Physical security tech goes nuclear

Photo courtesy of Sandia National Labs: Jason Hamlet was on the Sandia National Laboratories team that developed SecuritySeal, a device that attaches to a container and detects tampering.

Jason Hamlet was on the Sandia National Laboratories team that developed SecuritySeal, a device that attaches to a container and detects tampering. (Randy Montoya / Sandia National Labs)

Sandia National Laboratory is looking to commercialize technology that leverages cybersecurity cryptographic techniques to protect physical objects from tampering.

The lab’s SecuritySeal device for locking down nuclear materials used in keeping international nuclear weapons treaty inspections honest can also secure more everyday items like cargo containers, pharmaceuticals, criminal evidence containers and ballot boxes, or even safeguard consumer goods against warranty fraud.

SecuritySeal attaches to a container and detects tampering. The technology is based on physical unclonable functions, or PUFs. Sandia has a long history of research into tamper detection and continues to advance the field, providing technologies to the International Atomic Energy Agency and others. The lab said its prototype is a little bigger than a credit card and would fit on a truck or cargo container, but it can also be larger or small enough to fit a prescription medication bottle.

The device, said Sandia scientists, has been developed and used to ensure nuclear weapons systems dismantled and crated under nonproliferation treaties aren't meddled with.

The PUF technology in the device uses the small unique defects in tolerances and electrical characteristics that are part of any manufacturing process, including those in the making of microelectronics, to provide an electronic fingerprint for each device's seal. Resistance properties change if someone tries to lift, slide or remove the SecuritySeal's film from the surface to which it is adheres, and the PUF response is altered so the tamper is detected, according to Sandia.

Additionally, a digital reader checks the device remotely and can deduce a change in signature if the tag-seal fails to properly respond. Knowledge of the private key is needed to generate the right response. If the PUF changes, the private key changes and the tag-seal can’t provide the correct response, according to the lab.

About the Author

Mark Rockwell is a senior staff writer at FCW, whose beat focuses on acquisition, the Department of Homeland Security and the Department of Energy.

Before joining FCW, Rockwell was Washington correspondent for Government Security News, where he covered all aspects of homeland security from IT to detection dogs and border security. Over the last 25 years in Washington as a reporter, editor and correspondent, he has covered an increasingly wide array of high-tech issues for publications like Communications Week, Internet Week, Fiber Optics News, magazine and Wireless Week.

Rockwell received a Jesse H. Neal Award for his work covering telecommunications issues, and is a graduate of James Madison University.

Click here for previous articles by Rockwell. Contact him at or follow him on Twitter at @MRockwell4.


    sensor network (agsandrew/

    Are agencies really ready for EIS?

    The telecom contract has the potential to reinvent IT infrastructure, but finding the bandwidth to take full advantage could prove difficult.

  • People
    Dave Powner, GAO

    Dave Powner audits the state of federal IT

    The GAO director of information technology issues is leaving government after 16 years. On his way out the door, Dave Powner details how far govtech has come in the past two decades and flags the most critical issues he sees facing federal IT leaders.

  • FCW Illustration.  Original Images: Shutterstock, Airbnb

    Should federal contracting be more like Airbnb?

    Steve Kelman believes a lighter touch and a bit more trust could transform today's compliance culture.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.