Security screening and support system

ABSTRACT

A security screening and support system for a venue having a plurality of access points includes a plurality of screening centers connected to a central control. The plurality or screening centers are arranged so as to be located in relation to the plurality of access points of the venue. The screening centers collect threat samples from subjects entering the venue, with the samples being screened for a threat signature, such as explosives. If a subject tests positive, an alert status is sent to the central control and a response, which is preferably randomized from a plurality of standard operating procedures, is enacted. The central control enables security personnel to view, monitor, respond and analyze threat situations.

CROSS REFERENCE TO RELATED APPLICATIONS

The present invention claims the benefit of U.S. Provisional PatentApplication Ser. No. 60/678,195 entitled “Personnel Screening andSecurity System With Dynamic, Individualized Subject Interface” filedMay 6, 2005 and U.S. Provisional Patent Application Ser. No. 60/702,621entitled “Kiosk/Security Decision Support System” filed Jul. 27, 2005.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention pertains to the art of security systems and, morespecifically, to a personnel security screening and response controlsystem for use in providing security screening in a wide range ofvenues, particularly where user attention to increased security measuresis not desired.

2. Discussion of the Prior Art

Since Sep. 11, 2001, protection against terrorist threats has become anational priority. This priority extends from the protection ofgovernment facilities inside the U.S. and abroad to the protection ofprivate businesses and venues. Various types of threats have beenpostulated, including attacks using explosives, chemical and/orbiological agents, as well as nuclear and radiological agents (dirtybombs). The diversity of these threats has created complex securitychallenges for national, state, and local governments, thetransportation industry, private businesses, and even individuals. Totalexpenditures related to Homeland Security topped $100B in 2003 andbillions have been allocated in Federal, Supplemental Appropriations andState/Local spending. Increasingly, U.S. businesses are devoting morerevenue to security systems, with total expenditures reaching tens ofbillions of dollars. Growth in the homeland security industry isexpected to be vigorous over the next decade. Motivated by the widediversity of potential threats and by the inadequacy of currentlyavailable systems, government investments in research and developmentare on the rise.

Of the various threats postulated, explosives remain the number onechoice of most terrorists. Indeed, many experts have noted that, in thecase of terrorist activity, compelling statistical evidence exists thatbombs are a primary threat. Additional studies have shown that mostdeaths and injuries occur in locations where security screening is nottypically present, highlighting the importance of protecting high-valuelocations lacking a security screening system. As security systems ingovernment facilities improve, businesses and other non-governmentvenues become increasingly attractive targets, with public safety,security and the economic health of businesses being held at risk.

Experience in aviation security has shown that employing moderatelyeffective portal screening to screen 100% of personnel increasesoperational risk to would-be attackers and is thus a significantdeterrent. Indeed, most of the security systems currently available weredeveloped in response to regulatory pressures pertaining to aviationsecurity. However, since the use of such systems by individuals wasmandated, to date the development of these systems has been focused onsecurity sensors themselves, with little attention being given to userinteractions or ease of use. Prior methods of providing for personnelscreening and security involve costly, large fixed base, and lowthroughput systems. Indeed, these systems are most often associated withlong lines, user frustration, false alarms, and irritating delays forthe personnel being screened.

The above described systems were not designed with the needs ofbusinesses in mind, especially with regard to providing security in amanner that is consistent with their objectives and image. Furthermore,existing interfaces for security and personnel screening are not readilyadaptable to different individuals or to changes in security sensingtechnology. In the case of explosives screening, current systems oftencost more than $1M per portal for systems that detect bulk explosives,and tens of thousands of dollars per portal for systems that detecttrace explosives. Moreover, installation and annual maintenance costsoften times exceed the original price of the system. In the case oftrace explosive detection, currently deployed systems were developedprimarily for use by analytical chemists in laboratories and thereafteradapted for use in the field. Current trace explosive detection systemssuffer from very long clearance times following a positive detection(15-30 minutes), have exceedingly high false alarm rates and requireextensive training to ensure proper use and maintenance.

Trace explosive detection systems are based on wide scientific evidencewhich indicates that handling of explosives leaves trace residues onhands, clothes, and other materials. These residues are highlyconcentrated and difficult to eradicate. Actually, the Federal AviationAdministration relies on this principle as a basis for their traceexplosive detection program. Indeed, contamination is expected to be soextensive and difficult to eliminate that currently installed traceexplosive detection systems depend on secondary contaminationtransferred from the hands and clothes of individuals to their baggage.Baggage is sampled for trace explosives, and samples obtained arepresented to detection systems for analysis.

