Abstracts of HSHQDC-13-R-00032 Phase I Awards



Nevada Nanotech Systems, Inc.
1315 Greg Street
Suite 103
Reno, NV 89511-6091

Proposal Information HSHQDC-13-R-00032-H-SB013.2-001-0005-I - Bulk Currency Vapor detection in Confined Spaces
Topic Information H-SB013.2-001 - Bulk Currency Vapor Detection in Confined Spaces
Award/Contract Number HSHQDC-13-C-00117

The proposed goal of Nevada Nanotech Systems Inc for the Phase I program is to select a practical technological solution and develop a Con-Ops for the problem of detecting U.S. currency via unique vapor signature(s) in confined spaces for three related, though unique, application scenarios (bags, vehicles, and shipping containers). Nevada Nano will document a matrix of technical and operational requirements for three application areas, identifying commonalities and key differences. Nevada Nano will map the requirements to the capabilities of various existing technologies and assess the tradeoffs. Any gaps in the technology capabilities versus application requirements will be identified and workarounds developed to minimize the impacts. The Phase II goal is to fabricate systems for field testing, achieve satisfactory detection results in these tests, and provide detailed documentation of the performance. It is expected that a field-proven technology (TRL10) can be adapted for this application; however the need for adaptation will reduce the TRL to about 5/6 at the end of Phase I. Rapid increases to TRL7/8 are expected early in Phase II. The anticipated results are: 1. a comprehensive listing of requirements for this task based on prior studies and additional tests 2. a detailed assessment of the advantages and disadvantages of each possible technology solution with documented test results demonstrating baseline capabilities 3. a selection of the best fit technology and clear documentation of the strengths and weaknesses of the technology 4. conceptual design of any adaptations required for this application


KWJ Engineering Inc.
8440 Central Avenue
Suite 2D
Newark, CA 94560-3453

Topic Information H-SB013.2-001 - Bulk Currency Vapor Detection in Confined Spaces
Award/Contract Number HSHQDC-13-C-00101

KWJ leverages its extensive experience to develop an automatic clandestine currency detection system (CCDS) for screening smuggled money in DHS real world applications. The ideal such system is equipped with probe (sampling, pre-concentration and detection), sensor array detection system or analytical instrument combination, analysis hardware and software, and communications components. The proposed CCDS can identify the unique signature of U.S. banknotes precisely, fast, and, in a non-intrusive manner, and can be deployed and easily used. Phase I will isolate and identify the ideal the technology for the field detection of concealed money. Further, through the Phase I effort, comprehensive knowledge regarding the criteria and the optimum technologies for developing a CCDS will be collected and organized within a disciplined evaluation matrix. This knowledge is valuable for this project and for developing other field screening techniques to complement existing DHS operations. In Phase I, we will perform a comprehensive survey to identify the best technology and optimum path to develop the CCDS. The exact US currency signature and the specifications required for detecting bulk currency in confined spaces will be quantified. The optimum technique for building a CCDS will be selected based on thorough technique survey, KWJ's extensive gas sensing and field analytical experience, and a sound statistical systems engineering evaluation of the information. A final report includes the optimized path to an innovative CCDS with supporting alpha design documentation. In Phase II, a prototype of CCDS can be fabricated and tested by KWJ itself or by cooperating with appropriate partners.



BlueRISC, Inc.
28 Dana St
Amherst, MA 01002-0000

Proposal Information HSHQDC-13-R-00032-H-SB013.2-002-0009-I - Lean Software Roots of Trust
Topic Information H-SB013.2-002 - Software Based Roots of Trust for Enhanced Mobile Device Security
Award/Contract Number HSHQDC-13-C-00116

In this proposal, we outline a project to research and develop a lean, fully-software-based Mobile Trusted Module (SW-MTM) for mobile devices. The goal of the proposed solution is to provide the required Roots of Trust (RoTs) and trusted security services via a fully software implementation while maintaining the heightened level of assurance typically only achieved through additional, security-centric hardware. This will be achieved by building a solution that is not only compatible with the Trusted Computing Group's (TCG) MTM specification but also goes beyond in order to provide both static and dynamic trust verification. The solution has the following key components: (i) fully software managed RoTs architecture including the protected Core Root of Trust for Measurement (CRTM) and associated cumulative chain of trust, (ii) runtime integrity verification through dynamic RoTs, (iii) MTM compatible, open API containing support for the associated MTM trusted services and extensions. The solution is broadly applicable across both Defense and Government agencies as well as the commercial sector. The Phase I effort will conclude with a proof-of-concept demonstration of the proposed solution executing in a mobile device emulator. Should a Phase II be awarded, a functional prototype containing all proposed technologies will be delivered. The TRL at the start of the Phase I effort is 2. This is expected to reach a level of 5 by the end of the Phase I effort.


