PrintPrint

Awards

Topic Information Award/Contract Number Proposal Information Company Performance
Period
Award/Contract
Value
Abstract

H-SB010.2-008
Handheld Multisensor Wand for the Detection of Threat or Illicit Objects on Persons

D10PC20054 1021135
(FY10.2 Phase I)
Handheld Multisensor Wand for the Detection of Threat or Illicit Objects on Persons

Picometrix LLC
2925 Boardwalk
Ann Arbor, MI 48104-6765

10/15/2010
to
04/28/2011
$100,000.00

In this Phase I SBIR work, we propose to test the feasibility of enhancing a hand-held wand time-domain terahertz (TD-THz) based sensor with an additional suite of low cost sensor technologies to create a multi-sensor fusion based approach. The feasibility of TD-THz signature based anomaly detection has been demonstrated previously in double-blind testing performed by an independent laboratory. A key capability of the TD-THz inspection wand is to detect concealed anomalous objects on the body of a person by employing automated time-domain waveform signature analysis without the need for imaging and its associated privacy concerns. While the probability of detection (PD) and probability of false alarm (PFA) previously demonstrated with a single THz sensor was very good and met TSA criteria for the particular concept of operation, the addition of one or more sensors will broaden the detectable types of concealments and anomalies; reduce shield conditions; speed operator use; and further improve the PD and PFA. We will evaluate the potential impact of the receiver operating characteristic of each of the sensor combinations in Phase I using a combination of experimental testing using simulants and theoretical evaluation. A prototype multi-sensor wand will be engineered, built and tested in Phase II.

H-SB011.2-003
Mobile Device Forensics

D11PC20247 DHS SBIR-2011.2-H-SB011.2-003-0004-I
(DHS SBIR-2011.2 Phase I)
Automated Flash Memory Analysis

Cybernet Systems Corporation
3885 Research Park Dr.
Ann Arbor, MI 48108-2217

10/15/2011
to
04/30/2012
$99,936.07

Electronic devices used in criminal activity provide excellent evidence when examined, which is getting increasingly difficult as devices shrink and tools fall behind in capability. Law enforcement face an uphill battle to stay ahead of the latest technology changes since devices evolve so quickly. Central to all of these devices is the role of flash memory, which is the long-term storage available on almost all devices. As a result of these trends, there is a need to be able to obtain data from flash memories. Factors hindering obtaining useful data from seized flash chips are: 1) there is no standard way to access flash chips, 2) ordering mixed data blocks is like jigsaw solving, and 3) after reordering the data needs converted into usable pieces. Our solution is a hardware/software combination that allows software controlled reading of any chip type through programmable logic. Resulting raw data is reorganized with a software tool we developed that operates by finding "fingerprints" of various data objects, then leverages knowledge of what must be nearby to weed out false positives and obtain more fingerprints, incrementally ordering the blocks correctly. A data view orders objects, presenting multiple views of the data suitable for forensic analysis

H-SB012.1-002
Moving Target Defense

HSHQDC-12-C-00028 DHS SBIR-2012.1-H-SB012.1-002 -0025-I
(DHS SBIR-2012.1 Phase I)
IP Hopper (for Moving Target Defense)

Cybernet Systems Corporation
3885 Research Park Dr.
Ann Arbor, MI 48108-2217

06/01/2012
to
11/30/2012
$99,939.00

The IP Hopper is a moving target defense system that will use available network data and hopping algorithms to allow for constant IP address changing of both source and destination IP addresses. The use of "hopping" IP addresses will severely diminish an attacker's ability to attack any one target within a network. Utilizing IPv6 the IP Hopper will allow up to 340 undecillion (3.4 x 10 to the 38) different IP addresses to be randomly used to thwart any attackers attempt on a machine within the network. Working off of the military's SINCGARS radio concept, the IP Hopper will do for data packets what the SINCGARS do for voice communications. Working with other IP Hoppers data communications both internal and external to the network can benefit from this constantly moving network defense appliance.

H-SB012.2-004
Hardening for Commercially Available Hand Held Computing and Communications Devices for First Responders

HSHQDC-12-C-00081 DHS SBIR-2012.2-H-SB012.2-004-0008-I
(DHS SBIR-2012.2 Phase I)
Ruggedization of Commercial-Grade Handheld Electronics for First Responders

Cybernet Systems Corporation
3885 Research Park Dr.
Ann Arbor, MI 48108-2217

09/15/2012
to
03/14/2013
$99,925.93

Ruggedized electronics can be costly; utilizing commercial-grade hand-held computing/communication device and combining with well-designed case can provide ruggedization (impact, temperature, moisture) and extend capabilities such as integrated inclusion of smartcard/CAC readers, biometrics, and advanced barcode scanners. This program will determine the requirements for ruggedizing a device and use those requirements as inputs into a case design leveraging COTS gear. Phase I will result in an early prototype providing fit/function and preparation for improved production. Phase I will also plan for testing, certification, and integration into DHS workflows. The end system provides first responders with integrated, consistent platform for response coordination and management.

