Mohana Ravindranath | Nextgov | May 8, 2017 | 0 Comments

DHS Wants to Verify Drones, Devices are What They Say They Are

A U.S. Customs and Border Patrol drone aircraft lifts off at Ft. Huachuca in Sierra Vista, Ariz. Matt York/AP File Photo

The Homeland Security Department wants to ensure its electronic devices can't be spoofed, and it's looking to the private sector for help.

DHS' Silicon Valley outpost is gathering applications from companies that can help it assure the identity of devices on its networks, potentially including wearables and drones. 

For instance, if emergency responders are wearing devices that monitor their vital signs, and that information is relayed back to a central office, how can that office ensure the data is real and not corrupted? If a border patrol drone is monitoring a geographic area for any anomalies, how might humans verify no one has tampered with the images coming in?

» Get the best federal technology news and ideas delivered right to your inbox. Sign up here.

Eligible companies would provide systems that can assure DHS personnel of the identity of devices on its networks, especially when the data those devices are transmitting is confidential, according to a FedBizOpps posting.

Anti-spoofing technology exists on the commercial market today, but DHS users face various challenges that might require new solutions, according to the department. When they're used on the field, devices might need security systems that don't use much energy or computing power. They might not always be connected to a network, and therefore may not be able to accommodate the most current cryptographic technology.

DHS plans to make awards of between $50,000 and $200,000 in the first phase of the project, with performance periods of three to six months. The call is open til 2018, with four separate deadlines for application: July 28, Oct. 27 and Jan. 1 and May 3 of next year.

The solicitation is offered through DHS' Silicon Valley Innovation Program's Other Transactions system, which allows the department to award small contracts quicker than the traditional acquisition process.

Comments
JOIN THE DISCUSSION

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

    Download
  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

    Download
  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

    Download
  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

    Download
  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

    Download

When you download a report, your information may be shared with the underwriters of that document.