recommended reading

Feds Want Backpack Radiation Detectors That Don’t Use Rare Gas

A U.S. Customs and Border Protection patrol car sits near stacked cargo containers at the port of Newark. Of the 5,000 containers that leave the seaport each day, 98 percent pass through radiation detectors.

A U.S. Customs and Border Protection patrol car sits near stacked cargo containers at the port of Newark. Of the 5,000 containers that leave the seaport each day, 98 percent pass through radiation detectors. // Mel Evans/AP File Photo

The government is looking for backpack-based radiation detection systems that don’t require an increasingly rare isotope of helium traditionally used in such devices.

The Defense and Homeland Security departments want to test the radiation detectors against current standards as part of a program to develop a shared data system that can help agencies as well as state, local, tribal and territorial governments choose the best radiation detection devices for their needs, contracting documents said.

Helium-3 is a nonradioactive isotope that is a byproduct of the radioactive decay of material used to enhance the power of nuclear weapons.

“The nation’s limited helium-3 supply will persist into the foreseeable future and it is highly unlikely there will ever again be enough helium-3 supply available to address the demand for neutron detection for Homeland Security,” the request for information said.

The Domestic Nuclear Detection Office at DHS expects alternatives to helium-3-based handheld and backpack-based radiation detectors will be commercially available in 2015. The government, which regulates helium-3, will stop providing helium-3 for neutron detection systems at that time, the documents said.

For years, DNDO has been researching neutron detection systems that don’t require helium-3, according to S.Y. Lee, a DHS spokesman. Currently, helium-3 alternatives are used in walk-through and drive-through radiation detection systems, and DHS and the Pentagon are trying to assess the commercial availability of alternative technologies for handheld and backpack-based systems.

The agencies this week extended the deadline for responses to the RFI by more than two weeks to July 31. DHS officials declined to say why the deadline was extended or if it was because they hadn’t received enough responses from industry.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.