Physical Security / Ports: Sea, Land, & Air

New Technology Could Change Airport Security Rules on Liquids

The Los Alamos National Laboratory announced what it called a breakthrough for screening liquids at airport security.

Called MagRay, the system uses magnetic resonance imaging (MRI) and X-rays to quickly analyze whether a bottle's contents are safe or dangerous, said CNBC.

"Things that were challenging before now suddenly become quite clear—even very-difficult-to-detect liquid explosives," said Michelle Espy, a Los Alamos National Laboratory physicist and MagRay project leader.

An effective scanner must detect whether a passenger is carrying, for example, a bottle of white wine or nitromethane, which looks similar but could be used to make an explosive, CNBC said. Screening liquids is challenging because X-ray technology looks at density changes, but since liquids don't have lots of density changes, it's difficult to tell them apart, CNBC said.

Each liquid has its own signature, which allows the system to determine whether it's benign or a threat. All kinds of containers can be screened, and the process doesn't affect the liquid in any way, the report added.

The ultimate goal is to incorporate the technology with existing X-ray tunnels at airports, so that you can put any amount of liquids in a bin and have them screened along with your carry-ons, CNBC said. If everything goes "absolutely perfectly," it might take about four years for the system to make its way to airports, the report said.

Did you enjoy this article? Click here to subscribe to Security Magazine. 

You must login or register in order to post a comment.

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

Security May 2015 Issue cover

2015 May

In the May 2015 issue of Security, learn how to be the bridge between busieness and security with "customer facing," how to effectively work with your CFO, and covert security.

Table Of Contents Subscribe

Body Cameras on Security Officers

Body cameras are being used increasingly by police in cities across the U.S. Will you arm your security officers with a body camera?
View Results Poll Archive

THE SECURITY STORE

Effective Security Management, 5th Edition.jpg
Effective Security Management, 5th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.