Athena Weapons Detection System

Powered by CEIA OPENGATE

Weapons Detection System Overview

Athena Security’s Weapons Detection System powered by CEIA OPENGATE is a groundbreaking Concealed Weapons Detection System Software designed for faster screening of individuals and their belongings, such as backpacks, purses, and bags, to detect a wide variety of ferrous and non-ferrous threats, such as high-caliber assault weapons. Athena’s WDS now has best practices by Homeland Security built in to help your organization stay in compliance.

Components

The system includes:

  • OPENGATE® HD Active Walkthrough Metal Detector
  • Optional LiDAR (Light Detection and Ranging) Thermal Camera and Visual Camera
  • High-Resolution Visual Camera
  • Patented AI Technologies
  • Controller Tablet and Monitor

Efficient Operation with Real-Time Alerts

The system meets Federal Standards with real-time auditory and visual alerts. It can be deployed outdoors and indoors. Athena’s concealed weapons detection system scans individuals at average walking speed towards the Controller tablet. It displays “CLEAR” for no threat detected or “Object Detected” for potential threats. Real-time alarms activate upon detection. Patented software alerts officers to threats. It also ensures compliance with Homeland Security best practices, enhancing security measures.

The Athena Control Center Includes:

  1. Real-Time Alerts
  2. Real-Time Alert Resolution
  3. Digitized Incident Reporting
  4. Prompt & Automated Compliance Documentation
  5. Reports and Analytics
  6. Security Officer Check-In
  7. Enterprise User Management
  8. Pre-built API Integrations
Real-Time Alerts

Real-time image transmission to a browser, mobile app, and other third-party integrations. Alerts can be confirmed, which can trigger additional actions for alert resolution.

Accountability

Gives organizations the ability to view alerts in real time and access past alerts.

Alert Resolution

This feature aids investigations by specifying what was found during the search. It provides resilience when problems arise and offers front-facing images of all individuals passing through the screening portal in real time.

Quantify Deterrence

80% of the value of the system is deterrence. The turn around feature quantifies that deterrence value for security organizations by streamlining the logging of these incidents for reporting purposes.

DHS best practices embedded with patented AI to help keep weapons out

  • DHS 14.2.2 Prohibited Items Log
  • DHS 8.2 Testing and Documentation with WDS
  • DHS 14.2.1 Illegal Items Notification Procedures
  • DHS 8.5 Secondary Screening Procedures
  • DHS 9.2.6 U-Shaped Screening Technique
  • DHS 15.4.5 Implementing Credentialing

DHS 14.2.2

Prohibited Items Log – Ensuring Compliance and Evidence Tracking for Weapons Detection Systems

DHS guidelines for weapons detection systems emphasize the importance of maintaining a detailed and structured log of prohibited items. This log must contain evidence to support security decisions

Athena Security’s Weapons Detection System streamlines prohibited item logging for accountability and thorough documentation:

Customizable Prohibited log:

Design prohibited item logging which is part of Homeland Security best practices.  Capture essential details like item description, location, date/time, and any relevant images or videos for comprehensive evidence.

Flexible Access:

Officers can log prohibited items directly from the field using the operator tablet or administrators can access the forms via a secure browser for ease of use.

Data Centralization:

Prohibted item logs are stored securely, allowing for easy retrieval, analysis, and auditing as needed, demonstrating compliance and supporting security investigations or reviews.

Improved Incident Response:

Athena’s Weapons Detection System logging goes beyond meeting regulations. Detailed logs inform immediate action and alerts for removing prohibited items and addressing potential threats.

Trend Analysis:

Weapons Detection Logs provide insights into recurring issues, facilitating proactive security adjustments.

Legal Protection:

Robust documentation of prohibited items protects your organization in case of legal challenges.

DHS 8.2

Testing and Documentation for Weapons Detection System Compliance

DHS 8.2 emphasizes the criticality of regular WDS (Weapons Detection System) testing and documentation to ensure optimal performance and reliable threat detection.

DHS 8.2 emphasizes the criticality of regular testing and documentation to ensure optimal performance and rellable threat detection.

Equipment Verification Automation Test:

Testing confirms that your concealed WDS system are installed correctly and functioning properly as per manufacturer specifications.

Data-Driven Insights:

Documentation tracks performance history, revealing any declining trends and facilitating timely maintenance. Test results, Including location, date, time, and pass/fail status, are logged automatically for easy access and auditing.

Management Insights:

Clear reports provide supervisors and management with an overview of testing schedules, results, and any necessary follow-up actions.

DHS 14.2.1

Illegal Items-Notification Procedures For Weapons Detection Systems

DHS guidelines for weapons detection systems state that “screening procedures should specify that the discovery of illegal items should immediately prompt notification of supervisory staff.”

