International terrorism threatens the U.S., its allies and interests, and the world community. Defeating the terrorist enemy requires technologies that can deter and counteract potential attacks.

SRI provides government and civilian agencies with advanced technologies, facilities, and programs to increase physical and cyber security. Solutions include

  • Remote test site for developing methods to neutralize improvised explosive devices (IEDs) and other terrorist threats.

  • The Cyber Security Research and Development Center, supported by SRI for the U.S. Department of Homeland Security

  • Medical countermeasures to prevent, diagnose, and treat conditions caused by potential and existing chemical agents of terrorism


SRI researchers examine a IPDM test device.

SRI has developed a novel approach to safely and efficiently render harmless weapons and ammunition that are no longer needed for military use.

green boxes highlighting people walking on street

SRI’s vision-based systems enable safe operations of moving unmanned ground vehicles around stationary and moving people in urban or cluttered environments.

track boxes around people walking through a parking lot

SRI is developing a prototype system to automatically detect and track multiple individuals in a crowd.

Products & Solutions

PassThru image

An iris biometric system for vehicle entry points, the IOM drive-up product extends the use of identity authentication to the perimeter. Easy-to-use and automated, the drive-up system can efficiently replace RFID cards, passcodes, or security guards at the gate.

screenshot of a download in progress on a computer

BLADE blocks even unknown, zero-day attacks without interfering in normal browser operations.

illustration of Earth with web connections viewed as light streams

To shield computer networks from cyber-attacks, SRI's HPB software analyzes millions of entries from worldwide volunteers participating in a firewall correlation system, and uses them to analyze attack trends.

words in red, such as bug, malware, hacking, phishing

SRI and partners have devised Eureka, a free online service to evaluate whether detailed analysis of malware threats is warranted.

BotHunter logo

SRI’s BotHunter system takes a unique approach to discerning networked computers that are under control of hackers, or may be spreading malware infections.

explorer equipment

ConTEXTract™ video OCR technology finds and reads text (such as street signs, name tags, and billboards) in real scenes. Recognition of text within imagery and video requires a more specialized approach than is provided by off-the-shelf OCR software,.

RapID-Cam II handheld device

This ruggedized, handheld device allows for simple biometric enrollment and identification anywhere in the field. The IOM Handheld Identity Reader can capture dual-iris and facial images up to eighteen inches away—putting a comfortable distance between the user and the subject.

IOM N-Glance iris reader

An easy-to-use, modular identity-verification system for access control. The system allows users to network any number of iris readers to enforce secure access throughout a facility or campus.

IOM system illuminators and camera cabinet

A convenient, walk-through biometric system that can be integrated directly into existing turnstiles, infrastructures, or entrances. Ideal for high-traffic applications such as airports and corporate lobbies, this product delivers uncompromising identification without delay.

woman opening an exterior door

Easy, fast, accurate biometric solutions for access control and identity verification. SRI Identity™ solutions can help you seamlessly acquire, verify and manage identity information.

Press Releases

SRI VP Mark Clifton shaking hands with emaratech director general Thani Alzaffin

SRI has entered into an exclusive reseller agreement with emaratech, the leading information technology solutions provider and management consulting company throughout the UAE and Jordan.

man looking at iris biometric system

SRI International Sarnoff’s Iris on the Move® (IOM) N-Glance™ biometric system is now protecting access to E-Commerce Park Curaçao, the first data center of its kind built in the Pan Caribbean area.

Woman walking through IOM PassPort SL

SRI International Sarnoff offers a new solution for integrating biometric identification into existing security systems. The IOM PassPort SL product delivers the free flow and proven performance of Iris on the Move® (IOM) technology in a flexible design.

driver in car using iom passthru at security gate

SRI International Sarnoff’s Iris on the Move® (IOM) PassThru™ drive-up identification system was selected as a 2013 ASIS Accolades – Security’s Best winner. The award recognizes security’s most innovative new products, services, and solutions.

sia NPS

SRI International Sarnoff’s Iris on the Move® (IOM) PassThru™ drive-up identification system was named Best in Biometrics, Identification and Credentialing by the Security Industry Association (SIA) New Product Showcase (NPS) at ISC West 2013.

iom passthru at vehicle access gate

SRI International Sarnoff brings the security of iris recognition to drive-up applications with its new Iris on the Move® (IOM) PassThru™ system. This multimodal biometric product quickly captures face and iris images for accurate identity authentication at the perimeter of any location.

Aurora Skate

Aurora Flight Sciences and SRI International Sarnoff today announced the integration of the SRI Sarnoff DL Micro™ digital data link and video processor into the Aurora Skate® Small Unmanned Aerial System (SUAS). This pairing maximizes the real-time delivery of quality video from the SUAS.

