+44 1462 888261
+44 7788 426658

Detection systems for counter-terrorism and counter-drugs

Terrorism has been with us for a long time, but technology to detect terrorist weapons has only been widely deployed since the 1970s, beginning with the X-ray machines and metal detectors placed in airports to combat, first, hijackings and, later, bombings.  This coincided with increased efforts to prevent the smuggling and distribution of illicit drugs, and similar technologies were applied to that problem too.   Outrages such as the Brighton Grand Hotel bombing in 1984, the 1985 Air India bombing, the destruction of Pan Am flight 103 in 1988 and, of course the September 11 2001 attacks in the USA, all spurred the development of better ways of screening baggage, buildings, vehicles and people.   Since 2001, attention has focussed on detecting person-borne explosive devices, liquid and gel explosives, CBRN threats and the many forms of improvised explosive device used in the Iraq and Afghanistan conflicts.


In response, terrorists have changed their methods to circumvent improved security measures.  The increased use of suicidal attackers, the use of unusual explosive materials and the infiltration of explosives into air cargo are at least partly in response to visible security measures, especially at airports.   Meanwhile, drug smugglers have developed remarkably clever ways to hide drugs.  After all, to them, smuggling is a highly paid profession and they are prepared to invest a lot of money and effort to ensure success.


This leaves a confusing situation for anyone developing, acquiring or using detection technologies – many concepts of operations, many technologies and many types of threat.   Whilst some of the technologies are very versatile none represents a complete solution in itself, and combining technologies, procedures and tactics to create a fuller solution requires detailed knowledge both of the technologies and of the threats. Often new techniques fail to be adopted because they have been aimed at the wrong application, they were too similar to existing systems or they can’t easily be integrated into operations.   Users also take serious risks in procurement and deployment of detection systems because information on equipment performance and operational effectiveness is so hard to come by.


One of the key functions of Xdtec is to help users, developers and vendors to reduce risk by helping them to understand the complexity of the detection field and identify sources of information and help.



Picture ©US Government