Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise Services

4 Steps to Better Mail Screening and Ricin Detection

By James Viscardi
May 28, 2013

 

Recent incidents of ricin being mailed to the White House and members of Congress are a chilling reminder that the mail system continues to be used by those wishing to do harm. The targets may often be political leaders or the media, but those same tactics can frequently become directed at companies as well – and the people most at risk are usually rank-and-file employees. Some simple but critical steps taken after the 2001 anthrax attacks can greatly reduce the risk.

In the aftermath of the 2001 anthrax attacks, the Federal government made major changes in mail screening to address the threat of bio hazards delivered through the mail. I have been directly involved with helping a range of Federal agencies institute those changes and the immediate detection and identification of the recent ricin mailings shows how successful they have been. The changes also offer a path that individual companies can follow to better protect their employees.

Similar to how the Federal government approached mail screening, below are four steps private companies can use as well:

 

1.    A Layered Approach Is the Best Approach. No one approach can protect against all threats. That’s why Federal agencies responsible for screening mail didn’t just institute one protection to improve threat detection – they instituted several including a range of technologies that complement each other. That multi-layered system ultimately proved very effective when the ricin attacks occurred. This approach is key for companies considering how to protect themselves. The right combination of imaging, detection and identification technologies can provide the most effective protection and ensure good value for the investment.

 

2.    Consider the Threats. Before making investments in mail screening technology, Federal agencies first wanted to identify the range of threats they faced. In 2001, anthrax and other biohazards were obviously very near to mind, but they weren’t the only ones. Mailed explosive devices also had long been a threat, so screening systems had to be able to detect biological and chemical agents as well as explosives. Carefully considering the full range of threats, they faced helped them to invest wisely in the detection technologies they needed, and the return on investment was demonstrated in the 2013 ricin attacks.

 

3.    Don’t Stop The Mail. For the Federal government, dramatically slowing mail service to improve screening was not a realistic option – and it isn’t for most companies either. The good news is that effective detection and identification solutions can detect and allow for the isolation of suspicious packages while allowing regular mail to continue unimpeded.

 

The best combination of capabilities begins with a conveyorized X-ray system that provides high-resolution images to the mailroom operator, which means most mail parcels will be cleared without further scrutiny. Any alarms resulting from X-ray screening can then be confirmed using another method. For example, chemical identification using spectral-based technology, such as FT-IR (Fourier Transform Infrared Spectroscopy) as well as Ion Mobility Spectrometry (IMS) provides excellent complements to X-ray imaging to support detection and identification of suspicious packages.

 

4.    Keep Your People And Technology Ready. Almost a dozen years elapsed between the anthrax attacks and the recent ricin mailings. During that time Federal agencies that screen mail faced enormous budget pressures that presented significant temptations to cut back on employee training and technology service. To their credit, they resisted those pressures and ensured that their people and tools were ready when the next threat emerged. That ready posture made a significant contribution to detecting, identifying and responding to the ricin mailings before any harm was done.

 

Investments in mail threat detection and identification technologies can dramatically improve an organization’s ability to protect its employees without impeding its work. But both the people and technologies involved must consistently be trained and serviced to ensure they will function at their best when they are needed most.  

 

Mailed threats to the president, members of Congress or the media get much of the attention. But threats to private companies are unfortunately very real as well. The actions Federal agencies took after the anthrax attack to better prepare themselves to quickly detect, identify and respond to future attacks paid off during the recent ricin mailings. Those same actions provide a scalable check list other companies can follow to better protect themselves from unwelcomed surprises in the mail.

KEYWORDS: counterterrorism layered security Mail screening national security Ricin Detection workplace violence

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

James Viscardi, Vice President, U.S. Critical Infrastructure and Emergency Response, Smiths Detection

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Opened padlock on computer keyboard

10 Data Breaches to Know About (April 2026)

Laptop with desktop screen showing

Research: Microsoft Edge Loads Stored Passwords in Cleartext

Diverse Team Collaborating on Business Analysis

12 Tips for Building an Effective Security Budget

Laptop in darkness

Reframing MFA Bypass: Four Identity Gaps Attackers Exploit

Nurse

Why De-Escalation Must Be Part of a Layered Safety Strategy in Healthcare

SEC 2026 Benchmark Banner

Events

June 3, 2026

The Role of AI and Video in Measuring Health, Safety, and Security Standards

OSHA fines grab headlines, but most compliance issues start with everyday operational gaps: missed protocols, unsecured areas, or slow response. Learn how emerging technologies & AI can be leveraged towards a more proactive model of compliance.

June 10, 2026

Applying Agentic AI in Security Operations for Faster Decisions & Better Outcomes

Security teams have never had more visibility. We’ll explore how a new decision layer is helping security teams move from detection to decision. Turn alerts into decision-ready context, reducing reliance on manual triage and enabling faster action.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Solutions by Sector webinar promo


The Role of AI and Video - Free Webinar - June 3, 2026

Related Articles

  • empty envelopes on white background

    Strengthen mail security to better protect public figures

    See More
  • NYC Mayor Bloomberg Targeted in Failed Ricin Mail Poisoning

    See More
  • convergence freepik

    4 steps to prepare for a ransomware attack: A C-suite guide

    See More

Related Products

See More Products
  • threat and detection.jpg

    Surveillance and Threat Detection

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • The Complete Guide to Physical Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing