Contraband Detection Market Survey

Federal Register, Volume 81 Issue 8 (Wednesday, January 13, 2016)

Federal Register Volume 81, Number 8 (Wednesday, January 13, 2016)

Notices

Pages 1645-1647

From the Federal Register Online via the Government Publishing Office www.gpo.gov

FR Doc No: 2016-00503

-----------------------------------------------------------------------

DEPARTMENT OF JUSTICE

Office of Justice Programs

OJP (NIJ) Docket No. 1704

Contraband Detection Market Survey

AGENCY: National Institute of Justice (NIJ), Justice.

ACTION: Notice of request for information.

-----------------------------------------------------------------------

SUMMARY: The NIJ is soliciting information in support of the upcoming National Criminal Justice Technology Research, Test, and Evaluation Center (NIJ RT&E Center) ``Market Survey of Contraband Detection Technologies.'' This market survey, which will identify commercially available contraband detection systems for use in corrections facilities, will be published by NIJ to assist purchasing agents or other representatives of corrections facilities in their assessment of relevant information prior to making purchasing decisions. Comments with regard to the market survey itself, including which categories of information are appropriate for comparison, as well as promotional material (e.g., slick sheets) and print-quality images in electronic format, are also invited.

DATES: Responses to this request will be accepted through 11:59 p.m. Eastern Standard Time on February 15, 2016.

ADDRESSES: Responses to this request may be submitted electronically in the body of, or as an attachment to, an email sent to administrator@nijrtecenter.org with the recommended subject line ``Contraband Federal Register Response.'' Questions and responses may also be sent by mail (please allow additional time for processing) to the following address: National Criminal Justice Technology Research, Test and Evaluation Center, ATTN: Contraband Federal Register Response, Johns Hopkins University Applied Physics Laboratory, 11100 Johns Hopkins Road, Mail Stop 17-N444, Laurel, MD 20723-6099.

FOR FURTHER INFORMATION: For more information on this request, please contact Rebecca Koslover (NIJ RT&E Center) by telephone at 443-778-1643 or administrator@nijrtecenter.org. For more information on the NIJ RT&E Center, visit http://nij.gov/funding/awards/Pages/award-detail.aspx?award=2013-MU-CX-K111 and view the description, or contact Jack Harne (NIJ) by telephone at 202-616-2911 or at Jack.Harne@usdoj.gov. Please note that these are not toll-free telephone numbers.

SUPPLEMENTARY INFORMATION: Information Sought: Information is sought for an upcoming ``Market Survey of Contraband Detection Technologies,'' which seeks to identify commercially available contraband detection systems for use in corrections facilities. Applicable technologies should be capable of detecting contraband types in one or more of the following categories: (1) Weapons; (2) drug paraphernalia; (3) cell phones (or other mobile devices); and (4) forms of currency (e.g., money, stamps, etc.). In addition to these categories of contraband types, NIJ seeks to identify systems capable of detecting contraband under the following conditions: (1) Person-borne; (2) vehicle-borne; and (3) environmental.

The person-borne category seeks to identify technology that is capable of detecting contraband concealed either on a person, or within body cavities. The vehicle-borne category seeks to identify technology that is capable of detecting contraband concealed in vehicles (e.g., passenger cars, delivery trucks, etc.) entering and leaving correctional facilities. Lastly, the environmental category seeks to identify technology that is capable of detecting contraband concealed in the environment (e.g., walls, furniture, etc.).

Usage: This market survey will be published by NIJ to assist corrections agencies in their assessment of relevant information prior to making purchasing decisions.

Page 1646

Information Categories: Comments are invited with regard to the market survey, including which categories of information are appropriate for comparison, as well as promotional material (e.g., slick sheet) and print-quality photographs of the technology. At a minimum, the Center intends to include the following categories of information for each Contraband Detection technology that may be of use in corrections facilities:

  1. Vendor Information

    1. Name

    2. Address and phone number of corporate office

    3. Web site

    4. Years your company has been in business

    5. Number and types of customers (e.g., state, local, or federal corrections)

    6. Location where technology is manufactured, assembled, or refurbished

  2. Product Information--Person-Borne Contraband Detection

    1. Name and model number

    2. Primary purpose of product

    3. Physical dimensions (height x width x depth, in inches) of device

    4. Operational dimensions (i.e., limitations to the detection area)

    5. Weight (in pounds and ounces) of device

    6. Portability (e.g., fixed, portable, or handheld)

    7. Intended environment (e.g., indoor use only? Indoor/outdoor use?)

    8. Operating conditions or limitations (e.g., temperature, humidity, etc.)

    9. Ability of the system/device to detect metal objects

    10. Types of metals that are detected by the system

      ii. Types of metals that are not detected by the system

    11. Ability of the system/device to detect non-metal objects

    12. Types of non-metal materials that can be detected by the system/device (e.g., liquids, gels, plastic, wood, ceramic, powder, paper, currency, etc.)

