You are on page 1of 84

ThreatID™ Hardware and

Software User’s Guide

January 2021

Contacting Us
For sales, service or technical support:

41 Eagle Rd. Suite E


Danbury, CT 06810 USA
T: +1-475-237-4758
Reachback Emergencies 1-877-328-0938
E: support@redwavetech.com
W: www.redwavetech.com
Copyright and Trademarks

Date
October 2020

Trademarks
Registered names, trademarks, etc. used in this document, even when not
specifically marked as such, are protected by law.
ThreatID is a trademark of Redwave Technology.

Copyright Information
This document contains proprietary information that is protected by copyright. All
rights are reserved. No part of this publication may be reproduced in any form
whatsoever or translated into any language without the prior, written permission
of Redwave Technology.

Copyright © 2020 Redwave Technology

Notices
The information contained in this document is subject to change without notice.
Redwave Technology makes no warranty of any kind with regard to the material,
including, but not limited to, the implied warranties of merchantability and
fitness for a particular purpose.

Redwave Technology shall not be liable for errors contained herein for incidental
consequential damages in connection with furnishing, performance or use of this
material.

Disclaimer
The ThreatID is intended to provide initial determinations and be used as an information
resource in the field and not absolute or conclusive identifications of unknown substances.
The results provided by the ThreatID should be verified by using other appropriate
techniques. Redwave Technology makes no recommendations nor does it assume any
liability for how the information is utilized.

ii
Contents

Contacting Us........................................................................................................................ i
Copyright and Trademarks................................................................................................... ii
Trademarks....................................................................................................................... ii
Copyright Information ..................................................................................................... ii
Notices ............................................................................................................................. ii
Disclaimer ........................................................................................................................ ii
Contents .............................................................................................................................. iii
Warnings and Safety Information 1 ..................................................................................... 1
Flammable Materials........................................................................................................ 1
Introduction 2 ....................................................................................................................... 2
Conventions Used in this Manual .................................................................................... 2
Notes, cautions and warnings ...................................................................................... 2
Overview .......................................................................................................................... 5
Battery Compartment ....................................................................................................... 7
System Requirements ....................................................................................................... 9
Power ........................................................................................................................... 9
Supply requirements..................................................................................................... 9
Power supply details .................................................................................................. 10
Power cord selection .................................................................................................. 11
Technical Specifications ................................................................................................ 12
Transportation and Unpacking 3 ........................................................................................ 13
Transporting............................................................................................................... 13
Unpacking .................................................................................................................. 14
Battery Installation..................................................................................................... 14
Software Installation .................................................................................................. 15
Connecting Wi-Fi and Bluetooth™ ........................................................................... 17
Using the ThreatID 4.......................................................................................................... 19
ThreatID Procedure Overview ....................................................................................... 19
Logging onto ThreatID .................................................................................................. 21
ThreatID Home Screen .................................................................................................. 23

iii
Screen Layout ............................................................................................................ 23
Status Lights ............................................................................................................... 25
Setting Up the System .................................................................................................... 25
Cleaning the sample interface .................................... Error! Bookmark not defined.
System Performance Tests ......................................................................................... 26
Date & Time............................................................................................................... 30
Testing a Material .......................................................................................................... 33
Preparing the ThreatID ............................................................................................... 33
Collecting a Background ............................................................................................ 34
Collecting a Sample Spectrum ................................................................................... 35
Reviewing Results.......................................................................................................... 46
Protein Warning ......................................................................................................... 46
Water Check ............................................................................................................... 47
Mixture Warning ........................................................................................................ 48
Spectral Display ......................................................................................................... 48
Library Hit List .......................................................................................................... 49
Score........................................................................................................................... 50
Information Icon ........................................................................................................ 50
Water Subtraction....................................................................................................... 52
Functional Groups ...................................................................................................... 57
Additional Options ..................................................................................................... 58
Administrative Features 5 .................................................................................................. 61
Results ............................................................................................................................ 61
User Manager ................................................................................................................. 65
Library Manager ............................................................................................................ 66
Method Manager ............................................................................................................ 68
System Settings Manager ............................................................................................... 70
Incident Manager ........................................................................................................... 71
System Health ................................................................................................................ 73
Maintenance 6 .................................................................................................................... 79
Cleaning ......................................................................................................................... 79
Troubleshooting7 ............................................................................................................... 80

iv
Warnings and Safety Information 1
The ThreatID was designed to operate in remote locations. However,
analyzing certain materials and some maintenance procedures may be
hazardous if the following guidelines are not practiced.

WARNING

The ThreatID is NOT intrinsically safe. Use the system only in


atmospheres that have been tested for flammable materials.

If the equipment is used in a manner not specified in this User’s Guide,


WARNING the protection provided by the equipment may be impaired.
If a 2.4GHz Cordless phone or cellular phone is used near the
ThreatID you may experience problems with the wireless
communication. Try turning off the phone or moving further away and
attempting the communication
again.
WARNING

Flammable Materials
Analysis of flammable and/or explosive materials can be accomplished
using the ThreatID, however care must be taken to protect yourself
and the instrument. Always wear eye protection and gloves. The
ThreatID only needs a very small amount of the material to be
analyzed. By keeping only a micro-sample of the material in or around
the spectrometer your safety and those of others in the vicinity can be
WARNING protected.

1
Introduction 2
About this Manual
This manual contains the following sections:
• Warnings and Safety Information – Important information about the safe
use of this instrument.
• Introduction – Conventions used in this manual, an overview of the
ThreatID and accessories, system requirements, and the technical
specification.
• Transportation and Unpacking – How to safely transport the ThreatID,
unpack and install it.
• Using the ThreatID – Setting up the system, using the system and the
general functions of the ThreatID software.
• Maintenance – Simple maintenance procedures that can be performed by
the user

Conventions Used in this Manual

Normal text is used to provide information and instruction.


Bold text refers to text displayed on the PC screen.
UPPERCASE text, for example ENTER or ALT, refers to keys on the PC
keyboard.

Notes, cautions and warnings


Three terms, in the following standard formats, are also used to highlight
special circumstances and warnings.
NOTE: A note indicates additional, significant information that is provided with some
procedures.

2
CAUTION We use the term CAUTION to inform you about situations that
could result in serious damage to the instrument or other
equipment. Details about these circumstances are in a box like
this one.

D Caution (Achtung)
Bedeutet, daß die genannte Anleitung genau befolgt werden muß,
um einen Geräteschaden zu vermeiden.
DK Caution (Bemærk)
Dette betyder, at den nævnte vejledning skal overholdes nøje for
at undgå en beskadigelse af apparatet.
SP Caution (Advertencia)
Utilizamos el término CAUTION (ADVERTENCIA) para advertir
sobre situaciones que pueden provocar averías graves en este
equipo o en otros. En recuadros éste se proporciona información
sobre este tipo de circunstancias.
F Caution (Attention)
Nous utilisons le terme CAUTION (ATTENTION) pour signaler les
situations susceptibles de provoquer de graves détériorations
de l'instrument ou d'autre matériel. Les détails sur ces
circonstances figurent dans un encadré semblable à celui-ci.
I Caution (Attenzione)
Con il termine CAUTION (ATTENZIONE) vengono segnalate
situazioni
che potrebbero arrecare gravi danni allo strumento o ad altra
apparecchiatura. Troverete informazioni su tali circostanze in un
riquadro come questo.
NL Caution (Opgelet)
Betekent dat de genoemde handleiding nauwkeurig moet worden
opgevolgd, om beschadiging van het instrument te voorkomen.
P Caution (Atenção)
Significa que a instrução referida tem de ser respeitada para
evitar a danificação do aparelho.

3
We use the term WARNING to inform you about situations that
could result in personal injury to yourself or other persons.
Details about these circumstances are in a box like this one.
WARNING
D Warning (Warnung)
Bedeutet, daß es bei Nichtbeachten der genannten Anweisung zu
einer Verletzung des Benutzers kommen kann.
DK Warning (Advarsel)
Betyder, at brugeren kan blive kvæstet, hvis anvisningen ikke
overholdes.
SP Warning (Peligro)
Utilizamos el término WARNING (PELIGRO) para informarle
sobre situaciones que pueden provocar daños personales a
usted o a otras personas. En los recuadros como éste se
proporciona información sobre este tipo de circunstancias.
F Warning (Danger)
Nous utilisons la formule WARNING (DANGER) pour avertir des
situations pouvant occasionner des dommages corporels à
l'utilisateur ou à d'autres personnes. Les détails sur ces
circonstances sont données dans un encadré semblable à celui-ci.
I Warning (Pericolo)
Con il termine WARNING (PERICOLO) vengono segnalate
situazioni che potrebbero provocare incidenti alle persone.
Troverete informazioni su tali circostanze in un riquadro come
questo.
NL Warning (Waarschuwing)
Betekent dat, wanneer de genoemde aanwijzing niet in acht wordt
genomen, dit kan leiden tot verwondingen van de gebruiker.
P Warning (Aviso)
Significa que a não observância da instrução referida poderá
causar um ferimento ao usuário.