While currently deployed trace detection systems operating on thisprinciple have high sensitivity, false alarm rates and low throughputrequire that only a small fraction of personnel be screened. As aresult, probability of detection is quite low. Moreover, most businessesand unregulated industries are not at risk from the very smallquantities of explosives that are a threat to aircraft and thus do notrequire the explosive detection capabilities needed by aviationsecurity. A better operational point for such cases would be the abilityto screen 100% or nearly 100% of individuals using a high throughput,customized system, with fewer false alarms. Raising the percentage ofindividuals screened will increase the overall probability of detection,as well as the level of deterrence.

Further, it is known that explosive contamination can vary widely oversmall spatial distances. Evidence indicates that trace residue levelscan change as much as 10,000 fold over distances as short as a fewcentimeters. Currently available trace explosive detection systemssample only from limited spatial areas, with swipes of these areasprovided to a fixed base system. Thus, there is a need to improve uponthe spatial sample and analysis of explosive contamination.

As described above, currently available screening systems suffer frommany disadvantages such as high cost, low throughput, high false alarmrates, operational complexity, high maintenance and trainingrequirements, poor spatial sampling and the like. In addition, as thecurrently available systems are focused on individual security sensorsystems rather than the user interface, these systems are not easilyupgraded with new technological solutions and/or designed to create apositive experience for users. These limitations have created asignificant barrier to the use of such systems when convenience of useis paramount to meeting the combined needs of security and access tobusinesses in particular. More specifically, the security of largevenues and transportation hubs has become a distinct challenge forbusinesses, state and local governments, as well as the federalgovernment in the United States and abroad.

Improving security requires the formulation of effective tactics,techniques, and procedures which are tailored to the particular threatlevel, the location and available assets, as well as the consistentapplication of these approaches to reduce vulnerabilities. Moreover, asattacks are rare events, it is critical that a system exist forpromulgating and exercising security procedures, as well as formeasuring improvements in the response to real or simulated events.Taken together, such a system would permit an entity to establish bestpractices and achieve a state of readiness for individual venues, aswell as across an entire company. Current approaches to security are adhoc and do not utilize sophisticated decision support aids, modernsoftware and communication tools, authentication procedures, or audittrail creation.

As such, there is a need to improve the interface and experience ofpersonnel screening processes. More specifically, there exists a needfor a personnel screening and security system that collects subject datathrough the use of a user friendly, even entertaining, interface. Inaddition, there is a need for a support system that integrates multiplesecurity interfaces which are positioned in multiple locations.Moreover, there is a need for a security screening and support systemthat meets the needs of unregulated industries and businesses wishing toimprove security in a manner that is consistent with current businessobjectives, desired user interactions, and a changing technologicallandscape.

SUMMARY OF THE INVENTION

The present invention is directed to a personnel security screening andsupport system including a screening center having a main housing withinwhich is arranged a threat screening system and a demographic screeningsystem. The screening center establishes an interactive system fordetermining the potential threat of a subject, e.g., whether a subjecthas recently encountered or handled an explosive substance that may posea potential threat. In one preferred embodiment, the screening centeralso determines a particular demographic of the subject in order topresent targeted advertising or other information to ensure that thesubject's interaction with the screening system is pleasant.

In accordance with the invention, the threat screening system includes athreat data collector and a data analyzer. At this point, it should benoted that the data analyzer employed would depend on the particularthreat data collected which can take various forms in accordance withthe invention. That is, the threat data collector includes a samplecollector which obtains one or more assessment samples from anindividual, either physically or passively, with the sample(s) beingprocessed through the data analyzer to establish a threat potential forthat particular individual. Where explosive-based threats are ofparticular concern, the threat sample collector preferably obtains atrace residue sample from the subject which is subsequently analyzed bya sample analyzer to determine whether the trace residue sample containsa threat residue. For instance, in accordance with one preferredembodiment of the invention, a trace residue sample is obtained from asubject's hand. More specifically, the subject's hand is placed a samplecollecting sheet onto which any foreign particles or trace residue wouldbe transferred. The sheet is then shifted to the sample analyzer whichdetermines whether the trace residue contains any threat residue, suchas explosive particles, chemicals or the like. The particular form ofanalysis can also vary depending on the particular threat form beingtargeted. In the case of the explosive residual analysis, a preferredembodiment exposes the sample to various reagents and UV light in orderto establish a threat signature. At the same time threat data iscollected from the subject, demographic information is also preferablyobtained.