    13. Ability of the system/device to detect objects concealed within a body cavity

    14. Types of body cavities that are covered by the system/device

    15. Ability of the system/device to detect other types of contraband and related material not specifically listed here (i.e., potential next generation contraband detection)

    16. Modes of operation (e.g., settings for detecting different materials)

    17. Number of detection areas (e.g., ability to simultaneous detect threats)

    18. Type of detector used (e.g., transmission x-ray, active millimeter wave, pulse induction detector, continuous wave detector, passive, etc.)

    19. Minimum size of objects that can be detected (length x width x height in inches, or weight in pounds and ounces)

    20. On a person

      ii. Concealed within body cavities

    21. Total inspection time per individual screened with the system/

      device (seconds/person)

    22. Penetration depth of the system/device's scan when used on a clothed person (in inches)

    23. Alert/alarm mechanism (e.g., alarm only, body location alarm, anomaly image, body region image, full body image, etc.)

    24. Average time (in seconds) to process/generate an alarm

    25. Privacy safeguards or features (e.g., remote viewing, body masking)

    26. Number of recommended operators

    27. Safeguards for cyber security, unintentional disassembly, jamming, or intentional damage

    28. Sturdiness/fragility of the technology material

    29. Ability for easy storage when not in use

    30. Data management with respect to saving, archiving, retrieving, and printing subject scan information

      aa. Onboard memory storage (e.g., quantity of data that can be stored on device in number of files/alerts/days activity)

      bb. Power requirements (e.g., 120 volts)

      cc. Battery discharge time (hours of continuous operation before needing a charge), if applicable

      dd. Battery shelf life (in months), if applicable

      ee. Battery recharge time (hours required to fully charge battery after complete discharge), if applicable

      ff. Battery replacement procedure and where it must be done (e.g., field or factory), if applicable

      gg. Availability of supplemental charger for emergency battery charging (e.g., hand crank, backup battery, solar, etc.), if applicable

      hh. Regulatory and Compliance safety requirements (e.g., FCC approved) and/or NIJ Compliance (e.g., NIJ Standard 0602.02, and 0601.02)

      ii. Radiation safety standards (e.g., ANSI, ICRP, NCRP, EURATOM, etc.), if applicable

      jj. Length of warranty (in months) that comes standard with the system/device and the components that are covered

      kk. Auxiliary equipment (e.g., car chargers, emergency chargers, etc.)

      ll. Manufacturer suggested retail price (MSRP) without optional features, accessories or service plans

      mm. Availability of extended maintenance plans

      nn. Service contract costs

      oo. Other information or notes that are relevant to the system/

      device

  3. Product Information--Vehicle-Borne Contraband Detection

    1. Name and model number

    2. Primary purpose of product

    3. Physical dimensions (height x width x depth, in inches) of device

    4. Operational dimensions (i.e., limitations to the detection area)

    5. Weight (in pounds and ounces) of device

    6. Portability (e.g., fixed, portable, or handheld)

    7. Operating conditions or limitations (e.g., temperature, humidity, etc.)

    8. Ability of the system/device to detect explosives, firearms, or other weapons

    9. Ability of the system/device to detect narcotics, alcohol, or other chemicals

    10. Ability of the system/device to detect people or animals

    11. Ability of the system/device to detect other types of contraband and related material not specifically listed here (i.e., potential next generation contraband detection)

    12. Modes of operation (e.g., settings for detecting different materials)

    13. Number of detection areas (e.g., ability to simultaneous detect threats)

    14. Type of detector used (e.g., transmission x-ray, active millimeter wave, pulse induction detector, continuous wave detector, passive, etc.)

    15. Minimum size of objects that can be detected (length x width x height in inches, or weight in pounds and ounces) in and underneath a vehicle

    16. Total inspection time per vehicle screened with the system/device (seconds/vehicle)

    17. Alert/alarm mechanism (e.g., alarm only, vehicle location alarm, anomaly image, vehicle region image, full vehicular image, etc.)

    18. Average time (in seconds) to process/generate an alarm

    19. Number of recommended operators

    20. Safeguards for cyber security, unintentional disassembly, jamming, or intentional damage

    21. Sturdiness/fragility of the technology material

    22. Ability for easy storage when not in use

    23. Data management with respect to saving, archiving, retrieving, and printing vehicle scan information

    24. Onboard memory storage (e.g., quantity of data that can be stored on device in number of files/alerts/days activity)

    25. Power requirements (e.g., 120 volts)

    26. Battery discharge time (hours of continuous operation before needing a charge), if applicable

    aa. Battery shelf life (in months), if applicable

    bb. Battery recharge time (hours required to fully charge battery after complete discharge), if applicable

    cc. Battery replacement procedure and where it must be done (e.g., field or factory), if applicable

    dd. Availability of supplemental charger for emergency battery charging (e.g., hand crank, backup battery, solar, etc.), if applicable

    ee. Regulatory and Compliance safety requirements (e.g., FCC approved) and/or NIJ Compliance (e.g., NIJ Standard 0602.02, and 0601.02)

    ff. Radiation safety standards (e.g., ANSI, ICRP, NCRP, EURATOM, etc.), if applicable

    gg. Length of warranty (in months) that comes standard with the system/device and the components that are covered

    hh. Auxiliary equipment (e.g., emergency chargers, etc.)

