Tsa Procurement Specification for Body X-rays 2008
Download original document:
Document text
Document text
This text is machine-read, and may contain errors. Check the original document to verify accuracy.
SENSITIVE SECURITY INFORMATION TRANSPORTATION SECURITY ADMINISTRATION OFFICE OF SECURITY TECHNOLOGY SYSTEM PLANNING AND EVALUATION PROCUREMENT SPECIFICATION FOR WHOLE BODY IMAGER DEVICES FOR CHECKPOINT OPERATIONS u.s. Department of Homeland Security Transportation Security Administration 601 South 12th Street Arlington, VA 22202-4220 23 September 2008 FINAL, Version 1.02 u.s Department ofHomeland Security Transportation Security Administration Prepared By: TSA Office of Security Technology WARNING: This re~ord contains Sensitive '. nff.lrmation that is controlled under 49 C.l!"R parts 15 and 1520. No part of this record may be disclosed to PCl"$(>US without II "need to ., defined in 49 CFR parts 15 and 1520, except with the written . r the Secretary of Transportation. Un:lUthorized plIrmission of the Administrator of the Transportation Security Admillls relea,e may result in dvil penalty Qr "ther action. F". U.S. gove"nment .. g~ncles, pub"" e iii governed by;; U.S.C. 552 and 49 CFR parts 15 and 1520. SENSITIYE SECURITY INFORMATION I 1. Report No. DHS/TSNOSTIENGIWBI-OOI Technical Report Doenmentation Pa!!e 2. Government Accession No. 3. RecipicQ.t's Catalog No. N/A N/A 4. Title and Subtitle 5. Report Date Procurement Specification for Whole Body Imager Devices for Checkpoint Operations 6. PerformIng Organization Code i. Author 8. Performing Organization Report No. Office of Security Technology System Planning and Evaluation Group DHS/TSNOST/ENG/WBI-OOI 23 Seotember 2008 TSA-16 9. Performing Or~anizationName and Address 10. Work Unlt No. (TRAIS) Transportation Security Administration Om.e of Security Technology System Planning and Evaluation h 601 Soutlllt Street Arlinl/ton, VA 22202 N/A 11. Cnntl'act Or Grant No. NlA 12. Sponsoring Agent)' Name and Address 13. T;ype of R<;lport and Period Co"'cred N/A FINAL 14. Sponsoring Agency Code DHS/TSNOSTiENGI 15. Supplementary Notes N/A 16. ,Abstract This Procurement Speci1Ication establisht:s the technical requirements for the Vv'ho1e Body I:rnager hereinafter referred to as the vrm. Whole Body Imaging (WBI) systems ate passenger screening technologies which use imaging technology such as backscatter XMray (BS) or millimeterwav~ nvrM'W,) to detect tJotential threat:> \hat may be hidden on a nassengcr Qr within their clvtlul1l2' 17. Key Words 18. Distribution Statement This record contains Sensitive S~urity Information that is conttol1r;::d undt:t" 49 CFR parts 15 and 1520, No part of this record:may be disclosed to persons without a "need to know", it;; defined in 49 CFRparts 15 and 1520, except with the "'tritten permission of the Administrator of the Transportation Security Administration or the Secretary of Transportation. Unauthorized release may result in civil penalty or other action. For U,S. government agencies, public disclosu.re is £!overned bv 5 U.S.c. 552 and 49 CFR l~arts 15 and 1520. 19. SecUrity ClassiC. (of tbis report) 20. Securit}' Cla8sif. (ofthis page) 22. Price ~~ No. QrPagcs Unclassified I I Unclassified I Renroduction of comnleted naOI:! authorized WARNING: This record contains e ,. eeur-it)' Information that is controlled under 49 CFR parts 15 and 152(). No part of this record mny be dis,.::losed to p"rsons without a "0 w H , as defined in 49 CFR parts 15 and 1520, except with the written permissioD of the Administrator of the TranspormtioD Secoril)· .. atlon or the Secretary hf Transportation. {)nauthonzed release may result in civil penalty or other action. For l,;o$. g<Jvernment agencies., ',closure is governed by 5 U.S.c. 552 llnd 49 CFR parts 15 nnd 1520. ii SENSITIVE SECUftlnl' INFORMATION DOCUMENT CHANGE HISTORY {b6 Version 0.01 Description - Author Initial Dr J Date 2/26/07 0.02 3/7/08 0.03 3/10/08 0.04 3/12/08 0.05 3/14/08 0.06 3/28/08 0.07 4/14/08 0.08 4/21/08 0.09 5/12/08 0.10 Comments Draft 5/15/08 0.11 5/22/08 0.12 Updated detection requirements 6/10/08 0.13 Industry Comment Update 7/2/08 0.14 OSO comments update 8/14/08 0.15 Engineer team review 8/29/08 0.16 Formatting updates and detection requirement update 9/4/08 Finalized release 9/5/08 1.00 TTTT• • • • • TTTTTT• • • • • • • • 1.01 Updated RMA Section 9/22/08 1.02 Multiplexing requirement update/updated release 9/23/08 ,YAR'lING: This record Mntains Sens i . Information that Is controUed under 49 CFR parts 15 and 1520. No part of tbls record may be disclosed to persons with()ut a "nee ." lIS defined in 49 eFR parts IS and 1520, except with the written permission of the Administrator of the Transportation Security tion or the $ec:fetary of Transportation. U~authorized l'01e3$e rna)' result in civil pl1:11ally or other adion. For If.S. g<)vcl;'nment agencies, . disclosure is governed by 5 U.S.c. 552 and 49 CFR parts lSand 1520. iii -sENSITIVE SECtfRlTY INF'ORMA'I'ION NOTICE This document is disseminated under the sponsorship of the U.S. Department of Homeland Security in the interest of infonnation exchange. The United States Government assumes no liability for the contents or use thereof. The United States Government does not endorse products or manufacturers. Trade or manufacturer1s names appear herein solely because they are considered essential to the objective of this report. This document does not constitute Transportation Security Administration certification policy. ---- WARNING: This record cont;dQs Sensitive . Information thllt Is controlled under 49 CFR parts 15 and 152U, No part of this r~cord may be disclosed to persons without a "need 0 ." as defined in 49 eFR parts 15 and 1520, except with the wl'itten permission of the Administrat<>r of the Transportation Security A ' . ation or the Secretary of TrllDsportation. Unauthorized relellse may Nsult in ~Ivil p~l1l11ty or oth"r action, For U.S. gov"rnment ~g.meies, . isclosure i~ governed by 5 U.S.c. 552 and 49 eFR parts 15 and 1520. iv SENSITIVE SECURITY INFORMATION TABLE OF CONTENTS 1.0 INTRODUCTION 1 1.1 1 1 1 1 1.4 BACKGROUND SCOPE SYSTEM DESCRIPTION Major Components DEFJNITIONS 2.0 APPLICABLE DOCUMENTS 2 2.1 2.2 2.4 GENERAL GOVERNMENT DOCUMENTS NON-GOVERNMENT DOCUMENTS ORDER OF PRECEDENCE 2 2 2 3 3.0 REqUIREMENTS 4 1.2 1.3 1.3.1 2.3 1 TIER I REQUIREMENTS System....................................................................................... Eleetrical 3.1.3 Physical 3.1.4 Identification Markings 3.1.5 Environmental............................................................................. 3.1.6 Electromagnetic Compatibility 3.1.7 Human Factors 3.1.8 Regulatory 3.1.9 Reliability, Maintainability, and Availability 3.1.10 Safety 3.1.11 Security TIER II REQUIREMENTS 3.2 3.2.1 System 3.3 TIER III REQUIREMENTS 3.3.1 System OPTIONAL CAPABILITIES 3.4 3.4.1 Automated Threat Detection Marking 3.1 3.1.1 3.1.2 4 4 10 1I 11 11 12 13 14 14 16 17 17 17 18 18 18 18 . . 4.0 VERIFICATION 19 4.1 4.1.1 4.1.2 4.1.3 4.1.4 4.1.5 4.1.6 TEST AND EVALUATION Developmental Test and Evaluation (DT&E) Qualification Testing Operational Test and Evaluation (OT&E) First Article Test and Evaluation (F AT&E) Factory Acceptanee Test (FAT) Site Aeeeptance Test (SAT) 19 19 19 19 19 19 19 4.1.7 Continuous Assessment __ ,............................ .. ~" " " 20 \VA.Rl'\'ING: This record conta.ins Sensitive Security Information that is l;ontrolle del' 49 CFR parts 15 and 1520. No part of this record may be dh:dQ$l;!d to persons without :a "need to know", liS defin 49 CFR parts 15 and 1520, except with the written permission of the Adroinistrator of the Transportation Security A istration or the Secretary (If Transportation. Unauthorized nment llgendes, public disclosure is governed by S IT.S.c. 552 nnd 49 release IDay re:sult in civil penalt)" or other al'.:tion. FM U.S. CFR parts 15 and 1520. v SENSIlIVE SECURITY INF'ORMATION 4.2 4.2.1 4.2.2 4.2.3 4.2.4 4.3 VERiFICATION METHODS Analysis Demonstration Inspection Tcs!.. VERiFICATION REQUIREMENTS TRACEABILITY MATRiX 20 20 20 21 21 21 5.0 ACRONyMS 33 APPENDIX A TECHNOLOGY SECURITY REQUIREMENTS 1 A.I A.2 A.3 A.4 A5 A.6 2 2 2 2 3 4 INTRODUCTION SCOPE VENDOR REQUIREMENTS REFERENCES OS HARDENING/SECURITY REQUIREMENTS SYSTEMS IT SECURiTY REQUIREMENTS APPENDIX B FIELD DATA REPORTING SYSTEM REQUIREMENTS 1 APPENDIX C USER ACCESS LEVELS AND CAPABILITIES 1 APPENDIX D TSA OPERATIONAL POWER REQUIREMENTS 1 1.0 Introduction 1 2.0 Overview 1 3.0 Equipment 1 4.0 Measurement 1 5.0 Power Performance Data Acquisition and Requirements Analysis 1 5.1 5.2 5.3 5,4 5.5 5.6 5.7 BASELINE VOLTAGE AND CURRENT DISTORTION . POWER USAGE PROFILE AND POWER FACTOR : MAXIMUM INRUSH CURRENT RATIO STEADY STATE CURRENT UNBALANCE MAXIMUM LEAKAGE CURRENT VOLTAGE SAG AND INTERRUPTION WITHSTAND PERFORMANCE.. UNINTERRUPTIBLE POWER SUPPLY 1 2 2 2 3 3 4 APPENDIX E WBI REPORTS 5 1.0 5 FDRS Report Display vi SENSlllvE SECURIlY INFORMATION 1.0 INTRODUCTION 1.1 BACKGROUND The Department ofHome1and Security (DHS), Transportation Security Administration (TSA), presents the Whole Body Imager (WBI) as a new device that is intended to be used to screen passengers. SCOPE 1.2 This specification establishes the performance, design, and verification requirements for the WBI systems. 1.3 SYSTEM DESCRIPTION WBI systems are passenger screening technologies which use imaging technology to detect anomalies on a passenger's body or within their clothing. The mission of the WBI is to effectively SCreen passengers at airport checkpoints, while preserving the privacy of passengers. The requirements within this Procurement Specification have been broken into a tiered system. The vendor has the choice to meet the requirements of different tiers: Tier I encompasses the core requirements that must be met; Tiers II and III describe stepped requirements that may be met. A higher level system must meet all the requirements of the tier below it: for example, a Tier III system must meet all Tier I, Tier II, and Tier III requirements. Requirements are denoted by the use of a bold, italic, shall. 1.3.1 Major Components WBI systems consist of the following 11l4ior components: • Scanner • Image Operator Station • Screening Operator Station 1.4 DEFINITIONS Anomaly Downloading Image Operator (10) Screening Opcrator (SO) Shall Transportation Security Officer (TSO) Unloading WBI System Any undivested Ol1iects includilw explosives weapons and liquids. Retrieving data or information from the WBI either locally or remotely. The TSO responsible for reviewing the images and communicating to the SO the alarm status for each passenger. The TSO responsible for scanning and managing each passenger during the WBI screening process. Bolded, italicized "shalls" are requirements that the vendors' submitted WBI must meet in accordance with the tier svstem. Formerly known as Screeners or Operators, TSOs are the TSA personnel who operate the airport security checkpoint and conduct security screenin o of all persons and obiects entering the secure area. Loading data or information into the WBI either locally or remotelY. The combined performance of the WBI including the operator in the 1000. WARNING: This reeord cont:UllS 'ecurity Information that is controJled under 49 CFR parts 15 and 1520. No part of this reeCJl'd may be disdOl:ed to. persons without l\ ;'ne ." as defined in 49 CFR parts 15 llnd 1520. except with the written permission of the Administrator of the Transportation Security A . n or the Secretary of Transportation. Unauthodzed rcl~ase may result in civil penalty or other action. For U.S. government agencies, pu CFR parts 15 and 1520. I e is governed by 5 U.S.C. 552 and 49 SENSIIlvE SECURII y INFORlVIA'l'ION 2.0 APPLICABLE DOCUMENTS 2.1 GENERAL The documents listed in this section are referenced in this specification. While every eHbrt has been made to ensure the completeness ofthis list, document users are cautioned that they must meet all requirements of this specification, whether or not the applicable references are listed. The following specifications, standards, handbooks, documcnts, and drawings of the exact revisions listed below form a part of this specification to the extent noted herein. 2.2 GOVERNMENT DOCUMENTS 5 USC 552 29 CFR 1910.7 29 CFR 1910.1096 29 CFR 1910.1200 47 CFR 15 49 CFR 15 49 CFR 1520 49 CFR 1544.403 49 CFR 1544.405 DOTfFAAJCT-03/05 FIPS 197 2.3 Freedom of Information Act 1996 Occupational Health and Safety Administration (OSHA): Occupational Safety and Health Standards; Definition and Requirements for a Nationally Recognized Testing Laboratory, I January 2007 OSHA: Occupational Safety and Health Standards; Ionizing Radiation, I Januarv 2007 OSHA: Occupational Safety and Health Standards; Toxic and Hazardous Substances: Hazard Communication, I January 2007 Federal Communications Commission (FCC); Radio Frequency Devices I October 2007 Transportation: Protection of Sensitive Security Infonnation, I Octobcr 2007 Transportation Security Administration (TSA); Protection of Sensitive Security Information 1 October 2006 TSA; Airport Operator Security: Air Carriers and Commercial Operators: Current Screeners, I October 2006 TSA; Airport Operator Security: Air Carriers and Commercial Operators: New Screeners: Qualifications of New Screening Personnel, I October 2006 Human Factors Design Standard for Acquisition of Commercial Off-theShelf, Non-developmental and Developmental Systems (2003). Federal Information Processing Standard (FIPS) 197 Advanced Encrvption Standard CAES) TSA Security Technology Integrated Program (STIP) Business Rules Document (BRO), 13Alj@st2007 TSA Security Technology Integrated Program (STIP) Transportation Security Equipment (TSE), Interface Requirements Document (lRO), Version 3.11, 14 April 2008 TSA WBI Classified Detection Appendix, Version 2.0, September 23, 2008 NON-GOVERNMENT DOCUMENTS ANSI C63.16-1993 ANSIIHPS N43.l7-2002 Discharge Test Methodologies and Criteria for Electronic Equipment (1993) American National Standard "Radiation Safety for Personnel Security Screening Svstems Usin<> X-rav." \VARNING: This record contains Sens i . Information that is controlled "odeI' 49 CFR parts 15 and 152(). NQ part of tbis record mil}" be diselo.<;ed to pe-rsonlO without :a "nee II as def'th.Qd in 49 CFR parts 1S: and IS20. cx<:~pt with the written permission of the Administrator of the Transportation Sccurit)' Adml . or the Secretary of Transportation. Unauthorized release rnSl)' rostdt in eivil penalty or other a~tioD. For U.S. government agendu, pub c is governed by 5 IT.S.C. 552 and 49 CFR parts 15 and 1520. 2 SENSITIVE SECURITY INFORMA.TION EN 55022 IEC 60068-2-64 lEe 61000-4-3 IEC 61000-4-4 IEC 61000-4-5 IEC 61000-4-6 IEC 61000-4-8 IEC 61000-4-11 IEC 61000-6-3 IEEE C95.l-2005 UL310 UL 61010-1 UL 61010A-1 2.4 Limits and Methods of Measurement of Radio Disturbance Characteristics of Information Teehnology Equipment (Radiated Radio Freauencv!RF) Emissions). Environmental Testing, Part 2: Test Methods - Test Fh: Vibration, Broad-band Random (Di!!ital Control) and Guidance, 28 May 1993 Testing and Measurement Techniques. Radiated, radio frequency, electromametic field immunity test. Testing and Measurement Techniques. Electrical fast transientlburst immunity tes t Testin" and Measurement Techniques. Surrye immunity test Testing and Measurement Techniques. Immunity to conducted dishlrbances, induced bv radio-frequencv fields. Testing and Measurement Techniques. Power frequency magnetic field immunity test. Testin(! and Measurement Techniaues. Volta!!e dios and interruotions. Electromagnetic Compatibility (EMC). Generic Standards. Emission Standard for Residential, Commercial, and Light-industrial Environments, 17 Julv 2006 Safety Leyels with Respect to Human Exposure to Radio Frequency Electromagnetic Fields, 3 kHz to 300 GHz Standard for Electrical Quick Connect Terminals. 