4
Overview

The ThreatID system

The ThreatID is a material identifier for field useage. It incorporates a Fourier


Transform Infrared (FT-IR) spectrometer with an interchangeable sample interface
with both a diamond Attenuated Total Reflectance (ATR) and gas cell in a battery
operated, ruggedized enclosure. It is lightweight and portable and can be used for
the chemical identification of solids, powders, liquids, pastes, gels, and gases. The
technique is non-destructive.

Sample measurement of solids, powders, liquids, pastes, and gels with the
ThreatID involves placing a sample on top of a diamond crystal mounted in a
stainless steel platform. An infrared beam from the spectrometer is passed up
through the crystal. The beam is attenuated by the sample and reflected internally

5
in the crystal, and back towards the detector that is housed within the instrument
enclosure.
Sample measurement of gases with the ThreatID involves introducing a sample
into the stainless steel gas cell. An infrared beam from the spectrometer is passed
up through the cell. The beam is attenuated by the sample in the cell; the cell is
designed to return the beam to the detector that is housed within the instrument
enclosure.

Principle of Diamond ATR operation


The Diamond ATR sample interface provides an easy to use, sensitive and reproducible
means of sample measurement that is key to the ThreatID’s success. The infrared beam
interacts with only material that is directly in contact with the diamond; in fact, the beam
penetrates only 1- 5 micrometers (0.001 – 0.005 millimeters) into most samples. Good
contact between the sample and the surface of the crystal is important to ensure that the
infrared beam penetrates the sample. Insufficient contact results in a low-quality spectrum
and poor identification results.

Liquids and gels naturally make good contact with the diamond surface. The
operator needs to ensure that they are covering the diamond and that high volatility
liquids do not evaporate before the measurement is complete. Solids need to be
brought in contact with the diamond through an external force. The ThreatID has a
press that can be used to apply controlled force to the sample to make good
contact with the crystal.

6
Principle of Gas Cell operation
The ThreatID Gas Cell is designed to provide sensitive identification of gas phase
samples. The cell is specifically designed with a multi-reflection path allowing the infrared
beam to interact with the sample multiple times all within a small volume of sample.

In spectroscopy, sensitivity is determined by distance which the light passes through the
sample, referred to as path length. For identification of solids and liquids, sensitivity is not
a concern as the neat samples are essentially at their maximum concentration. Gases,
though, require identification at much lower concentrations; therefore, a long path length
is required. The ThreatID Gas Cell has a path length of 4 meters, contained within a cell
which is 15 cm in length and 145 ml in volume. The beam transverses the cell 26 times
before returning to the instrument, allowing for identification of gases at part per million
level concentrations while keeping the physical size and sample volume low.

Battery Compartment

The battery compartment door must remain closed whenever there is a risk that
the instrument may be exposed to water, including use in the Hot Zone, use
outdoors or use in other wet environments. The battery compartment has
electrical connections that cannot be exposed to water or decontamination
solution.

7
Caution: Keep Door Sealed in the HOT ZONE, in any dangerous area or in wet
environments

8
In addition to the battery compartment, the top plate also has an ON/OFF switch,
liquids well, USB and Ethernet ports.

Caution: Keep USB plug and Ethernet port sealed in the HOT ZONE, in any
dangerous area or in wet environments

System Requirements

Power
There are two options for powering your ThreatID:
• Power supply provided as standard.
115-240 VAC (Auto-selecting), Frequency 50-60 Hz
• Battery – chargeable either in the external battery assembly, or while installed in
the system while the ThreatID plugged its power supply.
Caution: Only ThreatID batteries supplied by RedWave Technologies should
be used with the ThreatID system.

Supply requirements
• Line disturbances - sags, surges and other line disturbances must not exceed
10% of input voltage (even for a half cycle).

9
• Noise - < 2 volts (common mode) or < 20 volts (normal mode)

Power supply details


• Certifications – The power supply is CE, SA, UL, and GS certified
• Current consumption – 1.2 A max.

Earth or Ground - Single point system ground via std. 3 conductor universal IEC-
320 power cord. Each wall outlet you use with ThreatID must be equipped with a 3-
wire line – live, neutral, and ground. The ground must be a non-current carrying
wire connected to earth ground at the main distribution box. To assure good
ground connection and avoid shock hazard, do not use outlets using conduit
connected ground.

10
Power cord selection
The following power cords can be used:

11
Environmental conditions
• Use Temperature: -20°C to +50 °C
• Storage Temperature: -20°C to +70°C
• Humidity: up to 99%; non-condensing
• Altitude: up to 2000 m.
• Cleaning: wipe clean with mild detergent

Technical Specifications

Interferometer Geometry - High throughput Michelson interferometer with fixed and


moving flat mirrors
Standard Beam Splitter - Zinc Selenide
Maximum Spectral Resolution - 4 cm-1
Laser – Low Powered Solid State
Source - Wire-wound element
Spectral Range - 4000 to 650 cm-1
Sample Interface – Interchangable; Diamond Internal Reflection Element mounted
in a 316 stainless steel plate, and 4 meter gas cell with 316 stainless steel construction
Pressure Applicator – Spring loaded manual press
Detector - 1.3 mm diameter, Thermoelectrically cooled pyroelectric DLaTGS
Detector Window – Zinc Selenide
Length – 14.5 inches, Depth – 10.5 inches, Height – 6.5inches
Weight – 13.8 lbs.
Power supply - 100-240 V (ac), 1.5 Amps, 50-60 Hz
Battery Charge – up to two (2) hours on a single Li ion battery, hot swapped to extend
battery usage

12
Transportation and Unpacking 3
Transporting
The ThreatID is shipped in a specially designed, reusable shipping case. This
case protects the ThreatID from impact and vibration that may occur during
normal shipping. This case should be used whenever the ThreatID is shipped
via common carrier and to store the ThreatID unit. This case allows the
ThreatID to be removed and re-packed in the case quickly, keeping the
instrument secure for both shipping and storage. The top tray of the ThreatID
GLS case contains supplies needed for gas measurement.

Shipping case with Top Tray ThreatID in shipping case

13
Unpacking
Upon opening your shipping case for the first time, please inspect the ThreatID
for damage and report any damage found immediately to your Redwave
Technology representative.

The ThreatID System package consists of the following parts:

• ThreatID system with power supply and two batteries

• ATR sample interface (ThreatID GLS and ThreatID LS)

• Gas cell sample interface (ThreatID GLS and ThreatID G)

• ThreatID application software

• USB Storage Device

• Liquids Well (stored inside the main ThreatID case)

• Gas sampling Pump (ThreatID GLS and ThreatID G)

• Tedlar gas sample bags (ThreatID GLS and ThreatID G)

• Battery charger kit.

• Performance validation sample (ThreatID GLS and ThreatID LS)

NOTE: Only use the power supply and batteries provided with the
ThreatID system for the ThreatID.

Battery Installation
The ThreatID should arrive with no battery in the battery compartment and two
batteries in the shipping case. Both batteries should be fully charged and ready
for use. Battery life is indicated by the LED bars on the front of the battery. Five
bars indicate a full charge.

The battery compartment is located near the rear right corner of the top plate.
Flip the latch up to and open the battery compartment door. Insert the battery
with the LED charge indicator facing out. The tab on the battery should be on
the bottom; press the battery into the compartment to engage the connector.
Close and latch the battery door. If the battery door will not close, the battery is
not seated in the connector; check that it is inserted in the correct orientation.

14
Depending on temperature and age of the battery, the system should generally
operate for a period of two hours on each battery. The battery on the ThreatID
is “hot swap” capable. The system will remain on while a near dead battery is
exchanged for a charged battery and display a 1 minute countdown timer to

swap batteries. The user may choose to dismiss the battery swap and operate
the system on the internal hotswap battery.

The only way to recharge the internal battery is to plug the system into a
wall outlet. We recommend you charge the internal battery regardless of
use once a month.

It is highly recommended that the battery not be stored in the TheatID. Like all
lithium ion batteries, the ThreatID battery will slowly discharge when left in the
system, leaving the system with dead battery.

Sample Interface Installation


The ThreatID uses an interchangeable sample interface which allows customers to
install either a diamond ATR sample interface for solids and liquids identification, or a
gas cell for gas identification. Both sample interfaces attach easily to the instrument
top plate. The ThreatID automatically recognizes which sample interface is installed
and adjusts the software and instrument settings accordingly.

There are two silver clamps on the right side of the ThreatID top plate. These two
clamps affix the sample interface to the system. To release the installed sample
interface, lift up on each of the clamps. Once release, the sample interface can be
removed from the system. To install, press the sample interface down to engage the
switch before closing the clamps.

15
NOTE: Only clean the system with a sample interface installed to ensure that the
ThreatID remains sealed.

Software Installation
The embedded computer in the ThreatID comes with all required software pre-
installed. A backup software USB drive is included for use in the case of a
computer or memory failure; however, no software installation is required to use
the ThreatID.

As software updates become available, a link will be provided to existing


customers for download or an optional USB drive will be mailed. All software
instructions will be provided at that time.

16
Connecting Wi-Fi and Bluetooth™
The ThreatID system has embedded Wi-Fi and Bluetooth connectivity. Connecting the
system to a secure Wi-Fi network, if available, is advantageous because it allows the
use of online hazardous material resources to obtain additional information about
identified materials. A Wi-Fi network may also include mobile phone “hot spots.” To
connect to a Wi-Fi network, swipe in a downward motion anywhere along the top
border of the touch screen. The downward swiping motion will bring up a system

dialog box containing links to Wi-Fi and Bluetooth connections.

To connect to a Wi-Fi network, select the Wi-Fi icon: . A dialog box will appear
listing the available networks. Select the appropriate network and choose CONNECT.
If a password is required, enter the correct password when prompted. When complete
the DONE option can be selected.

17
An option also exists in the ThreatID software to transfer data via a Bluetooth
connection. This allows wireless data transfer in the absence of a Wi-Fi network. To
connect the ThreatID to another Bluetooth device, first ensure that the other device has
Bluetooth enabled and is set to allow pairing. Next, swipe down from the upper margin

of the touchscreen to bring up the system dialog box. Select the Bluetooth icon: .
Another dialog box will be displayed listing the available Bluetooth devices in range.
Select the desired device and choose to pair the two. Once the devices are paired,
choose the DONE option to exit the dialog box.

18
Using the ThreatID 4
The ThreatID System features the ThreatID application software, which is a
user-friendly software that guides the user through the tasks required to quickly
identify sample compounds.

Task-Oriented Screens
From the ThreatID Home Screen, you can easily navigate through
each measurement step including collecting a background, analyzing
samples, comparing spectra, mixture searching, and other tasks.

Security Features
ThreatID software contains security features to protect data, including
the ability to password protect individual users’ log-in rights.

Android™ Operating System


The embedded computer in the ThreatID uses the Android operating system. The
software uses all common Android conventions, such as pop up keyboards, drop
down menus and other control features, similar to many tablets and smartphones
that use the Android operating system.

ThreatID Procedure Overview

The ThreatID software guides users through the entire measurement process
required to identify samples.
Log on.
Turn the system on by pressing the ON/OFF switch. The ThreatID system
will boot and take you to the Android™ HOME screen.

1. From the Android HOME screen, the software can be started by


swiping up on the screen. The software may take a few seconds to
boot to the login screen. Enter the Username and Password.
2. After clicking SIGN IN the system will display a permissions dialog
box. Click OK for all three permissions screens.

19
3. In the top center of the ThreatID screen are five status lights. Each
of the lights should be green. If any of the lights are red or yellow,
check the System Health screen.
4. To begin a measurement, choose the large green START arrow in
the middle of the screen.
5. On the Preparation screen, select a METHOD from the drop- down
list. Also select or define a new INCIDENT under which the data will
be stored.
6. Solid / Liquid: Clean the diamond surface; the live image on the
right side of the screen should be used to ensure the diamond
surface is clean.
Gas: Ensure that the gas cell is clean by flushing with room air. Use
the included pump to flush the cell for at least 1 minute or use a large
volume syringe to flush the cell with at least 500 ml of air. Use air at
the same temperature and location (indoor vs outdoor) for
background collection.
7. Press NEXT to begin the background collection.
8. While the background is being collected, enter the Sample ID and
Comment. The Sample ID will be the file name and the file will be
stored in a folder with the Incident name.
Solid / Liquid: Also, select liquid, solid or both at the bottom of the
screen. (Not required for gases).
9. Once the background has completed, press NEXT.
10. Solid / Liquid: Place the sample on the diamond surface as shown
in the video on the left side of the Preview screen. The live image of
the diamond surface on the right side of the screen can help to
ensure the sample is placed correctly. Apply the press if the sample
is a solid or use the liquid well for volatile liquid samples. Use the live
spectrum displayed to ensure the spectral quality.
Gases: Introduce the sample into the gas cell using a syringe or
Tedlar sample bag observing the real time spectrum. Continue to fill
the cell until the sample absorbance is between 0.4 – 1.0 A. If 0.4 A
is not obtained, ensure that at least 500 ml of gas has been
introduced.
11. Once the software detects an adequate absorbance level (as
specified in the method), the NEXT button will turn green. Press the
NEXT button to start sample measurement.

12. The Results screen will display the sample spectrum (green) in the
center of the screen with the Library Match List on the right side.
Select one or more Library Match entries to overlay the sample and
library spectra.

20
Each Library Match lists the match Quality, a measure of the
similarity between the sample spectrum and the matched
library spectrum.
Each Library Match also contains links to information sources
pertaining to that material such as a ThreatAssist™, Google
search, PubChem, NIOSH and the WISER database.
Solid / Liquid: Water can be subtracted from samples and
the resulting residual spectrum can be searched by using the
WATER droplet icon then selecting the magnifying glass icon.
11. The ThreatID application can also be used to review previously
collected data. Choose the VIEW PREVIOUS RESULTS button to
access the results.
12. The LOGOFF button will log off the user and exit the software when
selected from the HOME screen. The internal computer will exit to
the Android desktop once the software has shut down
13. The ThreatID can be turned off at any time by pressing the ON/OFF
button on the top surface of the instrument.

Logging onto ThreatID


Upon power up, the Threat ID will boot up and display a “splash” screen. Swipe up on the
touch screen to open the ThreatID log-in page. Enter the Username and Password. The
Remember Me box will retain the Username to be auto populated the next time the system is
turned on. Select Sign In to begin. NOTE: The system is factory set with a default username
and password: Username – Admin, Password – admin

After clicking the SIGN IN button, a permissions dialog box will appear. Select OK for all three
permission dialog boxes.

21
22
ThreatID Home Screen

Once you are logged in, you will see the ThreatID Home Screen. That is the main
screen for the ThreatID. From there you can access the screens needed to perform an
analysis.

Screen Layout

The home screen is designed to be simple to understand and put all commonly used features at
your fingertips. The large arrow at the center of the screen starts the sample measurement.
Once started, the software will walk you through all the required steps on subsequent screens.
In addition, a series of large buttons on the left side of the screen provide easy access to

commonly used features, such as viewing results , editing a method

, checking the status of the system , exiting the software

, and a power/battery status menu .

The software also features a drop-down menu to access other areas of the software. The menu
icon is available on most screens. All screens also have a home icon to bring the
user easily back to the home screen if needed.

23
The battery status menu displays current power source (removable battery, reserve battery or
AC power), batteries current charge level, and estimated charging time for drained batteries.

The battery status icon is color coded for both current battery level and power source. When on

AC power a green battery icon with a charge symbol will appear on the home screen.
Full battery to 25% is green, after 25% - 15% is yellow and below 15% is red. When running on
reserve power the battery icon will change to blue for full battery until 25% where it will follow
the same color code as the removable battery. Once the reserve battery is drained past 15% it
will turn red and pulse. The system will warn the user once the system has crossed 25% power
on either battery to be prepared for hot swap (removable battery) or to plug the system into AC
power (reserve battery). Once the battery crossed 15% on the removable battery the user will be
given one minute to perform a hot swap and switch batteries. If a fresh battery is inserted the

24
system will automatically revert back to the ThreatID app. The user can choose to dismiss the
warning message and continue to run on reserve power.

NOTE: The reserve battery can only be recharged by plugging the ThreatID into AC
power. Batteries take approximately 4 hours to charge once depleted.

Status Lights
The status of the ThreatID system is displayed in easy to read lights on the home screen.
Indicator lights on the start screen are shown for the Source, Laser, Energy,
Battery and Reserve. Green indicates that the instrument is ready (if no battery is
installed, it will be grey as shown). Each field has preprogramed marginal (yellow) and
critical (red) values. The Battery and Reserve indicator lights will turn yellow with 30
minutes remaining and red with 10 minutes of battery life remaining. Once the
removable battery field turns red the system will display a one minute countdown timer
where the battery can be switched for a fully charged one. Failure to replace the
removable battery during the one minute will result in the system automatically
switching over to the reserve battery. Failure to recharge the reserve battery once the
light has turned red may result in the system shutting down mid-test. If any of the fields
are yellow or red with exception to the Reserve, the system is not ready to use, and
further information can be found on the SYSTEM HEALTH screen available from the
button with the same name.

Setting Up the System

After unpacking the ThreatID, you must ensure that it is functioning properly before you
start to use the system. To achieve high quality results and guarantee your system is
performing at an optimum level it is best to allow your system at least 10 minutes of
warm up time prior to use.

