect and identify the presence of radionuclide elements. VeriTainer Corporation, Inc.: VeriSpreader VeriTainer Corporation, Inc., provides the VeriSpreader, a crane-mounted radiation scanning device. The National Biometric Security Project: Biometric Testing and Evaluation Process The National Biometric Security Project provides the Biometric Testing and Evaluation Process (BTEP), a method of testing biometric identification products and a listing that declares the suitability of those products for homeland and conventional security applications. The Technology is designed to certify that biometric identification products meet a variety of industry best standards. Bold = emphasis added solely as an aid in summarization during presentation 28 28