Galois, Inc.
421 SW Sixth Avenue
Suite 300
Portland, OR 97204-1662

Proposal Information HSHQDC-13-R-00032-H-SB013.2-002-0016-I - Practical Roots of Trust for Mobile Devices
Topic Information H-SB013.2-002 - Software Based Roots of Trust for Enhanced Mobile Device Security
Award/Contract Number HSHQDC-13-C-00100

To meet the critical security needs of the Department of Homeland Security and others, we propose two methods for providing a secure root of trust for mobile devices. One method is designed to integrate as easily into existing systems, while the other requires deeper integration but provides correspondingly stronger security. The keys to our work are practicality and integration: practicality to ensure our system applies to current and near-term mobile devices, and integration to allow for a smooth transition path to mobile device manufacturers. In the proposal we describe not only the technical path to implementation for these two approaches, but also the business, legal, and political steps required to bring root of trust technology to market. Once in place, root of trust technology can be used as a strong basis for implementing other key mobile security solutions, such as secure data at rest, secure data in transit, secure authentication, and mobile device management.


RAM Laboratories, Inc.
591 Camino de la Reina
Suite 610
San Diego, CA 92108-3108

Proposal Information HSHQDC-13-R-00032-H-SB013.2-002-0019-I - Software Based Roots of Trust for Enhanced Mobile Device Security
Topic Information H-SB013.2-002 - Software Based Roots of Trust for Enhanced Mobile Device Security
Award/Contract Number HSHQDC-13-C-00111

Mobile devices require security features that are utilized by application developers and users to ensure secure communication and commerce. Existing features on mobile hardware are often considered proprietary between the manufacturer and the telecommunications provider, rendering them unavailable for external use. Current works-around involve adding trusted hardware to the device, which increases cost and SWAP, while using a software keying approach places the device's Identity key outside of protected memory, subjecting it to attack. To provide the needed security, while addressing cost, SWAP, and performance, RAM Laboratories proposes to develop a Mobile Device Trust Solution that implements Roots of Trust (RoTs) via a firmware solution that builds on secure mobile device TrustZone(R) technology, hardware virtualization, TPM Mobile specifications and Android device drivers. The resultant solution will provide a software-based trusted chipset-equivalent security for mobile applications by establishing a Identity to fingerprint the device for keying and signature generation. This Identity is generated by extracting physical circuitry information from physically unclonable functions (PUFs) that establish a unique Identity for the device. The PUFs support a verification engine that generates signatures and keys for RoT Verification; they are used for key generation to encrypt storage for RoT Storage; and, they are used as a basis for keying and activation codes for managing assertions for RoT - Integrity. Our solution will be integrated with our teammate, ViaSat's, Secure Mobility Environment (SME) firmware and targeted to Samsung Galaxy Note II and S4 devices. Phase I takes this technology from TRL 2 to TRL 4.


HexEffect, LLC
2187 Ivy Crest Drive
Bellbrook, OH 45305-1867

Proposal Information HSHQDC-13-R-00032-H-SB013.2-002-0024-I - DynaTrust
Topic Information H-SB013.2-002 - Software Based Roots of Trust for Enhanced Mobile Device Security
Award/Contract Number HSHQDC-13-C-00112

HexEffect, LLC will use its experience with both offensive and defensive computing technologies to develop a software-only root of trust (RoT) system called DynaTrust. The system will be deployable on commercial mobile devices running the Android operating system. The purpose of DynaTrust is to allow trusted execution and data storage on widely available low cost and legacy commercial devices. DynaTrust will use precise timing and self-checksumming code to establish a dynamic RoT on a mobile device. HexEffect will employ unique rootkit-like techniques to help maintain the integrity of the RoT while it is active. This RoT will provide trusted execution and data access services. It will be deactivated when the user no longer requires access to protected resources. The anticipated usage model is similar to how VPNs are currently used. A successful effort will result in a system that can be used to establish trust on most existing Android devices. DynaTrust will allow organizations to perform trusted operations on low cost and legacy devices rather than requiring the purchase of newer, costlier devices. This technology will also enable safer bring your own device (BYOD) practices in government and commercial organizations. Our initial TRL is 2. DynaTrust will be built using known basic principles, but with some extensions and integrated in novel ways. By the end of Phase II we will be at TRL 6, having demonstrated our solution in a live environment using real devices.


