A stand-off security checkpoint system and apparatus that enables security
officers entrusted with protecting our nations' critical infrastructure
or other high risk locations, a means of verifying in real-time, the
identity of entrants to a facility. Via a communications system and
apparatus that is positioned a safe, stand-off distance away from the
entrance to a facility, a person entering a facility exits his vehicle or
walks up to a machine housing which is equipped with cameras and sensor
equipment. A close up view of the persons' identification as well a
picture of the person himself is captured and readied for real-time
transmission to security personnel well away from the entrants location
at the machine. Via wireless transmitter and receiver equipment, and
computer hardware and software arrangements incorporated into the system,
the entrant and his identification card can be viewed and verified, from
a safe standoff distance by on-site, as well as off-site security
screening personnel. The utilization of wireless networks and internet
communications networks, along with the machines' physical features and
use, creates multiple opportunities to detect suspicious behavior by
entrants to facility well before they reach an unsafe distance to the
entrance. While in operation, and with the person a safe distance away
from the entrance, the system further equipped with sensors to detect
metal, chemical and biological substances can also send special alerts to
the detection of harmful substances, well before the entrant reaches the
entrance to the facility or security checkpoint. By design, the system
and apparatus creates a new and effective means of deterring terrorists
who may be trying to effect a terrorist infiltration by disguising
themselves as officials or vendors. Additionally, the system is designed
to be laid out so as to prompt a direct separation of a would-be suicide
or truck bomber from his vehicle. This can greatly deter his desire to
effect an attack at that location, as the chances for nullification and
or the detection of suspicious activity by security officers operating
the system, well before he reaches his location are greatly in odds
against him.