In further accordance with the invention, the demographic screeningsystem includes a demographic collector and a demographic analyzer. Thedemographic collector obtains a demographic indicator or attributeinformation from the subject. In accordance with a preferred embodimentof the invention referenced above, when the subject's hand contacts thesample collecting sheet, a hand size or other features of the hand aredetermined. The demographic analyzer compares the collected handfeature(s) with stored demographic information to determine a particulardemographic of the subject. In addition, other physical attributes, suchas height, weight, and facial attributes, could also be employed todetermine the particular demographic.

In accordance with one preferred embodiment of the invention, once asubject is analyzed from a threat standpoint, and the demographicindicator is analyzed for the particular demographic of the subject, thescreening center preferably issues the subject an article, in the formof a keepsake. Unbeknownst to the subject, the keepsake, which includesa picture of the subject taken at the screening center, is alsopreferably provided with a visual indicator associated with the threatsignature, e.g., an indication of whether the trace residue samplecontained a threat residue, as well as advertising targeted to thesubject's particular demographic. That is, in accordance with thispreferred form of the invention, the keepsake contains a hiddenindicator, such as a code or icon, embedded in the keepsake and visuallyidentifiable to security personnel, relating to whether the subject isdetermined to be a potential threat. In addition to issuing the keepsakeat the screening center, other security measures are taken, particularlythe dispatching of security personnel. Certainly, other securityprocedure options can be employed, such as refusing to issue thekeepsake and detaining the subject.

As indicated above, the security screening centers of the invention canbe employed in a wide range of environments, but preferably venues whereprominent screening procedures are not welcome. For instance, theinvention has particular application for use in screening visitors andguests wishing to enter amusement parts, concerts, race tracks, athleticevents and the like. In accordance with the most preferred form of theinvention, a group, pod or cluster of screening centers is arranged at adistance from each entry point of a particular venue. Members of thepublic wishing to enter the venue must first interact with the screeningcenter, be screened and receive a keepsake. Upon reaching the venue, thesubject presents both a pre-purchased ticket and the keepsake to asecurity screener, or an integrated ticket/keepsake. In addition tohandling the ticket, the security screener scans the keepsake for theembedded code and, if the embedded code indicates that the subject isnot a threat, the subject is permitted to enter the venue. If, on theother hand, the embedded code indicates that the subject may constitutea threat, the subject is taken aside for additional screening. Inaccordance with another embodiment, any individual not passing thescreening analysis is flagged at a remote control station incommunication with each of the screening centers and appropriatesecurity measures are taken to assure that the individual does not evenreach a venue entry point.

An aspect of the present invention is particularly directed to asecurity screening and support system for a venue having a plurality ofaccess points. The system preferably includes a plurality of screeningcenters connected to a central control. The plurality or screeningcenters are strategically placed in relation to the plurality of accesspoints of the venue. Preferably, multiple screening centers are arrangedin pods or clusters which are positioned remote from each of theplurality of access points, such as in parking lots or other areasleading to a main venue site. In general, the exact positioning andnumber of screening centers can vary depending on at least theparticular site configuration, logistics and the volume of people likelyto enter the venue for an event. In any case, the screening centerscollect samples, either through direct physical contact or passivesensing/transmission arrangements, from subjects looking to enter thevenue. The samples are then screened for a threat. If a subject testspositive, an alert status is sent to the central control and a responseis formulated.

In further accordance with the invention, the central control integrateseach of the plurality of screening centers at a single location. Thecentral control enables security personnel to view a target subject atany one of the plurality of screening centers, provide an alertindicating that a particular subject has a positive test result, andeither enact an appropriate response dependent upon a preset threatlevel or alter the threat level and response based on the results. Inaddition to providing a command center in connection with responding toan actual threat, a test alert can be run from the central control,while a monitoring responses to the test alert. Furthermore, the centralcontrol allows security personnel to evaluate procedures for addressingvarious threat conditions and log alert information from each of theplurality of screening centers to establish an audit trail.

