recommended reading

TSA explores full body scans for fugitives hiding in cargo

Markus Schreiber/AP

The Transportation Security Administration is evaluating computer devices that would search cargo for stowaways, Homeland Security Department documents reveal. The technology being sought potentially would be applied to domestic and outbound international flights -- not necessarily trips to the United States, which involve cooperation with overseas governments.

The department’s Science and Technology Directorate, on behalf of TSA, is reviewing white papers and photographs of products submitted by vendors, according to an Aug. 9 request for information. The equipment must be capable of examining containers, crates and boxes that weigh more than 150 pounds and are large enough to hide a human being. Animals cannot be used as screeners. “Canines are not considered a technology for this,” DHS officials stated.

If the directorate can find viable tools, TSA then will weigh whether they should be included on a list of sanctioned devices for air carriers to deploy. “The ultimate goal is to place new systems capable of detecting stowaways onto the [Air Cargo Screening Technology List] from which industry can select, purchase and use,” officials stated. Private screening companies would pay to acquire the equipment, not the government.

The tools must capable of probing the contents of shipments before they are placed on cargo aircraft. This means the technology would have to see through sealed containers made of various types of wood, plastic, metal, cardboard and fiberglass. It is not clear if the devices would be used for passenger planes, all-cargo planes, or both.

Cargo screening attracted attention after foreign allies tipped off U.S. officials to explosive-carrying toner cartridges aboard U.S.-bound planes coming from Yemen. DHS failed to fulfill a post Sept. 11, 2001, mandate that all cargo on incoming international passenger flights undergo screening. But in May, the department set a Dec. 3 deadline for air carriers to search all U.S.-bound shipments for explosives.

Some experts say no such cargo screening devices exist right now. In May, aviation security consultant Douglas R. Laird told NBC News that “there really is no good technology to fully screen some of the larger cargo, like containers.”

The news report added “the newest computerized machines are good at sniffing out potential explosives in suitcases and packages, but aren't useful on such cargo as containers and other big items like high-end cars that end up on airplanes.”

Homeland Security’s request for information does not list specific technical requirements but does require the tools to be speedy and accurate: “Screening solutions must be effective (i.e., a high probability of detecting a stowaway, while maintaining a low probability of false alarms) and must be efficient (i.e., able to screen containers in a short amount of time).”

The equipment would be looking for humans among fish and meat, produce, flowers, paper, clothes, electronics, machine parts and other durable goods.

Officials want photos of the devices, as well as a description of the science behind the technology, including published literature if available.

Through the review, DHS aims to find out how many items these systems can process in an hour, as well as the amount of manual effort required. Assuming screening procedures last 12 hours a day, officials want to know how frequently the devices can be expected to fail during that time.

TSA missed an August 2010 deadline for full compliance with the counterterrorism law that ordered all cargo aboard domestic and U.S.-bound passenger planes be subjected to screening. The bomb materials originating from Yemen were hidden on passenger, all-cargo and interchangeable passenger-cargo planes, according to lawmakers. TSA, however, has been able to search 100 percent of cargo on stateside passenger flights since 2010.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.