H-SB013.2-004
Structural Collapse Prediction Technology

HSHQDC-13-C-00104 HSHQDC-13-R-00032-H-SB013.2-004-0006-I
(HSHQDC-13-R-00032 Phase I)
A Rapid-to-Deploy Agent-Based Wireless Sensing Architecture for Autonomous Structural Collapse Prediction

Civionics, LLC
1600 Huron Parkway
2nd Floor
Ann Arbor, MI 48109-5001

09/20/2013
to
03/19/2014
$100,000.00

While most media attention in the wake of a terrorist attack, a natural disaster, or even a single building fire focuses rightly on the safety and wellbeing of the general public, one often overlooked aspect of these catastrophic events is the extreme risk taken by first responders who enter structures on the verge of collapse. For example, after the attacks on the World Trade Center on September 11, 2001, 403 first responders were killed by the structural collapse of the twin towers. This scenario plays out on a much smaller scale every day, when local firefighters enter a burning or condemned building in an effort to protect public safety, and end up putting themselves at risk in the case of structural collapse. In this proposal, Civionics has teamed with Weidlinger Associates to present a novel, rapid-to-deploy technology that can quantitatively assess pending collapse in structures impacted by a fire, a terrorist attack, a natural disaster, or another building-related catastrophe. This approach centers on three layers of innovation: (Layer I) a modular wireless sensing hardware platform; (Layer II) an elegant suite of embedded structural analysis and risk assessment algorithms autonomously executed by the deployed wireless sensors; and (Layer III) an intuitive mobile interface for first responders. In whole, the proposed system will reliably provide actionable collapse information to first responders in real-time, while leveraging a lightweight, modular, and unobtrusive design strategy to make the system easy to deploy in even the harshest rescue and recovery environments.

H-SB015.1-002
Low-cost, Disposable, Tamper-Proof Bolt Seal

HSHQDC-15-C-00012 HSHQDC-15-R-00017-H-SB015.1-002-0008-I
(HSHQDC-15-R-00017 Phase I)
Tamper-proof Electronic Bolt-Seal

Evigia Systems, Inc.
3810 Varsity Drive
ANN ARBOR, MI 48108-2224

05/04/2015
to
10/31/2015
$99,992.58

The proposed SBIR Phase I effort initiates the development of a low-cost tamper-proof electronic bolt seal that is easy to install, and provides electronic recording and reporting without increasing the inspection time at the customs and security checkpoints. The proposed e-seal addresses the present gap in seal protecting ALL the air and maritime containers and conveyances to extend protection beyond high-value items to protecting against trafficking of contraband, weapons, and illegal aliens by inserting them in the ordinary and common goods containers. The proposed bolt-seal development and its mass volume productization are enabled by a multi-faceted innovative approach for mechanical, electronics, and system designs in conjunction with manufacturing techniques.

H-SB016.1-005
Internet of Things (IoT) Low-Cost Flood Inundation Sensor

HSHQDC-16-C-00074 HSHQDC-16-R-00012-H-SB016.1-005-0038-I
(HSHQDC-16-R-00012 Phase I)
Wide-Area Flood Alert Sensor Network

Evigia Systems, Inc.
3810 Varsity Drive
ANN ARBOR, MI 48108-2224

05/02/2016
to
11/01/2016
$99,993.24

The proposed SBIR Phase I effort initiates the development of a highly-reliable, modular, and cost-effective wide-area flood sensor network system. Evigia leverages the EVX-1000 family of wireless mesh networked sensor system developed for remote rugged arctic oil-spill recovery operation to develop the proposed flood alert IoT system. The senor nodes operate on IEEE802.15.4 wireless physical layer, and an enhanced energy-efficient 6LoWPAN (IPv6 over Low power Wireless Personal Area Networks) open-standard mesh protocol. The proposed system addresses the present gap in cost-effectively monitoring and projecting water-levels and flooding, and generating early warnings in all terrains including urban and remote rugged areas.

