TSA Checkpoints Now Equipped with New State-of-the-Art 3-Scanners

A new state-of-the-art advanced technology computed tomography scanner that provides 3-D imaging has been installed at the TSA checkpoint, at Adirondack, NY, Regional Airport (SLK), and the checkpoint at Trenton-Mercer, NJ, Airport (TTN), providing critical explosives detection capabilities for screening carry-on items.

TSA Checkpoints 3d Scanner

“TSA remains committed to getting the best technology to enhance security and improve the screening experience. Our officers’ use of CT technology substantially improves our threat detection capability at the checkpoint,” said Bart R. Johnson, TSA’s Federal Security Director for 13 airports in Upstate New York. “Previously, our screening technology for carry-on bags used 2-D images. The CT technology applies advanced algorithms for the detection of explosives, including liquid explosives and other threat items.”

The system applies sophisticated algorithms for the detection of explosives by creating a 3-D image that can be viewed and rotated 360 degrees on three axes for thorough visual image analysis by a transportation security officer. This new technology creates such a clear image of a bag’s contents that the system can automatically detect explosives, including liquids, by shooting hundreds of images with an X-ray camera spinning around the conveyor belt to provide TSA officers with the three-dimensional views of the contents of a carry-on bag.

It takes a few extra seconds for the TSA officer to view the image and rotate it to get a better understanding of its contents, however in most instances, rotating the image allows the TSA officer to identify an item inside the bag and clear it without a need to open it for inspection. Checkpoint CT technology should result in fewer bag checks. However, if a bag requires further screening, a transportation security officer will inspect it to ensure that a threat item is not contained inside.

“The airport is excited to receive this enhanced screening equipment keeping our passengers safe while simultaneously improving the passenger experience,” said Airport Manager Corey Hurwitch.  “TSA’s demonstrated commitment to keeping Adirondack Regional Airport at the front of technological advancements in security is truly appreciated.” 

The CT units have a slightly smaller entry tunnel and not all larger carry-on bags will fit into the units. TSA recommends that large carry-on items be checked with the airline.

Passengers using these machines at the airport will be permitted to leave their laptops and other electronic devices in their carry-on bags.

Featured

  • Maximizing Your Security Budget This Year

    The Importance of Proactive Security Measures: 4 Stories of Regret

    We all want to believe that crime won’t happen to us. So, some business owners hope for the best and put proactive security measures on the back burner, because other things like growth, attracting new customers, and meeting deadlines all seem more pressing. Read Now

  • Securing the Flow of Operations

    The transportation industry is a complex and dynamic environment where efficient management of physical keys, vehicles and shared devices is critical to ensuring smooth operations, reducing costs and maintaining security. Every day, more transportation facilities are using modern electronic key and asset management systems to better secure, audit and manage the important assets that keep operations running smoothly. Read Now

  • Today's Enterprise

    Protecting servers and data has evolved rapidly over the past 15-plus years. Early on, concerns centered around the environmental conditions of where servers were housed within a building and the effects of humidity, temperature and air quality on their performance. This led to a better understanding of the need for a controlled environment to maximize equipment lifespan and capacity. It was also a driving force behind consolidating servers in a common space, i.e., the data center. Read Now

  • Study Proves It: Security Awareness Training Reduces Phishing Attacks

    Attackers are increasingly targeting human-based vulnerabilities to infiltrate organizations. Humans have direct access to insider systems and data – any threat actor can easily phish users, steal their credentials and secure keys to the kingdom without having to fight advanced cybersecurity defenses. Studies show social engineering attacks and human errors are behind 68% of all breaches.  Read Now

Featured Cybersecurity

Webinars

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3