27 May 2003 Safety Requirements for Electrical Equipment for Measurement, Control, and Laboratory Use, Part 1: General Requirements, 12 July 2004 Electrical Equipment for Laboratory Use; Part 1: General Requirements, 30 January 2002 International Commission on Non-Ionizing Radiation Protection (ICNIRP) Guidelines for Limiting Exposure to Time-Varying Electric, Magnetic, and Electromagnetic Fields (up to 300 GHz). Health Physics 74 (4); 494-522' 1998 ORDER OF PRECEDENCE In the event of a conflict between the text ofthis document and the references cited herein, the text of this document takes precedence. Nothing in this document, however, supersedes national and state laws and regulations unless a specific exemption has been obtained. WARNING: This record contains Sensitive ormation that is controlled under 49 eFR parts 15 and 1520. No part of this ~eeol'd may be disclosed to PQl'SOlHl without It "need to krio, ned in 49 CFR varts 15 and 1520, except with the written permission of the Administrator of the Transportation Security Administru 0 eeretury of Transportation. Unauthorized release may result in chil penalt:f or other action. For U,S. govcnuu-ent agcndes, publl.c diselo$u cd bJ:5 U.S.C. 5:52 nnd 49 CFR parts 15 and 1520. SENSITIVE SECURiTY INFORMATION 3.0 REQUIREMENTS 3.1 TIER I REQUIREMENTS 3.1.1 System 3.1.1.1 Detection/Imaging 3.1.1.1.1 System Detection The Concept of Operations for the WBI system encompasses a scenario in which an Image Operator (10) reviews the WEI scanned image and determines if an anomaly is present. For this reason, detection performance for the "WBI system" refers to perfonnance corresponding to the overall performance of WBI imaging and the operator in the loop. The WBI shall (1) image passengers without requiring the removal of clothing beyond outerwear. Detection performance requirements are as follows: 3.1.1.1.1.1 Explosives 3.1.1.1.1.2 Weapons 14(ml The WB! System shall 3 of we a ons 3.1.1.1.1.3 Liquids Other Anomalies • .......... """"............... ~~~~~~~~ 3.1.1.1.2 _~~ ~~~~~B B~~~~n~~M~~~ ~~~~~ ~~ ~ Privacy TSA policy dictates that passenger privacy is maintained and protected during passenger screening. To ensure passenger privacy safeguards arc in place, WBI systems win prohibit the storage and exporting of passenger images during nonnal screening operations. When not being used for nonnal screening operations, the capability to capture images ofnon~passengers for training and evaluation purposes is needed. To ensure that image capturing maintains passenger privacy, the WEI will provide two distinct modes of operation: Screening Modo and Test Mode as defined in 3.1.1.3,1. During Screening Mode, the WEI shall (6) be prohibited from exporting passenger image data, including via STIP. During Test Mode, the WEI shall (7) not be capable of conducting passenger screening. The WBI shall (8) prohibit local storage of image data in all modes. The WBI shall (9) employ 256-bit encryption for image data in accordance with Federal Infonnation Processing Standard (FIPS) 197 Advanced Encryption Standard (AES). WA d contains Sensitiv<,l Secul'ity Infol'mlltilln tnat is controlled under 49 CFR parts 15 and 1520. No part of this A "need to know", ns defined in 49 CPR parts 15 and 15:20, 'lxcept with the written permission of the Administrator of the Transporm dministtatioD 01' the Se~remry of Transportation. Unauthorized release may result in civil penalty or other action. F<JI' U.S. !l<Jveromeot agen .closure I. governed by 5 {1.S.C. 552 and 49 CFR parts 15 and 1520. record may be disclosed to pe 4 SENSI fIVE SECURITY INFORMitTION The \VBI shall (10) provide image filters to protect the identity, modesty, and privacy of the passenger. Enabling and disabling of image filtering shall (11) be modifiable by users as defined in the User Access Levels and Capabilities appendix. The WBI shall (12) ensure that images viewed by the 10 are not viewable by the SO. The WBI shall (13) provide a means for passengers to maintain a line of sight to their divested carry-on items during the screening process. Throughput Rate I Capacity 3.1.1.2 The WEI shall (14) have an imaging time of no greater than 10 seconds. Imaging time is defined from when the scan is initiated until the image is ful1y projected onto the Image Operator Control Panel (IOCP). The WBI shall (15) be able to scan passengers with a height of up to at least 195 em. Passenger access to the WBI imaging area shall (16) be no less than 85 em wide. The WBI shall (17) require passengers to be no less than 8 em and no more than 120 em from the system in order to complete a scan. The imaging area of the WEI shall (U~) be dimensioned so that a person, as defmed above, is able to attain the required poses that the vendor deems necessary for optimal performance without bumping against any part of the system. 3.1.1.3 General System 3.1.1.3.1 Modes of Operation 3.1.1.3.1.1 Screening Mode The WBI shall (19) provide a Screening Mode. TheWBI Screening Mode shall (20) be the ~ormal mode of operation for screening passengers for anomalies. 3.1.1.3.1.1.1 Multiplexing The WBI system shall (21) provide a means to multiplex images, allowing up to 64 IOCPs to receive images from up to 64 \VBI systems utilizing the network requirements set forth in section 3.1.1.3.6. 3.1.1.3.1.2 Test Mode For purposes of testing, evaluation, and training development, the WBI shall (22) provide a Test Mode. The \VB! Test Mode shall (23) be the sale mode of operation permitting the exporting of image data. '\lBI Test Mode shall (24) be accessible as provided in the User Access Levels and Capabilities appendix. When in Test Mode, the WBI: • shall (25) allow exporting of image data in real-time; • shall (26) prohibit projection of an image to the IO station; • shall (27) provide a secure means for high-speed transfer of image data; • shall (28) allow exporting of image data (raw and reconstnwted)" WAR.!.'\ING: This record contains Sens curity Information that is contl'olled under 49 CFR parts 15 Jlnd 1520. No part of this re~ord may be disdo.cd to persons without 11 "ne " ow", as defined in 49 CFR part. 15 and 1520, except with the written . 'strlltion or the Secrlltary of TransportathlD. Unauthorized permission of the Administrator of the Transportation Security release may re~mlt in civil pellalt~" Or other action. For U.S. government ... gcni<ic~, 'I'><oI1:tli, eFR parts 15 and 1520. SENSITIVE SEetJItlT"t INPO~IATION 3.1.1.3.2 Start-Up and Power-Down The WBI SO station shall (29) have start-up and power-down procedures or functions at the Screening Operator Station (see Section 3.1" 1.4.1 below) that shall (30), upon completion of start-up, display a login window. The \VBI 10 station shall (31) display a login window upon completion of SO Station start-up. The WBI shall (32) provide messages to the SO and 10 that inform them of the system status. 3.1.1.3.2.1 Cold Start-up The WBI shall (33) complete cold start-up procedures in five (5) minutes or less from a powered off/shutdown mode. Powered off/shutdown mode is defined as a state in which a WBI has been turned off or shutdown, but is still connected to a power source. 3.1.1.3.2.2 Sleep/Standby The WEI shall (34) complete a Sleep/standby start-up procedure in three (3) minutes or less from sleep/standby mode. Sleep/standby mode is defined as a power conserving state in which a \VBl has been turned on but is not fully functional. 3.1.1.3.2.3 Login Process The WEI 10 station shall (35) require no more than thirty (30) seconds to complete the login process. The WBI SO station shall (36) require no more than thirty (30) seconds to complete the login process. The login process is defined as the time from when the TSO enters user infOlmation and password to the time the ISO is able to scan passengers. 3.1.1.3.2.4 Fault Reset The ViTBI shall (37) have a fault reset time, after the fault has been corrected, of no more than two (2) minutes from activation of the system fault reset to ready for operation. 3.1.1.3.2.5 Power~Down The \VEl shall (38) complete a power-down procedure in five (5) minutes or less. Power-down is defined as the transition from operational mode to shut-down mode. 3.1.1.3.3 Calibration If the WBI employs a technology that requires recalibration over time, the system shall (39) employ a calibration process that culminates in a visible notification to clearly indicate to the SO whether the WBI system is correctly calibrated and ready/not ready to scan a passenger. The calibration process shall (40) take place as necessary in order to keep the system accurate to its qualified detection tier. The WBI shall (41) provide a message indicating to the operator that re-calibration is necessary and shall (42) not allow passengers to be scanned by the system during the calibration process. 3.1.1.3.4 Emergency Stop The WBI shall (43) include a physical emergency stop (E-Stop) button with protective guards to prevent accidental initiation of an emergency stop. An E-Stop button shall (44) be located at the SOCP. When an E-Stop button is enabled anywhere on the system, the E-Stop location shall (45) be identified on the SO and 10 stations. Activation of the E-Stop button shall (46) render the WBI incapable of scanning passengers. WAR.'1ING: This record contains Sllnsitivll Sllcurity Information that is contl'olllld under 49 CF s 15 and 1520. No part of this rQcord may be dl.c1o~ed to persons wlth,')tit a "nj>ed to now", as ,lefined In 49 CF • Hi and 1520, except witb the written permission of the Administrator of the Transportation Security Admlnistra the Secretary of Transportation. Unauthorized release way result in civil penalty Or other action. For U.S. govcrnm cndes, public disclosure is governed by 5 CS.C. 552 pnd 49 CFR parts 15 and 1520. 6 SENSITIVE SECURIT'l INfilOR1ffATION 3.1.1.3.5 Lock Down The WBI system shall (47) have a lock-down mode so that when activated by the SO: (a) No portion of the system shall (48) move under power. (b) System shall (49) not allow any passengers to be screened. (c) System shall (50) not emit scanning source radiation (d) System shall (51) not disable the display nlonitor or any means of two-way communication. 3.1.1.3.6 Network Interface The WBI system: (a) Shall (52) possess an Ethernet network interface equipped with an RJ-45 connector. (b) Shall (53) support fullJhalf duplex data rates of 10/100 mega-bits per second to support future requirements. (c) Shall (54) support Transmission Control Protocol/Internet Protocol (TCP/IP). 3.1.1.3.7 External Interface 3.1.1.3.7.1 SliP Interface The VlBI shall (55) meet the requirements specified in the Security Technology Integrated Program (STIP) Transportation Security Equipment (TSE), Interface Requirements Docwnent (IRD), Version 3.11, 14 April 2008 and STIP Business Rules Document (BRD), 13 August 2007. The \VBI shall (56) comply with the levels ofacccss control as defined in the User Access Levels and Capabilities appendix. 3.1.1.4 Operator Stations 3.1.1.4.1 Screening Operator Station (SO Station) The SO station: (a) shall (57) not interfere with the TSO's visual contact with passengers and their belongings, nor should it impact a TSO's ability to view the front and back end of the unit. (h) shall (58) have an activation button to initiate a scan. The activation button, if tethered to the device, shall (59) provide a minimum of 3 meters of cable length so that the cord does not interfere with the operator's activities. (c) shall (60) provide a hard-wired, secure means of communication between 10 and SO. An audible means shall (61) be provided to communicate anomaly presence and location. A visual indicator shall (62) provide the SO with notification regarding passenger status. A green status indicator shall (63) he used to denote when passenger is cleared. A red status indicator shall (64) be used to denote when passenger requires secondary screening. The SO shall (65) be provided a means to reset the status indicator. This 10/SO communication shall (66) not be discernible by others. 3.1.1.4.2 Image Operator Station (10 Station) The \VEl 10 station shall (67) include an Image Operator Control Panel (IOCP), which consists of the IO console and any other necessary input devices. WARNING: d contains Sensitive Security InforDlation that is contl'olled under 49 CFR p:uts 15 and 1520. No part of tbis record may be disclosed to without a «u"",d to know", as defined in 49 CFR p3l"h 15 and 1520, except with the written permission of the Administratol" of the r don Security Administration Qr the Secretary of Transportation. Unauthorized release may result in civil p,-,nalty or other action. }'(W Illcn! agencies, public diselosurll is governed by S {f.S.C. 552 and 49 em part& 15 and ]520. 7 SENSITIVE SECURITY INFQRJVlATION The 10 station shall (68) be operable at a distance up to 100m from the WEI system. 3.1.1.4.2.1 loep The IOep: (a) shall (69) pennit only authorized users to log on to the system. (b) shall (70) provide a means to indicate clear or suspect status of a passenger. (c) shall (71) provide all controls required for the 10 to view images. (d) shall (72) provide image enhancement tools to have, at a minimum, the following image processing capabilities, each selectable by a single keystroke to support image review: (i) Reverse image contrast from full negative to full positive (ii) Zoom from IX to 4X 3.1.1.4.2.2 loep Display Monitor The IOCP shall (73) include one or more flat panel color displays each measuring a minimum of 17 inches diagonally. Mounting for the flat panel displays shall (74) allow the display(s) to be placed directly in front ofthe user when the user is in his or her nonnal working position. The monitors shall (75) be adjustable so that the centers of the monitors range from 110 em La 160 em from the surface on which the operator is standing. These values are based on a seat height of 60 em and a viewing angle of 65 em. Note that the required monitor heights can vary as a function ofseat height and viewing distance. A summary oftbe eye height, viewing distance, and viewing angle variables used in determining momtar height are provided in the figure below, Viewing Distance xin. Eye Height 69.0 in. Eye Height 30.0 in. WAR.I'JING: This record conia 5th pe rcenti Ie 95th percentile seated female standing male a:: 20 max. .= 0 Center of monitor lIsltlve SecUflt)' Information that is controlled under 49 eFR parts 15 a.nd 1520. No part of this ..ecl)rd Illa)' be d,.clMed II) p,,"on, Wl "need to know", a, defined in 49 CFR parts 15 and H20, .,,,cept with tho> written permission of the Administrator of the Trallspo Seem'it)' Administration or the Secretary of Trllnsportation. Unauthorized release may ",sult in civil penalty or other action. For U.S. CFR parts 15 and 1520. rnCQt 8 "g~llcie., public disclosure III governed by 5 U.S.C. 552 and 49 SENSITIVE SECURITY INFOR~IA'fION 3.1.1.4.2.3 Display Monitor Mounting ros The height and location of the IOCP, monitors, seat, and other controls with which will interface must be considered together, as they will comprise a single workstation from which the TSOs will perform their screening tasks. The monitors and IOCP shall (76) be easily accessible (visually or physically, as appropriate) from both a standing and seated position within the workstation. The display monitor mounting method: (a) shall (77) allow operators to adjust height, tilt, and viewing angle without requiring the use of tools. (b) shall (78) allow for continuous adjustment or in increments of no more than 25 mm (c) shall (79) enable adjustments to be accomplished by a single individual (d) shall (80) be adjustable to allow a viewing distance from the eye to the display that is not less than 330mm. (e) shall (81) be adjustable so that the line of sight from viewer eye level to the center of the screen is beh:veen 10° and 20° below horizontaL (f) shall (82) have the capability to tilt displays up or down between _5° and +20°, in 5° increments or continuously. (g) sholl (83) be possible to swivel the display by a minimum of 20° to the left or right, in 5° increments or continuously, to accommodate for varying ambient lighting conditions (h) shall (84) allow the monitar(s) to be placed directly in front of the user when the user is in his or her Donnal working position, whether seated and standing. (i) shall (85) ensure that monitor positions are stable over time once a position has been set. There should be no sagging, drooping, tilting, etc. 3.1.1.4.2.4 Operator Display The monitor shall (86) display or indi~ate, at a minimum, the following: (a) Current operational state of the WBI system. (b) Present operational state of the scanner (c) Critical system parameters which state the operation of the scanner and the complete WBI. (d) Identification of the TO, (e) System error messages and diagnostic results. (f) WEI images. 3.1.1.4.2.4.1 Image Quality The images shall (87) have the resolution necessary for the TSO at the 10 station to visually identify any anomalies. The flat panel display shall (88) have a manufacturer's luminance rating ::::: 150 edlm2. WARNING: This re~ ontains S~nsitive Security Information that is contrQlled under 49 CFR paMs 15 lind 15l0. No paM of this reeord Dlay be disd".ed to p without II "nu..d to know", liS defined in 49 CFR parts 15 and 1520, except with the wri~J:l permission of the Administrator of the • ortation Securit)' Admiuish'ation Or the SecretaI')' of TranspoMation. Unauthorized release rna)' result in <:ivil peoalty or other aetion. CFR parts 15 and 1520. U.s. government agencies, publie disclosure is gQveJ:"oed by 5 U.S.C. 552 ond 49 SENlSI'l'IvE SECURITY INFORMATION 3.1.1.4.2.4.2 Jitter and Motion Artifacts The display monitor shall (89) exhibit no perceptible jitter or motion artifacts. 3.1.1.5 Field Data Reporting System The \VBI: (a) shall (90) ensure that all data recorded in the Field Data Reporting System (FDRS) is an accurate record oftbe events required to be recorded, as specified in Appendix:5, and that all data in each of the tables are captured and correlated throughout. (b) shall (91) collect FDRS data related to system events specifically defined for WBI in the Security Technology Integrated Program (STIP) Transportation Security Equipment (TSE) Interface Requirements Document, Version 3.11, 14 April 2008, Section 2.4.1. (c) shall (92) collect FDRS data as identified in Appendix B. (d) shall (93) display FDRS reports identified in Appendix E on the 10 monitor. (e) shall (94) provide User Access data according to the access levels defined in the User Access Levels and Capabilities appendix. (f) shall (95) make FDRS raw data available for downloading. (g) shall (96) make FDRS data reports available for downloading, (h) shall (97) provide internal storage so that data elements (as defmed in Appendix B) are stored for a minimum of one (1) year without being overwritten. 3.1.1.5.1 Data Storagerrransfer The WBI system shall (98) provide capabilities for data transfers via USB devices. These devices shall (99) provide connectivity to download FDRS data as described in 3.1.1 j and to uploadldmvnload a user database as defined in 3.1.11.2, A high capacity read/write drive shall (l00) be installed to pennit data uploads and downloads, All necessary softv/are drivers and operating system services to support the data collection devices shall (101) be preinstalled and preconfigured. 3.1.1.6 Operational Test Kit (OTK) The vendor shall (102) provide an OTK that wiIi validate the WBI is operating as required. 