The present invention relates to the field of security, and more particularly to detecting an explosive mixture based on identifying components of the explosive mixture using molecular computational identification.
In the aftermath of the Sep. 11, 2001 attacks, there has been a renewed focus on providing security in public places, such as airports/airplanes, bridges, tunnels, schools, shopping malls, etc. In response to the Sep. 11, 2001 attacks, the United States government created the Department of Homeland Security with the responsibility of protecting the territory of the United States from terrorist attacks and responding to natural disasters.
On Aug. 10, 2006, authorities in the United Kingdom uncovered an alleged plot to sabotage as many as 10 U.S. airliners traveling from the United Kingdom to the United States, reportedly by using liquid and gel based explosives. The plotters had planned to use liquid explosives. The New York Times reported that the plotters planned to use Lucozade bottles to contain these explosives. The plotters planned to leave the top of the bottle sealed and filled with the original beverage, but add a false bottom containing a liquid or gel explosive dyed red to match the sports drink in the top of the container.
It has been widely reported that the plotters planned to use peroxide-based liquid explosives. United States authorities, the FBI and the Department of Homeland Security, named two peroxide-based liquid explosives that could be used: triacetone triperoxide (TATP) and hexamethylene triperoxide diamine (HMTD). These peroxide-based liquid explosives are sensitive to heat, shock, and friction, and can be initiated simply with fire or an electrical charge, and can also be used to produce improvised detonators.
Currently, the focus of preventing an explosive device from detonating at a public place, such as on an airplane, is focused on detecting banned materials (e.g., semtex) or on biometrics and facial scanning to identify a potential terrorist. However, as discussed above in connection with the United Kingdom terror plot, many of the hazardous materials were planned to be carried in common articles, such as liquids and gels. Further, the common articles, such as liquids and gels, may not be identified as an explosive device as a single component but may be used in combination to form an explosive device. Currently, there is no mechanism in detecting an explosive device based on identifying the combination of materials of the explosive device that may be carried in common articles.
Therefore, there is a need in the art for detecting an explosive mixture based on identifying components of the explosive mixture.
The problems outlined above may at least in part be solved in some embodiments by embedding molecules in potentially hazardous materials where these molecules are used for identifying individual cells or nano-devices. Upon scanning the potentially hazardous material, the embedded molecules act as tiny ID tags that use the presence of a chemical, or a mix of chemicals (e.g., potentially hazardous material), as inputs, and give off light or sonar signatures as output. The output of these molecules may be read by a reader which may be used to identify the type of material as well as the amount of the material. This information may be stored and correlated with the passenger carrying the identified material and the passenger's flight information. A security alert may be generated if there is a combination of other amounts of potentially hazardous materials previously identified along with the amount of potentially hazardous material currently identified that together would be classified as an explosive device where the amounts of potentially hazardous materials previously identified are being carried by individual(s) who are to board the same flight(s) as the passenger discussed above.
In one embodiment of the present invention, a method for detecting an explosive mixture comprises the step of scanning a potentially hazardous material embedded with molecules used for identifying individual cells, where the molecules generate one of light and sonar signatures based on the scanning. The method further comprises detecting either the light or sonar signatures generated based on the scanning. The method further comprises identifying an amount of the potentially hazardous material based on detecting either the light or sonar signatures. The method additionally comprises generating a security alert indicating existence of a potentially explosive mixture if there exists a combination of other amounts of potentially hazardous materials previously identified with the identified amount of the potentially hazardous material.
The foregoing has outlined rather generally the features and technical advantages of one or more embodiments of the present invention in order that the detailed description of the present invention that follows may be better understood. Additional features and advantages of the present invention will be described hereinafter which may form the subject of the claims of the present invention.
A better understanding of the present invention can be obtained when the following detailed description is considered in conjunction with the following drawings, in which:
The present invention comprises a method, system and computer program product for detecting an explosive mixture. In one embodiment of the present invention, a potentially hazardous material is embedded with molecules, such as by the manufacturer of the potentially hazardous material, where these molecules are used for identifying individual cells or nano-devices. Upon scanning the potentially hazardous material (e.g., the potentially hazardous material embedded with these molecules may be contained in a passenger's carry-on luggage which is scanned at the airport's baggage screening station), the embedded molecules act as tiny ID tags that use the presence of a chemical, or a mix of chemicals (e.g., potentially hazardous material), as inputs, and give off light or sonar signatures as output. The output of these molecules may be read by a reader which may be used to identify the type of material as well as the amount of the material. This information may be stored and correlated with the passenger carrying the identified material and the passenger's flight information. A security alert may be generated if there is a combination of other amounts of potentially hazardous materials previously identified along with the amount of potentially hazardous material currently identified that together would be classified as an explosive device where the amounts of potentially hazardous materials previously identified are being carried by individual(s) who are to board the same flight(s) as the passenger discussed above.