Additional objects, features and advantages of the present inventionwill become more readily apparent from the following detaileddescription of preferred embodiments when taken in conjunction with thedrawings wherein like reference numerals refer to corresponding parts inthe several views.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a perspective view of a screening center constructed inaccordance with the present invention;

FIG. 2 is a cut-away side view of the screening center of FIG. 1;

FIG. 3 is a flow chart depicting a preferred sample collection andanalysis process employed in connection with the present invention;

15 FIG. 4 depicts an article or keepsake issued from the screeningcenter following completion of the sample collection and analysisprocess of FIG. 3;

FIG. 5 is an aerial view of a venue having multiple access points, withclusters of screening centers located away from each access point inaccordance with the present invention;

FIG. 6 illustrates a central control display including informationobtained from one of the screening centers;

FIG. 7 is a central control display illustrating an alert status forportions of the venue of FIG. 5; and

FIG. 8 is a central control display illustrating the alert procedurestatus for portions of the venue of FIG. 5.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

As will become more fully event below, the present invention can takevarious forms and scan for various potential threats. However, initialreference to FIGS. 1 and 2 in describing a preferred form of theinvention wherein a personnel screening center or kiosk employed in thesecurity screening and support system of the present invention isgenerally indicated at 2. Screening center 2 includes a main housing 4provided with a front wall 6, a rear wall 7, a top wall 8, a bottom wallor base 9 and opposing side walls 10 and 11. In addition, screeningcenter 2 is provided with various accessories that enable screeningcenter 2 to blend in or match a particular venue or location. Forexample, in the embodiment shown, screening center 2 is shown with apair of columns 17 and 18, as well as a shield 20, which represents aconfiguration employed in connection with an auto racing venue. At thispoint, it should be understood that screening center 2 can take variousforms within the scope of the invention. Preferably, each screeningcenter 2 is designed to blend into the environment of the particularvenue in which it is employed.

In any event, screening center 2 includes a collecting portion 34arranged within a housing 37 that retrieves trace residue samples andcertain demographic samples from a subject. As such, collecting portion34 includes a residue sample collector 38 and a demographic samplecollector 41, as well as an output portion 45 which, as will bedescribed more fully below, outputs or issues an article to the subjectupon completion of a screening process.

In accordance with the invention, residue sample collector 38 includes asample collecting sheet 55 positioned upon a palm pad 56 below a cowl57. Sample collecting sheet 55 is provided on a continuous roll 59 thatenables screening center 2 to provide a clean sheet for each subject. Inany case, sample collecting sheet 55 includes a slightly adhesive ortacky surface that attracts trace residue from the subject. Once a traceresidue sample has been collected from the subject, sample collectingsheet 55 is moved to a sample analyzer 63. Upon reaching sample analyzer63, chemical reagents stored within a chemical reagent dispenser 66 aresprayed onto sample collecting sheet 55 and a test for a threat residueby an analyzing portion 68 of sample analyzer 63 is performed. As willbe discussed more fully below, palm pad 56 preferably includes apressure pad or pad sensor 72 operatively coupled to analyzing portion68 in connection with obtaining a good sample, as well as a demographiccontrol center 75 for determining a particular demographic of the testsubject.

Reference will now be made to FIG. 3 in describing a preferred screeningand analyzing sequence designed to occur at screening center 2.

Upon approaching screening center 2, a subject places, for example,his/her hand upon sample collecting sheet 55 and against palm pad 56, sthereby triggering pad sensor 72. If insufficient pressure is applied topalm pad 56, a warning or further instructions are presented to thesubject on a display 79, such as requesting that additional pressure beapplied. In connection with the embodiment shown, a silhouette oroutline of a hand, which may or may not correspond to the hand size of,in the case of the exemplary race car venue, the hand of a famous racecar driver associated with the particular event for an amusing sizecomparison for the user, is provided at residue sample collector 38 forproperly positioning the subject's hand. The inclusion of pad sensor 72assures that the subject provides a sufficient pressure to obtain aproper sample as indicated in step 85. Thereafter, a media feed system87 transfers sample collecting sheet 55 to reagent dispenser 66 where,as shown in step 89, a polymer coating or spray is applied. Once coated,sample collecting sheet 55 is passed under a UV bath 91 of analyzingportion 68 to obtain a sample image 93. If necessary, the process ofcoating and bathing sample collecting sheet 55 can be repeated a numberof times with different chemicals to scan for wider ranges of explosivesso as to obtain an accurate and comprehensive result. In any case, onceone or more sample images 93 are obtained, the images 93 are analyzedfor a threat residue at 95. Although various known explosive detectionanalysis arrangements can be employed, including spectroscopic systems,it is preferred to simply coat the sample with one or more chemicalswhich will chemically react with any existing explosive residue suchthat the residue will be readily identifiable upon be exposed to the UVlight at 91. This particular technique is preferred because it is knownto be accurate, involves simple and robust hardware, yet is costeffective. In any case, such explosive detection techniques are known inthe art and do not form a particular aspect of the invention such thatthey will not be discussed further herein.

