Past funded research has been in the following areas: (1) Multilevel Secure Distributed Systems Security; (2) Multilevel Secure Network Systems; (3) Multilevel Secure Databases; (4) Formal Methods; (5) Computer Misuse and Anomaly Detection; (6) Object Oriented Technology; and (7) Secure Applications.
The Department of Defense provides the military forces needed to deter war and protect the security of the United States through five major areas: peacekeeping and war-fighting efforts, Homeland Security, evacuation and humanitarian causes.
|Recipient||Amount||Start Date||End Date|
|Florida State University||$ 291,312||   ||2015-09-18||2016-09-18|
|Northeastern University||$ 282,770||   ||2015-09-18||2016-09-18|
|University Of California, Irvine||$ 285,854||   ||2015-09-17||2016-09-17|
|Mississippi State University||$ 213,433||   ||2015-09-17||2016-09-17|
|Regis University||$ 179,435||   ||2015-09-17||2016-09-17|
|North Carolina Agricultural And Technical State University||$ 292,750||   ||2015-09-16||2016-09-16|
|University Of Houston System||$ 130,806||   ||2015-09-16||2016-09-16|
|Hampton University||$ 187,020||   ||2015-09-15||2016-09-15|
|University Enterprises Corporation At Csusb||$ 298,781||   ||2015-09-15||2016-09-15|
|University Of Pittsburgh The||$ 264,553||   ||2015-09-15||2016-09-15|
Not available at this time.
Uses and Use Restrictions
Summer salary, professional travel, publishing costs, graduate student support, postdoctoral support, and conference support.
No more than two summer months support from all sources.
No released time from teaching during the regular academic year.
Investigators must be an employee of a U.S.
college or university, the principal investigator and supported graduate students must be (at least) a permanent resident of the U.S., graduate students must at least have started to apply for U.S.
This will benefit researchers in the information security field of computer science that are at least permanent residents as well as their students that are permanent residents of the U.S. and intending to apply for U.S. citizenship.
Aplication and Award Process
This program is excluded from coverage under E.O.
A brochure is available from NSA giving the form of the proposal. A proposal may be sent directly to NSA by a college or university before the yearly deadline. NSA has the authority for the final approval and passes the funds to a college or university. The college or university distributes the funds to the principal investigator, students, postdoctoral students, etc.
The agency grant and contracting officer coordinates with the performing organization for the effective administration of the grant.
December 15 is the deadline for submission of proposals with certain exceptions, such as conference applications for which there is no deadline.
Public Law 97-89, NSA/CSS Directive 60-11.
Range of Approval/Disapproval Time
Generally within 6 months, but may be made at any time throughout the year for which funding is authorized.
Only no-cost extensions allowed when work is not completed. Funds will remain.
Formula and Matching Requirements
Length and Time Phasing of Assistance
Since this is a research and technology program the assistance is generally available for a 1 to 2-year period.
Post Assistance Requirements
Interim and final reports are required.
Additionally, copies of publications, conference presentations, dissertations, and theses published as a result of this research are required.
FY 07 $2,000,000; FY 08 est not reported; and FY 09 est not reported. Note: No current information provided by Agency.
Range and Average of Financial Assistance
$50,000 to $100,000. Average: $80,000.
Regulations, Guidelines, and Literature
NSA provides a free brochure describing how to apply for a grant.
Regional or Local Office
Program Director, INFOSEC University Research Program, Department of Defense, National Security Agency, ATTN: R23, 9840 O'Brien Road, Fort George Meade, MD 20755-6000. Telephone: (301) 688-0847. FAX: (301) 688-0255. E-mail email@example.com.
Criteria for Selecting Proposals
The evaluation of proposals is based on the following factors (listed in order of importance): (1) The relevance of the research to the INFOSEC Research and Technology Group and NSA; (2) the perceived quality and realism of the research; (3) qualifications of the principal investigator(s); (4) graduate student involvement and support; and (5) cost realism.