It is noted that even though the following discusses detecting an explosive mixture based on identifying components of the explosive mixture using molecular computational identification in connection with airport security that the principles of the present invention may be applied to other fields, such as nuclear plants, sports stadiums, subways, coal mines, etc. That is, the principles of the present invention may be applied to any field involving the detection of an explosive device that may be carried by multiple individuals, where each individual carries a component of the explosive device. It is further noted that a person of ordinary skill in the art would be capable of applying the principles of the present invention to any field involving the detection of an explosive device that may be carried by multiple individuals, where each individual carries a component of the explosive device. Further, embodiments covering such permutations would fall within the scope of the present invention.
In the following description, numerous specific details are set forth to provide a thorough understanding of the present invention. However, it will be apparent to those skilled in the art that the present invention may be practiced without such specific details. In other instances, well-known circuits have been shown in block diagram form in order not to obscure the present invention in unnecessary detail. For the most part, details considering timing considerations and the like have been omitted inasmuch as such details are not necessary to obtain a complete understanding of the present invention and are within the skills of persons of ordinary skill in the relevant art.
Potentially hazardous materials (e.g., semtex, which is a general-purpose plastic explosive) may be embedded with molecules used for identifying individual cells or nano-devices. A potentially hazardous material may refer to herein as any material that may or may not be hazardous by itself but can be used in connection with other materials to devise an explosive device. Embedding molecules used to identify individual cells or nano-devices may be referred to as “molecular computational identification.” Scanner 103 may be configured to emit light (e.g., photons) or neurons or any other means that causes the embedded molecules in a potentially hazardous material to emit light or sonar signatures based on the presence of a chemical, or a mix of chemicals. That is, these embedded molecules may act as tiny ID tags that use the presence of a chemical, or a mix of chemicals (e.g., potentially hazardous material), as inputs, and give off light or sonar signatures as output. The output of these molecules may be read by MCID reader 104 which may be used to identify the type of material as well as the amount of the material.
For example, suppose an airplane passenger 102 attempts to carry on board an airplane a potentially hazardous material, either on the body of airplane passenger 102 or in carry-on luggage 106, which unknowingly to airplane passenger 102 has been embedded with molecules as discussed above. As passenger 102 walks through detector 101 or as carry-on luggage 106 is screened by luggage screening machine 105, scanner 103 causes the embedded molecules to emit light or sonar signatures based on the presence of the potentially hazardous material which is detected by reader 104. The light or sonar signatures detected by reader 104 may be used to identify the type of material as well as the amount of the material.
Referring to
Data processing system 108 may be connected to a centralized processing location (e.g., server) 109 via a network 110 (e.g., Local Area Network (LAN), such as Ethernet, Token Ring, ARCnet, or a Wide Area Network (WAN), such as the Internet). The connection between data processing system 108 and centralized processing location 109 may be any medium type (e.g., wireless, wired). Further, data processing system 108 may be any type of device (e.g., wireless, Personal Digital Assistant (PDA), cell phone, personal computer system, workstation, Internet appliance) configured with the capability of connecting to network 110 and consequently communicating with centralized processing location 109.
Centralized processing location 109 may be connected to a database 111 configured to store various information, such as profiles of potential terrorists, plane information (e.g., size of airplane), flight information (e.g., place of origination and destination of particular flight), potentially hazardous materials previously detected for each passenger and flight(s) of passenger, combination of ingredients to devise an explosive device as well as the particular amounts for each ingredient to devise such an explosive device for each type of airplane, etc. A detail description of the hardware configuration of centralized processing location 109 is provided further below in connection with
Referring to
Referring to
Referring to
I/O devices may also be connected to data processing system 108 via a user interface adapter 222 and a display adapter 236. Keyboard 224, mouse 226 and speaker 230 may all be interconnected to bus 202 through user interface adapter 222. Data may be inputted to data processing system 108 through any of these devices. A display monitor 238 may be connected to system bus 202 by display adapter 236. In this manner, a user is capable of inputting to data processing system 108 through keyboard 224 or mouse 226 and receiving output from data processing system 108 via display 238 or speaker 230.