Upon completion of the analysis, an explosive detection result 97 isobtained, after which sample collecting sheet 55 is moved to a waste orcollection zone in step 99. If analyzing portion 68 detects the presenceof a threat in step 103, screening center 2 is caused to initiate athreat sequence, which will be discussed more fully below, in step 105and if no threat residue is detected, screening center 2 follows anon-threat process as indicated at step 106.

At the same time sample collecting sheet 55 is being analyzed for threatresidue, demographic control 75 preferably analyzes and determines aparticular demographic of the subject in step 120. In the embodimentshown, demographic control 75 employs, for example, hand size, handpressure or other feature(s), in order to determine a particulardemographic of the test subject. Upon determining a particulardemographic of the test subject, advertising targeted to the particulardemographic is collated as part of non threat process 106. Thereafter,information is printed in step 125 onto an article or keepsake 130 whichis dispensed at output portion 45. At this point, it should be notedthat keepsake 130 is preferably provided with various information anddata which the subject will likely wish to obtain, as well asinformation and data of potential interest to security personnel. Forinstance, keepsake 130 is preferably provided with event memorabilia onthe particular event which the subject has paid to witness. Thismemorabilia can take various forms, such as pictures, stats, and otherevent information. In addition, keepsake 130 is preferably provided withtargeted advertising. Furthermore, keepsake 130 contains a visualindicator on the analysis done of the sample residue.

FIG. 4 schematically illustrates the inside of one keepsake 130 producedin accordance with the invention. As shown, keepsake 130 includes afirst photo portion 140 having a still photograph of a facial portion ofthe subject obtained via a camera 142 positioned on screening center 2.In addition to first photo portion 140, keepsake 130 includes a secondphoto portion 144 illustrating a hand portion of the subject obtainedduring the screening process. In the embodiment shown, keepsake 130 isdepicted in connection with a car race venue such that the subject andthe subject's hand is shown slowing a car into, for example, pit row, soas to provide the subject with a level of amusement following thescreening process. More importantly, however, keepsake 130 includes athreat indicating portion 148 that includes a time/date indicator 149and a threat indicator 150. Threat indicator 150 can be presented invarious colors and/or forms in order to inform security personnel thatthe subject has or has not tested positive for a threat residue. Ofcourse, a wide range of threat indicators could be employed such as, forexample, providing a particular color on an automobile hub 150′ or thelike. In general, it is simply desired to provide some type of markingor identifying indicia on keepsake 130 which would provide a readilyvisual indication to any security personnel looking at keepsake 130whether the particular individual matches the picture in first photoportion 140 and if the individual tested positive for explosivedetection. Finally, keepsake 130 is shown to include a plurality ofadvertisement portions 152 and 153 that present advertisements targetedto the particular demographic of the subject ascertained during thesample collection process. In addition to providing advertisements onkeepsake 130, screening center 2 can provide advertisements, news, eventinformation or the like during the screening process on display 79 tofurther enhance the subject's interaction and enjoyment with thescreening process. Of course, presenting this information can actuallybe used in connection with financing the overall cost and maintenance ofthe overall system.

At this point, it should be realized that each subject tested byscreening center 2 receives a dedicated keepsake 130 due to theindividual picture in first photo portion 140 and the hand print. It isan aspect of the invention that a requisite keepsake 130 be required,along with a ticket, invitation or the like, for each individualattempting to enter the particular venue. Therefore, each keepsake 130is obtained outside the venue and, preferably, a substantial distancefrom an entry point to the venue, such as in or adjacent a parking lotfor the event. Regardless, each subject wishing to enter the venue mustpresent his/her keepsake 130 to security personnel who matches thepicture to the individual and scans keepsake 130 for threat indicator150.