25
System Performance Tests

The SYSTEM HEALTH screen is accessible through the menu or through the button
on the HOME page. It lists information pertaining to the specific instrument, provides status lights for
key system components and a tool to Validate Performance.

Validate Performance
This feature will step the user through a series of tests that measure the instrument’s performance
according to the manufacturer’s specification. The end result is a report showing that the instrument has
meets performance metrics and is operating properly. The entire test takes approximately 15 minutes.
A polystyrene validation sample (included) is required to complete the test.

Performance Validation should be run:


1. Once per month to ensure the instrument is ready for emergency use.
2. Prior to responses if part of a standard operating procedure (SOP).
3. If it is suspected the instrument is not performing to expectations.
4. If the instrument software has been updated.

Before running the test, ensure that the diamond crystal is clean and the instrument warmed-up (on for at
least 10 minutes) and is well-aligned (see auto alignment procedure). To start the test, press the
VALIDATE PERFORMANCE button. The software will display a warning stating that the
polystyrene standard is required and the test will take 15 minutes to complete. Choose PROCEED to
continue with the test.

The system will then display a background preparation screen. Check the live image on the right to
ensure no residue is on the diamond surface. Clean the diamond if necessary. Once the system has
determined that the diamond surface is clean, the NEXT button will go green. Select the NEXT button
to continue with the test.

26
The system will automatically start conducting the signal to noise portion of the test. The instrument
should not be bumped or moved during this portion of the test. The signal to noise takes approximately
12 minutes to complete. No user input is needed during the test.

Once the signal to noise portion is complete, the NEXT button will turn green. Press the NEXT button
to continue the test.

27
The software will then request the polystyrene standard. Place the performance validation sample over
the diamond and engage the press. A preview screen will show the polystyrene spectrum. When the
system determines that the absorbance is sufficient, the NEXT button will go green. Press the NEXT
button to continue the test.

Once the system has collected the spectrum of the polystyrene standard, it will compare the results to the
instrument specification and display a Performance Validation Test Results screen. Green bars indicate
a passing score on each of the tests; red bars indicate a failing score. The REPORT menu option can be

28
used to generate a PDF report of the results. The results, in PDF format, can also be emailed using the
EMAIL menu option.

Confidence Check
A Confidence Check is a quick test which insures that the system is measuring and identifying samples
correctly . Since it is run in the same manner as an unknown sample, it also ensures that the user is
operating the instrument correctly. RedWave provides a Confidence Check sample. This sample when
measured against the standard ThreatID library produces a match to polyethylene terephthalate with a
score higher than 0.95. This test takes approximately 1 minute. The Confidence Check should be
measured once the system has warmed up (on for at least 10 minutes depending on temperature). It is
typically conducted both before and after a series of samples; by bracketing samples, confidence in the
results can be increased.
This test does not replace VALIDATE PERFORMANCE test.

Confidence Check should be run:


1. Before first and after the last sample in a set of samples
2. Anytime a user wants to check the function of the ThreatID from sample measurement to
identification

Before running the test, ensure that the diamond crystal is clean and the instrument warmed-up and is
well-aligned (see System Health, Chapter 5). This test requires the Confidence Check Sample, provided
with the ThreatID. This is a ½” diameter clear plastic disk of polyethylene terephthalate. If you don’t
have a confidence check sample, a pieces of a clear plastic water bottle, market with the PETE recycle

code (1) can be used.

29
The Confidence Check is measured using the same procedure as a
sample meaurement (see Testing a Sample, Chapter 4). During the
sample measurement portion of the test, place the Confidence Check
sample onto the diamond sensor and make contact with the press.

A successful confidence check produces a library match to polyethylene terephthalate (PET) with a
score of 0.95 or higher on the primary search. A successful confidence check result is shown below.

Please reference both TESTING A MATERIAL and COLLECTING A SAMPLE sections to run the
confidence check sample.

Date & Time

The Android software automatically adjusts time/date settings when connected to the internet.
The time zone will always default to eastern standard time (EST) and can be changed at any
time. To access the time/date menu pull down the android menu from the top of the screen.

30
Select the settings menu icon at the top of the screen.
Scroll down and select the Date & Time tab under SYSTEM.

Inside this menu you can choose to set the time manually or select automatic (default).
You can adjust the time zone and select 12 or 24 hour time clock.

31
32
Testing a Material – Solids and Liquids

Preparing the ThreatID

The ThreatID software is designed to guide users through the entire testing procedure.
Subsequent screens will lead you through naming the test, specifying a method,
collecting a background spectrum, collecting the sample spectrum and displaying the
library match. Each screen has instructions describing the actions the software is taking
and any user actions need.

Note: Before beginning a measurement, you should ensure that the sample interface is
clean. A suitable solvent such as acetone, denatured alcohol, ethanol or isopropyl
alcohol should be used to clean the sensor.

Danger: When using flammable and/or explosive materials, always wear


eye protection and use a very small amount of the material. Keep
only a micro sample of the material in or around the spectrometer
to protect your safety and those of others in the vicinity.

Danger: When using extremely volatile materials, take care not to inhale
the vapor. Wear an appropriate breathing apparatus and work
under a laboratory hood.

Note: This procedure discusses software operation only.

1. While on the Home Screen, click the green start button .


2. The first screen allows the user to prepare the instrument.

33
3. A drop-down menu on the top left allows the user to select the METHOD
to be used. Methods specify instrument parameters and libraries which are
searched to identify the material. The last method used is displayed as the
default selection.
4. A drop-down menu on the top right allows the user to specify the
INCIDENT name or to create a new incident name. The incident name
allows grouping a series of results all of which were measured at the same
incident or location. For the first measurement in a series, Create a New
Incident can be selected from the list. The last incident used is displayed as
the default selection.
5. The video on the left side of the screen demonstrates proper cleaning of the
sample interface.
6. An indication of diamond surface cleanliness is displayed in the middle of
the screen. Use this indicator and the diamond surface image (described
below) to access cleanliness of the diamond interface.
7. On the right of the screen a live video is displayed of the diamond surface.
The surface should appear clean, without contamination, before choosing

Collecting a Background
At this point in the testing procedure, the ThreatID automatically measures a background
spectrum. The background is a “blank” reference signal that serves to compensate for
instrument and atmospheric conditions that may affect the measurement. Measurement of a
background spectrum with each sample ensures consistent and accurate results.

1. In the Background Collect screen, a status bar and the text displaying
“Collecting Background” shows the status of the background collection.
Once the background collection is complete, and the user has chosen liquid,
solid or both, the NEXT button will turn green.

2. If you wish to start your analysis over or log out, click Back to go back to
the Background Preparation screen. Only do that if you wish to start your
analysis over.

34
3. During the background measurement, the Sample ID and Sample
Description fields can be filled in. Clicking in any of the text fields will
pop up a keyboard at the bottom of the screen to be used.

Sample ID
Using a unique Sample ID allows you to quickly and efficiently find sample results after
measurement. As a default, the software will fill in “Sample YYYY-MM-
DDTHR:MM:SS”. (YYYY = Year, MM = Month, DD= Day, T= Time, HR = Hour,
MM= Minute and SS= Seconds). Using the time date format prevents accidental
overwriting of data. The Sample ID will also be the name of the file that is saved. The
spectrum is automatically saved in the Incident name folder (see above).
Sample Description
This is an optional field that allows you to include additional information about the
sample. The comments are saved with the spectrum and can be included on the report
that can be printed for every sample taken on a ThreatID.

Solid / Liquid / Both Select


Three radio buttons at the bottom of the screen allow you to specify if the sample is a
solid, liquid or both. This information will be documented with the sample information
and will be used to improve search results and display the correct sampling tutorial
videos.

4. Once the background collect status bar reaches completion, press the to
proceed to sample measurement. The NEXT button will not illuminate until you
have selected solid, liquid or both.

Collecting a Sample Spectrum

After you have collected a background spectrum, you will analyze your sample using the
Sample Analysis screen.

35
Danger: When using flammable and/or explosive materials, always wear
eye protection and use a very small amount of the material. Keep
only a micro sample of the material in or around the spectrometer
to protect your safety and those of others in the vicinity.

Danger: When using extremely volatile materials, take care not to inhale
the vapor. Wear appropriate respiratory protection and work in a
well-ventilated space.

1. The Sample Collection Screen allows for correct sample positioning prior to
starting the analysis. On the left side is a short video demonstrating proper
sample loading for both a solid and a liquid. On the right side of the screen
is a live video of the diamond surface to aid in positioning small samples.
The center of the screen displays a live spectrum. With no sample in place,
this should be a nearly flat line near 0 absorbance units as shown below.

Note: If you observe a spectral anomaly that you suspect is due to a residue on
the crystal, re-clean your crystal, and click the BACK button to collect a new
background.
2. Place the sample on the diamond window as indicated in the video(s) shown
on the left of the screen.
1 For solid samples, latch the press arm down to press the sample
onto the surface.

