Athena's Concealed Weapons Detection System

blank

Concealed Weapon Detection System Overview

Athena Security's Weapons Detection platform works with CEIA Opengate, Apollo Weapons Detection, Garrett weapons detection, Metrasens Ultra weapons detection. The Platform is designed to help organizations comply with best practices from the Department of Homeland Security (DHS), which is a crucial aspect of operating a modern weapons detection system. It goes beyond simple alerting of most WDS's to provide a digital framework that ensures security procedures are followed consistently and documented to enable the platform to catch more threats then any piece of WDS hardware.

blank

Components

The system includes:

  • Walkthrough Metal Detector/Weapons Detection
  • Optional LiDAR (Light Detection and Ranging) Thermal Camera and Visual Camera
  • High-Resolution Visual Cameras
  • Patented AI Technologies
  • Controller Apple iPad Tablet and Operator Monitor Tablet
  • Athena Control Center Cloud

Efficient Operation with Real-Time Alerts

The systems adhere to Federal Standards with real-time auditory and visual alerts. It can be deployed outdoors and indoors. Athena’s concealed weapons detection systems scan individuals at average walking speed towards the Controller tablet. It displays “CLEAR” for no threat detected or “Object Detected” for potential threats. Real-time alarms activate upon detection.  The patented software platform enhances any weapons detection system by adding an AI-powered alert layer that proactively identifies devices that are offline or misconfigured, detects individuals who attempt to bypass the system, and ensures operators are using equipment correctly. This intelligent oversight alerts officers to threats and ensures compliance with Homeland Security best practices, enabling the system to catch more threats than a standalone weapons detection system alone.

blank

The Athena Control Center Includes:

  1. Real-Time Alerts
  2. Real-Time Alert Resolution
  3. Digitized Incident Reporting
  4. Prompt & Automated Compliance Documentation
  5. Reports and Analytics
  6. Security Officer Check-In
  7. Enterprise User Management
  8. Pre-built API Integrations
blank
blank
Real-Time Alerts

Real-time image transmission to a browser, mobile app, and other third-party integrations. Alerts can be confirmed, which can trigger additional actions for alert resolution.

blank
Accountability

Gives organizations the ability to view alerts in real time and access past alerts.

blank
Alert Resolution

This feature aids investigations by specifying what was found during the search. It provides resilience when problems arise and offers front-facing images of all individuals passing through the screening portal in real time.

Quantify Deterrence

80% of the value of the system is deterrence. The turn around feature quantifies that deterrence value for security organizations by streamlining the logging of these incidents for reporting purposes.

DHS best practices embedded with patented AI to help keep weapons out

blank
blank
  • DHS 14.2.2 Prohibited Items Log
  • DHS 8.2 Testing and Documentation with WDS
  • DHS 14.2.1 Illegal Items Notification Procedures
  • DHS 8.5 Secondary Screening Procedures
  • DHS 9.2.6 U-Shaped Screening Technique
  • DHS 15.4.5 Implementing Credentialing
blank

DHS 14.2.2

Prohibited Items Log – Ensuring Compliance and Evidence Tracking for Weapons Detection Systems

DHS guidelines for weapons detection systems emphasize the importance of maintaining a detailed and structured log of prohibited items. This log must contain evidence to support security decisions

Athena Security’s Weapons Detection System streamlines prohibited item logging for accountability and thorough documentation:

Customizable Prohibited log:

Design prohibited item logging which is part of Homeland Security best practices.  Capture essential details like item description, location, date/time, and any relevant images or videos for comprehensive evidence.

Flexible Access:

Officers can log prohibited items directly from the field using the operator tablet or administrators can access the forms via a secure browser for ease of use.

Data Centralization:

Prohibted item logs are stored securely, allowing for easy retrieval, analysis, and auditing as needed, demonstrating compliance and supporting security investigations or reviews.

Improved Incident Response:

Athena’s Weapons Detection System logging goes beyond meeting regulations. Detailed logs inform immediate action and alerts for removing prohibited items and addressing potential threats.

Trend Analysis:

Weapons Detection Logs provide insights into recurring issues, facilitating proactive security adjustments.

Legal Protection:

Robust documentation of prohibited items protects your organization in case of legal challenges.

Disclaimer: No System is 100% accurate including this advanced weapon detection system.

blank

DHS 8.2

Testing and Documentation for Weapons Detection System Compliance

DHS 8.2 emphasizes the criticality of regular WDS (Weapons Detection System) testing and documentation to ensure optimal performance and reliable threat detection.

blank

DHS 8.2 emphasizes the criticality of regular testing and documentation to ensure optimal performance and reliable threat detection.

Equipment Verification Automation Test:

Testing confirms that your concealed WDS system are installed correctly and functioning properly as per manufacturer specifications.

Data-Driven Insights:

Documentation tracks performance history, revealing any declining trends and facilitating timely maintenance. Test results, Including location, date, time, and pass/fail status, are logged automatically for easy access and auditing.