The various aspects, features, embodiments or implementations of the invention described herein can be used alone or in various combinations. The methods of the present invention can be implemented by software, hardware or a combination of hardware and software. The present invention can also be embodied as computer readable code on a computer readable medium. The computer readable medium is any data storage device that can store data which can thereafter be read by a computer system. Examples of the computer readable medium include read-only memory, random access memory, CD-ROMs, flash memory cards, DVDs, magnetic tape, optical data storage devices, and carrier waves. The computer readable medium can also be distributed over network-coupled computer systems so that the computer readable code is stored and executed in a distributed fashion.
Referring to
Referring to
The various aspects, features, embodiments or implementations of the invention described herein can be used alone or in various combinations. The methods of the present invention can be implemented by software, hardware or a combination of hardware and software. The present invention can also be embodied as computer readable code on a computer readable medium. The computer readable medium is any data storage device that can store data which can thereafter be read by a computer system. Examples of the computer readable medium include read-only memory, random access memory, CD-ROMs, flash memory cards, DVDs, magnetic tape, optical data storage devices, and carrier waves. The computer readable medium can also be distributed over network-coupled computer systems so that the computer readable code is stored and executed in a distributed fashion.
As discussed in the Background Information section, currently, the focus of preventing an explosive device from detonating at a public place, such as on an airplane, is focused on detecting banned materials (e.g., semtex) or on biometrics and facial scanning to identify a potential terrorist. However, as discussed above in connection with the United Kingdom terror plot, many of the hazardous materials were planned to be carried in common articles, such as liquids and gels. Further, the common articles, such as liquids and gels, may not be identified as an explosive device as a single component but may be used in combination to form an explosive device. Currently, there is no mechanism in detecting an explosive device based on identifying the combination of materials of the explosive device that may be carried in common articles. Therefore, there is a need in the art for detecting an explosive mixture based on identifying components of the explosive mixture. A method for detecting an explosive mixture based on identifying components of the explosive mixture is discussed below in association with
Referring to
In step 402, scanner 103 of detector 101, luggage screening machine 105 scans for a potentially hazardous material. For example, scanner 103 in detector 101 may scan an airplane passenger 102, including all materials carried by airplane passenger 102, such as when airplane passenger 102 passes through detector 101 prior to boarding an airplane flight. In another example, scanner 103 in luggage screening machine 105 scans for potentially hazardous materials being stowed in carry-on luggage 106.
In step 403, reader 104 of detector 101, luggage screening machine 105 determines whether there is any light or sonar outputted by material scanned. Upon scanning for a potentially hazardous material by scanner 103, reader 104 detects any light or sonar signatures outputted by material scanned.
If there is no light or sonar signatures detected by reader 104, then, in step 402, scanner 103 of detector 101, luggage screening machine 105 scans for a potentially hazardous material carried by another passenger either on himself/herself or in the passenger's carry-on luggage 106.
If, however, there is light or sonar signatures detected by reader 104, in step 404, data processing system 108 or centralized processing location 109 identify a potentially hazardous material as well as an amount of the potentially hazardous material based on the light or sonar signatures detected by reader 104. Either data processing system 108 or centralized processing location 109 may contain software configured to identify a potentially hazardous material as well as an amount of the potentially hazardous material based on the light or sonar signatures detected by reader 104. If centralized processing location 109 identifies the potentially hazardous material as well as determines the amount of the potentially hazardous material based on the light or sonar signatures detected by reader 104, data processing system 108 may be configured to forward the information read by reader 104 to centralized processing location 109.
In step 405, data processing system 108 or centralized processing location 109 stores, such as in database 111, the type and amount of potentially hazardous material identified. If data processing system 108 determines the type and amount of potentially hazardous material based on the light or sonar signatures detected by reader 104, then data processing system 108 may store this information on database 111 via centralized processing location 109. Alternatively, if centralized processing location 109 determines the type and amount of potentially hazardous material based on the light or sonar signatures detected by reader 104, then centralized processing system 109 may store this information on database 111.
In step 406, data processing system 108 or centralized processing location 109 determines whether the type of and amount of potentially hazardous material identified is classified as an explosive device by itself.
If processing system 108 or centralized processing location 109 determines that the type of and amount of potentially hazardous material identified is classified as an explosive device by itself, then, in step 407, data processing system 108 or centralized processing location 109 generates a security alert to airport security indicating the existence of a potentially explosive device.
Upon generating a security alert, or, if the type of and amount of potentially hazardous material identified is not classified as an explosive device by itself, then, in step 408, data processing system 108 or centralized processing location 109 indicates to obtain passenger information, including flight information. For example, data processing system 108 may indicate to a security personnel in the security area to stop the passenger carrying a material (either on himself/herself or in carry-on luggage 106) determined to be potentially hazardous and obtain passenger information, such as a boarding pass and airplane tickets. A name may then be obtained for the passenger as well as the flight(s) the passenger is expected to take. In another example, centralized processing location 109 may indicate to security personnel in the security area to stop the passenger carrying a material (either on himself/herself or in carry-on luggage 106) determined to be potentially hazardous and obtain passenger information, such as a boarding pass and airplane tickets. The security personnel may be carrying a PDA which is contacted by centralized processing location 109 wirelessly to inform the security personnel to obtain passenger information from the passenger that just passed through detector 101.
Referring to
In step 410, data processing system 108 or centralized processing location 109 requests from database 111 information on the profile of the passenger carrying the detected potentially hazardous material, if there exists such a profile. Data processing system 108 or centralized processing location 109 may provide information, such as a name, to database 111 to determine if there is a profile for this passenger.
In step 411, data processing system 108 or centralized processing location 109 determines whether or not the passenger carrying the detected potentially hazardous material is identified as being a terrorist. For example, database 111 may provide a profile on the passenger carrying the detected potentially hazardous material which includes a terrorist warning.
If data processing system 108 or centralized processing location 109 determines that the passenger carrying the detected potentially hazardous material is a terrorist, then, in step 412, data processing system 108 or centralized processing location 109 generate a security alert to airport security regarding the passenger being identified as a terrorist.
Upon the execution of step 412, or if data processing system 108 or centralized processing location 109 did not determine that the passenger carrying the detected potentially hazardous material was a terrorist, then, in step 413, data processing system 108 or centralized processing location 109 obtains information regarding the flight(s) or plane(s) based on the flight information received. For example, data processing system 108 or centralized processing location 109 may obtain, in step 409, the flight information of the passenger carrying the detected potentially hazardous material where the flight information includes the place of origination and the place of destination as well as all intervening flights as well as the type of airplanes for each flight. In one embodiment, data processing system 108 or centralized processing location 109 obtains this information from database 111. The information regarding the flights and airplanes may be valuable information in order to determine whether there is a potential explosive mixture based on other types and amounts of potentially hazardous materials identified as being carried by individuals on these flights and airplanes. The type of airplane may be important as the size and amount of fuel carried on the airplane may determine the amount required for each component of the explosive device in order to construct a workable explosive device.
Referring to
For example, suppose that an explosive device can be classified as a solution containing the following elements and amounts: A (8 ml); D (7 ml); G (4 ml) and J (10 ml). Suppose further that (1): one hour before flight 1234 from Boston to Atlanta with a connecting flight 7777 to San Francisco, reader 104 detects a passenger carrying through airport security (either on himself/herself or in carry-on luggage 106) a solution containing 8 ml of component “A;” (2) half an hour before flight 1234 from Boston to Atlanta with a connecting flight 7777 to San Francisco, reader 104 detects a passenger carrying through airport security a solution containing 4 ml of component “G;” (3) in Baltimore, flight 2468 to Atlanta with a connecting flight 7777 to San Francisco, reader 104 detects a passenger carrying through airport security a solution containing 7 ml of component “D;” half an hour before flight 7777 from Atlanta to San Francisco, reader 104 detects a passenger carrying through airport security a solution containing 10 ml of component “J.” The readings from the networked remote readers 104 may be collated, cross-checked and processed thereby identifying a composition of an explosive mixture, namely, A (8 ml); D (7 ml); G (4 ml) and J (10 ml). Hence, the existence of a potential explosive mixture has been detected for flight 7777.
If a potential explosive mixture has been detected, then, in step 415, data processing system 108 or centralized processing location 109 generates a security alert to airport security indicating the existence of a potential explosive mixture.
In one embodiment, different levels of a security alert could be generated based on how close an explosive device could be made based on the detected potentially hazardous materials. Referring to the above example, if 8 ml of component “A” and 4 ml of component “G” where identified, then, a low level notification may be generated to officials indicating a possibility that a group of individuals may be attempting to devise an explosive device since 2 out of the 4 components to devise the explosive device have been detected.
If, however, a potential explosive mixture has not been detected, then, in step 402, scanner 103 of detector 101, luggage screening machine 105 scans for a potentially hazardous material carried by another passenger either on himself/herself or in the passenger's carry-on luggage 106.
Method 400 may include other and/or additional steps that, for clarity, are not depicted. Further, method 400 may be executed in a different order presented and that the order presented in the discussion of
Although the method, system and computer program product are described in connection with several embodiments, it is not intended to be limited to the specific forms set forth herein, but on the contrary, it is intended to cover such alternatives, modifications and equivalents, as can be reasonably included within the spirit and scope of the invention as defined by the appended claims. It is noted that the headings are used only for organizational purposes and not meant to limit the scope of the description or claims.