3.1.2 Electrical The \VBI: (a) shall (103) be capable of operating on commercially available 110 VAC, 220 VAC, or 480 VAC power at 60 Hz with a +/- 15% voltage tolerance and up to a +/- 10% variance in frequenoy, at no more than 20 amp service for 110 VAC, 10 amp for 220 VAC, or 5 amp for 480 VAC. (b) shall (104) route the power and data cables (if applieable) to floor level. (c) shall (l 05) meet the input power requirements defined in Appendix D, TSA Operational Power Requirements, 3.1.2.1 Uninterruptible Power Supply The WBI system shall (106) include an UninternIptible Power Supply (UPS) to ensure automatic, orderly, and safe shut-down ofWBI system equipment and to preserve data in the event ofloss of WARNING: rd contains Sensitive Security Information that is controlled under 49 eFR parts 15 and 1520. No part of this record may be disclosed ns with.,ut " "need to lmow"', 9S defined in 49 CFR parts 15 and 1520, except with the written permission of the Administrator of t S ortation Secudty Admilli~tratilJn or the Secretary of Tnm~portation. UDlluthonzed .S. goverllmellt agencies, public disclQsure is governed by ;; U.s.C. SS2 and 49 Telease may result in civil penalty I,Ir other acti.;m. CFR parts 15 and 1520. 10 SENSlIIvE SECORII i' INFORMAIION electrical power. The UPS shall (107) provide an indicator to the operator when running on UPS power and shall (108) provide an indicator to the operator when the UPS battery requires replacement. 3.1.3 Physical 3.1.3.1 Floor Loading The total floor loading of the WEI system shall (109) not exceed 416.04 kg/m2 (85 Ibs/ft') based on the actual foot print dimensions. The point load (concentrated load) shall (110) not exceed 453.59 kg over a 193.55 cm square (1,000 Ibs over a 30 in square) floor area. The vendor shall (111) indicate the number of support legs and pad size including the maximum actual load in pounds-per-square·in (psi) per leg. 3.1.3.2 Scanner 3.1.3.2.1 Footprint Thc WEI system footprint shall (112) be less than 4 square meters. 3.1.3.2.2 Orientation The WEI system shall (113) be configurable so that passengers may face left or right in relation to the entrance during scanning. 3.1.3.2.3 Height The WEI system height shall (1 14) be less than 3 m. 3.1.3.2.4 Width The \VBI system width shall (115) be no greater than 2.25 m. 3.1.4 Identification Markings 3.1.4.1 Identification Information The WEI system shall (116) identify the following information (which shall (117) is located to be readable without disassembly of any hardware): (a) Manufacturer name. (b) Model. (c) Unique serial number. 3.1.4.2 Permanency and Legibility Direct identification marking and identification plates, tags, or labels used shall (118) be as permanent as the life expectancy of the item and shall (119) be capable of withstanding the environmental tests and cleaning procedures specified for the item to which it is affixcd. Legibility shall (120) be understood to mean that which allows ready human or machine readability, as applicable. Information contained on identification plates shall (121) be displayed in a color that contrasts to the color of the surface of the plate. Identification tag marking, when used, shall (122) be permanent to the extent required for use of the item. The minimum text character height shall (123) be 2.54 mm (0.1 inch). 3.1.5 Environmental 3.1.5.1 Operational Environment The WEI shall (124) be capable of operating between 0° and 32° Celsius (32 0 and 89.6° Fahrenheit) and 10% to 80% relative non~condensinghumidity, without affecting: pcrfonnance. , " . This record contains Sensitive Seeuri(y Information tbat is record may be permission of IS th~ creon:!! without a "need to Imow", Administrator 0 AS co~trolled under 49 CFR parts 15 and 1520. No part of this defined in 49 CFR puts 15 nod 1520, ll'xcept with the Wl'ittl"h ansportation Security Administration or the Secretary of Transportation. Unauthorized release ma:y result in civil penalt)" or other action. overnment agencies) publk disdosure is g<Jverned by 5 U.s.C. 552 nnd 49 CFR parts 15 and 1520. 11 SENSI1TVE 8ECBRITY INFOltJ\1lA I'ION 3.1.5.2 Storage Environment The WBI system shall (125) be capable of storage between -7°C and 49 °C (19.4 of and 120.2 OF) and 10% to 98% relative, non-condensing humidity The WBI sholl (126) be capable of storage under these conditions for not less than 12 months, without resulting in any temporary or pennanent degradation of WEI performance or appearance. 3.1.5.3 Vibration Immunity System function degradation resulting from low-frequency (low frequency vibration will be defined from 0.1 to 30 hertz) vibration typically stemming from airport terminal sources (e,g., aircraft departures/landings, heavy foot traffic, electric carts, large heating, ventilation and air conditioning (HVAC) systems, subfloor bag conveyors, and outdoor truck traffic) shall (127) be prevented by compliance with IEC 60068·2-64, Environmental Testing. Part 2: Tests -- Test Fh: Vibration, Broadband Random and Guidance, or equivalent test type. 3.1.6 Electromagnetic Compatibility The WEI system: (a) shall (128) comply with ANSI C63.16-1993, Discharge Test Methodologies and Criteria for Electronic Equipment in the following aspects: (i) Section 9.4 Contact Discharge at 2 kV and 4 kV. (ii) Section 9.3 Air Discharge at 2 kV, 4 kV and 8 kV. (iii) Assuming 8 to 10 equipment discharge test points plus coupling planes, positive and negative discharge wavefonn polarities. (b) shall (129) comply with lEe 61000-4-3, Testing and Measurement Techniques. Radiated, radiofrequency, electromagnetic field immunity test in the following aspects: (i) 10 V/meter, 80 MHz to 1 GHz. (ii) Four sides of Equipment Under Test (EUT), 1% steps, 2.8 sec. dwell. .AM Mod., 80%, 1 kHz. (iii) Perfonnance Criteria A. (c) shall (130) comply with IEC 61 000-4~4, Testing and Measurement Techniques. Electricalfast transient/burst immunity test in the following aspects: (i) Alternating Current (Ae) and Direct Current (DC) power ports at O.5kV, lkV, and 2kY. (ii) Signal lines over 3 mat 0.25 kV, O.5kV and lkV. (iii) Performance Criteria B. Cd) shall (131) comply with LEC 61000-4-5 Testing and Measurement Techniques. Surge immunity test in the following aspects: (i) AC power port at 2kV line to earth, lkV line to line at 0,90 and 270 deg. (Ii) DC power ports at 0.5 kV line to earth, 0.5 kV line to line. (iii) Signal lines over 30 m at 1 kV line to earth. (iv) Positive and negative polarity, 5 surges per mode of appearance. (v) Perfonnance Criteria A. ow ARc'iING: This record contains Sensitive Security Information that is cnntrolled under 49 parts 15 and 1520. No part of this record may be disdosed to persons without a «need to know", as defined in 49 C llrts 15 llnd 1520, ""c"pt with th" written pcrmissian of the Administrator of tbe TransportatioD Security Administrll' 1)1' the Secretnry of Transportation. 'Unauthorized reI""•• may ...,sult in <:i,'ll penalty or other action. For U.S. gov"rnm eneies, public disclQsure i. governed by :; U.S.C. 55Z and 49 CFR parh 15 and 1520. 12 SEN8J:fI,rE SECURITY INFORl\ltA fION (e) shall (132) comply with IEe 61000-4-6, Testing and Measurement Techniques. Immunity to conducted disturbances, induced by radio1requency fields in the following aspects: (i) 10 Vnns, 150 kHz to 80 MHz. (ii) Power ports and signal lines over 3 In, 1% steps, 2.8 sec. dwell. (iii)Performance Criteria A. (f) ~'hull (133) comply with lEe 61000-4-8, Testing ~ind Measurement Techniques. Powerfrequency magnetic field immunity test in the following aspects: (i) 30 Aim, 50 or 60Hz. (ii) Performance Criteria A. (g) shall (134) comply with IEe 61000-4-11 Testing and Measurement Techniques. Voltage dips and interruptions in the following aspects: (i) 30% reduction for 0,5 periods (lO ms), Perfonnance Criteria B. (ij) 60% for 5 periods (100 ms), Performance Criteria C. (iii) 60% for 50 periods (1 sec), Perfonnance Criteria C. (iv) 95% for 250 periods (5 sec), Performance Criteria C 3.1.6.1 Personal Electronic Devices A Personal Electronic Device (PED) is defmed to include any PED, which in the user non-operational mode utilizes electl"Onic circuitry to maintain computer clock and data storage functions. An unpowered PED is defined to include any PED, including FLASH memory devices, which in the user nonoperational mode utilizes electronic circuitry to maintain computer clock and data storage functions. The WBI system vendor shall (135) provide a report indicating that the WBI system unit has, at a minimum, undergone testing in accordance with the European Committee for Electro-technical Standardization (CENELEC) Standard EN 55022, Limits and Methods of Measurement of Radio Disturbance Characteristics of Information Technology Equipment (Radiated RF Emissions), or equivalent test type. 3.1.7 Human Factors Note: Reference the human factors standards in DOTJFAAJCT-03/05 HF SID.OOl ~ Human Factors Design Standard: Acquisition of Commercial Off-the-SbelfSubsystems, Non-Developmental Items, and Developmental Systems (2003) for the following requirements. All \VBI components with a user interface: (a) shall (136) be operable by TSOs meeting personnel requirements specified in 49 Code of Federal Regulations (CFR) Parts 1544.403 and 1544.405 in terms of auditory and visual acuity, dexterity, English proficiency, and educational level (high school diploma, General Educational Development (QED), or a combination of education and experience). (b) shall (137) use a graphical user interface (QUI) that is viewable on the \VBl display monitor and controlled through the IOCP. (c) During utilization of the WEI: em WAR.'UNG: This record contains Sensitive Security Information t • controlilld under 49 parts 15 and 15l0. No part of this record may be disclosed to persons without a "need to , as defined in 49 (,}<'R parts 15 lind 1520. except with the written ecority Administration or tbe Secretary of Transportation. Unauthorized permission of the Administrator of tbe Transport relell'. rna)' result in civil penalt)· or other n. For U.S. government lIgendes, publi~ disclosul"e is governed hy 5 lUte. 552 lind 49 CFR parts 15 nod 1520. 13 -SENSITIVE SECURIT"'lINFORMA'I'ION (i) The system shall (138) take no more than one (1) second from the time that a soft key or icon is selected to the time the action is complete, or the operator receives feedback that the soft key or icon was successfully selected. (ii) Labels, icons, and colors shall (139) be used consistently across displays. (iii) Key strokes shall (140) not be buffered. (iv) The system shall (141) display a message or icon (such as an hourglass icon) to indicate when the system is busy processing an operator-initiated or machine-initiated command. (v) If the same function keys or icons are available on more than onc screen, then those functions shall (142) appear in the same location across screens. (vi) The system shall (143) indicate when a function or mode has been activated or deactivated on any screen or console. Functions are activated by command from the control panel. Modes are changed via menu selection. (vii) Function keys and icons shall (144) be assigned a single function to the maximum extent practicable. If an action requires the use of an embedded menu system or a multistep process, then there shall (145) be available at all times a menu selection, key, or icon that allows the operator to cancel the last action or return to the starting position. (viii) 3.1.7.1 Noise Audible noise levels produced by the WEI shall (146) not exceed a time*weighted average of 70 dBA within 1 m from the WBI system over a 5 minute period. 3.1.8 Regulatory 3.1.8.1 Electromagnetic Emission Safety The WEI systemshali (147) comply with lEC 61000-6-3, Electromagnetic Compatibility (EMC). Generic Standards: Emission Standard for Residential, Commercial, and Light~industrial Environments, 17 July 2006. 3.1.8.2 Emission Control All WBI System radio frequency emissions shall (148) comply with 47 CFR 15, Radio Frequency Devices. 3.1.9 Reliability, Maintainability, and Availability 3.1.9.1 Reliability The WBI system shall (149) be designed to meet a minimum of 1000 hours Mean Time Between Critical Failure (MTBCF) in an airport operational environment. This is calcuLated using a 16 hour duty day. A oritical failure means that the system cannot be used operational/y. A failure that prevents the equipment from performing its intended function is considered 8S a critical failure. A non-critical failure means that the system can still perform its intended function until the next scheduled maintenance interval. W.4.&'iIl"iG: This record contains Sensitive Security Information that is controlled un record may be dlscl"".d to persons without .. "Rood to know", CFR parts 15 and 1520. 14 d..fiRed In eFR parts 15 and 1520. 1"0 part of this FR part. 15 lind 1520, except with the written permission of the Administrator of tbe Transportation Security Admini. on or the Secretary of Transportation. Unauthorized release may result in civil penalty or other action. }'Qr U.s. govern agencle., publk di.c1o.ure is governed by 5l.:.S.C. 552 and 49 9S SENSITIVE SECURITY INFO:R1VIA'I'ION 3.1.9.2 Maintainability The WBI system shall (ISO) be designed to have a Mean Time To Repair (MTTR) of no! more than 4 hours_ MTTR is defined as follows: MTTR = Total Aetive Corrective Maintenance Time I Number of Maintenance Actions 3.1.9.2.1 Maintenance Access The WBI system shall (lSI) have a maintenance access capability that requires no more than 60.96cm (24in) of external clearance distance for perfonning scheduled or unscheduled maintenance actions. The maintenance doors shall (152) be either removable or sliding with a key lock and handles. 3.1.9.2.2 Scheduled (Preventive) Maintenance The WBI system shall (153) have a Mean Time Between Maintenance Action (MTBMA) for scheduled (preventive) maintenance of not less than seven (7) days. The maintenance manual shall (154) specify all scheduled maintenance activities and the intervals ofperformance. The WBI system shall (155) not require any custom tools for the performance of scheduled maintenance_ 3.1.9.2.3 Unscheduled (Corrective) Maintenance The WBI system: Shall (156) be modular in design to allow easy removal and replacement of failed Line Replaceable Units (LRUs). (a) Must provide Built In Testing (BIT) diagnostic capabilities that: (i) shall (157) initiate on power-up. (ii) shall (158) monitor system health in a non-interference (background) mode during normal operations. (iii) shall (159) capture and report error and failure codes to the FDRS. (b) Must provide Fault Isolation Test (FIT) diagnostic capabilities that: (i) shall (160) be manually initiated by the TSO as a result of BIT or other system-generated error. (ii) shall (161) identify the failed LRU with at least 90% accuracy. (iii)shall (162) be at least 98% accurate when isolating the failed component to one of three LRUs. (iv) shall (163) report the resultant error or failure codes to the user display and store the resultant error or failure codes on the system for later retrieval as part of the FDRS. 3.1.9.3 Availability The WBI system shall (164) demonstrate an inherent availability (Ail threshold of at least 99%. Availability shall (165) be computed as: Ai = [MTBF I (MTBF+MTTR)] *100% Where MTBF is the Mean Time between Failures and MTTR is the Mean Time to Repair. ----- MTBF = 1 I Failure rate WARNING: This record con iti'Vc Secnrit)' Information that is controlled under 49 CPR parts 15 and 1520. .1'\0 part of this record may be di~dosed to persons withou to know". lUI df'fined in 49 ern parts Hi llnd 1520, except with th", written pcrmiillion of the Administrator of the Transportation cc linistratia» or the Secretary of Transportation. Unauthorized release ma;y result in civil penalty or otber Rction. For U.S. g()vernment agen,,; ·c disclosure i$ gJ>vcrocd by 5l:.S.C. 552 and 49 CFR parts 15 and 1520. 15 SENSITIVE SECURITY INFORMATION Failure Rate - Nmnber of failures I Total Operating Hours 3.1.10 Safely 3.1.10.1 General The WEI shall (166) not expose operators, passengers, or maintenance personnel to hot surfaces over 43.9 degrees Celsius (Ill degrees Fahrenheit). 3.1.10.2 Radiation The WEI shall (167) comply with ANSIIHPS N43.17-2002 American National Standard - "Radiation Safety for Personnel Security Screening Systems Using X-ray." The WEI shall (168) comply with OSHA Standard, 29 CFR 1910.1096, Ionizing Radiation, I January 2007. The WEI shall (169) comply with Institute of Electrical and Electronics Engineers (IEEE), C95.1 - 2005, Safety Levels with Respect to Human Exposure to Radio Frequency Electromagnetic Fields, 3 kHz to 300 GHz, revision ofC95.l-1991 (Active). The WEI shall (170) comply with International Commission on Non-Ionizing Radiation Protection (ICNIRP), Guidelines for Limiting Exposure to Time-Varying Electric, Magnetic, and Electromagnetic Fields (Up to 300 GHz). Health Physics 74 (4): 494-522, April 1988. 3.1.10.3 Electrical Safety The WEI: (a) shall (l7l) comply with UL 61010-1, Safety Requirements/or Electrical EqUipment/or Measurement, Control, and Laboratory Use, Part I: General Requirements, 12 July 2004. (b) shall (172) comply with UL 61010A-l, Electrical EqUipment/or Laboratory Use, Part 1: General Requirements, 30 January 2002. (c) shall (173) comply with UL 310, Standard for Electrical Quick Connect Terminals, 27 May 2003. These standards are applicable to electrical equipment used in the workplace and require approval or certification by a National Recognized Test Laboratory (NRTL) listed by OSHA in 29 CFR 1910.7. 3.1.10.4 Ergonomic Safety The WEI: (a) shall (174) possess no sharp comers or edges that can puncture, cut, or tear the skin or clothing, or otherwise cause bodily injury. (b) shall (175) mount external wires, connectors, or cables in a manner which will prevent trip hazard, disconnection or damage by operators and passengers through incidental contact. (c) shall (176) possess no loose covers and cowlings. 