For use in connection with further describing the invention, FIG. 5depicts the security and screening system of the present invention inconnection with a venue 190, depicted as a car race track havingmultiple access points 193-196. As shown, arranged a requisite distancefrom each access point 193-196 is a screening center cluster such asindicated at 203 and 204 in connection with access points 193 and 194respectively. Screening center clusters 203 and 204 include a pluralityof screening centers 2 that screen individuals or subjects prior toentering venue 190 through access points 193-196. The number andlocation of clusters 203 and 204 are designed to enable a highthroughput of subjects in order to prevent any significant delays inentering venue 190. In further accordance with the preferred form of theinvention, each screening center 2 and each screening center cluster203, 204 is fully integrated and connected to a central control 210,which could be located inside, outside or remote from venue 190, thatenables security personnel to monitor screening processes, initiatesecurity procedures, establish control updates and provide other supportfunctions as needed while screening subjects looking to enter venue 190.

The overall manner in which the screening command and control receives,processes and responds to pertinent information can certainly vary. FIG.6 illustrates one preferred command and control arrangement whereincentral control 210 includes a main control display 215 presentedfollowing a positive test for an explosive residue at a screening center2 which is part of cluster 203. As shown, main control display 215presents a screen snapshot 219 having a location screen portion 229 thatidentifies a particular venue and/or portion of a venue from which thepositive test was received and a cluster screen portion 232 thatindicates a particular screening center 2 of the cluster 203 from whichthe positive test was received. Also shown is a keepsake view portion235 including a photo portion 238 having a snapshot of the subject whichtested positive, as well as a portion 239 of a sample image obtainedduring the requisite screening process, for further analysis. Screen 219further includes a video screen portion 242 that presents a loopedvideo, with or without audio, feed of the subject immediately before,during and after screening, as well as a close-up screen 245 thatrepresents a still image, close-up photograph of a subject. Therefore,snapshot screen 219 provides security personnel with a host of locationand subject information that can be used to access and respond to thepotential threat. The system is shown to be on alert and pre-programmedalert actions to be taken are shown by alert status informationindicated at 249. The alert status information preferably providessecurity personnel with a list of actions to be taken in connection withthe security alert, while also keeping track of what actions have beencompleted and a time since the security alert occurred. In accordancewith a preferred form of the invention, various predetermined standardresponses or actions are automatically established as standard operatingprocedure upon receipt of a positive threat test result. However, theparticular response employed is preferably randomized to counter thepossibility of a group of threat potential individuals predicting futureresponses.

FIG. 7 presents an alert level screen 260, also preferably provided inconnection with main control 210, which enables security personnel toview, monitor and update threat alert levels associated with variousportions of venue 190. Furthermore, as shown in FIG. 8, main control 210preferably includes an audit screen 270 that enables security personnelto ensure implementation of various security procedures, log alertstatus information occurring at various screening centers 2, implement atest alert and view the response of security personnel to actual andtest scenarios.

With this overall construction, it should be readily apparent that thesecurity screening and support system constructed in accordance with thepresent invention provides a high throughput, interactive system forscreening unknowing subjects entering a venue for exposure toexplosives. The screening system provides each test subject with akeepsake which represents a piece of memorabilia in some form orfashion, is required for entry into the venue, and provides anindication of the results of the explosive test. Moreover, the systemnot only screens for potential security threats, but presentsdemographic analysis to enable targeted advertising to be presented tothe subjects which can help a business offset any costs associated withinstallation and maintenance of the overall system. By fully integratingthe screening centers at a central control, security personnel can view,monitor, respond and analyze threat situations to ensure an efficientand coordinated response to any security alerts that may occur, whilealso permitting training and readiness assessment.