H-SB04.1-003
Advanced Low Cost Aerosol Collectors for Surveillance Sensors and Personal Monitoring

NBCHC040076 04110379
(FY04.1 Phase I)
An Enhanced: Lower Power, Higher Efficiency, Concentrator Design

Digital Flow Technologies, Inc.
2353 Sapphire Lane
East Lansing, MI 48823-

04/01/2004
to
10/15/2004
$89,950.00

Two primary efforts define the DFTI (Digital Flow Technologies, Inc.) response to the HSARPA requirements to develop a lower cost, more efficient, high (1000 liters/min) volume flow rate concentrator that requires lower power than the extant concentrator designs. The first of these is to create an operational "pre-concentrator" that will deliver a jet flow of air-plus-particles with the particulates (aerosols) concentrated at the jet centerline. This flow, delivered to a conventional concentrator tube provides a higher efficiency of operation given this centerline concentration. This prototype will be developed and proof tested with aerosol samples. The second effort will extend the initial design elements of the DFTI Concentrator System (described herein) that provides a dramatic reduction in the required power at a lower system cost. These specific extensions of the initial design elements (as described in this proposal) will be preparatory to the construction of a system in Phase II.

H-SB04.1-005
Marine Asset Tag Tracking System

NBCHC040059 04110654
(FY04.1 Phase I)
Microwave Data Telemetry for Marine Container Security

IR Telemetrics, Inc.
P.O. Box 70
Houghton, MI 49931-1234

04/01/2004
to
10/15/2004
$99,836.00

IR Telemetrics builds microwave telemetry systems for transmitting sensor data through narrow metallic passages within automobile engines. IRT devices can interface with sensors and transmit their data to a local receiver network through complex passages as small as four centimeters. Research will adapt IRT core technology to enable continuous communication with marine containers. The performance of IRT systems will be evaluated in a small marine container environment in a succession of experiments of increasing complexity. Based on test findings and iterative design improvements, investigators will identify the attributes of a local transmitter/receiver network, analyze the expected cost-of-installation for a commercial system, and identify a strategy for integrating the local system with global tracking infrastructure. IRT will form a strategic collaboration with Savi, Inc., to facilitate rapid commercialization of the proposed system. Savi has a decade of experience in helping to build and support the world`s largest wireless cargo security and tracking system, called the Total Asset Visibility (TAV) network. TAV includes a software platform linked with automatic identification technology infrastructure at over 750 locations in more than 40 countries and monitors in excess of 300,000 conveyances equipped with smart radio tags.

H-SB04.2-005
Innovative Techniques for Concealed Weapons or Explosive Detection at a Distance

NBCHC050017 0421214
(FY04.2 Phase I)
Stand-Off Terahertz Imaging and Spectroscopy Detection of Concealed Weapons and Explosives

Picometrix LLC
2925 Boardwalk
Ann Arbor, MI 48104-6765

11/01/2004
to
05/15/2005
$100,000.00

We propose to develop the design for a stand-off active terahertz imaging and spectroscopy system prototype for the detection of concealed threats at ranges up to 50 meters. Terahertz imaging has the potential to reveal concealed explosives; metallic and non-metallic weapons (such as ceramic, plastic or composite guns and knives); flammables; biological agents; chemical weapons and other threats. Because terahertz imaging employs safe non-ionizing radiation that penetrates clothing, people may be routinely scanned. Images can have sub-millimeter resolution, superior to longer wavelength techniques. Explosives, chemical weapons, and biological agents posses a spectral fingerprint in the terahertz regime. In phase I, elements of a long range time domain imaging system will be demonstrated. Parameters such as range, field of view, resolution, depth of field, size, weight and cost will be estimated.

H-SB05.2-002
UNCOOPERATIVE VEHICLE STOPPING USING NON-LETHAL METHODS

NBCHC060041 0521244
(FY05.2 Phase I)
Modulated Microwave Vehicle Stopping

Cybernet Systems Corporation
727 Airport Boulevard
Ann Arbor, MI 48108-1639

12/15/2005
to
06/30/2006
$99,459.00

Stopping vehicles, which are potential car bomb threats or are simply fleeing a crime scene at high speed allows military and law enforcement personnel added effectiveness. Furthermore, the current option of high-speed pursuit adds almost as much danger as might be avoided if the assailant is subdued. For this reason, many local police forces operating on a purely civilian mandate have stopped authorizing such high-speed pursuit for less serious crimes for the public safety.This solicitation calls for a means for stopping uncooperative vehicles (those that do not intentionally which to stop upon police or military request), which can be exercised safely from pursuit aircraft or automobile. We propose to develop a system that does this by transmitting modulated microwave energy to the target vehicle that is tailored to disrupt the computation functions of the vehicle engine controller, thus stopping the vehicle.

