recommended reading

Airborne nuclear forensics tool being prepared

Researchers prepare pods that, airborne, will track radiation to its source and identify nuclear bombs.

Researchers prepare pods that, airborne, will track radiation to its source and identify nuclear bombs. // Sandia National Laboratories

 The U.S. Air Force and a major national research laboratory are collaborating to deploy a new airborne tool for identifying the origin of a nuclear bomb after detonation.

The “Harvester” technology would offer a “modular nuclear debris sampling capability” -- pods that could be attached to manned or drone aircraft to collect and identify radioisotopes left behind by an atomic blast.

“Nuclear debris sampling and analysis enables verification that a nuclear explosive event occurred and aids in the national technical nuclear forensics mission requirements,” Susan Romano, spokeswoman for the Air Force Technical Applications Center, this week told Global Security Newswire. “Modularity can enable installation on a range of aircraft, potentially eliminating the need for payload-specific aircraft modifications.”

Nuclear forensics encompasses a range of technical capabilities to determine the start point for material in an atomic device that is seized in transit or actually detonated. That capacity is seen as a deterrent to rogue actors that might otherwise hope to get away with a nuclear attack, and as an asset for directing any U.S. response after an incident.

The U.S. ability to maintain a viable forensics infrastructure  has been a point of concern in recent years. An expert panel convened by the National Academies warned in 2010 that “strong leadership, careful planning and additional funds” were needed to overcome troubles with present capabilities, which it said include the absence of a central leadership, insufficient personnel and outdated technology.

The Harvester system could also be a new resource for the Comprehensive Test Ban Treaty regime, which aims to prevent and identify illicit trial detonations that are seen as key to development of a nuclear arsenal, Romano stated by e-mail.

Research and development on the technology started around 2002, and design on the Harvester system dates to 2008 at the Sandia National Laboratories in New Mexico, officials said.

Initial flight-testing occurred in September at Grand Forks Air Force Base in North Dakota.

The system -- two pods for collecting and analyzing nuclear material and a third for guidance -- were placed on a Reaper drone owned by the Homeland Security Department’s Customs and Border Protection branch, Sandia said in a recent release.

The pods successfully gathered and analyzed various radioisotopes found in the atmosphere, suggesting they could do the same for material released by a manmade device.

Following an actual nuclear event, a drone could be directed to the “hot spot” of a post-explosion plume, Sandia said. Radioactive material would adhere to filter paper as the pods are flown through the affected area and then undergo sensor analysis to determine the specific kind and quantity of substance. Further study would be conducted once the filters are collected after the aircraft returns to base.

Sandia is also continuing work on a new Whole Air Sampling Pod, which could be used to gather gas samples at large volume rather than the particles collected by existing pods.

“The gas samples can then be analyzed for gas species of interest for forensics/treaty monitoring, notably short-lived radioxenon produced from a nuclear explosion,” Sandia project chief Joe Sanders stated by e-mail on Thursday.

The Pentagon hopes to try out the Harvester system on a manned aircraft this year, and to take over management of the technology in 2014, Romano stated.

The number of units to be built remains under consideration, she said. Meanwhile, “Harvester product improvement opportunities are being identified for possible future implementation,” the spokeswoman added.

Romano did not release details of costs for the project to date, or anticipated expenses as the Harvester program moves forward.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.