3.1.10.5 Hazardous Materials If hazardous materials are used in the WEI, they shall (177) be identified, including their location and amount by weight or volume. A complete Material Safety Data Sheet (MSDS) shall (178) be developed and provided to meet the requirements of29 CFR 1910.1200, OSHA Hazard Communication. The WARNIN : contains Sensitive Set:urit)< Information that is controlled under 49 CFR parts 15 and 1520. No part of tbis record may be disclosed to l' " hout a "'Med to know", $l.S defined in 49 eFR p:.trts 15 llnd 1520. except ,,,'jth the 'Wl'ittun permission of the Administrator of the Traosp . ecurity Administration or the Secretary of Transportation. Unauthorized release may result in civil penalty or other action. For U.s. gove ndes, public disclosure is governed by 5lJ.S.C. 552 ;and 49 CFR parts 15 and 1520. 16 SENSITI¥:E SECIJRITY INFORMATION hazardous materials ,5hall (179) be packaged or configured to not require the use ofpersonal protective equipment (e.g., respiratory protection, eye and face protection, hand protection, protective clothing). 3.1.11 Security 3.1.11.1 Physical Security The units are to be used in areas accessible to the public. The WBI system: (a) shall (180) provide thlD means to physically protect its sensitive components and controls. (b) shall (l81) possess highly visible tamper-evident seals or alarms on assemblies that contain sensitive components!data. 3.1.11.2 Software Access TheWBI: (a) shall (182) allow user access, password protection, and capabilities per the User Access Levels and Capabilities appendix. (b) shall (183) have a user database with a minimum capacity of 10,000 users. A user database is defined as the user ID and password combinations to access the system. (c) shall (lR4) through the use ofa graphical user interface (GUI) or menu, allow the user to encrypt and export a user database. (d) shall (185) through the use of a aUI or menu, allow the user to import and decrypt a user database. 3.1.11.3 Information Technology Security The WBI system shall (186) address the technology security requirements set forth in Appendix A. 3.2 TIER II REQUIREMENTS 3.2.1 System 3.2.1.1 Detectionltmaging 3.2.1.1.1 System Detection Detection performance requirements are as follows: Explosives 3.2.1.1.1.2 Weapons location WARNING: This reeo WI Sensitive Security Iu!ol.'nllttion that is controlled under 49 eFR PSl"ts 15 and 1520. No part o{ this record may be disclosed to persons' II "need to know", as defined in 49 ern parts 15 :md 1520, exeept witb tbe written permission of the Administrator of the TranspOl" curity Administration or the SecNtllry of Trllnspurtation. Unauthorized release may result in civil penalty or other action. Fur U.S. gove encies. public disclosure is governed by 5 US.C. 552 and 49 CFR parts 15 and 1520. 17 SENSITIVE SECURITY INF'ORMATION 3.2.1.1.1.3 Liquids The WBI System shall (189) produce images to enable an operator to determine the presence and location ofliquids, 3.3 TIER III REQUIREMENTS 3.3.1 System 3.3.1.1 Detection/Imaging 3.3.1.1.1 System Detection Detection performance requirements are as follows: 3.3.1.1.1.1 3.3.1.1.1.2 Weapons .. , • • II • • • • '"' • "" I C' C I II" n I 3.3.1.1.1.3 3.4 OPTIONAL CAPABILITIES 3.4.1 Automated Threat Detection Marking The WBI system shall (193) provide an automated detection highlighting function in meeting the tiered detection requirements. Automated detection highlighting of anomalies shall (194) be coded red. Automated detection highlighting shall (195) be bounded by a box indicating the location of the anomaly. The WEI shall (196) provide a means for the 10 to toggle automated detection highlighting on and off. WARNING: This record contains Sensitive S~ur ormation that is controlled under 49 CFR parts 15 and 1520. No part of this r~cord may he disclosed to persons without It "need to kii defined in 49 CFR parts 15 and 1520, except with the written permission of the Administrator of the Transportation Security AdlUl .on or the Secl"-'tary C)f Transportation. Unauthorized . ·.closure i. governed by :5 U.S.C, 552 and 49 relMse may I"<!sult bt cMI peno.lty or other action. For U.S. govemment agcndell, p CFR parts 15 aDd 1520. 18 SENSI flV E SECURITY INF8RMAI'lQN 4.0 VERIFICATION Unless otherwise specified within this document, verification will be accomplished through inspection, test, demonstration, and analysis. To support compliance with the requirements in this specification, inspection, test, demonstration, and analysis will be performed on a WBI that is representative of the approved production design that has been placed under configuration control. 4.1 TEST AND EVALUATION Use of the test and evaluation process will assure that a WBI has met the requirements of the WBI specification, associated interface requirements and control documents, and algorithm description. Requirements verification will be performed in accordance with the Contract Statement of Work (SO\\l) and this Specification. All testing will be conducted according to Government-approved test plans, test cases, and test procedures and will be witnessed by an authorized Government representative. 4.1.1 Developmental Test and Evaluation (DT&E) Contractor DT&E testing comprises test and evaluation of the engineering design and developmental process that is conducted by incrementally determining the degree to which functional engineering specifications are attained. Verification will proceed from the unit level, through integrated verification of functional areas and interfaces within the complete system, to the complete system, in as near an operational configuration and environment as practical. 4.1.2 Qualification Testing The Government will conduct testing to verify compliance to the requirements set forth in this specification. 4.1.3 Operational Test and Evaluation (OT&E) The Government will conduct OT&E on production~representative systems to assess operational effectiveness and suitability when used by representative field TSOs in the intended operational environment. 4.1.4 First Article Test and Evaluation (FAT&E) An FAT&E will be performed, as directed by the Government, on the Contractor's first production model to verify compliance with all technical contract requirements. 4.1.5 Factory Acceptance Test (FAT) The Contractor will conduct an FAT at the factory on each system prior to delivery. FAT will verify that each system is manufactured to the Government-approved product baseline, that each system complies with technical contract requirements, and that no defects from the manufacturing process exist. 4.1.6 Site Acceptance Test (SAT) The Contractor will conduct an SAT at the site on each system prior to its placement into operation. SAT will verify that each system is properly installed and configured, and that no defects remain from the transportation and installation processes. WARNING: This record contains Sensitive . Information that is controlled under 49 CFR parts 15 and 1520. No part of this record may be disdos.::d to persons withnut a "need to ." s defined in 49 eFR parts 15 and 1520, except with the written . n or the Secretttry of Transportation. Unauthorized permission of the Administrator of tbe Transpnrtation Security Adnn Nlease ma}' result in chil penaln' or other action. For U.s. government agencies, po . sure is goverOlld by 5 IJ.S.C. 552 and 49 eFR parts 15 and 1520. 19 SENSITIVE SECURB l' Il'iiFORMAlION 4.1.7 Continuous Assessment The Government will perfonn continuous assessment of fielded WBI systems to verify operational effectiveness, suitability, reliability, and availability of the equipment. Continuous assessment will include collection of data from fielded WBr for the purpose of assessing field perfonnance over time. 4.2 VERIFICATION METHODS All WEI development will undergo test and evaluation to verify that the WEI meets system specification requirements. The verification methods (analysis, demonstration, inspection, and test) described below are mandatory for WBI requirements verification. 4.2.1 Analysis 4.2.1.1 Hardware Hardware analysis will encompass any or all of the following: (a) Engineering analysis is an engineering design function comprising study, calculation, or modeling of the known or potential failure modes and the reactions or interactions of the specified parts, materials, and the design configuration with the known function, performance and/or probable effeets of the operational environments. This analysis is customarily used to verify margin when it is not desirable to test to failure. (b) Similarity analysis is a method applied to end-items or components that are identical in design and manufacturing processes to end-items or components that have previously been qualified to equivalent or more stringent requirements. This method can be applied to commercial, off-the-shelf/non-developmental item (COTSINDI) equipment for the same manufacturer's models, based on tbe manufacturer's engineering specifications. For COTSINDI equipment, the use of manufacturer's published materials that contain test conformance information relating to materials construction, commercial reliability test data, intemal performance capabilities, and environmental conditions (heat, power consumption, etc.) are acceptable. (c) Validation of records analysis is a metbod of verification wherein manufacturing records are used to verify the compliance of concealed construction features or processes of manufacturing (e.g., Contractor items). This method will be applied to COTS equipment for the same manufacturer's models based upon the manufacturer's engineering specifications. 4.2.1.2 Software Software analysis will encompass the processing of accumulated results and conclusions to provide proof that the verification of requirements has been accomplished. The analytical results may be composed of interpretation of existing infonnation or derived from lower level tests, demonstrations, analyses, or examinations. 4.2.2 Demonstration The demonstration method of verification is used to indicate a general "pass/fail" condition. 4.2.2.1 Hardware Hardware demonstration will detennine, by observation, the qualitative characteristics of end-item or component properties. Demonstration will require no special test equipment or instruction to verify characteristics such as operational perfonnance, human engineering features, service, access features, and transportability. s record contains Sensitiyc Secu.ritJ Information that is controlled under 49 CFR pans 15 and 1520. No part of tbis record may he disclOSE: "thout a «o.::cd to know", as defined in 49 CFR parts 15 and 1520, except with the written permission of the Administrator of the Transpo Administration or the Secreta¥)' of Transportation. Unauthorized 20 SENSITIVE SECURITY INFORMATION 4.2.2.2 Software Software demonstration will determine compliance ""ith requirements (e.g., the proper response at a site as a result of a specified interrogation or command to be processed by the program) through observation of functional operation. Demonstration will be used primarily for activities where data gathering is not appropriate, such as display image verification. 4.2.3 Inspection 4.2.3.1 Hardware Inspection ofhardware will comprise verifying physical characteristics to determine compliance with requirements without the use of special laboratory equipment, procedures, items, or services. Inspection will verify workmanship, physical condition, construction features, and docwnentfdrawing compliance. For COTSfNDI hardware, use of manufacturer's published materials that contain test conformance information such as commercial reliability test data, safety regulations, or other Government standards and licensing, as applicable, are acceptable. 4.2.3.2 Software Inspection will consist of an examination that comprises review of software source and object listings to verifY compliance with software documentation, technical requirements, coding standards, and verification of the implementation of required algorithms. 4.2.4 Test 4.2.4.1 Hardware Hardware testing will verifY hardware performance during or after the controlled application of functional and/or environmental stimuli. The test equipment required for verification will be calibrated and kept in proper working condition. Any test hardware or software used will be documented, validated, and kept under configuration control. 4.2.4.2 Software Software testing will employ technical means, including evaluation of functional operation by use of special equipment or instrumentation, software and/or simulation techniques, to determine compliance of the system with requirements. Data derived from software testing will be reduced for analysis of software/system performance under the test specified. Test equipment required for verification will be calibrated and in proper working condition. Any test hardware or software will be documented, validated, and under configuration control. VERIFiCATION REQUIREMENTS TRACEABILITY MATRIX 4.3 The Verification Requirements Traceability Matrix (VRTM) shown in Table I defines the verification method to be used to validate each WBI specification requirement. Formal verification tests will encompass the following range of conditions, when applicable: • Normal data flow or condition. • Minimmn and maximum conditions. • Below minimum and above maximum conditions. • System failures and recovery. \V ARNING: This record con sltive Secllrit)· Information that lJi contl'olled unde.· 49 ern parts 15 and 1520. 1'0 part of tbl~ record may be disclosed to persons w.t "need to know", as defined in 49 CFR parts 15 lind 1520, except with the written permission of tbe Administrator of the TraDsporta urlty Administration or the Secretary of Transportation. Unauthorized release may result in civil penalty or other action. For {l.S. ~over a cndes, public disclosure is goyerned by !ilf.S.C. 552 and 49 CFR part'& 15 and 1520. 21 SENSITiVE SECUttlTV IN'FORlVIAllON TABLE I. Verification Rennirements Traceabilitv Matrix - Req.# Paragraph Number Paragraph Title FAT&E FAT SAT 1 3.1.1.1.1 System Detection D D D 2 3 4 31.1.1.1.1 31.1.1.1.2 31.1.1.1.3 A A A X X X X X X Q-T Q-T Q-T 5 3.1.1.1.1.4 A X X Q-T 6 7 8 9 10 II 3.1.1.1.2 3.11.1.2 3.1.1.1.2 3.1.1.1.2 3.1.1.1.2 3.1.1.1.2 Explosives Weapons Liquids Other Anomalies Privacy Privacy Privacy Privacy Privacy Privacy D X X D X X D X X I X X X 12 13 3.1.1.1.2 3.1.1.1.2 Privacy Privacy 14 3.1.1.2 15 D D D D X D D I D I Throughput Rate I Capacity T X X 3.1.1.2 Throughput Rate I Capacity 1 X X 16 3.1.1.2 Throughput Rate I Capacity I X X 17 3.1.1.2 Throughput Rate I Capacity D X X 18 3.1.1.2 I X X 19 3.1.1.3.1.1 D X X 20 3.1.1.3.1.1 D D X 21 22 23 24 25 3.1.1.3.1.1.1 3.1.1.3.1.2 3.1.1.3.1.2 3.1.1.3.1.2 3.1.1.3.1.2 D D D X D D D D D D D X X X X Throughput Rate I Capacity Screening Mode Screening Mode Multiplexing Test Mode Test Mode Test Mode Test Mode Remarks I WARNING: This talns Sensitive Secur!!')' Information that is controlled under 49 CFR parts 1S and 1520. No part of tbis a "need to know", as defined in 49 CFR parts 15 llnd 1520, except with the written permission of the Administrator of the TraDsporta rity Administration or the Secretary of Transportation. Unauthorized record may be dis.dos:ed to perf;(jns rltlease may result in civil penalt;r or other action. For U.s. governm des, publie di~clt'\lmre is governed by 5 U.S,C. 552 and 49 CFR parts 15 and 1520. 22 - SENSITIVE SECURITY INFORMAl ION D D D X X X D D X Start-up and Power-Down D D X 3.1.1.3.2 Start-up and Power-Down D D X 31 3.1.1.3.2 Start-up and Power-Down D D X 32 3.1.1.3.2 Start-up and Power-Down D D X D D D D D D D D D D I I I D D T T T T D D D D D D D D D D I I I D X T X X T X X X X X X D D D D X X X D X X X X X I I X A X X 26 27 3.1.1.3.1.2 3.1.1.3.1.2 28 3.1.1.3.1.2 Test Mode Test Mode Test Mode 29 3.1.1.3.2 30 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 Cold Start-up 3.1.1.3.2.1 Sleep I Standby 3.1.1.3.2.2 Login Process 3.1.1.3.2.3 Login Process 3.1.1.3.2.3 3.1.1.3.2.4 Fault Reset 3.1.1.3.2.5 Power-Down 3.1.1.3.3 Calibration 3.1.1.3.3 Calibration Calibration 3.1.1.3.3 3.1.1.3.3._- ......_.._..Calibration _E-Stop 3.1.1.3.4 3.1.1.3.4 E-Stop E-Stop 3.1.1.3.4 E-Stop 3.1.1.3.4 3.1.1.3.5 Lock Down 3.1.1.3.5 Lock Down 3.1.1.3.5 Lock Down 3.1.1.3.5 Lock Down 3.11.3.5 Lock Down Network 3.1.1.3.6 Interface Network 3.1.1.3.6 Interface 54 3.1.1.3.6 Network Interface A X X 55 3.1.1.3.7.1 STIP Interface A X X --_._._.... W AID cord contains Sensitive Securit.,.. Information that is controlled under 49 CFR parts 15 and 1520. No part of this recurd may be disdo&(: '0 ithout R «need to know", lUI defined in 49 CFR parts 15 ..nd 1520, o.'I;ccpt with the written permission of the Administrator of the Tr9ll. . Secu.riQ' Admin.istration Qr the Secretary of' Transportation. Unauthorized ule.ase may result in civil penalt)' or other 3l.:tion. For U.S. go,'e <:fench~$, public dbdQ.$lue is g.. . "erned by S LS.C. 552 and 49 CFR parts 15 and 1520. 23 -- SENSII I vI!: SECURI'FY INFORMATION X X SO Station A I I I 3.1.1.4.1 SO Station I I X 59 3.1.1.4.1 SO Station 1 X 60 3.1.1.4.1 SO Station I X X X 61 3.1.1.4.1 SO Station D D D 62 3.1.1.4.1 SO Station D D D 63 3.1.1.4.1 SO Station D D D 64 3.1.1.4.1 SO Station D D D 65 3.1.1.4.1 SO Station D D D 66 3.1.1.4.1 SO Station D D D 67 3.1.1.4.2 IO Station I X X 68 3.1.1.4.2 IO Station D X X 69 3.1.1.4.2.1 IOCP T X X 70 3.1.1.4.2.1 IOCP D X X 71 3.1.1.4.2.1 IOCP D X X 72 3.1.1.4.2.1 IOCP D X X 73 3.LL4.2.2 IOCP Display Monitor I X X 74 3.1.1.4.2.2 IOCP Display Monitor I I I 75 3.1.1.4.2.2 IOCP Display Monitor I I I 76 3.1.I .4.2.3 D D D 77 3.1. 1.4.2.3 D D D 78 3.1.I.4.2.3 T X X 79 3.1.1.4.2.3 D X X 80 3.1. 1.4.2.3 T X X 56 3.1.13.7.1 STIP Interface 57 3.1.1.4.1 58 Display Monitor Mountino Display Monitor Mountino Display Monitor Mountino Display Monitor MountinQ Display Monitor Mountin a --~~~ W.4.R.."JING: This record contam C-C . ·ve Securif.)· Information that is controlled under 49 eFR parts 15 and 1520. :Ko part of this record may be disclosed to persons without :1\ know'"'' as defined in 49 CFR parts 15 and 1520~ except with the written permission of the Administrator of the Transportation Secul') . 'stration or the S"t:rl.l:tary of Transportation. 1lnlluthorb:ed . disclosure is governed by 5 U.S.C. 552 and 49 release m9Y result in civil penalt:r or other action. For U.S. govel'oment agenclc • CFR parts 15 and 1520. 24 SENSITIVE SECURITY INFORl\IATION T X X T X X T X X D D D I I I I I I I I I X X X I X X Field Data Reporting System D X X 3.1.1.5 Field Data Reporting System D X X 3.1.1.5 Field Data Reporting System D X X 81 3.1.1.4.2.3 82 3.1.1.4.2.3 83 3.1.1.4.2.3 84 3.1.1.4.2.3 85 3.1.1.4.2.3 86 3.1.1.4.2.4 87 3.1.1.4.2.4.\ 88 3.1.1.4.2.4.1 89 3.1.1.4.2.4.2 90 3.1.1.5 91 92 . Display Monitor Mountin" Display Monitor Mountinl> Display Monitor Mounting Display Monitor Mountin" Display Monitor Mountin" Operator Display Image Quality . Image Quality Jitter and Motion Artifacts . 93 3.1.1.5 Field Data Reporting System 94 3.1.1.5 Field Data Reporting System D D X 95 3.1.1.5 Field Data Reporting System D X X D X X WARNlNG: This rcco . s Sensitive Security Information that is controlled under 49 CFR parts 15 and 1520. No part of this record may be disclosed to persons II "'need to know", as defined in 49 eFR parts 15 :lind 1520, except with the written permission of the Administrator of the Transpo. 'urity Administration or the Secretary of TranSpQTtanon. Unauthorized release rna)' result in civil penalt~' or other action. For U.S. gover odes. public disclosure is governed b~; :S (i.S.C. 552 and 49 eFR parts 15 and 1520. 25 SENSITIVE SECURITY INFORl\'1ATION 96 3.Ll.5 Field Data Reporting System D X X 97 3.1.1.5 Field Data Reporting System A X X 98 3.1.1.5.1 Data Storage I Transfer D D D 99 3.1.1.5.1 Data Storage I Transfer D D D 100 3.1.1.5.1 Data Storage I Transfer I I X 101 3.1.1.5.1 Data Storage I Transfer I X X 102 103 104 105 3.1.1.6 3.1.2 3.1.2 3.1.2 OTK Eleetrical Electrical Electrical D X T D X X D D T X X 106 3.1.2.1 Unintcrruptible Power Supply D I I 107 3.1.2.1 Uninterruptible Power Supply D D X 108 3.1.2.1 Uninterruptible Power Supply D X X 109 110 111 112 3.1.3.1 3.1.3.1 A X X X X X X X X X X . Floor Loading Floor Loading Floor Loading Footprint Orientation Height Width ID Info. ID Info. D I I X X X X X X X X X A A I 114 115 116 117 3.1.3.1 3.1.3.2.1 3.1.3.2.2 3.1.3.2.3 3.1.3.2.4 3.1.4.1 3.1.4.1 118 3.1.4.2 Permaneney and Legibility A X X 119 3.1.4.2 Permanency and Legibility T X X 113 w~.a I I ,iii,. . Security Information that is controlled nnder 49 CFR part' 15 and 1520. No p.rt of thi, record rna)' be disclo,~ed to persons witiiOih~ed to know", as defined in 49 eFR parts 15 and 1520, except with the \'l'l'itt"'D permission of the Administrator of the Transportation . . Administration or the Secretary of Transportation. UnauthQood release may result in civil penalt)-° or other action. For U.S. governm des. public disclosure is governed by 5 U.s.c. 552 and 49 CFR parts 15 and 1520. 26 SENSITIVE SECURITY INFORMATION 120 3.1.4.2 Permanency and Legibility A X X 121 3.1.4.2 Permanency and Legibility I X X 122 3.1.4.2 Permanency and Legibility A X X 123 3.1.4.2 Permanency . and Legibility I X X 124 3.1.5.1 Operational Environment A X X C-C 125 3.1.5.2 Storage Environment A X X C-C 126 3.1.5.2 Storage Environment A X X C-C 127 3.1.5.3 Vibration Immunity A X X C-I 128 3.1.6 Electromagnetic Compatibility A X X C-I 129 3.1.6 Electromagnetic Compatibility A X X C-I 130 3.1.6 Electromagnetic Compatibility A X X C-I 131 3.1.6 Electromagnetic Compatibility A X X C-I 132 3.1.6 Electromagnetic Compatibility A X X C-l 133 3.1.6 Electromagnetic Compatibility A X X C-l 134 3.1.6 Electromagnetic Compatibility A X X C-l 135 3.1.6.1 PED A X X C-I 136 3.1.7 Hwnan Factors A X X 137 3.1.7 Human Factors D X X 138 3.1.7 Human Factors T X X 139 3.1.7 Human Factors 1 X X 140 3.1.7 Human Factors D X X 141 3.1.7 Human Factors 1 X X WARI l.'d contains Sensitive Seeurit)' Information that is controlled under 49 CFR parts 15 and 1520. I'."o part of this record may be disclosed to . Gut 9. "need to know", as defined in 49 CFR parts 1$ and 1520, except with the written permission of the Administrator of the Transpo' ucity Administration or the Secretary of Transportation. lJnauthorized release may result in civil penalt~' or other action. For U.S. goverum ublic disclosure is 20verned by 5 V.S.C. 552 and 49 CFR parts 15 and 1520. 27 -- SENSITIVE SECURITY INFORMATION 143 3.1.7 Human Factors ] 144 3.1.7 Human Factors ] 145 3.1.7 Human Factors D X X X X 146 3.1.7.1 Noise T X X 147 3.1.8.1 Electromagnetic Emission Safety A X X C-I 148 3.1.8.2 149 142 3.1.7 Human Factors ] X X X X A X X c-] 3.1.9.1 Emission Control Reliability A X X C-C 150 3.1.9.2 Maintainability A X X C-C 151 3.1.9.2.1 Maintenance Access I ] X 152 3.1.9.2.1 Maintenance Access ] X X 153 3.1.9.2.2 Scheduled Maintenance A X X 154 3.1.9.2.2 Scheduled Maintenance A X X ISS 3.1.9.2.3 Scheduled Maintenance A X X 156 3.1.9.2.3 Unscheduled Maintenance ] X X 157 3.1.9.2.3 Unscheduled Maintenance D X X 158 3.1.9.2.3 Unscheduled Maintenance D X X 159 3.1.9.2.3 Unscheduled Maintenance D X X 160 3.1.9.2.3 Unscheduled Maintenance D X X 161 3.1.9.2.3 Unscheduled Maintenance T X X 162 3.1.9.2.3 Unscheduled Maintenance T X X 163 3.1.9.2.3 Unscheduled Maintenance D X X 1.64 3.1.9.3 Availability A X X C-C , cord contains Sensitive Securit)' Information that is controlled under 49 eFR parts 15 and 1520. No part of this record may be disclose 0 p " out a "need to know", as defined in 49 CFR parts 15 and 1520, except with the written permission of the Administrator of the Transpor . Administration or the Secretary of Transportation. Unauthorized release rna:)' result in civil penalty or other action. For U.S. government a ' eFR parts 15 nnd 1520. 28 ic disclosure is governed by 5 LS.C. 552 and 49 SEl"SI'fIVE SECURITY INFORMATION 165 3.1.9.3 Availability A X C-C X X X X 166 3.1.10.1 General T T 167 3.1.10.2 Radiation A 168 3.1.10.2 Radiation A X X C-] 169 3.1I0.2 Radiation A A X X C-] Radiation Electrical Safety Electrical Safetv Electrical Safetv X X 170 3.1.10.2 17l 3.10.1.3 A X X C-I 172 3.10.1.3 A X X c-r 173 3.10.1.3 A X X C-] 174 3.1I004 Ergonomic Safety I I X 175 3.1.1 004 Ergonomic Safety I I X 176 3.1I004 Ergonomic Safety T X X I77 3.1.10.5 Hazardous Materials I X X 178 3.1.10.5 Hazardous Materials A X X 179 3.1.10.5 Hazardous Materials I X X 180 3.1Il.l I ] X 181 3.1.11.1 I I X 182 3.1.11.2 Software Access D X X 183 3. I.! 1.2 Software Access A X X 184 3.1I1.2 Software Access D D X 185 3.1I1.2 Software Access D D X 186 3.1.1 1.3 Info. Tech. Security A X X 187 3.2.U.U Explosives A X X Physical Security Physical Security C-I C-I Q-T WARNIN : ontains Sensitive Security Information that is ccmtrolled under 49 CFR parts 15 and 1520. No part of this record may be disclosed to pel'S "need to know", as defined in 49 eFR parts 15 and 1520. except with thf: written . dministraticUl or tbe Secretary of Transportation. Unauthorized permission of the Administrator of the Transporta 0 'j;' disclosure is governed by 5 ·V.S.C. 552 :lind 49 release may result in civil penaJt:r or other action. For U.S. government ag CFR parts 15 and 1520. 29 SENSITIVE SECURITY INFORMATION 188 3.21.1.1.2 189 3.2.1.1.1.3 190 3.3.1.1.1.1 191 3.3.1.1.1.2 192 3.3.1.1.1.3 193 3.4.1 194 3.4.1 195 3.4.1 196 3.4.1 Weapons Liquids Explosives Weapons Liquids Automated Threat Detection Marking Automated Threat Detection Marking Automated Threat Deteetion Marking Automated Threat Detection Marking Q-T Q-T Q-T Q-T Q-T A A A A A X X X X X X X X X X D X X D X X D X X D X X X X A X X C-I A X X C·J AppendixC 197 n1a User Access Levels and Capabilities A Appendix D Baseline Voltage and Current Distortion Baseline Voltage and Current Distortion 198 5.1 199 5.1 200 5.2 Power Usage Profile and Power Factor A X X C-J 201 5.3 Maximum Inrush Current Ration A X X C-I 5.4 Steady State Current Unbalance A X X C-J 202 WARNING: This l'ec<lcd contains Sensitive Securit)' Information that is controlled under 49 CF'R parts 15 a record may be disclOSed to persons without a "need to kno ." . parts 5 llnd 1520. l"~C'~t with the wJ:;'hte-n permission of ransporrntion Seeurit)' Administration or the Secretary of Transportation. Unautbol.'i:«>d re ease may result in civil penalt)" or other CFR parts 15 and 1520. :acrinn~ For U.S. government agencill's. public disclosure is govcl'ocd b}' 5 U.s.C. 552 and 49 30 SENSITIV:E SECURITY INF9RMATION 203 5.4 Steady State Current A X X C-I A X X C-I Unbalance 204 5.4 Steady State Current Unbalance 5.4 Steady State Current Unbalance A X X C-I 5.5 Maximum Leakage Current A X X C-I 207 5.6 Voltage Sag and Interruption Withstand Performance A X X C-I 208 5.7 A X X C-I D X X D X X 205 206 Unmterruptible Power Supply A]>llendix E FDRSReport Display 209 1.0 210 1.0 211 1.1 10 Log Report D X X 212 1.1 10 Log Report D X X 213 1.1 10 Log Report D X X 214 1.2 Event Report D X X 215 1.2 Event Report D X X 216 1.2 Event Report D X X 217 1.2 Event Report D X 218 1.3 Access History D X 219 13 Access History D X X X X FDRS Report Display WARNING: This record contains Sensitive Security In or hat is controlled under 49 CFR parts 15 and 1520. No part of this record may be disclosed to persons without a "need to know", as e . 49 CFR parts 15 and 1520, e.'l:cept with the written permission of the Administrator of the Transportation Security Administration or retary of Transportation. Unauthorized ....1."'. n"I)" t'e~ult In dvll p.nll.lf)" or other ""rion. For U.S. goveJ'nment agende" publ;" dis.Io.Ul·. eFR parts 15 and 1520. 31 • n.d by ,5 I.tS-C- 552 and 49 SENSITIVE SECURI I'f INFORMATION LEGEND 1 Remarks See paragraph 4.2.1 See para,graph 4.2.2 See paragraph 4.2.3 Verification Methods Analysis Demonstration D Inspection I Not verifiable NV Test T Not aoplicable X A See paragraph 4.2.4 LEGEND 2 c-c C-I Q-T Certifications/Oualifications Certification bv the Contractor Certification by an independent evaluator (UL Listing or Equivalent is a certification ~rformed by Underwriter's Laboratories or eCluivalent independent agency) Qualification by the Government (Transportation Security Laboratory) W Alli"iING: This A'e<:ord contain~ Sensitive " formation that is cOntrolled under 49 CFR parts 15 lind 1520. No part of tbis rocoro may be di.do•• d to persons without" "need to . de£lll"d in 49 CFR pnrts IS lOnd 1520, "xcept with tbe written permission of the Administrator of the Transportation Security Admin ~ • or the Secretary of Transportation. Unauthorized r..,leas", ma~' result in dvil pe"alty Qr other action, For {.J,S. government agencie., pu J ure is gQYened by ;; {),S.C. 552 auu 49 CFR parts 15 and 1520. 32 SENSITIVE SECURll }' INFORMATION 5.0 AC A; ANSI BIT BRD BS C&A CBEMA CENELEC CFR COTS DC DHS DISA DPF DOT EMC EN E-Stop EUT FAA FCC FDRS FIPS FISMA FIT GED Gill Hi-SOC HSAR HVAC ICNIRP lD IEC IEEE 10 IOCP IP IRD 15S0 IT ITIC ITMRA ITSEC ACRONYMS Alternating Current Inherent Availability American National Standards Institute Built-In Test Business Rules Document Backscatter Certification and Accreditation Computer Business Manufacturers Association European Committee for Electro-technical Standardization Code of Federal Regulations Commercial off the Shelf Direct Current Department of Homeland Security Defense Information Security Agency Displaced Power Factor Department of Transportation Electromagnetie Compatibility European Standard Emergency Stop Equipment Under Test Federal Aviation Administration Federal Communications Commission Field Data Reporting System Federal Informatioll.:I'rQgeSsing Standard Federal Information Security Management Aet Fault Isolation Test General Equivalency Diploma Graphical User Interface High Speed Operational Connectivity Homeland Security Acquisition Regulation Heating, Ventilation, and Air Conditioning International Commission of Non-Ionizing Radiation Protection Identification International Electro-technieal Commission Institute of Electrical and Electronics Engineers Image Operator Image Operator Control Panel Internet Protocol Interface Requirements Document Information System Security Officer Information Technology Information Technology Industry Council Information Technology Management Reform Act IT Security WAR.'\lNG: ThiS r tainsSensitive Securit)' Information that is controlled under 49 C.FR parts 15 and 1520. No part of tbis r€tcord may be di~d(J!;ed to rel"Son a "need to know", 9.S defined in 49 CFR parts 15 llnd :l5:!O, exc:cpt with the written permi.ssioh of the Administratur of the Transpor udty Administrfltion or the Secretary or Transportation. Unauthorized role9$(, rolA)' result in civil peoa.lty 01' ()thcr action. For V.S. govern ndes, public:: dbdosure is governed bJ 5 U.S.C. 552 and 49 CFR parts 15 and 1520. 33 SENSITIVE SECURITY INFOR1\iATION Pd PED Line Replaceable Unit Millimeter Wave Material Safety Data Sheet Mean Time Before Failure Mean Time Between Maintenance Actions Mean Time To Repair National Electrical Manufacturers Association National Institute of Standards and Technology National Recognized Test Laboratory National Security Agency Operator Control Panel Operating Security Occupational Safety and Health Administration Operational Test Kit Probability of Detection Personal Electronic Device PEa False Alarm Rate RF RMS SO Radio Frequency Root Means Square Screening Operator Standard Security Technology Integrated Program Transmission Control Protocol Total Hannonic Distortion Total Power Factor Transportation Security Administration Transportation Security Engineering Transportation Security Laboratory Transportation Security Officer Underwriters Laboratory Unintenuptible Power Supply Universal Serial Bus LRU MMW MSDS MTBF MTBMA MTTR NEMA NIST NRTL NSA OCP as OSHA OTK STD STIP Tep IHD IPF TSA TSE rSL ISO UL UPS USB VAC Volts Alternating Current WBI Whole Body Imager WARNING: This record contains Sensitive Security Information that' ntrolled uuder 49 CFR parts 15 and 1520. No p"rt of this ..ecord may be disclo.ed to p(>l'sons without " "need to 1m , ". defined in 49 CFR part< 15 and 1520, e:x"ept with the written permission "f the Administrator of the TranslJorta . ecurity Administration or the Secretary of Tnmsportation. Unautborized release may result in civil penalty or other a . . For lJ.S. government agendes, l'ublie disclosure is governed by 5 U.S.C. 552 nnd 49 CFR parts 15 and 1520. 34 SENSITIVE SECURITY INFORMATION APPENDIX A TECHNOLOGY SECURITY REQUIREMENTS Preparedfor: Transportation Security Administration Security Transportation Deployment Office January 2008 record~'io~njt'~i""~S~'c~n~"['t'~V~~~~I:n':Oirm~.ti~'o;n~tb~.~t~is~.~o~n;tl~'O;U;Cd~Ulnd!c[rj419iC~'FiR~p~a;r"'~·il~S~a~nd record may be dbcluscd to persons without WARNING: This 11 "'need to .,. $IS defined in 49 CFR parts 15 and 1520. except 1520.with 1\"0 the partwritten of this permisllion of the Administrator of the Transportation Security Admm . Qr the Secretary of Transportathm. llnlluthomed release may result ill civil penalt:y or other action. For U.S. govCl;nmcnt lIgcndes,. pu 1 CFR parts 15 and 1520. A-I nre is goverr)cd hy 511.S.C. 552 aDd 49 - SENSITIVE SECUIUTY INFORM'ATION A.1 INTRODUCTION Due to the TSA's plan for a secure network which will connect thc vast information systems of our nation's airports, it is necessary to outline information security control requirements to ensure the network is both secure and effective. In support of the Security Technology Integration Program (STLl') team's work to achieve this goal through the High Speed Operational Connectivity (Hi-SOC) roll-out, the Certification and Accreditation (C&A) Assessment team compiled these requirements in the form of an IT Security (ITSEC) Requirements matrix which applies to all Transportation Security Equipment (TSE). The points of contact for this effort are as follows: ~orroation System Security Officer (ISSO) U.S. Transportation Security Administration 701 South 12 th Street Arlington, VA 22202 . Phone:. . ~ Email: hs. ov A.2 SCOPE This document covers a subset of the security requirements mandated by DHS and TSA. The complete set of IT Security requirements can be found in the TSA Management Directive 1400.3 and the DHS National Security Systems Handbook 4300A This document was created to identify specific requirements from the full set of sccurity requiremcnts that are directly applicable to the hardware and software utilized for the TSE being designed and built A.3 VENDOR REQUIREMENTS Vendors shall configure their Operating System (OS) and application software by strictly following the OS Secure Baseline Configuration Guides. All hardware and software systcms shall be secured based on the TSA IT Security requirements which can be found in the TSA Management Directive 1400.3 and the DHS National Security Systems Handbook 4300A Technology Security Requirements are also included in section 6, which provides a guideline to assisting an implementing the major security requirements. This document provides a reference of many of the findings that have been identified in past security scans. These requirements are included as guideline which TSE is required to meet all of the security requirements identified in 1400.3 and the 4300.A TSA and DHS IT Security Requirements documents. Additionally, TSA will conduct preliminary security scans (as needed and as requested) and quarterly security scans on the equipment that provides security reports. This will help the vendor in meeting the security requirements. A.4 REFERENCES The following documents were utilized in the development of this set of Systems ITSEC Requirements for Systems Developers & Administrators: TSA MD 1400.3 Transportation Security Administration (TSA) Management Directive No. 1400.3 - TSA Information Security Policy DHS4300A Department of Homeland Security Sensitive Systems Handbook V3.2, October I, 2005 --- "YAR+~ING: This recur Sensitive Sf.!