Industry Insight

A Clear Detection

FOR passengers who've traveled through an airport recently, it's fairly obvious what might be improved at today's passenger checkpoints -- the long lines. All the while, time is ticking away for departing flights, and that's just focusing on the inconvenience factor.

A more fundamental challenge with today's airport checkpoints and one of paramount concern to those responsible for running and securing airports -- especially in light of the foiled terror plot in the United Kingdom that dominated the news for much of last month -- is reliably identifying potential threats.

A more fundamental challenge with today's airport checkpoints and one of paramount concern to those responsible for running and securing airports -- especially in light of the foiled terror plot in the United Kingdom that dominated the news for much of last month -- is reliably identifying potential threats. While security staff around the world labor admirably with the current state of technology, there are concerns about the limits of what it is able to accomplish.

A New Paradigm for Passenger Screening
GE's Checkpoint of the Future takes advantage of networking and remote monitoring to integrate airport screening operations, creating a comprehensive view of threats individual passengers may pose.

Beginning with a passenger's first interaction at the airport -- curbside bag check, ticket counter or boarding pass kiosk -- data from integrated sensors build an individual security picture for each passenger. Any indications of potential threats not only identify the passenger for further screening, but also alert additional sensors the passenger, or his or her bags, might encounter to provide more detailed scrutiny.

With the Checkpoint of the Future, when a passenger checks bags at curbside, goes to a ticket counter or uses a boarding pass kiosk, he or she presses a button to begin the desired transaction. Using the ItemiserFX trace detector, the passenger's finger is immediately analyzed for the possible presence of any explosives residues.

As the passenger reaches the checkpoint, carry-on baggage goes through a computed tomography-based scanner, giving it the same scrutiny checked bags are subjected to elsewhere at the airport to detect potential threats. While carry-on bags are screened, the passenger steps into a millimeter wave-based device and then onto a ShoeScanner. Together, the devices scan for the presence of any forbidden objects on the body or in the shoes. And, combined with the explosives detection scanning data from the ItemiserFX, a total security picture is created for each passenger. And the best part about the whole process: it all happens in about 20 seconds.

Advanced Technologies Take Off
Tested technologies, such as trace, incorporated into existing products -- in this case, the Itemiser FX finger-sampling device -- contributes to a new way of looking at checkpoint passenger screening.

Explosives in a variety of forms constantly give off microscopic particles. These particles transfer easily to people and also to surfaces that come into physical contact with either a contaminated person or item. Trace detection is based on the premise that when a person handles contraband substances -- explosives included -- tiny particles are left on their hands and bodies. These invisible particles leave identifiable traces on the hands, clothing and other articles touched by anyone who handles them.

Basically odorless, these particles become embedded in the skin with the same stickiness as fish oil, onions, gasoline and other substances difficult to wash away. Once contaminated, a person can unknowingly transfer trace particles to anything they touch. Thus, trace detection can help detect explosives where other methods, particularly those that rely on visual detection, may fail.

With the introduction of ItemiserFX, direct sampling of individuals becomes a possibility. A gentle touch of a fingertip to a reusable pad replaces the use of traps and swabs, and allows analysis of individuals for contraband substances. This direct transfer of threat substances to the instrument offers the possibility of improved detection. This same technology also is used in portals that give off gentle puffs of air to dislodge particles, which then are carried by the natural convection plume of warm air around a human body into a trace instrument that analyzes for the presence of explosives.

Advanced Computed Tomography (CT) technology is already seen in airports throughout the world where it's used for checked baggage inspection. GE Security produces its CTX explosives detection systems based on CT technology and hopes to leverage this experience -- and the related imaging technology -- to bring checked-bag-like levels of digital processing to the screening of carry-on bags.

Millimeter wave, a newer technology and one not yet in use at checkpoints, might be used to identify a more comprehensive array of potential threats carried on passengers' bodies than is possible with the current state of security technology. Active millimeter wave leverages common RF signals that reflect off of objects at low-signal levels. These signal levels are many times smaller than similar signals used by cell phones or garage door openers and meet known health standards, yet they offer the potential to identify difficult to detect threat objects.

Currently available millimeter wave products are largely manual in nature, requiring operators to review detailed images of each passenger screened. GE scientists are working to bring the same levels of automation to millimeter wave that are enjoyed by other advanced screening technologies, so that this promising technology can make a difference at the Checkpoint of the Future.

Quadrupole Resonance technology, or QR, the technology underlying GE's ShoeScanner, offers the potential to identify shoe-borne threats. Advanced Quadrupole Resonance technology uses RF magnetic fields to excite and detect specific atoms of explosive materials.

Looking to the Future
In the not-too-distant future, it's hoped that the security checkpoint will provide comprehensive threat detection, including the possibility of much enhanced detection of explosives. It's also hoped that it will offer a lower total cost of operation because of automation and increased screener productivity. And, just as important, it will provide a dramatically improved passenger experience.

This article originally appeared in the September 2006 issue of Security Products, pg. 14.

Featured

  • The Future of Access Control: Cloud-Based Solutions for Safer Workplaces

    Access controls have revolutionized the way we protect our people, assets and operations. Gone are the days of cumbersome keychains and the security liabilities they introduced, but it’s a mistake to think that their evolution has reached its peak. Read Now

  • A Look at AI

    Large language models (LLMs) have taken the world by storm. Within months of OpenAI launching its AI chatbot, ChatGPT, it amassed more than 100 million users, making it the fastest-growing consumer application in history. Read Now

  • First, Do No Harm: Responsibly Applying Artificial Intelligence

    It was 2022 when early LLMs (Large Language Models) brought the term “AI” into mainstream public consciousness and since then, we’ve seen security corporations and integrators attempt to develop their solutions and sales pitches around the biggest tech boom of the 21st century. However, not all “artificial intelligence” is equally suitable for security applications, and it’s essential for end users to remain vigilant in understanding how their solutions are utilizing AI. Read Now

  • Improve Incident Response With Intelligent Cloud Video Surveillance

    Video surveillance is a vital part of business security, helping institutions protect against everyday threats for increased employee, customer, and student safety. However, many outdated surveillance solutions lack the ability to offer immediate insights into critical incidents. This slows down investigations and limits how effectively teams can respond to situations, creating greater risks for the organization. Read Now

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”