Although described with reference to a preferred embodiment of theinvention, it should be readily understood that various changes and/ormodifications can be made to the invention without departing from thespirit thereof. For instance, while being described in connection with asingle venue, e.g., a race track, the present invention may beincorporated into multiple venues or venues having multiple discreetareas or sections in order to ensure the safety of workers, visitors andthe like. In addition, the invention can be employed in connection withvarious types of threats so as to be not limited to explosive detectionor the specific analyzing system described. To this end, the type ofsample collector, i.e. threat sensor arrangement, can be based on directphysical contact with the subject or passive in nature, such as would bethe case using, for example, a radiation detector or a millimeter wavesensor. Furthermore, although the embodiment described above outlined asecurity personnel review of each keepsake for a threat indicator, whichcould be either the presence or absence of some identifying mark on thekeepsake, it should be realized that a keepsake need not be issued atall to any individual who tests positive. In such an arrangement,security personnel would be dispatched to the particular screeningcenter in order to further evaluate the individual and the threat. Tothis end, the mere fact that an individual has a matching keepsake wouldjustify entry into the venue, with the keepsake review being performedby either personnel or electronic machinery. In general, the inventionis only intended to be limited by the scope of the following claims.

1. A security screening and support system for a venue having aplurality of access points comprising: a plurality of screening centers,each of the plurality of screening centers being located based on arespective one of the plurality of access points, each one of saidplurality of screening centers including: a sample collector forobtaining a threat sample for a subject; and a sample analyzeroperatively coupled to the sample collector, said sample analyzerscreening the threat sample to determine whether the subject is apotential threat and produces a test result; an article produced by theone of the plurality of screening centers and issued to the subject fromthe one of the plurality of screening centers with an indicator of thetest result, with the article being required in connection with enteringthe venue; and a central control operatively connected to each of theplurality of screening centers, said central control including: meansfor providing an alert indicating that a particular subject is apotential threat; and means for establishing at least one threat levelfor the plurality of access points, wherein the at least one threatlevel has at least one predetermined, associated potential threatresponse.
 2. The security screening and support system according toclaim 1, further comprising: means for setting a test alert status atone of the plurality of screening centers; and means for monitoring aresponse to the test alert status.
 3. The security screening and supportsystem according to claim 1, further comprising: means for ascertaininga status of a particular one of the plurality of screening centers. 4.The security screening and support system according to claim 1, furthercomprising: means for monitoring a subject at any one of the pluralityof screening centers.
 5. The security screening and support systemaccording to claim 4, wherein the monitoring means includes means forviewing in the central control a looped video received from one of theplurality of screening centers.
 6. The security screening and supportsystem according to claim 4, wherein the monitoring means includes meansfor viewing at the central control a still photograph of the subjecttaken at one of the plurality of screening centers.
 7. A method ofproviding security screening and support at a venue having a pluralityof access points comprising: obtaining a threat sample from a subject,looking to enter the venue, at one of a plurality of screening centerslocated away from the plurality of access points of the venue; analyzingthe threat sample for at least one of a plurality of threat signatures;issuing a visual indicator of whether the threat sample contained atleast one of the plurality of threat signatures, wherein the visualindicator is provided on an article provided at the one of the pluralityof screening centers and issued to the subject from the one of theplurality of screening centers; monitoring each of the plurality ofscreening centers from a central control; and issuing an alert when aparticular subject tests positive for one of the plurality of threatsignatures.
 8. The method of claim 7, further comprising viewing of thearticle and the visual indicator by security personnel when the subjectattempts to enter the venue at one of the plurality of access points. 9.The method of claim 7, further comprising: viewing a status of aparticular one of the plurality of screening centers.
 10. The method ofclaim 7, further comprising: updating a threat level for at least aportion of the venue.
 11. The method of claim 7, further comprising:viewing alert information at any one of the plurality of screeningcenters.
 12. The method of claim 11, further comprising: transmittingalert information from one of the plurality of screening centers to thecentral control; and logging the alert information from the one of theplurality of screening centers.
 13. The method of claim 7, furthercomprising: capturing a visual image of the subject at one of theplurality of screening centers; transmitting the visual image to thecentral control; and viewing the visual image at the central control.14. The method of claim 7, further comprising: capturing a video imageof the subject at one of the plurality of screening centers; andwatching the video from the central control.
 15. The method of claim 7,further comprising: establishing alert procedures for addressing thealert status.
 16. The method of claim 15, further comprising: monitoringthe alert procedures from the central control.
 17. The method of claim15, further comprising: updating the alert procedures to addressevolving threat conditions.
 18. The method of claim 15, furthercomprising: responding to the alert in accordance with predetermined,standard operating procedures, wherein various selections for thestandard operating procedures exist; and randomly altering a responsefrom the various selections.