Detect Me Not Covering All The Bases In Explosives Detection Essay

PAGES
2
WORDS
651
Cite

Explosives detect me not Explosive detection: An overview

Not all explosions are created alike. In general, explosives are classified into two categories: as either low or as high explosives, depending upon their rates of decomposition. Low explosives burn; in contrast, high explosives detonate (Chapter 12, 2011, FAS). Detonation is a different phenomenon from burning. During detonation of a high explosive, the initial reaction is initiated by a shock that generates compression, heat, and finally chemical decomposition. Every component of a high explosive has its own equation of state (EOS) with a unique relationship of pressure, density, and internal energy (Walter 1996). When the temperature of a substance increases, molecules of the different components travel faster and hit the surface of the exterior of the bomb casing with greater and greater force, finally causing an explosion when the interior surface of the casing can no longer resist (Moorcraft 2001). The speed with which this occurs depends upon the nature of the substance.

...

The rule stands for the fact that every passenger can carry a 3.4 ounce (100ml) bottle or less (by volume) of liquid in a single, quart-sized, clear, plastic, zip-top bag. Only one bag per passenger is allowed, which is placed in screening bin before the passenger is allowed on the flight (Make your trip better using 3-1-1, 2011, TSA). The 3.4 ounce (100ml) limit and one container limit means that this is the maximum amount of liquid passengers can bring. The amount of liquid and container size is limited given the potential dangers of a travel carrying a substance that could be hazardous but masked as an apparently innocent bottle of water or shampoo.
However, there have been many complaints about security procedures, which some travelers claim are excessively burdensome in terms of searching for chemical explosives. Scientists are working to…

Sources Used in Documents:

References

Chapter 12: Military explosives. (2011). Navy Documents.

Retrieved August 16, 2011 at http://www.fas.org/man/dod-101/navy/docs/fun/part12.htm

Frank, Thomas. (2010). TSA takes explosive screening to bags. USA Today.

Retrieved August 16, 2011 at http://www.usatoday.com/travel/flights/2010-02-16-TSA-swabs_N.htm
Retrieved August 16, 2011 at http://www.tsa.gov/311
Retrieved August 16, 2011 at http://www.chm.bris.ac.uk/webprojects2001/moorcraft/Kinetics.htm
Nolan-Neelan, Fay. (2010). Detective explosives within clothing. Highlights in Chemical Technology. Retrieved August 16, 2011 at http://www.rsc.org/Publishing/ChemTech/Volume/2010/12/detecting_explosives.asp
Retrieved August 16, 2011 at https://www.llnl.gov/str/Simpson99.html


Cite this Document:

"Detect Me Not Covering All The Bases In Explosives Detection" (2011, August 16) Retrieved April 26, 2024, from
https://www.paperdue.com/essay/detect-me-not-covering-all-the-bases-in-44009

"Detect Me Not Covering All The Bases In Explosives Detection" 16 August 2011. Web.26 April. 2024. <
https://www.paperdue.com/essay/detect-me-not-covering-all-the-bases-in-44009>

"Detect Me Not Covering All The Bases In Explosives Detection", 16 August 2011, Accessed.26 April. 2024,
https://www.paperdue.com/essay/detect-me-not-covering-all-the-bases-in-44009

Related Documents

They need to know what their responsibilities are not only as individuals but also as team members and corporate employees. David cites an excerpt from a corporate security document that illustrates his point: "A security policy serves many functions. It is a central document that describes in detail acceptable network activity and penalties for misuse. A security policy also provides a forum for identifying and clarifying security goals and

Anti Terrorism Measures Effective Anti-Terrorism Measures Effective Anti-Terrorist Tactics The threat of terrorism involves many variables. The nature and degree of risk posed by a potential attack depends on a number of factors, including the goals of the attackers and their means of inciting terror. There are numerous terrorist organizations with agendas ranging from various political ideologies to animal rights, environmental, and reproductive issues. With so many diverse groups and causes in play,

Cyber Terrorism
PAGES 13 WORDS 4455

Cyber Terrorism The Internet that we know today and use in our everyday lives was founded in the early 1970s. But all through the Cold War, the apprehension of data theft led to the Internet becoming a decentralized system. But it was not until the late 1980s when the Internet, after years and years of research was made available to public. This was a big change because now anyone in the

This is, of course, only one of countless scenarios which are the product of landmine-based negligence and which can have deadly consequences. Unfortunately, today the world's largest military power also remains the most immovable object standing between the global community and a worldwide ban on the use of landmines or comparable explosive devices. In addition to its continued experimentation with landmine technologies, the United States maintains stockpiles of landmines