Management Insights:

Clear reports provide supervisors and management with an overview of testing schedules, results, and any necessary follow-up actions.

blank

DHS 14.2.1

Illegal Items-Notification Procedures For Weapons Detection Systems

DHS guidelines for weapons detection systems state that “screening procedures should specify that the discovery of illegal items should immediately prompt notification of supervisory staff.”

Athena’s Weapons Detection System has Real-Time Alerts empower your security team to comply with this requirement seamlessly. Our advanced weapons detection system enables:

Instant Supervisory Notification:

Upon discovery of a confirmed illegal item, supervisors are automatically alerted, allowing for a swift and appropriate response.
Flexible Alert Delivery: Notifications can be tailored to your workflow, reaching supervisors via Security Operation Centers, mobile apps, computers, Video Management Systems (VMS), Access Control Systems, and other integrated business software.
Proactive Response Planning: Most clients configure the system to send alerts after confirmation by security personnel to a predetermined escalation path.
Alerts include location, date/time stamp, and images for swift action.

blank

DHS 8.5 Secondary Screening Procedures:

AI-Powered Accuracy and Compliance Monitoring

Key Requirement: DHS 8.5 mandates well-defined secondary screening protocols for individuals who set off WTM-D/WDS (Walk-Through Metal Detector/Weapons Detection System) alarms, ensuring thorough security measures.

Real-Time Procedure Verification

The system monitors officers during secondary screenings, ensuring strict adherence to best practices of rescanning individuals (or your organization’s preferred procedure). Immediate alerts are sent if officers deviate from the standard protocol, prompting on-the-spot corrections. This promotes consistency and reinforces training.

Data-Driven Accountability

The Athena software and AI collects data on screening practices, identifying trends, potential training gaps, and individual performance. This empowers management to oversee compliance and provide targeted support.

Legal Safeguards

Rigorous documentation of secondary screening procedures helps mitigate potential liability.

Visitor Experience

Consistent, well-executed procedures create a smoother and less intrusive screening process.

blank

DHS 9.2.6

U-Shaped Screening Technique

The U-Shaped Screening Technique is a proven method designed to enhance security while maintaining an efficient flow of individuals through screening processes. This technique utilizes a U-shaped layout that allows security personnel to closely monitor individuals as they pass through the screening area. Key benefits include:

Increased Visibility:

The design ensures that security staff have an unobstructed view of all individuals being screened, enhancing detection capabilities and improving overall security.

Streamlined Process:

By organizing the screening area in a U-shape, it reduces bottlenecks, allowing for quicker screening times and a smoother experience for everyone involved.

Improved Communication:

The layout fosters better communication among security personnel, enabling them to coordinate effectively and respond quickly to any potential threats.

blank

DHS 15.4.5

Implementing Credentialing

The Department of Homeland Security (DHS) guideline 15.4.5 highlights the crucial role of credentialing programs in managing building access and maintaining records of authorized personnel. Athena Security has developed innovative tools to align with these recommendations and simplify your security management.

1. Smart Access Control

Athena’s Smart Logic empowers you to keep the doors locked with intelligence. Instead of relying solely on object detection or clear top lock or unlock the door, which can be easily bypassed, Smart Logic keeps doors securely closed until a predetermined timer runs out or an authorized officer opens them. This intelligent system thwarts unauthorized access attempts, ensuring a higher level of security.

2. Proactive Threat Detection

Restricting access also means actively preventing unwanted individuals from entering your premises. As people pass through Athena’s Weapons Detection System (WDS), the system can scan for individuals on a watchlist. This proactive feature enables you to identify and intercept potential threats before they gain access to your building.

Officer Check-in

blank
blank
Customizable

Users can choose audio or silent alarms. Can save Officers across locations or keep them separate. Email alerts and/or reports.

blank
Ease Of Use

Officers register once and never have to touch the system. The tablet has built-in sensors to help identify the person without touching the system.

blank
Check-in Reports

Proactively identify staffing shortages when officers are too busy, or other situations where officers may need assistance.

blank

Health and Safety

The device uses low-frequency electromagnetic technology, dynamic non-contact detection, and meets EMC electromagnetic radiation standards. It is safe for pregnant women, children, and other humans, as well as pacemakers and electronic devices.

Third Party Lab Tested Safety Compliance

  • EN 45502-2-1:2003. (Cardiac pacemakers)
  • EN 45502-2-2:2008. (Implantable defibrillators)
  • ISO 14117:2019. (Cardiac pacemakers, cardioverter defibrillators, cardiac resynchronization devices)
  • ISO 14708-1:2014 (Implants for surgery)
  • ISO 14708-2:2019 (Cardiac pacemakers)
  • ISO 14708-3:2017 (Implantable neurostimulators)
  • ISO 14708-4:2008 (Implantable infusion pumps)
  • ISO 14708-5:2020 (Circulatory support devices)
  • ISO 14708-6:2019 (Implantable tachyarrhythmia treatment devices)
  • ISO 14708-7:2019 (Cochlear implants, auditory brainstem implant systems)