H-SB05.2-004
HARDWARE-ASSISTED SYSTEM SECURITY MONITOR

NBCHC060019 0521143
(FY05.2 Phase I)
HARDWARE-ASSISTED SYSTEM SECURITY MONITOR

Cybernet Systems Corporation
727 Airport Boulevard
Ann Arbor, MI 48108-1639

12/15/2005
to
06/30/2006
$99,894.00

Rootkits are Trojan horses installed by an intruder that mask changes that have been made in a system after attack. They replace or modify intrusion or other system status detecting applications so that they report a properly functioning system to a systems administrator, when in fact, the system has been compromised. Our solution to this requires designing a Linux based PC add on card that can monitor file access and prevent designated sectors from being written, as well as a memory scanner to catch memory resident rootkits. A GUI tool will allow an administrator to configure the device, which can only be accessed from a USB port. A valuable spin-off would be a bootable CD-ROM rootkit detection and repair tool for Windows.

H-SB06.1-010
NON-NUCLEAR SOURCES OR TECHNIQUES TO REPLACE NUCLEAR SOURCES IN COMMERCIAL (NON-MEDICAL) APPLICATIONS

NBCHC060147 0611196
(FY06.1 Phase I)
High Speed Non Ionizing Terahertz Measurement System to Replace Nuclear Gages

Picometrix LLC
2925 Boardwalk
Ann Arbor, MI 48104-6765

09/01/2006
to
03/15/2007
$150,000.00

We propose to prove the feasibility of a high speed non ionizing time domain terahertz (THz) measurement system to replace nuclear gauges. Nuclear source gauges (such as beta and gamma) are used in industrial process monitoring and control, often to measure thickness or mass in paper, plastics, rubber, and food stuffs in manufacturing and packaging. A single system based on low power non-ionizing pulsed THz measurements will be developed which can replace multiple types of nuclear source gauges. The THz measurement system will have similar or superior capabilities, with micron thickness resolution, less than 1 mm lateral resolution, and measurement times as fast as 250 microseconds. A single THz system can be configured for through or single sided measurements. Both very thin (<1mm) and thick (>50mm) materials can be measured with at equivalent precision. In addition, one THz gauges will make simultaneous measurements of properties such as water and chemical content. The miniature THz transmitters and receivers are hardened and can be remotely mounted from their control system. They require no shielding. In phase I we will determine laboratory feasibility of the measurements; describe the functional specifications, capabilities, environmental considerations, and comparative lifecycle costs of a proposed prototype system.

H-SB08.2-004
Telecommunications Linking System

NBCHC090001 0821167
(FY08.2 Phase I)
Comms Linking System

Cybernet Systems Corporation
727 Airport Boulevard
Ann Arbor, MI 48108-1639

12/01/2008
to
06/15/2009
$99,967.00

The DHS solicitation calls for development of system that provides (a) Access interfaces to all ICE databases where phone information is stored, (b) Database logic to allow phone links of at least 4 deep (i.e. develop the set of all phones, associated suspects, linked within 4 deep of a given call, determine whether two phones are associated together within four links, determine given two or more phone numbers, numbers that are intersections of the linkage database of them all or common contacts), (c) Correlation of numbers to suspects to case numbers and provide automated notification to investigative agents, (d) Graphical interface and statistical (weighted) search methodology, (e) Delinking (i.e. disallowed links) by end user agents, (f) Support for storage and indexing of stored voice associated with telephone information, and (g) Graphical, report information and export facilities. We propose to develop systems that Link a suspect (his phone number) to other potential suspects based on phone calling pattern (like the logic that a firm like Google uses to associate you with the web advertisements you might find compelling enough to view).Provide a scalable shareable GUI access to the mainframe database and search logic that can be access securely and readily by the user community we suggest that this is a secure web based type of GUI interface.

H-SB09.1-005
Hard Drive Unlocking

NBCHC090042 0911122
(FY09.1 Phase I)
Hard Drive Unlocking

Cybernet Systems Corporation
727 Airport Boulevard
Ann Arbor, MI 48108-1639

05/22/2009
to
01/07/2010
$99,998.00

Recovering hard drive data is an integral part of computer forensics and has played a key part of many investigations. However this capability is getting significantly harder as sophisticated encryption and data protection mechanisms become routinely employed. The trend of encrypting data is growing due to market pressures and legal requirements for privacy laws, especially in the financial and medical industries. As a result of these market forces, it will become nearly impossible to gather data from hard drives, especially in the timely or covert manner required by many investigations. To aid in this arms race between secure data and law enforcement access needs, Cybernet proposes to create a tool that simplifies and automates accessing protected hard drives. Cybernet`s Automated Drive Unlocking Tool (CADUT) comprises a software component that stores a database of known hard drive weaknesses and automated methods to apply them, and combines this with a hardware component designed to detect and attack implementation weaknesses of an unknown drive model using high-speed cracking and protocol fuzzing methods. As newer drive locking technologies and models are released, the database and hardware will be augmented as needed to remain competitive.