10010 San Pedro
Suite 510
San Antonio, TX 78216-3847

Proposal Information HSHQDC-13-R-00032-H-SB013.2-002-0025-I - Physical Unclonable Functions for Mobile Device Roots of Trust
Topic Information H-SB013.2-002 - Software Based Roots of Trust for Enhanced Mobile Device Security
Award/Contract Number HSHQDC-13-C-00113

Beginning with the release of the iPhone in 2007 and continuing with the increasing popularity of tablet computers, there has been an ever increasing desire to connect "unsecure" mobile devices to secure enterprise networks. Although several pieces of technology exist to meet this need, these devices lack a firm foundation upon which to build trust and security. This paper proposes development of Roots-of-Trust for mobile devices using Physical Unclonable Functions (PUF) and the ARM TrustZone trusted execution environment. Using these two basic technologies we propose building a Root of Trust for Storage (RTS), a Root of Trust for Integrity (RTI) and a Root of Trust for Verification (RTV). We will implement this capability on a selected mobile device platform without hardware modification. Because of the use of a PUF, our technology will make it nearly impossible to steal or clone a device's credentials. The new roost of trust will be used to implement a sample application that performs strong data-at-rest encryption and will make it impossible to decrypt the sample data if it is moved to a new device, or if the device's software is tampered with.



dbS Productions LLC
1808 Rugby Pl
Charlottesville, VA 22903-1625

Proposal Information HSHQDC-13-R-00032-H-SB013.2-003-0013-I - Search and Rescue Initial Response Tools
Topic Information H-SB013.2-003 - Lost Person Locator for First Responders
Award/Contract Number HSHQDC-13-C-00107

This proposal doubles the size of the International Search and Rescue Incident Database (ISRID) from 50,000 to over 100,000 SAR incidents organized by incident type, subject category, terrain, ecoregion domain, and population density. The PI brings over 30 years of SAR field experience and over 20 years of SAR research experience to the problem including experience in creating ISRID. At the start the TRL is 3 and at the end of Phase I we estimate 4-5. The enhanced database with new data will provide the needed information to provide new models to predict the probability of area (POA) of missing people. Sending teams to the right area saves lives, resources, and time. New research into combining geographic models of behavior along with effective sweep width and searcher velocity will allow the calculation of Probability of Success Rate. This underlying factor along with initial response tasking algorithm will allow a graphic display of not only exactly where initial search teams should be tasked plus show the relative priority of tasks. This will allow the power of formal search theory to be placed into the hands of initial responders with little to no formal training. The research and development will allow a full suite of products to be developed. From durable plastic job aids, Lost Person Behavior smartphone Apps, paper and e-book field guides, training courses, to software aimed at the initial SAR response we are in a unique position to commercialize the effort, since SAR is our primary market since 1991.



Civionics, LLC
1600 Huron Parkway
2nd Floor
Ann Arbor, MI 48109-5001

Proposal Information HSHQDC-13-R-00032-H-SB013.2-004-0006-I - A Rapid-to-Deploy Agent-Based Wireless Sensing Architecture for Autonomous Structural Collapse Prediction
Topic Information H-SB013.2-004 - Structural Collapse Prediction Technology
Award/Contract Number HSHQDC-13-C-00104

While most media attention in the wake of a terrorist attack, a natural disaster, or even a single building fire focuses rightly on the safety and wellbeing of the general public, one often overlooked aspect of these catastrophic events is the extreme risk taken by first responders who enter structures on the verge of collapse. For example, after the attacks on the World Trade Center on September 11, 2001, 403 first responders were killed by the structural collapse of the twin towers. This scenario plays out on a much smaller scale every day, when local firefighters enter a burning or condemned building in an effort to protect public safety, and end up putting themselves at risk in the case of structural collapse. In this proposal, Civionics has teamed with Weidlinger Associates to present a novel, rapid-to-deploy technology that can quantitatively assess pending collapse in structures impacted by a fire, a terrorist attack, a natural disaster, or another building-related catastrophe. This approach centers on three layers of innovation: (Layer I) a modular wireless sensing hardware platform; (Layer II) an elegant suite of embedded structural analysis and risk assessment algorithms autonomously executed by the deployed wireless sensors; and (Layer III) an intuitive mobile interface for first responders. In whole, the proposed system will reliably provide actionable collapse information to first responders in real-time, while leveraging a lightweight, modular, and unobtrusive design strategy to make the system easy to deploy in even the harshest rescue and recovery environments.


Summit Safety, Inc
7 Matthew Lane
Sterling, MA 01564-1541

Proposal Information HSHQDC-13-R-00032-H-SB013.2-004-0020-I - System for Advanced Warning of Structural Collapse
Topic Information H-SB013.2-004 - Structural Collapse Prediction Technology
Award/Contract Number HSHQDC-13-C-00102

This project will finalize the development of an advanced warning system for structural collapse for both new and existing buildings, particularly during structural fires. The project will utilize a non-contact ultrasonic sensor originally developed under NIST SBIR Topic 9.14 and extensively tested at Underwriters Laboratories (UL) under actual fire conditions through a follow-on DHS SBIR program. The ultrasonic sensor is capable of measuring changes in position, velocity, and acceleration from structural surfaces even in the presence of thick smoke, dust, or fog, which could render an optical or laser-based system unusable. Installation and alignment of the wireless sensor can be accomplished in a matter of seconds. The proposed system will integrate the ultrasonic sensor with conventional accelerometers to detect the vibrations and small changes in the position of a structure that are precursors of structural collapse. The collapse detection system will employ multiple sensors for distribution within and around the structure.



Constellation Technology
7887 Bryan Dairy Road, Suite 100
Largo, FL 33777-1452

Proposal Information HSHQDC-13-R-00032-H-SB013.2-005-0006-I - Innovative Materials Analysis to Differentiate Counterfeit from Authentic Products
Topic Information H-SB013.2-005 - Commodity Goods Counterfeit Detection
Award/Contract Number HSHQDC-13-C-00103

Constellation Technology Corporation (Constellation) is recognized as one of the world leaders in Materials Analysis. This abstract is intended to explain Constellation's development of new innovative means for detection of inferior materials to differentiate a visibly identical counterfeit product from the authentic item through advanced materials analysis. This project will be accomplished by Constellation interacting with the various Department of Homeland Security (DHS) operational components and Federal Agencies that have the mission to keep counterfeit goods out of the United States, as well as selective manufacturers of the authentic items; creating an inventory of a selective number of consumer products that have a high economic impact on the counterfeit market; developing an inventory of the materials used to both produce the counterfeit product and the authentic product; performing analysis to prepare an assessment of whether there are any measurable differences between the two sets of materials; and include a survey of available detection technologies and their operational modalities (e.g., CONOPS, mobility, logistics, costs). The successful implementation of the means for detection of counterfeit consumer products developed as part of this project is designed to include the entire supply chain, including cargo containers, distribution warehouses, points of retail sales, and ad-hoc points of sale. Constellation has the world class materials analysis subject matter experts and equipment to provide DHS with new innovative means of counterfeit detection of commodity goods.


35 Hartwell Avenue
Lexington, MA 02421-3102

Proposal Information HSHQDC-13-R-00032-H-SB013.2-005-0007-I - Detection of Counterfeit Commodity Goods
Topic Information H-SB013.2-005 - Commodity Goods Counterfeit Detection
Award/Contract Number HSHQDC-13-C-00114

The program will provide methods for detection of counterfeit consumer goods along the entire supply chain. In Phase I, key stakeholders in federal agencies will share their knowledge and describe the critical requirements necessary for successful detection techniques. An inventory of high impact authentic/counterfeit products and materials will be generated. Using TIAX's Macro to Micro Assessment Methodology, an assessment will be made to determine if laboratory analytical techniques can (1) detect inferior materials in counterfeit products and (2) identify and measure differences between visually identical authentic and counterfeit products. A survey will identify and critique existing standard sensing technologies that have potential for use as detection tools in the field. The findings from Phase I will be used to design the Phase II program which will demonstrate the feasibility of detecting counterfeit products/materials. The demonstration will be in a laboratory setting but will use existing commercial detection technologies identified in Phase I. In the Phase III program, the successful detection technologies will be transitioned to field deployable systems. Solutions for detection of counterfeit goods will first be marketed and sold for use by various agencies of the Federal Government. These include the U.S. Immigration and Customs (ICE), the U.S. Coast Guard, and the U.S. Custom and Border Protection. Development of commercial applications is a logical next step and it is anticipated that the developed detection technology will migrate directly to industrial applications such as quality control and product development.



InCadence Strategic Solutions
10432 Balls Ford Road
Suite 120
Manassas, VA 20109-2515

Proposal Information HSHQDC-13-R-00032-H-SB013.2-006-0028-I - MASS CASUALTY TRIAGE SYSTEM (MCATS)
Topic Information H-SB013.2-006 - Management of Mass Casualty Triage
Award/Contract Number HSHQDC-13-C-00087

For InCadence's SBIR Phase I effort for the Mass Casualty Triage System (MCATS) we will analyze the Management of Mass Casualty Triage problem set in the context of an end-to-end Solution Framework. The Solution Framework identifies key enablers of the overall solution including: Tagging or Identifying Victims; Support for one or more Mobile Hardware Platforms and Operating Systems; Design of the End User Application; Interface with one or more Sensors or Readers; Communications Options; Protocol Interoperability; Aggregation and Visualization of Casualty Status; and Back-end Server and Portal Options. For each enabler will evaluate options for the enabler in terms of: Cost Effectiveness, Universal Deployability, Ease of Use and Practicality. InCadence will repurpose components our several of our government-funded development efforts to rapidly prototype, evaluate and demonstrate proposed components of the end system. Repurposed components may come from our web-based near-real time Tactical Rapid Exploitation Portal (T-REX), our Multilingual Automated Registration System (MARS) which includes mobile biometric technology for fingerprint and iris collection and matching, and our Axon Cloud Broker for deploying and managing back-end server-based web services on the Amazon Web Services (AWS) platform. The final objective of our Phase I effort will be one or more feasible, effective Solution Paths for the end-to-end prototype MCATS that InCadence will produce during the Phase II effort. Our objective is to commercialize the objective system and its components for sale to first responder agencies. We will also pursue DHS SECURE Certification for the resulting product.



Engineering Science Analysis Corporation
6105 S. Ash Ave.
Suite A3
Tempe, AZ 85283-5626

Proposal Information HSHQDC-13-R-00032-H-SB013.2-007-0004-I - Contraband Element Imager Technology
Topic Information H-SB013.2-007 - Affordable Non-Destructive Anomaly Detection for Perceived Hollow Spaces
Award/Contract Number HSHQDC-13-C-00089

The Department of Homeland Security (DHS) requires an affordable anomaly detection device for non-destructive inspection to determine if perceived hollow spaces are empty or densely packed with contraband. DHS has identified a need to detect narcotics, weapons, explosives or other contraband smuggled over the border, onto planes, or carried into public venues while concealed in hollow spaces such as bicycle, stroller, or wheelchair frames. In response to these requirements ESA proposes to develop the Contraband Element Imager Technology (CEE-IT), a safe, hand-held, low-dose x-ray-based sensor imaging system. The significance of this innovation is the use of portable, hand-held, medical x-ray real-time imaging technology that can be used to image the contents of hollow spaces while utilizing software to key on the various densities of materials to quickly identify and create images and identities of the contents. The advantage of the CEE-IT innovation is that it enables DHS to detect and identify contraband during primary screening and virtually eliminates the secondary screening steps that disrupt normal flow through ports of entry. The successful development and integration of this technology at inspection points will allow quick, reliable and cost-effective non-destructive detection of concealed contraband with minimal disruption to normal commerce operations and without compromising the safety of our nation. Potential applications for the CEE-IT innovation include DoD checkpoints and installations, critical infrastructure security (utilities, transportation, shipping), public event security, and building security.