Innovation

DHS adds foraging to tech arsenal

concept art innovation

If the Department of Homeland Security doesn't have a particular technology needed to solve a problem, it has the option of going into "McGyver" mode, adapting what it can find to make a suitable solution instead of turning to the formal federal procurement process.

The agency scours tech ideas and adaptable gear from other agencies, research groups or private industry, or a combination of all those sources. Such "technology foraging," became a cornerstone of the DHS Science and Technology Directorate's mission in 2011. In an S&T Snapshot post on its website, Stephen Hancock, a former Navy aerospace engineering duty officer who leads the S&T tech foraging initiative, wrote that research managers canvas journals, patents, labs and forums across the Internet looking for technologies that could be "readily adaptable" to the agency's mission.

"When people think 'innovator,' they think 'Thomas Edison'—a lab genius who created science breakthroughs," Hancock wrote. "But today we need innovators who can recognize a breakthrough, adapt it, package it, and then field it. It is the reinventing of invention itself. After all, we're not the only ones facing the same kind of challenges."

DHS finds adaptable technologies in a wide variety of places. One example, according to the snapshot document, involved a collaboration between the Coast Guard and the National Oceanic and Atmospheric Administration. The Coast Guard needed a way to track small watercraft that might be used to transport illegal contraband. S&T developed software with NOAA that allows the Coast Guard to take its own radar images of a bay, then tap into NOAA’s coastal radar—normally used to monitor ocean currents and wave action--to detect stealthy small vessels that might be hauling contraband.

The article also mentions a collaboration with NASA on disaster-victim detection technology, in which S&T modified a NASA-developed human heartbeat detection monitor for use in search-and-rescue operations.

"These successful examples of tech foraging show how multiple investments from federal agencies can be leveraged, especially when program managers actively look for opportunities to re-purpose research and development, reducing costs and creating new homeland security solutions," said Hancock, quoted in the DHS document.

Although DHS spokeswoman Nicole Stickel declined to comment on the specifics of how the program might get technology to DHS users more quickly or cost-effectively, she did say that the program "leverages existing research to save time and money while jumpstarting a technology's application for homeland security."

About the Author

Mark Rockwell is a staff writer covering acquisition, procurement and homeland security. Contact him at mrockwell@fcw.com or follow him on Twitter at @MRockwell4.

The 2015 Federal 100

Meet 100 women and men who are doing great things in federal IT.

Featured

  • Shutterstock image (by venimo): e-learning concept image, digital content and online webinar icons.

    Can MOOCs make the grade for federal training?

    Massive open online courses can offer specialized IT instruction on a flexible schedule and on the cheap. That may not always mesh with government's preference for structure and certification, however.

  • Shutterstock image (by edel): graduation cap and diploma.

    Cybersecurity: 6 schools with the right stuff

    The federal government craves more cybersecurity professionals. These six schools are helping meet that demand.

  • Rick Holgate

    Holgate to depart ATF

    Former ACT president will take a job with Gartner, follow his spouse to Vienna, Austria.

  • Are VA techies slacking off on Yammer?

    A new IG report cites security and productivity concerns associated with employees' use of the popular online collaboration tool.

  • Shutterstock image: digital fingerprint, cyber crime.

    Exclusive: The OPM breach details you haven't seen

    An official timeline of the Office of Personnel Management breach obtained by FCW pinpoints the hackers’ calibrated extraction of data, and the government's step-by-step response.

  • Stephen Warren

    Deputy CIO Warren exits VA

    The onetime acting CIO at Veterans Affairs will be taking over CIO duties at the Office of the Comptroller of the Currency.

  • Shutterstock image: monitoring factors of healthcare.

    DOD awards massive health records contract

    Leidos, Accenture and Cerner pull off an unexpected win of the multi-billion-dollar Defense Healthcare Management System Modernization contract, beating out the presumptive health-records leader.

  • Sweating the OPM data breach -- Illustration by Dragutin Cvijanovic

    Sweating the stolen data

    Millions of background-check records were compromised, OPM now says. Here's the jaw-dropping range of personal data that was exposed.

  • FCW magazine

    Let's talk about Alliant 2

    The General Services Administration is going to great lengths to gather feedback on its IT services GWAC. Will it make for a better acquisition vehicle?

Reader comments

Wed, Aug 7, 2013

Liars. For the TWIC program and Trusted Traveler, they could have piggybacked off lessons learned for CAC and FIPS201 programs, and even made the data sets interoperable. (Trusted Traveler could have started with around 2 million pre-cleared CAC holders.) But, no, they had to do it Their Way.

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above