(:urity Information that is t'ontrol1ed under 49 CFR parts 15 and 1520. No part of this record may be disclosed to persons w ed to know", us defined in 49 CFR parts 15 and 1520, except with the written Distrntion or the Secretary of Transportation. Unauthorized other action. For U.S. government agen . disclosure is govQr-ned by 5 V.S.C 552 Dnd 49 " permission of the Administrator of the Transportation e ' release may result in civil penalty CFR parts 15 and 1520. (H.' A-2 SENSITIVE SE€URI'f¥ INFORMATION FIPS 140-2 Security Requirements for Cryptographic Modules ~ December 3, 2002 (Change Notice 2) Pubtic Law 107-296 Homeland Security Act of 2002 - November 25, 2002 FISMA 2002 Federal Information Security Management Act (FISMA) of2002 November 25,2002 Public Law 104-106 Clinger~Cohen Act of 1996 Lformerly, Information Technology Management Reform Act (ITMRA)] - February 10, 1996 HSAR Homeland Security Acquisition Regulation - December 2003 OS HARDENING/SECURITY REQUIREMENTS A.5 Original Equipment Manufacturer (OEM) vendors should follow the OS Secure Baseline Configuration Guides from the following sources and in the following order (i.e., if an as guide is not available under source i. then go to source ii.): 1. TSA as Secure Baseline Configuration Guides available from TSA upon request are: 1. HP-UX Server Secure Baseline Linux Server Secure Baseline Solaris Server Secure Baseline 4. Windows 2000 Server Secure Baseline 5. Windows 2003~XP Secure Baseline Department of Homeland Security (DRS) National Security Agency (NSA) 2. 3. 11. iii. iv. v. http://wwvi.nsa.gov/snac/index.cfm?MenuID=scgl 0,3.1 Defense Infonnation Security Agency (DISA) http://iase.disa.mil/stig§/checkli~t!jp.dex. html National Institute of Standards and Technology (NIST) http://osrc.nisi. gOY/pcig/ci g. html WARNING: This record contains Sens urlty Information that is controlled under 49 eFR parts 15 and 1520. No part of tbis record may be diSClosed tu persons without a n ow", as d..tined in 49 CFR P:ilrts Hi lind 1520. except with the written permission of the Administrator of the Transportation Securl • inistration or the Secretary of Transportation. Unautborilllld t:'clellse roay t:'esult in civil penalty or other action. For U.S. govcl'nment ag . ublie disclosure is governed by 5 U.S.c. 552 and 49 erR parts 15 llnd 1520. A-3 SENSITIVE SECURIrY INFORMl.TION A.6 SYSTEMS IT SECURITY REQUIREMENTS *Reference nwnbers apply to this document only. **A waiver is requested when a rcquirement cannot he met within a reasonable timeframe, hut can be fixed within a near-future timeframe (for example,6 months to a year). ***An exemption is requested for a requirement that cannot reasonably he fixed ever. This is something that will either be an unreasonable cost to fix or fixing the issue would result in the equipment not working and there is no work-around for the fix. Please fill in the matrix below for the following requirements. If a requirement has been met, please indicate Yes. If the requirement has not been met, please indicate No and under the Notes section please fill out the reason why. If a requirement is Not Applicable, please indicate this with Nt A and under the Notes section please fill out the reason why. If requirements cannot be met, please provide a detailed explanation in either the waiver or the exemption sections of the matrix. *Reference Number AC-t AC-2 DHSorTSA Reference TSAMD 1400.3, v3.lJI, Chapter 3, Access Control Section 7 "Passwordsn Section 3.2.1. Parts A andL TSAMD 1400.3, v3.IJI. Chapter 3. Access Control Section 7 Control Category HPasswordsl~ AC-3 Systems IT Security Reouirement Password length shall be a minimum of eight (8) characters and a maximum of 15 characters. Met Requirement YeslNo or NIA Notes No or NIA, Otber **Waiver Exolanation **~Exemption Exolanation Passwords shaH contain at least one of each of the following: one alphabetic uppercase, one alphabetic lowercase, one numeric, and one spcciai character. Section 3.2.1. PartB Passwords shall not contain TSAMD 1400.3, v3.IJI, any two identical consecutive cbaracters. Access Control Chapter 3. Section 7 "Passwords" WARNING: This record contains •.,c . . ,J. formation that is controUed under 49 ern paris 15 and 1520. No part of tlJis r£cord mllY he disclosed to persons without a "need to know", as defined in 49 CFR parts 15 and 1520~ cx:cept with the wn . . ...rthe Administrator of the Tl'unsportntion Security Administrntion or the Secrefury of Transporrntion. Unauthorized release may resliit in civil penalty or other action. For U.S. government agencies. pu...... . vemed br5U.S.C. 552 and 49 CI"U parts 15 and 1520. A-4 SENSITIVE SECURITY INFORMA.TION *Reference Nnmber AC-4 Control Category DHSorTSA Systems IT Security Reference Requirement Section 3.2.1, Parte TSA MD Passwords shal! not be the 1400.3, v3.1 - r1, same as the User ID. Chapter 3, Access Control Section 7 Met Requirement YeslNo orNtA Notes No or NtA, Other **Waiver Explanation ***Exemption ExPlanation '~Passwords~' AC-5 AC-6 Access Control Access Control AC-7 Access Control AC-8 Access Control I Section 3.2.1, PartK TSAMD 1400.3, v3.lJI, Chapter 3, Section 7 "Passwords" Section 3.2.2, Part A TSAMD 1400.3, v3.UI, Chapter 3, Section 7 uPasswords" Section 3.2.2, PartB TSA MD 1400.3, v3.JJ I, Chapter 3, Secticn 7 "Passwords" Section 3.6, Part A TSAMD 1400.3, v3.J JI, Chapter 3, Section 7 "Passwords" Section 3.6, Part A Passwords shall have a maximum lifetime of 90 days. Passwords shnll not be reused for a minimum of6 password change cycles. Systems, applications and network components sometimes come with default system accounts and passwords (or no password). The TSA requires that: All default accounts shall be removed from the system and the default password must be changed prior to placing the system or device into service. d contains Sensitive Security Information that is controlled under 49 ern parts: 15 and IS10. No part of thhl record may be disclosed to persons without a "need to know'" as defined in 49 CFR parts 1 an , . . . ion of the Administrator of the Transportatiun Security Administration or the Secretary of TrnRsportation. Unauthorized release may result in civil penalty or other action. For U.S. government agencies, pu Ie l ' ::; 2 and 49 CFR pam 15 and 1520. A·S SENSITIVE SECf:fIUTY INFORMATION *Reference Number AC-9 Control Category DHSor TSA Reference TSAMD 1400.3, v3.IJI, Chapter 3, Access Control Section 7 "Passwords" AC-IO Systems IT Security Requirement All system or root level accounts shall have a password assigned prior to placement of the system or Met Requirement YesINo or N/A Notes No or N/A, Otber **Waiver Explanation ***Exemption Explanation device into service. Section 3,6, Prot A All "guest" accounts shall be TSAMD 1400.3, v3.1 _fl. removed from the system. Chapter 3, Access Control Section 7 "Passwords" AC-ll AC-12 AC-13 Section 3.6, Part A TSAMD 1400.3, v3.1 Jl, Chapter 3, Access Control Section 7 "Passwords" Section 3.6, Part A TSAMD 1400.3, v3.l _fl, Chapter 3, Access Control Section 7 "Passwords" Section 3.2,7, Part A TSAMD 1400.3, v3.1_fl. Chapter 3, Access Control Sel..'1ion 7 "Passwords" Section 3,2.7,Part B Operati ng systems and applications shall be configured to force users to create strong passwords, as defined in this document. Personal passwords shaU be authenticated each time a claim of identity is made (e.g" when fllogging onto lT an interactive system). Access passwords shall be authenticated during the initial request for access to protected data, WARNING: Tlli!~ record tontains Sen'iitwe • ation that is controlled under 49 CFR parts 15 and J520. No part of this ~ord may be disclosed to persons without a "ne(!d to know". 11S defined in 49 CFR pnrts 15 and 1520~ except with the wn • ,. n of the Administrator of the Transpurtation Security Admini9trntion or the Secretary of Transportation. • osure is governed by 5 U.S.c. 552 and 49 CPR parts 15 and 1520. Unauthorized release may result in civil penalty or otJlI;r action. For U.S. government ag('l1cl , A-6 SENSITIVE SECURIFY INFORMATION *Reference Number AC-14 Control Category DHSorTSA Reference DHSMD4300, v2.1 Chapter 5, Access Control Section 5.6.5, "Internet AC-15 Systems IT Security Reauirement Firewalls shall be configured to prohibit any protocol or service that is not explicitly permitted. Met Requirement YesJNo or NI A Notes No or NIA, Other >l<*W-aiver ***Exemption Explanation Explanation Security", Port B DHSMD4300, Mobile code (e.g., ActiveX, v2.1, Chapter 5, JavaScript) that has not!leen Section 5.6.5, reviewed and digitally Access Control '-'Internet approved by an appropriate Security'~, Part D TSA authority shall not be used. AC-16 AC-17 AC-18 DHS MD 4300, v2.1 TSAMD 1400.3, v3.1 _rl, Chapter 3, Access Control Section 11 b, Section 3.3,Part C; and Section 11 c, Section 3.4, PartC TSAMD 1400.3, v3.1 _1'1, Chapter 4, Section 2 Access Controi HNetwork Logical Access Control" Section 3.2,Part A Telnet shall not be used to connect to any TSA computer. A connection protocol such as Secure Shell (SSH) that employs secure authentication (two f.ctur, encrypted, key exchange, etc.) and is approved by the Organization Element shall be used instead. Upon successful logon, the tlser shall be notified of the date and time of the last successful logon using this user identity and the number of unsuccessful logon attempts using this user identity since the last successful logon. Upon successfullogon~ a TSA MD 1400.3, standard and approved v3.tJl, Chapter warning message shall be 4} Seciion2 displayed. Minimum Access Control "Network LDgical requirements for this message Access Control" shall be as follows: Section 3.2,Part R WARNING: IS itive Seeurity Information that is rontroIled under 49 CFR parts 15 and 1520. No part of this record may be disclosed to persons ",itlrout a "need to know". us defined in 49 CFR parts 15 and 152 ,exec . crmission of the Administrator of the Trnnsportation Security Administration or tile Secretary of Transportation. Unauthorized ..dease may result in civil penalty or otllcr action. For U.S. government age .. re ill: owrncd by 5 U.S.c. 552 and 49 CFR parts 15 and 1520. A-7 SENSITIVE SECURITY INFORMA I ION *Reference Number Control CateQorv DHSorTSA Reference Systems IT Security Requirement Met Requirement YesINo or N/A Notes No 01" N/A, Other **Waiver Exoianation ***Exemption Explanation SAMPLE WARNING MESSAGE, 'THIS IS AN UNCLASSIFIED SYSTEM. This is a Government information system. This system is fOr the use ofauthorized users: find unclassified processing only. lndividuals Ll5ing this c:omputer system without authority or in excess of their authority are subject to Imving aIt of their activities on this system monitored and recorded by system personnel. In the course of monitoring individuals improperly using this system. Of in the course ofsystem maintenance. the activities of nuthorized users may also be monitored. Anyone using this system expressly consents to such monitoring and is advised that ifsuch monitoring reveals possible evidence of criminal activity or inappropriate use, such as input ofclassified infonnation, system personnel may provide the evidence of such monitoring to TSA officials and/or law enforcement officials. depending on the nature of the evidence revealed. Security Violations will be issued to any user processing Classified National Securitv lnfonnation on this system." Warning message shall be TSAMD 1400.3, v3.lJ1, displayed until a specific user AC-19 AC-20 Chapter 4, action is taken. Section 2 Access Control "Network Logical Access Control" Section 3.2,Part B Warning message shall include TSAMD 1400.3, v3.1_rl, a warning that they have Access Control accessed a Government Chapter 4, Section 2 information system. Unauthorized release may result in civil penalty or other action. For U.S. government agcncjes, PUudo; A-& . . • bv 5 U.S.C. 551 and 49 CFR parts 15 and 1520. SENSITIVE SECURITY INFORMATION *Reference Number AC-21 AC-22 AC-23 AC-24 Control CategorY Access Control Access Control Access Control Access Control DHSor TSA Reference "Network Logical Access Cnntrol" Section 3.2,Part B TSAMD 1400.3, v3. I_d, Chapter 4, Section 2 "Network Logical Access Control" Section 3.2,Part B TSAMD 1400.3, v3.lJI, Chapter 4, Section 2 ''Network Logical Access Control" Section 3.2,PartB TSAMD 1400.3, v3.1_r1, Chapter 4, Section 2 «Network Logical Access Control" Section 3.2,PartB TSAMD 1400.3, v3.1JI, Chapter 4, Section 2 "Network Logical Access Control" Section 3.3,PartA Systems IT Security RequIrement Met Requirement YeslNo or N/A Notes No or N/A, Other **Waivl,'f Explanation ***Exemption Explanation Warning message shall include a warning that lIsage may be monitored, recorded and subject to audit Waming message shall include a warning that notifies users that use indicates consent to monitoring and recording. Waming message shall include a warning that notifies users that unauthorized use is prohibited and subject to criminal and civil penalties. All end user assets shall have and employ session lock capabilities in accordance with TSA MD 1400.3, End User Assets Policy. WARNING: This record contains Sensitive Security Information that is oontToUed under 49 eFR parts 1S and 1520. 0 tbis reco-rd may be disclosed to persons without a "need to Imow", as dcfintd in 49 CFR parts 15 and 1520, except with the written permission of the Administr ransportation Seeurity Adminutration or tbe Secretary of Transportalion. Unauthorized release may result in 'Civil penally or Gther aetiau. For U.S. gf.lvernment ' . u lie disclosure is governed by 5 U.S.C. 552 and 49 CFR parts 15 and 152Q. A-9 SENSITIVE SECURITY INFORMATION *Reference Number AC-25 AC-26 Control Category DHSorTSA Reference TSAMD 1400.3, v3.1 JI, Chapter 4, Section 2 Access Control "'Network Logical Access Control" Section 3.4,Part A TSAMD 1400.3, v3.1 _rl, Chapter 4, Access Control Section 3 Systems IT Security ReQuirement An end user assets shaH have Met Requirement YesINo or NtA Notes No or NtA, Other "'*Waiver Explanation ***Exemption Explanation and employ session inactivity lockout capabilities in accordance with TSA MD 1400.3, End User Assets Policy. Remote access shall require identification and authentication consisting of a user identity and password and shall not be connected to any Access" Section other network aside from the 3, Parts D and J TSA network. TSAMD Split-tunneling or dual homing 1400.3, v3.IJI, shall not be permitted at any Chapter 4, time; only one connection is allowed. Access Control Section 3 ;~Rernote AC-27 "Remote Access" Section 3, PartM DHSMD4300, v2.1, Chapter 4, Section 4.6.2, "Wireless LANs Part A; TSAMD 1400.3, v3.1JI, Access Control Chapter 4, Section 4 H , AC-28 '~Wireless Wireless communications technologies are prohibited from use within DHS unless the DHS CISO specifically approves the technology and application. [If the device is equipped with wireless technology, this requirement must be met and Access" Section this technology MUST be 3, Part A disabled on the device1 WARNING, This record ,ontains Sensiliv. Security Inl",·m,tion that i, controlled under 49 C~p"t ----- 01 thi, record may be di"losed to persons "ith,ut a "need to know~', as defined in 49 CFR parts IS and 1520, except with the written. permission ministrator of the Transportation Security Administration or the Secretary of Transportation. UnautIl6ri:z~d release may result in civil penalty or other action. For U.s. go ent agencies, public disclosure is governed by 5 U.S.c. 552 and 49 CFR parts 15 and 1520. A·IO SENSITIVE SECURITY INFORMATION *Reference Number AC-29 AC-30 AC-31 AC-32 DHSorTSA Reference DHS MD 4300, v2, I, Chapter 5, Section 5.3, Access Control "Identification and Authentication", PartB TSAMD 14003, v3,1 _rl, Chapter 4, Section 2 Access Control ''Network Logical Access Control" Section 3.7,PartA Control Cate,gory Systems IT Security Requirement For IT systems requiring authentication controls, the IT system shall ensure that each nser is authenticated before IT system access occurs. Met Requirement YesINo or N/A Notes No or N/A, Other **Waiver Explanation ***Exemption Explanation Each system will be configured to restrict a user or process to the least privileges or access required to perform authorized tasks. Unencrypted passwords shall he transmined as ASCII characters ifinterchanged between TSA IT systems within the TSA Wide Area Network and shall be TSAMD transmitted separate from any 1400.3, v3.1 _fl, identification ofintended use. Chaptel'3, Encrypted passwords and Access Control Section 7 virtual passwords shall be "Passwords" transmitted either as a 64-bit Section 3.2.6, binary field in bit-oriented PartC communications, or as ASCII representations of the hexadecimal character set (i.e., the 16 characters in the set [09. AF] in character-oriented communications). TSAMD VPN assets shall be Access Control 1400.3, v3.1 _fl, automatically disconnected from the TSA network after Chapted, ----- WARNING: This re-eord contains Sensitive Security Information that is controlled under ~parts 15 and 1520. No part of this record may be diseIDsed to persons without a "need to know", as defined in 49 CFR parts 15 and 1520, ex«'!ptwith the written perm' . rUI tnc Administrator of the Trnnsportatlon Secnrity Adminktratlon or the Sceretary of Transportation. Unauthorized release may result in dvil penalty or other action. F ~. g(Jvernmcnt :igenclc-s. public disclosure is governed by 5 U.S.c. 552 and 49 CFR p~rts 15 and 1520. A-II SENSITIVE SECURITY INFORMATION *Reference Number Control Caterrorv DHSor TSA Reference Section lid "VPN Security" Section 3.2, Part F Systems IT Security Met Requirement YeslNo or NfA Reauirement thirty minutes of inactivity. Notes No or NfA, Other **\Vaiver Explanation ***Exemption Exolanation The user must then logon again to reconnect to the network. Pings or other artificial network processes AC-32 AU-I used to keep the connection onen are prohibited. File Transfer Protocol (FTP) shall not be used to connect to or from any DRS computer. FTP shall be disabled on the device. DHS4300A, v3.2, Chapter 5.0, Access Control Section 5.4.5, "Network Security", Part F AU devices capable oflogging TSAMD 1400.3, v3.IJl, shall have logging enabled at all times. C1lapter 4, Audit and Section to Accountability "Security Audit Trails" Section 3, Prnt A AU-2 AU-3 All successful and TSAMD unsuccessful attempts to 1400.3, v3.IJI, access TSA networks, network Cbapter4, devices, software applications, Audit and Section 10 and systems shall be logged Accountability ~<Security Audit automatically to an approptiate Trails" Section log file hy the component's 3, PartC logon process. Audit trails shall contain at a TSAMD minimum, the idcutity ofeach 1400.3, v3.1 _rl, user and device accessing or ,Chapter 4, Audit and attempting to access an Section 10 information tcchnology (IT) Accountability "Security Audit system or network component; Trails" Section the time and date of the access 3, Part D and the logoff; activities that ~ C~"'t ------ ~ WARNING: This r.cord oont.i.s S,nsitivc Security Information that co.troned uudcr 49 of .his r""onl may be disclosed ro persons with.ut a ''ueed to kn<Jw", as defined in 49 CFR parts 15 and 1520, except witll the written permission of the Admi' ator of the Transportatil:m SfcurUy Administration or the Secretary of Transportadon. Un81ltllOl'ized rclcasc may rEsult in civil penalty or other action, For U.S. govel'nment a .. s public diselosllre is governed by 5 U.S.c. 552 and 49 eFR parts 15 and 1520. A-12 SENSITIVE SECURIT}' INFORMATION *Reference Number Control Category AU-4 Audit and Accountability AU-5 Audit and Accountability AU-6 Audit and Accounlability AU-7 Audit and Accountability AU-8 Audit and Accountability DHSorTSA Reference Systems IT Security Requirement mig/lt modify, bypass, or negate IT seourity safeguards; and security-relevant actions associated with processing. Individual audit trail records TSAMD 1400.3, v3.1 Jl, shall specify the authenticated Chapter 4, identity oftlle individual or Section 10 process generating the record. "Secmity Audit Trails" Section 3, rart J TSAMD Individual audit trail records 1400.3, v3.J - rl, shall specify the software or Chapter 4, system command used to Section 10 initiate the event. "Security Audit Trails" Section 3, Part J TSAMD Individual audit trail records 1400.3, v3.1 _rl, shall be time stamped, Chapter 4, accurate to within a second or Section !O less ofthe TSA network time "Security Audit reference, and include local Trails" Section time zone information. 3, Part J TSAMD Password files shall be 1400.3, v3.1 _rl, encrypted or hashed when Chapter 4, stored in logs. Section 10 "Security Audit Trails" Section 3, Part K The information system shall TSAMD 1400.3, v3.1 J 1, provide the capability to Chapter 4, ensure timt audit trails and Section 10 audit 10l!S are Drotected against Met Requirement YeslNo or N/A Notes No or N/A, Other **Waiver Explanation ***Exemption Explanation WARNING: ThiS re . sitivc Secllrlty Information that is controlled under 49 CFR parts 15 and 1520. No part of this record may be diS<':loscd to persons without a "nero to l(Oow", ali defined in 49 CFR parts 15 and 15 • ex . 'tten ermis!'.ion of the Administrator of the Transportation Security Administra(ion fir the Secretary of Transportntion. . bUc disclosure is governed by 5 V.S.c. 552 and 49 CFR parts 15 and 1510. Unauthorized rdcase may result in civil penalty or other action. For U.S. gavern A-13 SENSITIVE SECURITY INFORMATION *Refcrence Number AU-9 Control Category DHS orTSA Reference "Security Audit Trails" Se<:tion 3 l'artH DRS Windows Server 2003/Windows XI'Secure Audit and Baseline Aecountability Configuration Guide, Sectton 2 "Audit Trail Systems IT Security Requirement unauthorized a'teration~ loss, Met Requirement Yes/No orN/A Notes No or NIA, Other **\'laiver Explanation ***Exemption Explanatio" unavailability, disclosure. or destruction. Auditing shall be implemented in accordance with DHS Secure Configuration Baseline Guide for the information system Operating System. Controls" IA-I TSAMD 1400.3, v3.1 _rl, Chapter I, Identification and «General Authentication Information Security Policy", Section 5.1.3.9 DHSMD4300, v2.l, OJapter 5, Section 5.8, '''Virus Protection~', Part A 81-1 System and Information Integrity SI-2 DHSMD4300, v2.1, Chapter 5, Information Section 5.8, "Virus lntegrity . :' Protection", Part A System and i The information system shall provide the capability to uniquely identi!)' and authenticate users prior to each network session. This includes access to individua~ group, and functional or service accounts. The positive identification must be verified through strong authentication methods (e.g., password, biometric, token, certificate, etc.). The information system shall implement antivirus software at the desktop that is properly configured to che<:k all files. The information system shall install updates to antivirus software and signature files in a timely and expeditious manner without requiring the end user to specifically request the update. ~ WARNfNG: This record ~ontains Sensitive Security Informathm tbat is rontrolled un 9 CFR parts lS and 1520. No part oftbis record may be disclosed to persons without a "neEd to kn()w", as defined in 49 CFR parts 1511lld 1520. c.xceptwith the written permis·" of the Administrator of tlte Transportation Securii}' Administration or the See.retnry ofTransportn(ion~ UnRnthoriwd nlease may result in civil penalty or other acti{jn. F'or U.S. rnment aget1cics, public disclosure is gov-erne-d by 5 U.S.c. 552 and49 CFR parts 15 and 1520, A-14 SENSITIVE SECURITY INFOR]\{:<AJION *Referenee Number Control Category 81-3 System and Information Integrity DHSorTSA Reference TSAMD Systems IT Security Requirement All initialization, shutdown, 1400.3, v3.lJI, and abort sequences and Chapter 3, scripts shall be configured to ensure the network remains in Section II "Infrastructure a secure state. Asset Security" Section 3, Part H Met Requirement YeslNo or NJ A Notes No or N/A, Other **Waiver Explanation *Exemption Explanation >1<", WARNING~ TillS retord contains Sensitive Secnrity Information that IS lied uude]' 49 CFR parts 15 and 1520. No part oHllls record may be disdosed to persons without a "need to ImolY", as defined in 49 CPR parts 15 and 1520, except with the written permissiun Administrator of tbe Transportation Security Administratilm or the Secretary of Transporta!ioll. Unauthorized release may result in dvU penalty or other action. fio. U.S. government agencies, . disclosure is governed by 5 U.S£. 552 and 49 CFR PdTts 15 and 1520. A-IS SENSITIVE SECURITY INFOR~f*~feN APPENDIX B FIELD DATA REPORTING SYSTEM REQUIREMENTS DATA ELEMENTS The data elements to be collected by the 'WEI system are described in the following five tables: Title Table Content I Operator Log Information Information for each 10 Session. II Information for each system event III System Event Infonnation Access History Information IV Scan Information Information for each scan completed by the WEI System. V User Data File User Data Information Information for data and report access . TABLEI 0,perator Log In~ormatIOn. Field Name Field Description Field Format MACHlNE_ID Identification number of the WBI String (length = 8) User_ID Identification login of the 10 String (length = 15) FirstName IO First Name String (length = 15) LastName 10 Last Name String Field Values/Comments Upon contract award a Contractor identifier will be assigned by the Government The field fonnat is a total length of eight (Contractor identifier plus WBI System serial number), (length'" 15) LoginTime IO Login Time String (length = 19) mm~dd-yyyy _hh:mm:ss LogoutTime IO Logout Time String (length = 19) mm-dd-yyyy_hh:mm:ss PaxCount Number of passengers scanned during session Integer WARNING, This record contains Sensitive e Information that is £Qntrolled under 49 eFR parts 15 and 1520. No part of this record may be dis<:losed to persons withtlut a "ne"d t ", lls defined in 49 eFR parts 15 and 1520. except with the written istration or the SecretaI'}' ()f Transportation. Unauthorized permission of the Administrator of the Transportation Security relcas<' rna)' re.ult h. civil penalt)· or nth.... lienon. For U.s. gov~rx..u.nt 1Ogel1 ublic disclosure is gov"rned hy :Ii lU;.e. 552 and 49 eFR parts 15 and 1520. -- SEN~InVE Field Name SECURITY INFORM: ATION Field Description Field Format Field Values/Comments PaxSuspectCount Number of passengers suspect during session Integer PaxClearCount Number of passengers cleared during session Integer Affiliation Company the 10 works for (TSA or Contractor) String (length = 50) SiteCode FAA Airport Code String (length = 3) Such as: SNA, BOS, EWR SubsiteCode Machine Location String (length = 20) Example: "Terminall Lane 2" WBIModelNo Model Number of String the WBI System (length = 8) WARNING: This rCl:ord c;:ontains Sensitive Sccurit)' Information tha conu:oIled under 49 CFR parts 15 and 1520. No part of this "",('ot'd m:ty he disclosed to persons without a "need to know''" defIned in 49 CFR parts 15 and 1520. e~('ept witb the written perml<;.sion of the Administrutor of the Transportation Secnr Administration or the Secretary of Transportation. Unauthorized release ma.y result in civil penalty or other action. For U.S. vernment agencies. public disclosure is governed by 5 U.S.C. 552 and 49 CFR parts 15 llnd 1520. B-2 SENSITIVE SECURITY INFOR.1WATION TABLEII . S~vst em Event I norma £ ti on. Field Name Field Description Field Format Field Values/Comments MACHINE_ID Identification String number of the WBI (length = 8) System Upon contract award a Contractor identifier will be assigned by the Government. The field format is a total length of eight (Contractor identifier plus serial number). WBIModelNo Model Number of String the WBI System (length = 8) SitcCode FAA Airport Code String (length = 3) Such as: SNA, BaS, EWR SubsiteCode Machine Location String (length = 20) Example: "Terminal I Lane 2" SoftVers WBI software version identification String (length = 10) Contractor assigned software version identification for the software running on the WBI System User_ID Identification login of the 10 String (length = 15) FirstName 10 Name LastName IOName AccessLevel Access Control Level String (length Affiliation TO Affiliation String (length = 15) Event_Time At what time did the String event occurred? (length = 19) mm-dd-yyyy_hh:mm:ss Event What event occurred? At a minimum, possible choices String (lcnRth = 15) String (length = 15) I) String (length = 25) include: account creations, modilY account, machine fault resets, 10 logoff, 10 logon, Operational mode change, View reports, download data, software restart, system errors, system startup, svstem shutdown. s.ns~,ation that i, controlled nndcr 49 eFR parts 1S and 1520. No part of thi, tn.'tY b" disclosed to persons without a "need to kno ' defined in 49 CFR parts 15 and 1520, el':<:ept with the written permission of the Administrator of the Transportation Seculity Adml . non or the Secretary of Transportation. Unauthorized release may result in civil penalty or other a<:tion. For U.S. government agencies, lie dif'dosure is governed b" 5 U.S.C. 552 and 49 WARNING: Thi' re<ord contain' J'1!!~l)I'd CFR parts 15 and 1520. SEN SI'I'IVE SECUltITY INFORM2\'fffiN" TABLE III" ACCCSS H"IS t 00' I. norma f< ti on. Field Name Field Description Field Fonnat Field Values/Comments Upon contract award a Contractor identifier will be assigned by the Government. The field format is a total length of eight (Contractor identifier plus serial number). MACHINE_lD Identification number String (length = 8) of the WBI SYSTEM User ID Identification login of String (length = 15) the 10 AccessLevel Access Control Level String (length = 1) Action System action Integer Use I =download files 2=cbange parameters 3=enter/modify users 4==view reports ActionTime Time action occurred String (length = 19) mm-dd-yyyy_bh:mro: 5S ReponType Report type Integer Downloaded Was the file downloaded? String Use 1=10 Log Report 2=Event Log Report 3=Access History Report Use D=Downloaded (length=l) N=Not Downloaded WARNING, This record contains Sensitive Security non that is controlled under 49 eFR parts 15 and 1520. No part of this record may be disclosed to persons without 0. "need to 1m" /I defined ill 49 CFR p'lrts 15 dnd 1520, except with the written pernlission of the Administrator of the Transportation Security A . . 't,ration or the Secretary (If TranSpol·tation. lJnauthorlzed release mil)' result in civil ptll1alt)· or other action. For U.s. government "ll"n CFR parts 15 and 1520. SENSfHVE SECURiTY INFORMATION TABLE IV Scan Information Field Name Field Format Field Description Field Values/Comments MACHINE_ID Identification number of the WBI String (length = 8) Upon contract award a Contractor identifier will bc assigned by the Government. The field format is a total length of eight (Contractor identifier plus WBI System serial number). SoftVers WBI software version identification String (length = 10) Contractor assigned software version identification for the software rUlUling On the WBT System ImageStart Date and time the String passenger scan starts (length mm-dd-YYYLhh:mm:ss 19) ImageComplete Date and time the passenger scan completes String (length = 19) mm-dd-yyyy_hh:nnn:ss IORespTime Date and time the 10 String decision is made (length = 19) mm-dd-yyyy_hh:mm:ss TO Decision Nature ofIO response String (length Use C for Clear S for Suspect Identification login of the 10 String (length = 15) User_ID I) 'VARNING: This record contains Sensitive Security Infor ation that is controlled under 49 CFR parts 15 and 1~2o. No part of this record may be dlscl<Jsed to persons without a 'Ineed to . QW". as defined in 49 CFR parts 15 and 1520, except with the written permission of the Administrator of the l'raosportatio Securi~' Administration or the Secreta!')' of Tram,portation. Unauthorized t'eleasll' mll;r result in civil penalty or other action. Fo li.S. government agencies. public disclosure is governed b~> 5 l).S.C. 552 and 49 CFR parts 15 and 1520. B-5 SENSITIVE SECURITY INFORMATION . TABLE V User Data File Field Name FirstName Field Format Field Description String (length TSOName Field Values/Comments 15) LastName TSOName String (length = 15) User_ID Identification login of the TSO String (length = 15) Password TSO Password String (length = 15) Affiliation TSO Affiliation String (length = 15) AccessLevel Access Control Level String (length = I) Status User Status String (length = I) Use I=active O=inactive StatusDate Date current status was activated String (length = 19) mm-dd-yyyy_hh:mm:ss is contJ'olled under 49 eFR parts 15 and 1520. No part 0:£ this to know" as defined in 49 CFR parts 15 and 1520. except with the written WARNING: This record contains Sensitive Securit)' Information tb rcc:ord may be disdoS0d to persons with~ut .It "n~ed permission of tbe Administrator of the Transportation Sec l"e1case ma~: ~'Administration or the Secretnry of Transportation. lJnauthorized result in t;:i,vil penalty or other action. For Ii • government agencies, public disclosure is CFR parts 15 and 1520. )3-6 gov~l'ned h)'" 5 TLS.C 552 :lnd 49 SENSITIVE SECURIJ;¥ INFORMATION APPENDIX C USER ACCESS LEVELS AND CAPABILITIES User access and associated capabilities, based on usemame, password, and user access level, shall (197) be as outlined in the Access Control Levels Table. Access Control Levels Table User Access Level Z User Capabilities Transportation Security Administration Headquarters Contractor Maintenance Technician (see Note Logon and Logoff Startup and Shutdown EnablelDisable Image Filters Access Test Mode Export Raw Image Data in Test Mode Modify Access Level Capabilities UploadJDownload User Database Create and Modify Accounts (All Users) Download Data (see Note 1) Set and Alter Passwords (All Users) (see Note 1) Modify Baselined or Fielded Software (see Note 1) Access Operating System :tlQte I: Contractor Maintenance Technicians shall not set or alter passwords and shall download data only without alteration. Contractor "superuser" passwords will be disabled by a Government representative after site acceptance. Only Government approved so.ft\'rare changes shall be made to the baselined or fielded software. 