recommended reading

TSA to travelers: Keep taking off those shoes

The Transportation Security Administration has abandoned a project to buy shoe-scanning devices that would allow airline passengers to waltz through security checkpoints without removing their Uggs and Nikes.

The government could not find a tool in the marketplace that met its requirements, TSA officials said this week. Possible reasons contracting experts gave for why TSA came up empty: the devices offered were too expensive, unreliable or exceeded radiation limits.

"The shoe-scanning technology solicitation did not result in any viable systems that meet TSA's technical or operational needs," said Lisa Farbstein, a spokeswoman for TSA, part of the Homeland Security Department. "While the procurement was canceled, TSA looks forward to continuing to work with its partners within DHS and industry to identify the best technologies and solutions for the security checkpoint."

Travelers bemoan the process of taking shoes on and off and walking around barefoot, but they have not been too keen on submitting their appendages to X-rays either. Radiation fears about the current crop of body scanners, however, apparently pale in comparison to the uproar last century over X-ray exposure from shoe-fitting machines. Retailers in the 1930s began measuring customers' feet with a device called a shoe-fitting fluoroscope until safety concerns in the 1950s led to their eventual extinction.

The request for bids that TSA issued last spring called for a shoe-scanning machine that would emit at most 0.5 milliroentgen units of radiation per hour. The shoe-fitting contraptions used from the 1930s into the 1950s subjected customers to 4 milliroentgens per hour -- eight times as much as the present day limit. "When you put your feet in a shoe-fitting fluoroscope, you were effectively standing on top of the X-ray tube," said a report by the Oak Ridge Associated Universities, an academic consortium. "The only 'shielding' between your feet and the tube was a 1-millimeter thick aluminum filter."

The 2011 solicitation did not require that the proposed technology take any particular form, such as a wand or a stationary platform. The goal was to deploy some type of technology that would effectively flag explosives "without requiring passengers to remove their footwear," the notice stated.

The airport shoe removal rule kicked in shortly after would-be bomber Richard Reid tried igniting the explosive-laden shoes he was wearing in December 2001. But now, "the removal of footwear takes time, reduces the efficiency of the checkpoint, creates safety concerns with footwear removal and contributes to passenger dissatisfaction," TSA officials acknowledged in the request for proposals.

Recently, TSA instituted what officials call "common-sense" policies that let select frequent fliers and children up to age 12 wear their shoes through checkpoints.

Ray Bjorklund, chief knowledge officer at research firm Deltek, said a variety of factors could have prompted TSA to pull the purchase, including the possibility of creating even longer lines. The functional specifications cited in the solicitation describe a system that can "increase overall operational throughput" by shortening the amount of time it takes for officers to clear a passenger.

He speculated that TSA's reference to working with partners inside Homeland Security could mean that another DHS office, perhaps the Homeland Security Advanced Research Projects Agency or the department's Science and Technology Directorate, "may have already started down a similar path, one that is more promising than the one TSA was pursuing."

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.