Typical Detection Process

Typical_ Detection_Process-1

Hidden Threats

To minimize false alarms, Ludlum systems contain proprietary radiation measurement algorithms that are independent of isotope identification, yet are very effective in signaling potential threats. These algorithms are designed to maximize alarm accuracy while minimizing false alarms.

Typical Three-Step Process

Anyone tasked with the need to detect radiation as part of threat avoidance should consider that an informed perpetrator can possibly mask a harmful radiation source with an isotope that is considered common or non-threating. Ludlum strongly recommends investigating and defining each alarm occurrence.

A typical border protection scenario flow would ideally employ the following three steps to ensure adequate protection: Detect, Locate, and Identify.

1. DETECT the radiation

  • This is accomplished by the gamma or gamma/neutron RPM

  • Measure the level of the detected radiation

  • Record and report the detected radiation

  • Is the radiation gamma or neutron (if applicable)

  • Is it an immediate threat? If yes, evacuate the area

  • Notify appropriate organization members

  • Follow local procedures

 2.    LOCATE the radiation source

  •  Conduct a survey with an appropriate handheld survey meter (ex: Ludlum Model 192 or Model 193-6)

  • Is the source of radiation a person that has recently been treated with nuclear medical isotopes? If yes, ask appropriate quantifying questions

  • Is the radiation source NORM or TENORM? If yes, expected or not? Follow local procedures.

3.    IDENTIFY the radiation source and/or isotope

  • Is additional information definition of the radiation source required?

  • If yes, conduct a survey with a handheld isotopic identifier, Ludlum Model 702i