    ii. Manufacturer suggested retail price (MSRP) without optional features, accessories or service plans

    jj. Availability of extended maintenance plans

    kk. Service contract costs

    ll. Other information or notes that are relevant to the system/

    device

    Page 1647

  4. Product Information--Environmental Contraband Detection

    1. Name and model number

    2. Primary purpose of product

    3. Physical dimensions (height x width x depth, in inches) of device

    4. Operational dimensions (i.e., limitations to the detection area)

    5. Weight (in pounds and ounces) of device

    6. Portability (e.g., fixed, portable, or handheld)

    7. Operating conditions or limitations (e.g., temperature, humidity, etc.)

    8. Ability of the system/device to detect metal objects

    9. Types of metals that are detected by the system

      ii. Types of metals that are not detected by the system

    10. Ability of the system/device to detect non-metal objects

    11. Types of non-metal materials that can be detected by the system/device (e.g., liquids, gels, plastic, wood, ceramic, powder, paper, currency, etc.)

    12. Ability of the system/device to detect other types of contraband and related material not specifically listed here (i.e., potential next generation contraband detection)

    13. Modes of operation (e.g., settings for detecting different materials)

    14. Number of detection areas (e.g., ability to simultaneous detect threats)

    15. Type of detector used (e.g., transmission x-ray, active millimeter wave, pulse induction detector, continuous wave detector, passive, etc.)

    16. Minimum size of objects that can be detected (length x width x height in inches, or weight in pounds and ounces)

    17. Maximum size of objects that can be detected (length x width x height in inches, or weight in pounds and ounces)

    18. Alert/alarm mechanism (e.g., alarm only, anomaly image, full picture image, etc.)

    19. Average time (in seconds) to process/generate an alarm

    20. Number of recommended operators

    21. Safeguards for cyber security, unintentional disassembly, jamming, or intentional damage

    22. Sturdiness/fragility of the technology material

    23. Ability for easy storage when not in use

    24. Data management with respect to saving, archiving, retrieving, and printing scan information

    25. Onboard memory storage (e.g., quantity of data that can be stored on device in number of files/alerts/days activity)

    26. Power requirements (e.g., 120 volts)

    27. Battery discharge time (hours of continuous operation before needing a charge), if applicable

    28. Battery shelf life (in months), if applicable

      aa. Battery recharge time (hours required to fully charge battery after complete discharge), if applicable

      bb. Battery replacement procedure and where it must be done (e.g., field or factory), if applicable

      cc. Availability of supplemental charger for emergency battery charging (e.g., hand crank, backup battery, solar, etc.), if applicable

      dd. Regulatory and Compliance safety requirements (e.g., FCC approved) and/or NIJ Compliance (e.g., NIJ Standard 0602.02, and 0601.02)

      ee. Radiation safety standards (e.g., ANSI, ICRP, NCRP, EURATOM, etc.), if applicable

      ff. Length of warranty (in months) that comes standard with the system/device and the components that are covered

      gg. Auxiliary equipment (e.g., car chargers, emergency chargers, etc.)

      hh. Manufacturer suggested retail price (MSRP) without optional features, accessories or service plans

      ii. Availability of extended maintenance plans

      jj. Service contract costs

      kk. Other information or notes that are relevant to the system/

      device

  5. Usability/Training

    1. Types of processes used to ensure usability of hardware and software products (e.g., requirements gathering, observation, task analysis, interaction design, usability testing, ergonomics, etc.)

    2. Types of data gathered from the user community (e.g., interviews, observations during hands-on training, survey, satisfaction surveys, repeat customers, etc.) to evaluate your products, and how often it is collected

    3. Types of user-group meetings and frequency of their occurrence

    4. Categories of problems reported to vendor and percentage of user community that experienced them within the last three (3) years

    5. Resolution(s) to the problems identified above

    6. Hours of technology support and location (e.g., telephone or at agency)

    7. Calibration requirements (e.g., cost, methodology, hours required)

    8. Hours and type of training provided (e.g., on-site, web-based, pre-recorded, play environment etc.)

  6. Features and Functions

    1. Types of reports that are available (e.g., standard information examples, extent that reports are customizable, etc.)

    2. Types of on-demand custom reports

  7. Performance and Security

    1. Average time to install and activate device (in minutes, hours, or days)

    2. False positive (alert generated when it should not have been) and false negative (alert was not generated when it should have been) rates

    3. Mean time to failure

    4. Percent availability versus downtime of the device

    5. Data protection mechanism while in transit and during storage (e.g., SSL, encryption, password strength, etc.)

    6. Types of database change record maintenance practices for historical data

    Nancy Rodriguez,

    Director, National Institute of Justice.

    FR Doc. 2016-00503 Filed 1-12-16; 8:45 am

    BILLING CODE 4410-18-P

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT