X-rays in 3D

September 2019 Editor's Choice, Security Services & Risk Management

The X-ray scanning and baggage screening feature in this issue has examined what Roteck is developing locally as a mobile scanning solution. In this article we take a further look at what another company, XPro Security Solutions, has to offer in terms of X-ray scanning for airports and other locations with high security requirements. In addition, we asked Greg Dixon, a director of XPro, for some insights into X-ray scanning and its use in today’s volatile world.

Dixon says XPro recently attended the Astrophysics dealer meeting in Prague to see what the latest products are from the company (XPro represents Astrophysics’ X-ray scanning solutions in South Africa). On this occasion, Astrophysics announced the launch of a new pallet and large cargo screening machine, the Astrophysics MVCTC high-performance multi-view and CT screening system.

This machine combines the power of multi-view conventional X-ray screening and computer tomography to create a 3D image for the screening of medium- to high-density pallets and for inspecting challenging commodities.

Dixon adds that Astrophysics has done a significant amount of research into the benefits of using artificial intelligence (AI) software to enhance its systems. “AI is now considered a vital component of screening efficiencies, speed and accuracy in the quest to reliably identify threats on a consistent basis in the ever-increasing passenger and cargo market,” adds Dixon. “Astrophysics has released AI software as an optional extra on many of its smaller model machines. This software increases the identification speed of any threats or risks identified, without any human intervention.”

Regulatory issues

Of course, when it comes to using X-ray technology (from any company), one of the primary hindrances to these systems being installed is safety – and rightly so. Organisations in South Africa cannot simply install an X-ray scanner whenever the idea strikes.

Dixon says it has long been recognised that exposure to high levels of radiation (from X-rays) may cause tissue damage, and that chronic exposure to lower levels of radiation may result in cancer.

“Since X-rays are a source of ionising radiation, they are governed by the Hazardous Substances Act which is managed and regulated by the Department of Health,” he explains. “Every security X-ray machine must be licensed by the Department, specific to the machine manufacturer, model and location of installation.

“XPro Security Solutions, as part of its service to customers, undertakes the facilitation of the licence application, as well as ensuring that maximum radiation emissions allowed are checked on a regular basis.”

Moreover, he adds that safety levels as prescribed by law are monitored on a regular basis by Department of Health inspectors (at least on an annual basis). These inspections and the service provided by companies that install and maintain X-ray systems allow the continued and safe use of these systems for security and the global fight against terrorism.

People scanning advances

There is an enormous difference between scanning baggage with X-rays, which nobody objects to unless the contents of their baggage can be damaged, and scanning people, where there are perceived health risks as well as privacy issues.

X-ray body scanners are accurate and efficient in terms of identifying any threats on or in the human body, says Dixon, but the many disadvantages such as slow throughput, privacy invasion and perceived health risks through the emittance of ionising radiation have seen this method lose popularity, and it has even been outlawed in many countries.

“Newer technology such as millimetre radio-wave (MMRW) screeners has proven effective, but some critical shortfalls and challenges have been identified, and these are yet to be overcome. This screening method is also unable to identify any threats inside the human body (swallowed or inserted) and only penetrates approximately 2 mm into human skin. On the positive side, it does not use ionising radiation, but rather passive millimetre radio-wave frequencies, which are harmless to humans.”

Multi-zone, pinpoint-accuracy, walk-through metal detectors remain the primary screening method at most airports and high-security areas. Although these are capable of detecting ferrous and non-ferrous metals, inadequacies related to non-metal threats (such as liquid or plastic explosives) remain of concern.

There is therefore still much to be done in terms of enhancing and expanding the capabilities of body scanners, not to mention improving the safety aspect. However, to date there are limited alternatives that can function as well as X-rays, making these scanners the choice in most locations. In addition, more research has been completed which will assist in ensuring the safe use of these devices in airports and other locations.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
SA availability of immutable backup storage appliance
CASA Software Infrastructure Security Services & Risk Management
CASA Software has launched the newly released Nexsan VHR-Series, a fully integrated, enterprise-class, immutable backup storage appliance purpose-built for Veeam software environments, with usable capacity ranging from 64 TB to 3,3 PB.

Read more...
Beagle Watch named best security company in Johannesburg
News & Events Security Services & Risk Management
Beagle Watch Armed Response has been named Johannesburg’s Best Security Company in the 2025 Best of Joburg Awards, surpassing about 26 nominated private security firms in the greater Johannesburg region, thanks to overwhelming public support.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Toxic combinations
Editor's Choice
According to Panaseer’s latest research, 70% of major breaches are caused by toxic combinations: overlapping risks that compound and amplify each other, forming a critical vulnerability to be exploited.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.