Acadia ILS-6500

SRI Sarnoff will introduce its Acadia® ILS-6500™ video stabilizer and encoder at ASIS 2012. SRI Sarnoff’s Acadia ILS-6500 combines real-time electronic image stabilization with H.264 encoding for improved distribution of quality video.

warfighter holding unmanned aerial vehicle (UAV)

A new digital data link and video processor from SRI Sarnoff enhances the quality of video images transmitted from unmanned aerial and ground vehicles. The DL Micro™ ultra-compact module increases image compression efficiency to improve the clarity and usefulness of video from moving vehicles.

SRI In the News

Global Biodefense noted SRI was awarded an Office of Naval Research contract to support advanced development and testing of hardened diagnostic devices to support the biosurveillance needs of the U.S. military in field forward locations. featured insights from SRI's Mark Clifton on the growing role of identity management in effective security operations.

Homeland Security Today featured insights by SRI's Mark Clifton on biometrics for domestic airport security.

Special Operations Technology featured perspective from SRI's Mark Clifton on ways iris biometrics can support special operations forces. featured a demonstration of SRI's iris-embedded tablet for B2B applications.

The Defense Department’s strategy to develop an enterprise architecture includes giving military personnel unique IP addresses and common access cards for authenticating users. “Adding biometric information along with the CAC implementation could easily be accomplished,” said SRI's Mark Clifton.

Over the past year, computer security experts have been preparing for DARPA's Cyber Grand Challenge — but now, the time has come to get hacking. SRI computer scientists are among the competitors.

As robots have gotten more sophisticated and costs have dropped, they are taking on new roles in the civilian government workspace. Robot designers, including SRI's Rich Mahoney, underscore three key areas of development.

It’s entirely possible that the best mobile device management system is one that makes mobile devices disappear.

DARPA is putting in millions of dollars to develop self-destructing devices, similar to those seen on the "Mission: Impossible" television series and films. DARPA awarded SRI a $4.7 million contract to develop self-destructing batteries.


Autonomous robotic “fetch” operation, where a robot is shown a novel object and then asked to locate it in the field, re- trieve it and bring it back to the human operator, is a challenging problem that is of interest to the military.

This paper, published in the Interservice/Industry Training, Simulation & Education Journal, addresses the need within the military to enhance its training capability to provide more realistic and timely training, but without incurring excessive costs in time and infrastructure.

In this paper, published in Intelligent Robots and Systems (IROS), 2012. We present a system for detecting pedestrians at long ranges using a combination of stereo-based detection, classification using deep learning, and a cascade of specialized classifiers.

In this paper, published in The Interservice/Industry Training, Simulation & Education Conference (I/ITSEC). In this paper we present a system for tracking the trainee's location, head orientation, and weapon orientation that provides high precision and does not require an instrumented site.

In this paper, published in IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2010. This paper presents a joint probabilistic relation graph approach to simultaneously detect and track a large number of vehicles in low frame rate aerial videos.

In this paper, published in IEEE International Symposium 3D Data Processing, Visualization, and Transmission.This paper presents a realtime, robust, and accurate stereo matching algorithm based on a coarse-to-fine architecture.

In this paper, published in IEEE International Conference on Robotics and Automation (ICRA). We present an innovative path following system based upon multi-camera visual odometry and visual landmark matching.

In this paper, published in IEEE 12th International Conference on Computer Vision Workshops (ICCV Workshops), 2009, we propose a principled statistical approach for using 3D information and scene context to reduce the number of false positives in stereo based pedestrian detection.

In this paper, published in SPIE, we present mixed reality training systems using Head Mounted Displays (HMDs) require very high precision knowledge of the 3D location and 3D orientation of the user's head.

Blog Posts

If your office building or facility is like most, people come and go throughout the day. Employees and visitors need quick access to get their jobs done, and your business needs security. So what is the best approach to ensuring secure access without slowing things down?

Hollywood isn’t exactly known for accuracy, and their portrayal of biometric technology is no exception. Fingerprint scanners, facial recognition software, and iris recognition technology have become commonplace in thrillers and crime films to create suspense and high-tech futuristic scenes.

Anyone who has used a handheld video camera knows how hard it is to keep steady. A mild cough can turn footage from a kid’s soccer game into an amusement park ride. Now imagine mounting that camera onto a police cruiser or a 20,000-foot-high unmanned aircraft.

From high school basketball games to sophisticated military operations, a strong perimeter is the first line of defense. The challenge for commercial security is strengthening the perimeter without affecting business.

Forward-deployed troops in the U.S. Army need access to targeting, reconnaissance, and surveillance information from the enterprise of networks. As emerging technologies produce ever more data, the challenge is to provide soldiers with the most relevant information as quickly as possible.