Information Security Grant Program
NATIONAL SECURITY AGENCY, DEPARTMENT OF DEFENSE
Public Law 97-89, NSA/CSS Directive 60-11.
The National Security Agency (NSA) is involved with the development of secure computing systems. This grant program is designed to assist in the area of unclassified Information Security research. This research should provide significant advances in our nation's ability to design, build, and maintain computer systems that perform with a high degree of integrity, confidentiality, and service assurance. Additionally, this grant program is aimed at developing computer science graduates who are knowledgeable in the area of Information Security from which NSA can recruit.
Types of Assistance
Uses and Use Restrictions
Summer salary, professional travel, publishing costs, graduate student support, postdoctoral support, and conference support. No more than two summer months support from all sources. No released time from teaching during the regular academic year.
Investigators must be an employee of a U.S. college or university, the principal investigator and supported graduate students must be (at least) a permanent resident of the U.S., graduate students must at least have started to apply for U.S. citizenship.
This will benefit researchers in the information security field of computer science that are at least permanent residents as well as their students that are permanent residents of the U.S. and intending to apply for U.S. citizenship.
Application and Award Process
None. This program is excluded from coverage under E.O. 12372.
A brochure is available from NSA giving the form of the proposal. A proposal may be sent directly to NSA by a college or university before the yearly deadline. NSA has the authority for the final approval and passes the funds to a college or university. The college or university distributes the funds to the principal investigator, students, postdoctoral students, etc.
The agency grant and contracting officer coordinates with the performing organization for the effective administration of the grant.
December 15 is the deadline for submission of proposals with certain exceptions, such as conference applications for which there is no deadline.
Range of Approval/Disapproval Time
Generally within 6 months, but may be made at any time throughout the year for which funding is authorized.
Formula and Matching Requirements
Length and Time Phasing of Assistance
Since this is a research and technology program the assistance is generally available for a 1 to 2-year period.
Post Assistance Requirements
Interim and final reports are required. Additionally, copies of publications, conference presentations, dissertations, and theses published as a result of this research are required.
FY 07 $2,000,000; FY 08 est not reported; and FY 09 est not reported. Note: No current information provided by Agency.
Range and Average of Financial Assistance
$50,000 to $100,000. Average: $80,000.
Not available at this time.
Regulations, Guidelines and Literature
NSA provides a free brochure describing how to apply for a grant.
Regional or Local Office
Program Director, INFOSEC University Research Program, Department of Defense, National Security Agency, ATTN: R23, 9840 O'Brien Road, Fort George Meade, MD 20755-6000. Telephone: (301) 688-0847. FAX: (301) 688- 0255. E-mail firstname.lastname@example.org.
Web Site Address
Examples of Funded Projects
Past funded research has been in the following areas: (1) Multilevel Secure Distributed Systems Security; (2) Multilevel Secure Network Systems; (3) Multilevel Secure Databases; (4) Formal Methods; (5) Computer Misuse and Anomaly Detection; (6) Object Oriented Technology; and (7) Secure Applications.
Criteria for Selecting Proposals
The evaluation of proposals is based on the following factors (listed in order of importance): (1) The relevance of the research to the INFOSEC Research and Technology Group and NSA; (2) the perceived quality and realism of the research; (3) qualifications of the principal investigator(s); (4) graduate student involvement and support; and (5) cost realism.