36
2 The press is not needed for liquid samples; however, a liquid well
(shown in the video) helps to retain liquids and prevent evaporation
for the duration of the test.
3. Once the sample is applied, the live update will show a preview of the
sample spectrum. If the sample absorbance is sufficient for an analysis, the

next button will become active as shown below.

Note: If you wish to stop the analysis, click the HOME icon , and you will
be brought back to the main Home Screen where you will clean the sensor and
begin your analysis again.

4. Click to record the measurement. The system averages several


scans of the sample, depending on the number of scans specified in the
method. The status bar shows the progress during data collection.

37
Testing a Material – Gases

GLS Consumables

Tedlar™ Bag – Tedlar bags are gas tight sample bags used to collect gas phase samples and
transport them to the ThreatID for analysis. They have an inlet port and a gas tight valve. They
are single usage.

Particulate Filter – The particulate filter is designed to protect the gas cell from particulate
contamination. It should be used on the INLET of the gas pump when collecting a sample.
They are single usage.

Exhaust Filter – This is an active carbon filter cartridge designed to trap most analytes when
pumping them out of the gas cell. The exhaust filter should be attached on the OUTLET of the
gas cell when filling and flushing the gas.

Purge Filter – The purge filter is used to remove water vapor condensation from the gas cell. It
is used on the INLET of the gas cell to flush it with clean, dry air only when condensation is
present. A low energy value with no sample present is a good indication that condensation is
present. The cell may need to be flushed for several minutes through the purge filter to remove
condensation.

38
Gas Cell Quick Release Fittings
Both the gas cell and flexible tubing are equipped with quick release, gas-tight fittings. To
connect, snap the male fitting connected to the tubing into the female fitting connected to the
gas cell. To disconnect, depress the metal button on the female side before pulling them apart.

Collecting a Gas Sample


The ThreatID GLS is designed to measure gases in a safe environment. Typically, gases are
collected in the area of interest using a Tedlar gas sampling bag, then brought to the ThreatID
for identification. The ThreatID GLS is shipped with Tedlar bags, filters and fittings for
sample collection. The bags can be filled with the included sample pump, or through the outlet
of another detector, such as a PID.

Tedlar bags have valved gas inlet. To fill the bag, attached the gas inlet to the outlet of the
pump using ¼” flexible tubing (included). Rotate the valve ½ turn counter-clockwise to open.
Note, a particulate filter should be attached to the input of the pump.

39
Preparing the ThreatID

The ThreatID software is designed to guide users through the entire testing procedure.
Subsequent screens will lead you through naming the test, specifying a method,
collecting a background spectrum, collecting the sample spectrum and displaying the
library match. Each screen has instructions describing the actions the software is taking
and any user actions need.

Note: Prior to starting a gas identification with the ThreatID, the gas sample must be
collected and brought to the instrument, typically with a Tedlar™ gas sampling bag.
Note: Background measurement should be made with the gas cell filled with clean air at
the same atmospheric condition as the sample. Outdoor samples should use clean
outdoor air for the background. Indoor samples should use clean indoor air for the
background.

Danger: When using extremely volatile materials, take care not to inhale
the vapor. Wear an appropriate breathing apparatus and work
under a laboratory hood.

1. While on the Home Screen, click the green start button .

40
2. The first screen allows the user to prepare the instrument.

3. A drop-down menu on the top left allows the user to select the METHOD
to be used. Methods specify instrument parameters and libraries which are
searched to identify the material. The last method used is displayed as the
default selection.
4. A drop-down menu on the top right allows the user to specify the
INCIDENT name or to create a new incident name. The incident name
allows grouping a series of results all of which were measured at the same
incident or location. For the first measurement in a series, Create a New
Incident can be selected from the list. The last incident used is displayed as
the default selection.
5. Clean the gas cell by pumping clean air through the cell. Connect the
sample pump to the cell outlet and pump for at least 1 minute. If the cell is
not available, a large syringe can be used to flush the cell. Flush the cell
with at least 500 ml of clean air to completely flush the cell.
6. Prior to background measurement the cell should be filled with clean air at
similar conditions to the sample location. Samples found indoors should use
a background of clean indoor air; samples outdoors should use a background
of clean outdoor air.
7. Once the cell is filled with clean air at the same atmospheric condition as the

sample, press

Collecting a Background
At this point in the testing procedure, the ThreatID automatically measures a background
spectrum. The background is a “blank” reference signal that serves to compensate for
instrument and atmospheric conditions that may affect the measurement. Measurement of a
background spectrum with each sample ensures consistent and accurate results.

41
5. In the Background Collect screen, a status bar and the text displaying
“Collecting Background” shows the status of the background collection.
Once the background collection is complete, the NEXT button will turn
green.

6. If you wish to start your analysis over or log out, click Back to go back to
the Background Preparation screen. Only do that if you wish to start your
analysis over.
7. During the background measurement, the Sample ID and Sample
Description fields can be filled in. Clicking in any of the text fields will
pop up a keyboard at the bottom of the screen to be used.

Sample ID
Using a unique Sample ID allows you to quickly and efficiently find sample results after
measurement. As a default, the software will fill in “Sample YYYY-MM-

42
DDTHR:MM:SS”. (YYYY = Year, MM = Month, DD= Day, T= Time, HR = Hour,
MM= Minute and SS= Seconds). Using the time date format prevents accidental
overwriting of data. The Sample ID will also be the name of the file that is saved. The
spectrum is automatically saved in the Incident name folder (see above).
Sample Description
This is an optional field that allows you to include additional information about the
sample. The comments are saved with the spectrum and can be included on the report
that can be printed for every sample taken on a ThreatID.

Collecting a Sample Spectrum

After you have collected a background spectrum, you will analyze your sample using the
Sample Analysis screen.

Danger: When using extremely volatile materials, take care not to inhale
the vapor. Wear appropriate respiratory protection and work in a
well-ventilated space.

5. The Sample Collection Screen allows for correct sample positioning prior to
starting the analysis. On the left side is a short video demonstrating proper
sample loading. The center of the screen displays a live spectrum. With no
sample in place, this should be a nearly flat line near 0 absorbance units.
Small residual spectral features due to water (H2O) or carbon dioxide (CO2)
in the atmosphere may be present as shown in the blue circles below.

43
Note: If you observe a spectral anomaly that you suspect is due to a residue
sample remaining in the cell, flush the cell with clean gas and click the BACK
button to collect a new background.
6. Attach the Tedlar bag containing the sample to the inlet of the cell. Open
the valve on the bag and press on the bag to dispense gas into the cell.
Continue dispensing gas into the cell until an absorbance between 0.4 and
1.0 A is shown on the y axis.

7. Once the sample is applied, the live update will show a preview of the
sample spectrum. If the sample absorbance is sufficient for an analysis, the

next button will become active as shown below.

44
Note: If you wish to stop the analysis, click the HOME icon , and you will
be brought back to the main Home Screen where you will clean the sensor and
begin your analysis again.

8. Click to record the measurement. The system averages several


scans of the sample, depending on the number of scans specified in the
method. The status bar shows the progress during data collection.

45
Reviewing Results

The results screen displays the measured sample spectrum (always shown in green) and
a list of displayed library matches. Matches that are displayed on the right side of the
screen can be selected by tapping; the spectrum of selected matches is displayed along
with the sample spectrum. Matches are ranked with the best match at the top of the list.
The list can be scrolled to see additional matches. In addition to the matches, the results
screen will show specific warnings if water, protein, explosive material, chem warfare
agents or a mixture is detected in the sample spectrum.

In addition to the displayed information, a report is created for each sample


measurement. This PDF document contains the sample ID and comments, user
identification, an image of the spectrum and the library hit list. The report is saved with
the sample data in the results directory and is automatically attached when the email
function is used.

Protein Warning – Solids and Liquids Only


If the sample spectrum contains features consistent with the sample containing protein,
the software will display the protein warning shown below. Protein is a consistent
feature of samples that may pose a biological hazard. Innocuous materials including
foodstuffs can also contain protein, however. The sample should be visually compared to
the library spectrum to confirm the presence of protein and possibly tested with

46
additional techniques which would confirm or deny a biological hazard. The warning
should be used as a guide to indicate that further testing may be required.

Water Check – Solids and Liquids Only


Water is a strong infrared absorber. In mixtures containing water, minor components
can be obscured by the strong water spectrum. The ThreatID software automatically
alerts the user if characteristic features of the water spectrum are present with the
message box shown below. Upon receiving this warning, users should confirm the
presence of water and possibly use the water subtraction feature or automated mixture
search to check for minor components in the sample

47
Mixture Warning

Anytime the top hit score falls below 0.95 the system will alert the user that a mixture may be
present. Follow the SHOW AUTOMATED MIXTURE SEARCH button to see the automated
mixture search results.

NOTE: The ThreatID is intended to provide initial determinations to be used as


an information resource in the field. These results are not intended to be absolute
or conclusive identifications of unknown materials. The results provided by the
ThreatID should be verified by using other appropriate techniques. RedWave
makes no recommendations nor does it assume any liability for how the
information is utilized.

Spectral Display
The results screen shows the sample spectrum and the selected library spectra overlaid. The
sample spectrum is always shown in green; library spectra are shown in red, purple or other
colors as indicated in the library list. A display showing multiple results is shown below. The

48
spectrum can be zoomed by pinching two fingers (similar to cell phone/tablet touch screen
devices), single finger up/down or side-to-side scroll, double tap to restore to original graph or
choose the full screen icon in the upper right hand side of the graph to expand the graph to fill

the entire touch screen .

To improve visualization, any single selected spectrum can be offset from others in the display

using the offset icon . Pressing the icon multiple times increases the offset.

Library Hit List


Library matches are ranked by the match score; the library entry with the highest score matches
the sample spectrum most closely. The maximum number of library entries displayed is defined
by the method. The list can be scrolled by swiping up or down to see additional entries. Only
selected spectra from the hit list are displayed in the spectral view. Users may click on entries
to select or deselect them for viewing.

Each entry lists the name of the material in the library, the name of the library in which the
material was found, the spectral match score and the Chemical Abstracts Number (CAS

Number) if it is available. In addition, there is an information icon and a selection icon

for each entry. The first hit at the top of the screen will always be the default entry in the

PDF report unless a different entry is selected using the icon which will illuminate green
when selected.

49
Score
The score is a measure of how much of the sample spectrum can be described by the
associated library spectrum. Scores are on a scale from 0 to 1.0, with 1.0 indicating a
perfect match between the sample and library spectrum. A perfect score of 1.0 is very
unlikely due to minor differences between the standard library spectra and field sample
spectra. The score does not represent the relative concentration of a substance, nor does
it represent the probability that the substance identification is correct. Generally, a score
of greater than 0.95 indicates a good match and largely a pure sample.

Information Icon

The information icon in each hit list entry accesses a series of icons which provide direct
links to a number of data sources. Three online sources and an on-board PDF provide
additional information on material of the selected library entry. These data sources are
accessible when the instrument has internet connectivity, with the exception of the NIOSH™
guide and Publication 52 PDFs, which are stored on the instrument. The library entry and the
data sources are linked by the CAS Number/chemical name depending on the database. All
online sources will automatically copy and search the selected database. For the NIOSH™, the
user must select the in the top right corner to bring up the search screen. The CAS Number
has been copied from the chosen hit and to paste it into the search field, press and hold your
finger/stylus down for a couple seconds. A paste option will come up and can be selected. Press
the search button once the CAS Number has been entered.

The search previous results icon can be activated to search all previous results for
compounds with the same top hit. A list of previous results will be displayed with only results
where the top hit was the same as the collected sample are shown.

50
- Sample History

- Google™ search

- PubChem™ – National Institute of Health (NIH)

- WISER ™: Wireless Information System for Emergency Responders


- NIOSH™: National Institute of Occupational Safety and Health

Collapse/Remove Icon
The collapse/remove icon in the hit list is used to collapse/remove items from the hit list. It can be
used to remove a material for the list of search results. This feature is most commonly used if one
wants to simplify the hit list by removing materials found in multiple libraries or similar materials
which provide little additional information. Clicking the icon hides the selected material from the
hit list in both the results display and any generated reports.

Email

The Email feature can be used to quickly send data and reports from the sample
measurement, providing easy transmittal of all pertinent information to whoever needs it.
The feature will auto launch a RedWave cloud based email tool. It will populate the TO field
with email addresses saved in the User Profile; additional addresses can be added by typing
them in. All of the relevant files are attached to the email including the ThreatID result file,
the sample spectral files and the sample report. The email recipient has all of the information
needed to review report with only a PDF viewer. To review the sample spectrum, additional
software will be needed that is capable of opening Thermo GRAMS SPC files. After the
email is sent, the email client will automatically close and return to the ThreatID app.

51
Note: Emails are sent from tech@redwavetech.com email address

Water Subtraction – Solids and Liquids Only

Water can be a major interferant for all chemical identification systems based on infrared
spectroscopy. The infrared spectrum of water is very strong and it covers a large portion of the
usable spectral range. One means of coping with water contamination in samples is to
mathematically subtract a water spectrum from the sample spectrum then search the subtraction
result. In many cases, minor components in a mixture containing water can be analyzed with this
water subtraction and residual spectrum search process.

The ThreatID software provides a feature to easily subtract the water spectrum from any sample
spectrum. This feature is often used when the Water Check warning is displayed for a sample.
When the Water icon , located at the top of the library match list, is selected, a standard
spectrum of water will be subtracted from the sample spectrum. The residual spectrum will then be
listed at the top of the library match list. The results of a water subtraction are shown in the figure
below with the sample spectrum in green, the residual in black and the first library search result of
vinegar in red.

The residual spectrum can be searched against the libraries specified in the selected method by

selecting the Search icon located next to the residual spectrum. In the figure below, the
library search results of the residual spectrum are shown for a sample of vinegar with water
subtracted. Vinegar is a solution of acetic acid water. Once the water was subtracted the residual
search found a correct match for the minor component of acetic acid.

52
Search Residual

Search residual is a mixture analysis technique. The spectrum of a known library match is
automatically subtracted from the sample spectrum and then the residual, secondary component is
identified by searching the spectral library again. This works the same way as the water subtraction,
but subtracting a library match instead of only water.

Search residual is often used when a mixture is suspected. There are several indications that the
sample may be a mixture. First, when visually comparing the spectrum to a good (score >0.95)
library match, the user may identify peaks in the sample that are not present in the library. Those
peaks may be due to a secondary component that is not in the library spectrum. Also, the user may

53
observe that the library and sample spectra look similar, but the score is lower than expected. This
may also be an indication that a mixture is present.

To use search residual, find the library entry which is to be removed from the sample spectrum.

Select the selection icon for that entry (when selected it will turn green). The software will
show a new entry in the hit list titled Residual Spectrum as shown in the image below. The new
entry will also indicate what was subtracted with the equation “<sample> - <library hit>” where
<library hit> is the name of the library match which was subtracted. In the image below 2,2,4-
Trimethyl pentane was subtracted so the entry states “<sample>- 2,2,4-Trimethyl pentane”.
Clicking on the entry will display it on the spectral view with the other selected entries.

To search the residual spectrum against the method selected libraries, choose the search icon
displayed in the residual spectrum entry (Once selected the magnifying glass will turn blue).
Library matches for the residual search will be displayed below the residual spectrum. Selecting
any of the matches displays the spectrum along with the other selected spectra. In the figure below
the residual spectrum and the first match (toluene) is displayed.

Automated Mixture Search

Automated mixture search uses proprietary algorithms to


automatically break down a suspected mixture into the individual components. This feature is
always available for any sample, but the software will display a message warning the user when

54
it suspects a mixture is present. Selecting the button will
advance the software to the automated mixture results

When observing an automated mixture result the first overlay in yellow is the proposed sum of
all the components automatically identified. You can also observe each individual component
by selecting them which overlays them on the screen.

55
All of the same features for chemical information are available as would be seen in a primary

search (internet databases and ThreatAssist database). The pie chart for each component
represents the relative amount of each components spectrum the automated search algorithm
used to make up the “Sum of components.” This is not a valid representation of the percent
weight of the material in a mixture.

ThreatAssist™

The ThreatAssist feature displays chemical information about the


selected library match. Pertinent chemical/physical information such as the CAS number,
chemical hazards (GHS symbols), melting point, boiling point, upper explosion limit (UEL),
lower explosion limit (LEL), common chemical uses, other chemical names/synonyms,
immediate danger to life and health (IDLH), solubility (in water), flash point, vapor pressure,
vapor density, ionization potential (IP), specific gravity and chemical handling information.
Selecting the ThreatAssist button will replace the spectral view with a text display of the
information which can be scrolled.

56
Functional Groups

Most times, the results of the Library Search will accurately identify a sample. In some
instances, though, additional peaks are present in the sample spectrum that are not
represented in the library spectrum. The Functional Group feature correlates individual
peaks within the sample spectrum to specific chemical bonds known as functional groups.
This can be used to validate the library search result or to provide additional information to
classify the material when a sample is not accurately identified.

Selecting the Functional Group option from the results screen brings up the functional group
classification analysis. The sample spectrum is displayed along with a list of functional
groups which have been preselected by the software due to the sample spectrum having
adsorptions inside the regions specified by each functional group. The user must use the
supporting information for each region to determine if the particular functional group is
present.