1) Super User 1 Federal Security Director Screening Manager Screening Supervisor All Access Level 2 Capabilities Logon and Logoff Startup and Shutdown EnablelDisabIe Auto-Detect Highlighting CreatelModify Accounts (Level 2) 2 Lead-In-Charge All Access Level 3 Capabilities Perform Daily Preventative Maintenance Create and Modify Accounts (Level 3) Access and view WBI FDRS Database and Reports Access and view WBI User Database Download WBI FDRS Data Calibrate system WAR."I/1NG: This rfcord contains Sensitive Security InfoI' n that is controUtll under 49 CFR parts 15 and 1520. No part of this reeord may be discl~.ed tt> persons with6ut " "n'" 0 know", as defined in 49 CFR parts 15 lind 1520, except with the written rtan'.lJl Security Administl'ation or the Secretary of Tran~portatioD. Unauthorized permission of the Administrator of tbe Tr release rna}' result in civil penil.lty or J: nction. For U.s. government ag'H1.ie~, puhlic di~dosure i. governE'(\ b)' !i U,S.c. 552 and 49 CFR parts 15 and 1520. C-l 8ENSITIVE SECURITY INFORMATION User Access Level 3 User Operators Capabilities Logon and Logoff Startup and Shutdown Access Screening Mode Screens Passengers Initiate Fault Isolation Test WARNING: This record contains Sensitive Se<:urit)' Informatio at is conn'olled under 49 CFR parts 15 and 1520. No part of tbis k"ecord m1ty be disclos~d to pl'rsons without a "need to· ''', as defined in 49 CFR parts 15 and 1520, e;:((:ept with the written permission of the Administrator of the Transportatio ecurity Adminlstratinu or the Secretary of Transportation. 'Unauthorized release ma;r result in dviJ penalty or other action. r U.S. govel'nm~nt CFR parts 15 and 1520. C-2 agencies, puhlic disclosure is governed by 5 U.S.c. 552 and 49 SENSI'IIVE SECORITY JNFORMATION APPENDIX D TSA OPERATIONAL POWER REQUIREMENTS 1.0 INTRODUCTION The purpose of this document is to define the minimum power performance requirements for any detection system that identifies potential threats 011 a person, an article of baggage, a parcel or cargo. The standards, on which these requirements were based, have been adopted from the FAA Specification Document: Electronic Equipment, General Requirements (FAA-G-2l00H). 2.0 OVERVIEW The requirements defined in this dOC1Jment were generated from the results of eight different electronic screening device tests, from the point-of-view of "power system perfonnance." The tests were conducted between August 21 st and August 25 th 2006, at the Transportation Security Laboratory (TSL) and the Doughty Road Laboratory. The objective of these tests was to provide confidence, as well as validate the compatibility ofTSA's equipment with the available electrical supply at its various deployment locations. Special attention was given to the equipment's power profile, energy consumption, and vulnerability to power system events (i.e., voltage sags and drops). Each system was tested to define the baseline electrical performance relative to: (a) The respective equipment data sheets, (b) The current Commereial-Off-the-Shelf (COTS) procurement specification, and (c) The actual system voltage sag and intenuption withstand performance. The recorded results of these tests are expected to provide procurement and specification personnel with a better understanding ofthe impact that detection systems have on other facility equipment, in addition to their internal components. This includes the sensitivities of detection systems to some of the more common power quality variations that may be encountered at locations where the detection systems are deployed. 3.0 EQUIPMENT For the purpose of this document, "detection systems" will refer to all screening devices using bulk, trace, or any other teclmology to screen passengers and their luggage before entering a secure area (e.g., Checked Baggage Systems, Checkpoint Systems, Cargo Screening Systems, or any other passenger and baggage screening system). 4.0 MEASUREMENT Power over an entire operational cycle tends to vary as heaters, compressors, and other cyclic loads tum on and off. The measured "Max.imum Steady State Load" will identify the highest level of power drawn consistently over a measured period oftime (e.g., 4 kW for 5 min, with no changes). Therefore, the Maximum Steady State Load must be maintained during a full operational cycle while power requirements are measured and recorded. 5.0 POWER PERFORMANCE DATA ACQUISITION AND REQUIREMENTS ANALYSIS 5.1 BASELINE VOLTAGE AND CURRENT DISTORTION The baseline voltage and current distortion measurement identifies the harmonic current distortion of the equipment and determines how that current distortion level will distort the vo tage at the supply point. WAlli~ING: This record contains Sensitive Security Information t controUed under 49 CfR parts 15 and 11520. No part of this rt'cord may be disclosed to persons without il "need to k , as defined in 49 CFR parts 15 and 1520, except with the written permission of the Administrator of the Transport' ecurity Administration Qr the Secretary of Transportation. lJnauthorized r"lease may result in civil penal!)' or other . . For U.S. government agencies, public disclosure is governed by 5 U.S.c. 552 and 49 CFR parts 15 and 1520. 0-1 SENSITIVE SECUftlTY INF'ORMATION Total Harmonic Distortion - The "Total Hannonie Distortion" will be calculated as the square root of the cumulative sum of each measured distortion over several operational cycles. The maximum Total Hannonic Distortion (THD) during a full operational cycle for detection systems' shall (198) be less than three percent «3%), as specified in the follO\ving references: (a) IEEE 519, Harmonic Limits and (b) FAA·G-21 OOH, 3.1.1.3.2.£, Inrush Current. Individual Harmonic Distortion The measured "Individual Hannonic Distortion" will identify the maximum distortion of the equipment during any operational cycles over a specific period oftime. The maximum Individual Hannonics (IN) during any given cycle for detection systems shall (199) be less than three percent «3%), as specified in the following references: (a) IEEE 519, Harmonic Limits and (b) FAA-G-2100H, 3.1.1.5.c, Table 1, Hannonics. 5.2 POWER USAGE PROFILE AND POWER FACTOR The power usage profile and power factor measurement evaluates the minimum and maximum power drawn during a full operational cycle of the equipment. Once the full load power draw is determined, the power factor is measured at the full load value. Power Factor (a,mll.'dmumstoodys(.tdooding) - Standard measure of "Power Factor" includes two methods, Displaced Power Factor (DPF) and Distortion Power Factor, or Total Power Factor (TPF). As long as the meter being used integrates the instantaneous voltage and currents over each cycle of the power frequency, the calculated Power Factor will be accurate regardless of the method selected. The Power Factor at maximum steady state loading shall (200) be greater than point six (> .6) for all detection systems, as specified in the following reference: (a) FAA·G-2100H, 3.1.1.3.1, Power Factor. 5.3 MAXIMUM INRUSH CURRENT RATIO The inrush current measurement assesses the maximum peak inrush of the equipment during a full operational cycle and detennines how that peak inrush compares to the maximum steady state Root Means Square (RMS) current drawn. Max Inrush Current Ratio ~ The maximum inrush current ratio will compare both the Maximum Peak Inrush (lm2X pea0 and the maximum steady state RM:S current (Imax RMS) through the following formula: ImllX peak I IJlli\x RMS. The maximum "Inrush Current Ratio" during a fun operational cycle for detection systems shall (20 I) be less ilian twenty times « 20) the steady state, as specified in the following references: (a) IECIEN61000-3-3, Flicker and Voltage Variation and (b) FAA-G-2100H, 3.1.1.3.2.h, Inrush Current. 5.4 STEADY STATE CURRENT UNBALANCE The steady state current unbalance measures the current unbalance of the equipment and determines how that current unbalance value compares to the COTS procurement specification. WARNING: This record contailLS Sensl Tit)' Information that is controlled under 49 CFR parts 15 and 1520. No part of this record may bc dlaclo..d to PCl"$OI1S without'" "nee . w". as derIDed in 49 CFR parh 15 and 1520, except with the written permissioll of the Administrator of the TranSpllrtatioD Security . . atioD or the Se~rebry of T ....nsportatien. '()nauthori2:ed release may J'''suU in civil penal!)' or other action. For U.S. govcrnmeJ;lt agencies, . ·SdO_UN i. governed hy 5V.S.C. 552 and 49 pun l5 and 15Z0. em D·2 SEN£ITIVE SECURITY INFORMATION Avg. Current Unbalance (lUND A'~) - The averagc eurrent unbalance will be the sum of eaeh eurrent unbalancc measured over the course of several operational cycles. (a) The average current unbalance measured for detection systems shall (202) be less than ten percent « 10 %), as specified in the following references: 1. National Electrical Manufacturers Association (NEMA) 11. FAA-G-2100H, 3.].1 A., Electric Load Balance. M61 and (b) The average current unbalance measured for detection systems shall (203) be verified and adjusted as needed during site acceptance. Max Current Unbalance (TUN''''''.) - A three-phase system is called balanced if the three-phase voltages and currents have the same amplitude and are phase shifted by 1200 with respect to each other. If either or both of these conditions are not met, the system is considered unbalanced or asymmetrical. Thus the maximum current unbalance is the maximum current measured that is out of symmetry, with respect to the other phases. (Note: Under multiple system configurations, it is possible for the eurrentunbalance of one system to be neutralized by the current unbalance of the next system (based on phase and direction)). (a) The maximum current unbalance for threat detection systems shall (204) be identified. for each system to substantiate the caleulation, sizing and integration of multiple configurations of the same equipment. (b) The maximum current unbalance for threat detection systems shall (205) be verified and adjusted as needed during site aeceptanee. 5.5 MAXIMUM LEAKAGE CURRENT The intent of the maximum leakage eurrent measurement is to identify the maximum leakage current injected onto the ground conductor by the equipment, during a full operational cycle. In addition, this measurement will help determine how that value might need to be correlated to ground fault protection settings, if applicable at the installation location. Maximum Leakage Current - The maximum leakage current is the current that flows from the unit through the grounding conductor into a facility ground. Leakage current could shock an individual if the household grounding is not sufficient or there is an intentional or unintentional interruption of grounding connection. Ca) The maximum leakage current measured for detection systems shall (206) be less than or equal to three and a half milliamps (3.5mA) as specified in the following references: 1. UL Standard 60950, clause 5.1.7, ii. lEe 6060 I-I, General requirements for basic safety and essential performance, and iii. IEEE Transactions on Very large Scale Integration (VLSI) Systems, 12(2):131-139. 5.6 VOLTAGE SAG AND INTERRUPTION WITHSTAND PERFORMANCE The voltage sag and interruption withstand measurement evaluates the capability of the equipment to withstand power faults which result in momentary power system interruptions. The secondary objective of this requirement is to evaluate the system drop-off and subsequent restart time. -- Voltage Sag - The voltage sag measurement identifies the length oftime and percentage below nominal usage that n system can tolerate) if the power source is interrupted or eliminated during normal operations. W AR~NG: TWs record contains Sensitive Securit)' Information that is controlled uode reeord may hi: dilldoll",d to persons without 9 14 neQ d to know", AS permission of the Administrator of the Trans ort release mar re:ntlt in civil penal r Administration ern 01' arts 15 and 1520. No part of this parb 15 and 1520. except with the written the Secretal')' of Transportation. Unauthorized action. "'or U.s. govcl'nmC'nt agencies, public disclosure i.ll CFR parts 15 D-3 gov~rned by 5 tl.S.c. :552 lind 49 SENSITIVE SECURITY INFORl\,fATION (a) The voltage sag for detection systems shall (207) tolerate a zero voltage for a minimum duration of twenty milliseconds (20 ms) as specified in the following references: 5.7 1. lEC 61000-4-34, Voltage Sag Immunity, 11. lEe 61000-4-11, Voltage Dip Immunity, and 111. lTIC (CBEMA) Curve 07.01.2000. UNINTERRUPTIBLE POWER SUPPLY The presence of an Uninterruptible Power Supply (UPS) demonstrates the systems ability to shield against unexpected power fluctuations, voltage sags or temporary power loses from the power distribution sources. As a byproduct of power performance, a weak UPS can cause unwarranted system reboots, hang-ups, and several other system anomalies. Uninterruptible Power Supply ~ The health ofa UPS can be significantly affected by the system's ability to tolerate the variance of power over short periods oftime. Measuring the strength of the UPS identifies the systems ability to maintain operational availability during moments of critical power failure. The UPS, ifpresent, shall (208) be configured into the core system for automated monitoring and display of the current health and condition of the UPS. WARNING: This recllrd co,ntalns SenSitive Securit)· Informatllll1 that is 'olled under 49 CFR parts 15 and 1520. No part of this record nUl)' be disclosed to persons witbout II "need to know" efined in 49 eFR parts 15 lind 1520, except with the written permhsion of the Administratllr of the Transportation S Ity AdminiJtration Or the Secrctoll'Y of Transportation. UDauthllrized release may result in civil penalt:\, or other acnon. .5. govel'>1ment ag.mcles, public di.closure b governl>d by !Ii II.s.C. 552 and 49 CF'R parts 15 and 1520. D·4 SENSITIYE SECURITY INFOR.M~ TION APPENDIX E WBI REPORTS FDRS REPORT DISPLAY 1.0 The WBI system shall (209) provide the reports listed in Table 1 below. Data reports (Reports 1, 2 and 3) shall (210) be viewable by calendar month and year (e.g., February 2008). Table 1. WEI Data Reports Report Narne ReDort 1 10 Log Report 2 Event Report 3 Access History Report 1.1 10 Log Report The 10 Log Report shall (211) present an overview of all lOs who worked each day for the selected month, along with their locations and login/logout times. The 10 Summary Report shall (212) contain one record / row in the output table for cach login session occurring in the date range. This report .<hall (213) be downloadable and be viewable on the 10 Station monitor. Output Field User_ID DescriDtion Identification login of the 10 Format String (length = 15) LastName 10 Last Name String (length = 15) FirstName 10 First Name String (length = 15) LoginTime 10 Login Timestamp String (length = 19) LogoutTime 10 Logout Timestamp String (length = 19) PaxCount Number of passengers scanned during session Integer PaxSuspectCount Number of passengers suspected during session Integer PaxClearCount Number of passengers cleared during session Integer Affiliation 10 Affiliation String (length = 15) WBIModeiNo Model Number of the WBI System String (length = 8) SiteCode FAA Airport Code String w_" ~ ••N,_••~ ~•• cm_~.. ~,,~ ,"_" of this record may be disclosed to persons without a "need tow", a$ deitned in 49 CFR plIrt:s 15 and 1520, enept with the permil)siM of the Administrator (If the Tran tatiOD SeC:l.l.rity Administration or the SecretaI')" of Transportation. Unauthorized release may result in civil penal' other action. For U.S. gOYfll"nment agencies, public disclosure is governed by 5 U.S.C. 552 and 49 CFR parts 15 an . writt~n SENSITIVE SECURITY INFORMATION Deseription Output Field SubsiteCode 1.2 Format (length - 3) String (length = 20) Machine Location Event Report An Event Report containing details of each system event shall (214) be provided. This report shall (215) consist of one row per event, and shall (216) provide data indicated in the following table. This report shall (217) be downloadable and be viewable on the 10 Station monitor. Descriotion OUtDU! Field Fonnat MACHINE_ID Identification Number of the WBI System String (length ~ 8) LastName 10 Last Name String (length ~ IS) FirstName 10 First Name String (length = 15) User_ID Identification login of the 10 String (length = 15) SiteCode FAA Airport Code String (length ~ 3) Event_Time Time event occurred String (length = 19) Event Description of event String (length 1.3 = 25) Access History Report The Access History Report shall (218) report who modified system settings as well as the time and nature of the modification using the format described below. The Access History report also presents detail on administrative operations activity (Le., who accessed the report, the type of report, and when the report was accessed). This report shall (219) be downloadable and be viewable on the 10 Station monitor. Output Field Description Format MACHINE)D Identification Number of the WEI System String (length ~ 8) User_ID Identification login of the 10 String (length = 15) AccessLevel Access Control Level String (length = 1) Action System action Integer ActionTime Time action occurred ../' String WAR1~ING: This record contains Sensitive Security InfQrmation tha . controlled under 49 eFR parts 15 and 1520. No paJ;'t of this rccord may be disclosed to persons without a "need to , as defined in 49 CfR parts 15 and 152:0, I;'!xc:ept with the written permission of the Administrator of the Transpo 1011 S¢curity Administratioll or the Secretary of Transportation. er action. For U.S. go",·ernment agencies, public disclosure is governed Unauthorized relcase may result in civil penalt)' or by 5 U.S.C. 552 llnd 49 CFR parts. 15 and 152 SENSITIVE SECURITY INFORMA lION Outnut Field Descrintion Format (length = 19) ReportType Report type Integer Dov.nloaded Was the file downloaded? String (length=l) WARNING: This re<:ol'd contains Sensitive Security InfQrmatio tat is controlled under 49 eFR parts 15 sod 1520. No part of this record may be disclllsed to persons without a "need t ow". as defined in 49 CFR parts 15 and 1520, except with the written permisshm Qf the Administrator of the Transpo don Security Administration or the Secretary of Transportation. Unauthorized release may result in civil penalty or 0' er action. For U.s. government agencies, public disclosure is governed by 5 U.S.C- 552 and 49 eFR pllrts 15 and 1520.