Topic Information Award/Contract Number Proposal Information Company Performance

DNA and Latent Fingerprint Collection from Same Sample

HSHQDC-15-C-00030 HSHQDC-15-R-00017-H-SB015.1-001-0004-I
(HSHQDC-15-R-00017 Phase I)
Multi-Dimensional Digital Print Collection for DNA Collection from Same Sample

Lynntech, Inc.
2501 Earl Rudder Freeway South
College Station, TX 77845-6023


In recent years, research has shown that is possible to obtain DNA evidence from latent fingerprints; however forensic investigators need optimized techniques to ensure that both pieces of evidence are effectively preserved. Many fingerprint visualization and transfer techniques utilize enhancement additives or ultraviolet light which can compromise DNA profiling kits resulting in partial or no profile being obtained, particularly in low copy number and/or environmentally compromised samples. Lynntech proposes to develop a portable, easy-to-use, non-contact two-dimensional and three-dimensional digital preservation system for latent prints that is fully compatible with existing DNA recovery and profiling assays and current and future fingerprint databases. During the Phase I research effort, Lynntech will demonstrate the technical feasibility of the proposed print analysis system for a selected set of substrates. Further, Lynntech will demonstrate DNA recovery and profiling from print samples utilizing Lynntech's analysis system. It is anticipated that our system will yield superior evidence preservation capabilities improving investigators likely-hood of human identification, pursuit, and prosecution.

Enhanced Distributed Denial of Service Defense

HSHQDC-15-C-00018 HSHQDC-15-R-00017-H-SB015.1-003-0006-I
(HSHQDC-15-R-00017 Phase I)
Complex Distributed Telephony Denial of Service (TDoS) Defense

13750 San Pedro
San Antonio, TX 78232-4314


TDoS is a form of DoS that affects government, enterprise, and small business voice systems. It is the most significant threat to voice systems and by far the most likely form of voice-based DoS. TDoS attackers use SIP, free IP-PBXs, call generators, and spoofed calling numbers to cheaply and anonymously flood their victims with calls. The attackers have the advantage, because attacks are easy to generate, victims often have a small number of critical phones and attendants that are easily overwhelmed, and have little capability to mitigate the attacks. The state of the art in mitigation is largely static black and white lists in PBXs, SBCs, and service provider networks. Plus, by spending just a little more effort, attackers can make their attacks much more complex and difficult to mitigate. Soon the ability to generate very large distributed TDoS attacks will also be possible, increasing the list of potential victims. The proposed project will define a defense for these types of attacks. Attack signatures for future attacks will be defined. A robust defense approach consisting of multiple levels of filters, which inspect the signaling for all calls, use network probes for some calls, and using Turing Tests and content analysis for other calls, all configured with flexible policies and business rules, will be defined. A proof-of-concept implementing the most promising filters and techniques will be built upon the commercial SecureLogix voice security product. This will provide a foundation for a Phase II effort and rapid transition to a commercial product.