Athena’s Weapons Detection System has Real-Time Alerts empower your security team to comply with this requirement seamlessly. Our advanced weapons detection system enables:

Instant Supervisory Notification:

Upon discovery of a confirmed illegal item, supervisors are automatically alerted, allowing for a swift and appropriate response.
Flexible Alert Delivery: Notifications can be tailored to your workflow, reaching supervisors via Security Operation Centers, mobile apps, computers, Video Management Systems (VMS), Access Control Systems, and other integrated business software.
Proactive Response Planning: Most clients configure the system to send alerts after confirmation by security personnel to a predetermined escalation path.
Alerts include location, date/time stamp, and images for swift action.

DHS 8.5 Secondary Screening Procedures:

AI-Powered Accuracy and Compliance Monitoring

Key Requirement: DHS 8.5 mandates well-defined secondary screening protocols for individuals who set off WTM-D/WDS (Walk-Through Metal Detector/Weapons Detection System) alarms, ensuring thorough security measures.

Real-Time Procedure Verification

The system monitors officers during secondary screenings, ensuring strict adherence to best practices of rescanning individuals (or your organization’s preferred procedure). Immediate alerts are sent if officers deviate from the standard protocol, prompting on-the-spot corrections. This promotes consistency and reinforces training.

Data-Driven Accountability

The Athena software and AI collects data on screening practices, identifying trends, potential training gaps, and individual performance. This empowers management to oversee compliance and provide targeted support.

Legal Safeguards

Rigorous documentation of secondary screening procedures helps mitigate potential liability.

Visitor Experience

Consistent, well-executed procedures create a smoother and less intrusive screening process.

DHS 9.2.6

U-Shaped Screening Technique

The U-Shaped Screening Technique is a proven method designed to enhance security while maintaining an efficient flow of individuals through screening processes. This technique utilizes a U-shaped layout that allows security personnel to closely monitor individuals as they pass through the screening area. Key benefits include:

Increased Visibility:

The design ensures that security staff have an unobstructed view of all individuals being screened, enhancing detection capabilities and improving overall security.

Streamlined Process:

By organizing the screening area in a U-shape, it reduces bottlenecks, allowing for quicker screening times and a smoother experience for everyone involved.

Improved Communication:

The layout fosters better communication among security personnel, enabling them to coordinate effectively and respond quickly to any potential threats.

DHS 15.4.5

Implementing Credentialing

The Department of Homeland Security (DHS) guideline 15.4.5 highlights the crucial role of credentialing programs in managing building access and maintaining records of authorized personnel. Athena Security has developed innovative tools to align with these recommendations and simplify your security management.

1. Smart Access Control

Athena’s Smart Logic empowers you to keep the doors locked with intelligence. Instead of relying solely on object detection or clear top lock or unlock the door, which can be easily bypassed, Smart Logic keeps doors securely closed until a predetermined timer runs out or an authorized officer opens them. This intelligent system thwarts unauthorized access attempts, ensuring a higher level of security.

2. Proactive Threat Detection

Restricting access also means actively preventing unwanted individuals from entering your premises. As people pass through Athena’s Weapons Detection System (WDS), the system can scan for individuals on a watchlist. This proactive feature enables you to identify and intercept potential threats before they gain access to your building.

Officer Check-in

Customizable

Users can choose audio or silent alarms. Can save Officers across locations or keep them separate. Email alerts and/or reports.

Ease Of Use

Officers register once and never have to touch the system. The tablet has built-in sensors to help identify the person without touching the system.

Check-in Reports

Proactively identify staffing shortages when officers are too busy, or other situations where officers may need assistance.

Health and Safety

The device uses low-frequency electromagnetic technology, dynamic non-contact detection, and meets EMC electromagnetic radiation standards. It is safe for pregnant women, children, and other humans, as well as pacemakers and electronic devices.

Third Party Lab Tested Safety Compliance

  • EN 45502-2-1:2003. (Cardiac pacemakers)
  • EN 45502-2-2:2008. (Implantable defibrillators)
  • ISO 14117:2019. (Cardiac pacemakers, cardioverter defibrillators, cardiac resynchronization devices)
  • ISO 14708-1:2014 (Implants for surgery)
  • ISO 14708-2:2019 (Cardiac pacemakers)
  • ISO 14708-3:2017 (Implantable neurostimulators)
  • ISO 14708-4:2008 (Implantable infusion pumps)
  • ISO 14708-5:2020 (Circulatory support devices)
  • ISO 14708-6:2019 (Implantable tachyarrhythmia treatment devices)
  • ISO 14708-7:2019 (Cochlear implants, auditory brainstem implant systems)