A stand-off security checkpoint
system and apparatus that enables security officers entrusted with protecting our nations'
critical infrastructure or other high risk locations, a means of verifying in real-time, the identity of entrants to a facility. Via a
communications system and apparatus that is positioned a safe, stand-off distance away from the entrance to a facility, a person entering a facility exits his vehicle or walks up to a
machine housing which is equipped with cameras and sensor equipment. A
close up view of the persons' identification as well a picture of the person himself is captured and readied for real-time transmission to security personnel well away from the entrants location at the
machine. Via
wireless transmitter and
receiver equipment, and
computer hardware and
software arrangements incorporated into the
system, the entrant and his identification card can be viewed and verified, from a safe standoff distance by on-site, as well as off-site security screening personnel. The utilization of
wireless networks and internet communications networks, along with the machines' physical features and use, creates multiple opportunities to detect suspicious behavior by entrants to facility well before they reach an unsafe distance to the entrance. While in operation, and with the person a safe distance away from the entrance, the
system further equipped with sensors to detect
metal, chemical and
biological substances can also send special alerts to the detection of harmful substances, well before the entrant reaches the entrance to the facility or security checkpoint. By design, the system and apparatus creates a new and effective means of deterring terrorists who may be trying to effect a terrorist infiltration by disguising themselves as officials or vendors. Additionally, the system is designed to be laid out so as to prompt a direct separation of a would-be suicide or
truck bomber from his vehicle. This can greatly deter his desire to effect an
attack at that location, as the chances for nullification and or the detection of suspicious activity by security officers operating the system, well before he reaches his location are greatly in
odds against him.