Selecting a functional group, such as an unsaturated aromatic hydrocarbon as shown below,


overlays a color band corresponding to the range of frequencies where this chemical group
adsorbs. In the example below, the unsaturated aromatic hydrocarbon functional group has
peaks in the 3000 – 3100 cm-1 region (shown in orange) and 650 – 850 cm-1 region (shown in
blue). Additional details pertaining to each frequency region are displayed to the right of each
adsorption to aid in corresponding a particular unknown chemical to the correct functional
group(s). Chemical hazard and typical physical state information is listed for each functional
group below the functional group name.

57
A report can also be generated once functional groups are identified. Select the selection icon

within each functional group deemed to be present to add to a report.

Additional Options

The three-button icon provides additional options for data handling.

58
Compare Results
Compare results allows overlay of the currently displayed sample with a previously
collected measurement. Select Compare Results then choose the other samples which
you would like to display. The selected files will be listed on the right side of the screen,
where the library hit list is usually displayed. You can choose up to three previously
collected samples to compare.

Show Report
Show report displays the PDF format report generated from the result file. The report is
automatically generated and saved when a sample is measured. The show report function
allows the user to see what has been saved.

Report Configuration
Report configuration allows the user to choose fields that appear in the report. After
changes are made in the report configuration, the PDF file will be overwritten to save in
the new format. The Report Configuration button brings up the screen shown below.
Select / deselect check boxes to include / exclude fields on the report. The Import Logo
allows the selection of a *.JPG file to be displayed as the logo at the top of the report.
Restore Default Logo restores the default ThreatID logo.

Add to Library
Add to library allows a user to add a collected spectrum to a user generate library. Once
selected a screen will appear as shown below where the library, library entry name,
description and CAS Number (if known) is shown. If no user library has been created,

use the button to create a new library. The software will ask for a
library name and description. Press the save button to exit the create new library screen
back to the add to library screen. Once the entry has been completed, press add to save
the entry and return back to the sample results screen.

59
Library Text Search
This function searches the library based a text field that the user enters. This feature
allows the user to manually compare the sample to a library spectrum of a suspected
chemical. It searches all text fields in the library including name, CAS number, and
comment. As an example, if the user suspected the sample might contain acetone, a text
search based on the name “acetone” or the CAS number “67-64-1” would find a spectrum
of acetone from the library for visual comparison or residual search. Enter the search

phrase in the Find in Libraries field and then select the search icon .

60
Administrative Features 5

Results
The RESULTS screen allows viewing of previous analysis results along with the transfer of results by

email or other means. It can be accessed by the menu or by clicking the button from
the HOME screen. Results are displayed as boxes containing the Sample ID, the date and time of
collection, the incident name, the top library match and the quality value of the match. Any box can be
double clicked to open the result file and display the information in the same format as it was displayed
when collected.

Each result file has a check box in the upper right corner. This check box allows selecting multiple
analysis data files.

61
From the results screen, functions can be accessed to edit, transmit or organize the data.

Edit
The EDIT feature allows users the ability to change the SampleID or Comment fields in a result. This
can be used to correct mistakes made when collecting the sample or update the information.

EMAIL

This feature allows users to directly email the result file, the raw spectral data file and the sample report
to any recipient. All currently selected files will be included in the email; each file will be in a separate

62
zip file. The To, CC and Subject fields of the email will be auto populated based on the user settings.
This is especially useful when sending data to reachback for technical support. You can automatically
add reachback or support by checking off the boxes at the top of the email form.

Export / Import
Similar to the email option, the EXPORT function copies the selected results files to a new location.
This is especially useful for moving the result files to a USB drive. To save to USB based drive, first
plug the drive into a USB port on the ThreatID. Select all files to be exported and select EXPORT; a list
of available drives will be shown. Select the intended drive and press OK. Likewise, the IMPORT
feature can be used to copy result files from a portable drive onto the ThreatID for review. These result
files must have been collected on another ThreatID. LOCAL STORAGE is the solid-state read/write
memory of the ThreatID instrument. ADDITIONAL STORAGE is where the USB drive will be located,
and the remaining storage locations shown are only available for RedWave personnel.

Search
This function allows users to find specific result files. The Sample ID, Comment and Incident fields
will all be searched. Select the SEARCH option. Type in the desired search term and press . The
files with a field containing that search term will be displayed.

63
Sort
The SORT menu option allows users to arrange the files by most recent, oldest, title or incident. Select
the SORT option and choose the check box by the desired sort parameter. Sorting by incident will
group all files from a specific incident together.

64
User Manager
ThreatID users can be defined or modified through the USER MANAGER. In addition to typical
fields, such as username, password and actual name, the USER MANAGER also allows the
administrator to set access privileges and email preferences. Like most ThreatID Manager screens, the
Users are listed on the right side of the screen and the settings for the selected user are shown in the
main dialog in the center of the screen. Users can be deleted by using the DELETE menu option. The
selected user’s settings can be edited by using the EDIT menu option. New users can be added by using

the icon.

Username
This is the log in name for the user.

Password
This is the password required for logging in the selected user.

First Name / Last Name


The user’s first and last name are displayed in the user list and in the reports to easily attribute the data
collection to the correct person.

Enabled
This marks the user as active or inactive. If the enabled box is not checked, the selected user will not be
allowed to log into the system. This is useful to limit someone’s access to the system temporarily
without deleting the entire user record.

Has Administrative Rights


Users with administrative rights have access to the Method Manager, System Settings Manager, User
Manger and Library Manager. They have complete access to all parts of the system. Non-
administrators have limited access to the system and must use pre-defined methods. Administrative
rights should only be given to advanced users and supervisors.

‘To’ Email addresses / ‘CC’ email addresses


These fields set default recipients for the user when the EMAIL function is chosen from the results
screen. The EMAIL function will generate an email containing the sample spectra and results as
attachments. The program will auto populate the ‘To’ and ‘CC’ fields based on these settings.
Additional addresses can always be added from the email interaction screen before the email is sent. It’s
often useful to include the email of the reachback service: Support@Redwavetech.com.

65
Default Email Subject
When EMAIL is select from the results screen, the software will auto populate the subject line with the
value defined in this setting. The subject can always be edited from the email interaction screen when
the email is generated.

Library Manager

Commercial and Redwave libraries are copyright protected and cannot be edited in software.
Any user generated libraries may be accessed by selecting the library and clicking edit in the top
right-hand corner of the screen.

66
To select a particular library entry, use the drop-down arrow inside the compound name
text box.

Both the compound name and description can be edited and as well any library entry can be
deleted.

67
Method Manager
Method Manager is used to view or edit existing methods, or to create a new method. It can be

selected from the menu or from the button on the home screen. It contains settings
that define the minimum acceptable signal, the libraries to be searched, the match criteria to display and
the system settings that control the measurement time and resolution. The ThreatID comes with two
factory defined methods that cover most needs: Unknown Identification and High Sensitivity.

Unknown Identification - This method is useful for most samples. It takes approximately 20
seconds to collect each the background and sample. The method searches all the standard ThreatID
libraries and has a moderate match criterion for displaying results.

Library Collection – This method is useful for collecting library samples. It provides higher
sensitivity and good signal to noise required for library data. It takes approximately one minute to
collect each the background and the sample. The method searches all the factory loaded libraries
(most users modify the method to also search any additional libraries they might have).

All existing methods are listed on the left side of the window in the list titled All Methods. To create a

new method, select the icon at the bottom of the method list. To edit an existing method,

highlight the method for the list on the left and select the menu option. Menu options can also be
used to save or cancel the modified or created method.

68
Title
This is the name of the method. It is displayed in the method list and in the drop-down method selection
menus on the sample Prepare Background screen. The name should be descriptive enough to allow an
easy understanding of the methods intended use.

Description
The optional description provides a comment field for a short description of the method’s parameters or
intended use. This field is displayed under the name in the method list.

Is Available to All Users


This check box controls the access to the method. If the box is checked, all users can use the method
independent of their user level; in other words, both technicians and administrators can use methods that
are checked. If the box is unchecked, only administrators can use the method.

Min. Absorbance
This field sets the minimum absorbance that the system will accept to move from the sample preview to
the data collection screen. This value can be set between 0.01 and 0.2 absorbance units. If the
maximum absorbance of the sample spectrum is smaller than this setting, an error will appear when the
user tries to go from the preview screen to the data collection. This is designed to alert the user that the
diamond ATR is not covered with sample, there is not enough pressure on a solid sample or that a liquid
sample has evaporated from the diamond prior to measurement. A value of approximately 0.1
absorbance units is recommended for this setting.

Libraries Selected
This field lists the libraries that the sample spectrum will be compared to in order to identify the sample.
To add libraries, use the Edit option.

Search Settings
These settings control the quality and number of library matches displayed on the results screen.

The Minimum Quality specifies the lowest match quality or correlation that will be displayed. The
scale is from 10 – 99, which corresponds to correlation values from 0.1 to 0.99. If the Minimum
Quality value is set to 85, then only matches with a correlation value of 0.85 or higher will be
displayed.

The Maximum Hits field specifies how many library matches, above the minimum quality value, will
be displayed. If the Maximum Hits value is set to 3, then only the top 3 hits will be displayed,
assuming they are all above the minimum quality.

System Settings
System settings specifies the set of system operating parameters used for the data collection portion of
the method. These settings include hardware parameters, such as the number of scans and the

69
instrument resolution; they are specified and saved in configuration files through the System Settings
menu option.

System Settings Manager


System Settings work in conjunction with the Method Editor. Commonly used measurement
parameters are saved in the Systems Settings Editor that can then be assigned to several methods in the
Method editor.

The System Settings control the resolution of the sample spectrum measurement and the number of
scans averaged for background and sample measurement.

Resolution
This sets the spectral resolution of the measurement; it is the narrowest peak in the sample spectrum that
can be observed. The value can be set to 4 or 8 cm-1. By convention, the term “high resolution” denotes
lower numbers. Most solids and liquids can be adequately identified with a resolution of either 4 or 8
cm-1. It is important to note that each increasing step in resolution (from 8 to 4 cm-1 for instance)
increases the measurement time by a factor of two. The factory defined Unknown Identification
settings uses 8 cm-1 resolution while the High Sensitivity settings uses 4 cm-1 resolution.

Sample Scans
This is the number of scans which will be averaged in order to produce the sample spectrum. Averaging
scans increases the signal to noise ratio and data quality. The signal to noise ratio increases by the
square root of the number of additional scans; therefore, to double the signal to noise, four times more
scans would be needed.

The number of scans (and the resolution) also determines the amount of time required to make a
measurement. Each scan at 4 cm-1 resolution takes approximately 2 seconds.

70
Background Scans
This is the number of scans which will be averaged in order to produce the background spectrum. The
same considerations for data quality and time apply to the background as well as the sample. The
background should always have at least as many scans as the sample.

Incident Manager
The INCIDENT MANAGER screen is accessible through the menu button on the HOME page. It
shows all of the created incidents and allows users to create , EDIT or DELETE incidents. Each incident
displays the date it was created and allows for a name and a description.

To create a new incident select the icon.

71
Enter in a name and description and press the SAVE icon. This incident can now be selected from the
drop-down menu in the PREPARE TO COLLECT A BACKGROUND screen.

As shown above, incidents can be selected or created by clicking the drop down menu next to the current
incident.

72
System Health

The SYSTEM HEALTH screen is accessible through the menu or through the button
on the HOME page. It lists information pertaining to the specific instrument, provides status indicators
for key system components and allows the user to conduct an AUTO ALIGNMENT, CLEAN
CHECK RESET (administrators only) or PERFORMANCE VALIDATION and system
backup/restore.

At the top of the SYSTEM HEALTH screen, version numbers are given for the ThreatID Software,
Threat ID Firmware (IR FW version), and the instrument configuration (Instrument Version). Also
listed is the data system version number and the instrument serial number. These values may be helpful
for Redwave service personnel to troubleshoot the instrument if needed.

Energy
The ENERGY value is a measurement of the total amount of infrared light in the system as measured
by the detector. This has a range from 0 – 30,000; any value over 10,000 is acceptable for use. If the
energy value is red (below 10,000), after a 10 minute warm up period, the AUTOMATIC
ALIGNMENT feature should be used to increase the energy. If there are no Energy values displayed
and the Energy indicator is red, contact RedWave.

Source
The SOURCE status light indicates if the infrared source is operating correctly. If sufficient current is
flowing through the source, the light will be green. A red light indicates that the source has burned out
and the instrument must be serviced by Redwave.

Laser
The LASER status light indicates whether the laser, which is used for instrument self-calibration and
control, is aligned and operating correctly. The system measures the laser power on the laser detector.

73
If the power drops below a given threshold, the light will turn red. If a red light is observed for the
LASER, the AUTOMATIC ALIGNMENT feature should be used to increase the laser energy. If that
does not resolve the red status light, contact RedWave.

Battery
The BATTERY status light indicates the charge status of the battery. If the battery has more than 30
minutes of charge, the light will be green. If it has less than 30 minutes of charge it will be yellow and if
it has less than 10 minutes of charge it will be red. With no battery installed the status light will read
NO BATTERY and be grey.

Automatic Alignment
This feature aligns the instrument optics through the use of internal computer controls. AUTOMATIC
ALIGNMENT should be used whenever there is a large marked drop in the ENERGY value, if the
ENERGY light is red, or if the LASER light is red. Prior to running the AUTOMATIC
ALIGNMENT, the system should be running for at least 10 minutes and the diamond sensor surface
should be clean.

Clean Check Reset


The ThreatID ensures that the diamond crystal in clean before each background measurement by using a
Clean Check algorithm. If the software reports that the diamond is not clean prior to measuring a
background, reclean the diamond and verify no residue remains with the live visual image. Then restart
the measurement procedure. If the software reports the diamond is not clean a second time, then return
to the home screen, select SYSTEM HEALTH and press the CLEAN CHECK RESET button.

Validate Performance
This feature will step the user through a series of tests which measure the instrument’s performance
according to the manufacturer’s specification. The end result is a report showing that the instrument is
operating according to manufacturer’s specifications. The entire test takes approximately 15 minutes. A
polystyrene validation sample (included) is required to complete the test.

Performance validation should be performed monthly to ensure that the ThreatID is operating properly
for responses. Performance validation should be preformed if it is suspect that the instrument is not
functioning well. Be sure the system has been on for at least 10 minutes and that the energy status
indicator is green before performing the test.

Before running the test, ensure that the diamond crystal is clean. To start the test, press the VALIDATE
PERFORMANCE button. The software will display a warning stating that the polystyrene standard is
required, and the test will take 15 minutes to complete. Choose PROCEED to continue with the test.

74
The system will then display a background preparation screen. Clean the diamond surface and use the
live video to verify no material is left on the diamond surface. Once the system has determined that the
diamond surface is clean, the NEXT button will go green. Select the NEXT button to continue with the
test.

The system will automatically start conducting the signal to noise portion of the test. The instrument
should not be bumped or moved during this portion of the test. The signal to noise takes approximately
12 minutes to complete. No user input is needed during the test.

75
Once the signal to noise portion is complete, the NEXT button will turn green. Press the NEXT button
to continue the test.

The software will then request the polystyrene standard. Place the plastic foam of the standard over the
diamond and engage the press. A preview screen will show the polystyrene spectrum. When the system
determines that the absorbance is sufficient, the NEXT button will go green. Press the NEXT button to
continue the test.

76
Once the system has collected the spectrum of the polystyrene standard, it will compare the results to the
instrument specification and display a Performance Validation Test Results screen. Green bars indicate
a passing score on each of the tests; red bars indicate a failing score. The REPORT menu option can be
used to generate a PDF report of the results. The results, in PDF format, can also be emailed using the
EMAIL menu option.

System Backup/Restore
System backup should be done periodically to store collected results in the event of a
system/software failure. The backup can be done to an external hard drive (ex. USB drive) or to the on-
board microSD card. To initiate a system backup/restore open the three-dot menu in the upper right hand
corner.

77
To backup the system, select the backup button and select the location you would like to back the system
up to.

78
Maintenance 6
User Authorized Service

Perform only those procedures described in this chapter. For all other
problems please contact your authorized RedWave engineer.

WARNING

This section describes the service routines that you can perform on your ThreatID
system. User servicing of parts and components beyond the procedures outlined in this
section may pose a safety risk to you, damage your instrument, and invalidate the
instrument warranty.

Cleaning

Avoid shock hazard. Never allow liquid to run into the ThreatID
battery compartment. Note the warning label on the top of the battery
compartment door.

WARNING

CAUTION Do not open your system and attempt to clean interior surfaces.
Opening your system will void any and all warranty.

When the outside of the ThreatID system needs cleaning, ensure that the battery door is
closed and latched. Use a damp, soft cloth and a mild detergent or other suitable
decontamination solution to clean the outside of the unit.

79
Troubleshooting 7
Perform only those procedures described in this chapter. For all other
problems please contact your authorized RedWave engineer.

WARNING

This section describes occasional issues that may arise and how to best correct them. User
troubleshooting beyond the procedures outlined in this section may pose a safety risk to you,
damage your instrument, and invalidate the instrument warranty.

Occasional system lock ups/blank screens/system crashes


In the event the system does not respond and is in a state described above, first press the

Android square button at the bottom of the screen to display all open apps. Make sure
the ThreatID software screen is selected and swipe the app to the right to manually close it. To

relaunch the app, select the ThreatID icon .

If the above steps do not resolve the issue, restart the system by pressing the power button.
Please wait 15s before rebooting the system.

If a system reboot does not solve the issue, remove the battery and power the system up.
Note: If AC power is available, remove the battery, plug the AC adapter into the ThreatID and
boot the system.

If the system is not responding to the power button, press the reset switch to reboot the system.

In the event the above steps do not resolve the issue, please call RedWave support.

80

You might also like