Welcome!

Agile Computing Authors: Liz McMillan, Pat Romanski, Elizabeth White, Dana Gardner, Andy Thurai

Related Topics: Release Management , Cloud Security

Release Management : Article

The Impact of Airport X-Ray Technologies - Part 1

Can airport scanners - inonizing radiation harm our bodies?

Over the last three weeks due to the nature of my IT security job, I have traveled through major airports at least eight times.

With all the commotion recently regarding the airports new back-scatter X-ray machines (privacy, health, etc.) I wanted a firsthand look/feel at this experience. While I am sensitive to and an advocate for issues of privacy regarding persons with medical conditions and children, at 15 pounds overweight I don't think any airport security personnel will take pleasure in looking at a scanned image of me. Far from it, I hope I don't give them any nightmares.

I was "chosen" for the opportunity at a major northeastern airport and I must state that the screener was courteous and very professional during the entire process, which lasted about 15 -20 seconds. I had to wait an additional 30 seconds for verification, I assume, and then was told with a smile "you can go sir."

Great - quite seamless. However, the unfortunate part for me was a slight ache afterward in an area where I had had dental work done a few years ago and one of my eyes; this lasted for about 48 hours. Of course, this led to some alarm, propagating some research on the technology. Here's what I found out.

There are two types of body scanning equipment in use: millimeter scanning and x-ray backscatter.

Also there are two major divisions of radiation: ionizing and non-ionizing. According to the US Environmental Protection Agency (EPA) website [1]

Radiation that falls within the "ionizing radiation" range has enough energy to remove tightly bound electrons from atoms, thus creating ions. This is the type of radiation that people usually think of as 'radiation.'

Radiation that has enough energy to move atoms in a molecule around or cause them to vibrate, but not enough to remove electrons, is referred to as "non-ionizing radiation." Examples of this kind of radiation are sound waves, visible light, and microwaves.

Also stated on the site is the sentence: "Higher frequency ultraviolet radiation begins to have enough energy to break chemical bonds. X-ray and gamma ray radiation" have extremely high energy - this immediately brought to mind the fictional story of Dr. David Bruce Banner.

The EPA site also has a section on health and radiation that stated: [2]

Any living tissue in the human body can be damaged by ionizing radiation in a unique manner. The body attempts to repair the damage, but sometimes the damage is of a nature that cannot be repaired or it is too severe or widespread to be repaired.

The following table from the EPA site [2] shows the acute affects of exposure to levels of radiation.

Exposure
(rem)

Health Effect

Time to Onset
(without treatment)

5-10

changes in blood chemistry

 

50

nausea

hours

55

fatigue

 

70

vomiting

 

75

hair loss

2-3 weeks

90

diarrhea

 

100

hemorrhage

 

400

possible death

within 2 months

1,000

destruction of intestinal lining

 

 

internal bleeding

 

 

and death

1-2 weeks

2,000

damage to central nervous system

 

 

loss of consciousness;

minutes

 

and death

hours to days

 

Radiation levels are typically measured in Roentgens/hour (R/hr) where the Roentgen is a unit of radiation exposure. The Rem (Roentgen Equivalent Man) is the unit of Dose. The Rad (Roentgen Absorbed Dose) is the actual amount of radiation absorbed. The two are related as shown below:

Rem = Rads x Quality Factor (QF)

Quality Factor depends on the type of radiation

According to the United States Nuclear Regulator Commission (NRC), NRC Regulations Title 10, Code of Federal Regulation 20 (10CFR20) [3]

Adults may receive a whole body dose 5 Rem per year; minors are restricted to 0.5 Rem per year; pregnant women are restricted to 0.5 Rem during the term of the pregnancy (for protection of the embryo).

All well and good but where does this leave us in terms of airport security scanning and doses of radiation engulfing our organs and body.

My focus will be more on the backscatter technology as this seems to be where traveler scanning is heading and it involves ionizing radiation.

I also pondered the fact that as our skin is our largest organ (it breathes and absorbs), how will these backscatter skin surface scans affect us in the long term?

Those of us who have worked in industrial settings have all at one point read material safety data sheet (MSDS), so I thought it best to review related literature from companies manufacturing these devices.

Per Wikipedia [4] there are three companies manufacturing commercial backscatter X-ray devices:

  • American Science and Engineering with their Smartcheck[5]

  • Rapiscan Systems with their Secure 1000

  • Tek84 with their AIT84 Body Scanner & Castscope

In Part 2, I will present their data sheet and radiation levels.

Click here for a link to calculate your radiation dose.

[1] http://www.epa.gov/rpdweb00/understand/ionize_nonionize.html

[2 ]http://www.epa.gov/rpdweb00/understand/health_effects.html#typeandexposure

[3] http://www.nrc.gov/reading-rm/doc-collections/cfr/

[4 ]http://en.wikipedia.org/wiki/Backscatter_X-ray

[5] http://www.as-e.com/products_solutions/smart_check.asp

More Stories By Jon Shende

Jon RG Shende is an executive with over 18 years of industry experience. He commenced his career, in the medical arena, then moved into the Oil and Gas environment where he was introduced to SCADA and network technologies,also becoming certified in Industrial Pump and Valve repairs. Jon gained global experience over his career working within several verticals to include pharma, medical sales and marketing services as well as within the technology services environment, eventually becoming the youngest VP of an international enterprise. He is a graduate of the University of Oxford, holds a Masters certificate in Business Administration, as well as an MSc in IT Security, specializing in Computer Crime and Forensics with a thesis on security in the Cloud. Jon, well versed with the technology startup and mid sized venture ecosystems, has contributed at the C and Senior Director level for former clients. As an IT Security Executive, Jon has experience with Virtualization,Strategy, Governance,Risk Management, Continuity and Compliance. He was an early adopter of web-services, web-based tools and successfully beta tested a remote assistance and support software for a major telecom. Within the realm of sales, marketing and business development, Jon earned commendations for turnaround strategies within the services and pharma industry. For one pharma contract he was responsibe for bringing low performing districts up to number 1 rankings for consecutive quarters; as well as outperforming quotas from 125% up to 314%. Part of this was achieved by working closely with sales and marketing teams to ensure message and product placement were on point. Professionally he is a Fellow of the BCS Chartered Institute for IT, an HITRUST Certified CSF Practitioner and holds the CITP and CRISC certifications.Jon Shende currently works as a Senior Director for a CSP. A recognised thought Leader, Jon has been invited to speak for the SANs Institute, has spoken at Cloud Expo in New York as well as sat on a panel at Cloud Expo Santa Clara, and has been an Ernst and Young CPE conference speaker. His personal blog is located at http://jonshende.blogspot.com/view/magazine "We are what we repeatedly do. Excellence, therefore, is not an act, but a habit."

IoT & Smart Cities Stories
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...