SlideShare a Scribd company logo
1 of 1
FACT              SHEET




ProVision
                                                                           ™



Advanced Imaging Technology

Designed for use at security checkpoints in airports, courthouses, correctional
institutions, embassies and other facilities, the TSA-approved ProVision quickly
screens subjects using safe active millimeter wave (MMW) radio frequency
technology to detect concealed objects made of any type of material.

Effective Detection                                                                              Privacy
ProVision quickly creates a 3-D black and white                                                  ProVision offers multiple levels of privacy protection
silhouette of the subject that reveals concealed                                                 that can be customized to support customer-specific
objects. Operators can locate weapons,                                                           operational procedures.
explosives, other banned items or even                                                           • Silhouettes: Analysts simply see a 3-D black and
intellectual property.                                                                             white silhouette that makes it virtually impossible to
• TSA qualified Advanced Imaging Technology                                                         identify anyone.
  (AIT) system                                                                                   • Blurring: The system provides options that allow
• Detects all types of materials (metallic and                                                     blurring of faces and other areas of the body.
  non-metallic): liquids, gels, plastics, metals,
                                                                                                 • Remote Monitoring: The system enables analysts
  ceramics, etc.
                                                                                                   to be stationed in separate rooms, where they
• Detects all types of objects: weapons,                                                           cannot see the individual being screened. These
  standard and home-made explosives,                                                               off-site analysts can then alert security personnel at
  contraband, drugs, money, papers, etc                                                            the checkpoint of any suspicious objects so a
                                                                                                   directed search can be performed.
High Throughput                                                                                  • Image Disposition: Images cannot be saved after
ProVision is built for high checkpoint throughput.                                                 security personnel review them.
A quick scan provides checkpoint personnel                                                       • Non-Invasive: Reduces the need for intrusive
with the data they need to confidently pass an                                                      pat-down searches.
individual through a checkpoint.
                                                                                                 • Networking: Provides an additional layer of privacy
• Two-second scan time for a complete multi-
                                                                                                   because the analyst does not know which scanner
  directional view.
                                                                                                   generated the image.
• Scans 200–400 people per hour depending on
  application.
• Reduces need for time-consuming and
  intrusive pat-down searches.

Safe Technology
Leveraging harmless radio waves, ProVision
offers advanced imaging—without any health
risks.
• The signals created by ProVision are 10,000
  times lower than other commercial radio
  frequency devices.
• ProVision does not use X-rays or ionizing
  radiation.



L-3 Communications Security & Detection Systems
www.L-3com.com/sds

L-3 Communications, Security & Detection Systems (“L-3”) has made all reasonable efforts to ensure that the information in this document is accurate and complete, and disclaims any and all warranties
for such accuracy and completeness. L-3 shall not be held liable for any technical or editorial errors or omissions contained herein, or for incidental, special, or consequential damages concerning the
furnishing or use of this document. The information contained in this document is subject to change without notice. This brochure consists of L-3 Communications Corporation general capabilities
information that does not contain controlled technical data as defined within the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR)Part 734.7-11.

                                                                                                                      © 2009 All rights reserved. L-3 Communications, Security & Detection Systems Inc.
                                                                                                                                                                                  PROV_FS_17NOV09

More Related Content

What's hot

Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and RisksMiguel Rebollo
 
NETWORK SECURITY USING LINUX INTRUSION DETECTION SYSTEM
NETWORK SECURITY USING LINUX INTRUSION DETECTION SYSTEMNETWORK SECURITY USING LINUX INTRUSION DETECTION SYSTEM
NETWORK SECURITY USING LINUX INTRUSION DETECTION SYSTEMIJORCS
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection SystemDevil's Cafe
 
Signature-Based or Anomaly-Based Intrusion Detection: The Merits and Demerits
Signature-Based or Anomaly-Based Intrusion Detection: The Merits and DemeritsSignature-Based or Anomaly-Based Intrusion Detection: The Merits and Demerits
Signature-Based or Anomaly-Based Intrusion Detection: The Merits and Demeritsdavid rom
 
Network Intrusion Detection System Using Snort
Network Intrusion Detection System Using SnortNetwork Intrusion Detection System Using Snort
Network Intrusion Detection System Using SnortDisha Bedi
 
AN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEMAN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEMApoorv Pandey
 
Intrusion Detection Presentation
Intrusion Detection PresentationIntrusion Detection Presentation
Intrusion Detection PresentationMustafash79
 

What's hot (7)

Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and Risks
 
NETWORK SECURITY USING LINUX INTRUSION DETECTION SYSTEM
NETWORK SECURITY USING LINUX INTRUSION DETECTION SYSTEMNETWORK SECURITY USING LINUX INTRUSION DETECTION SYSTEM
NETWORK SECURITY USING LINUX INTRUSION DETECTION SYSTEM
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
 
Signature-Based or Anomaly-Based Intrusion Detection: The Merits and Demerits
Signature-Based or Anomaly-Based Intrusion Detection: The Merits and DemeritsSignature-Based or Anomaly-Based Intrusion Detection: The Merits and Demerits
Signature-Based or Anomaly-Based Intrusion Detection: The Merits and Demerits
 
Network Intrusion Detection System Using Snort
Network Intrusion Detection System Using SnortNetwork Intrusion Detection System Using Snort
Network Intrusion Detection System Using Snort
 
AN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEMAN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEM
 
Intrusion Detection Presentation
Intrusion Detection PresentationIntrusion Detection Presentation
Intrusion Detection Presentation
 

Similar to Prov fact sheet

NoxEye.pptx
NoxEye.pptxNoxEye.pptx
NoxEye.pptxMathanE5
 
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEODEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEOIRJET Journal
 
eForensics Free Magazine 01.12. teaser
eForensics Free Magazine 01.12. teasereForensics Free Magazine 01.12. teaser
eForensics Free Magazine 01.12. teasereForensicsMag
 
Private residence complex security. Technical solutions
Private residence complex security.  Technical solutionsPrivate residence complex security.  Technical solutions
Private residence complex security. Technical solutionsSIS Group International
 
Anti evasion and evader - klaus majewski
Anti evasion and evader - klaus majewskiAnti evasion and evader - klaus majewski
Anti evasion and evader - klaus majewskiStonesoft
 
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)TI Safe
 
Review 1 부분4
Review 1 부분4Review 1 부분4
Review 1 부분4희범 구
 
Smart surveillance
Smart surveillanceSmart surveillance
Smart surveillancePuneet soni
 
Motion based security alarm
Motion based security alarmMotion based security alarm
Motion based security alarmAkshay Surve
 
Vi system product brochure
Vi system product brochureVi system product brochure
Vi system product brochurewilnet40
 
Inria Tech Talk IoT - 28 Mars 2018
Inria Tech Talk IoT - 28 Mars 2018Inria Tech Talk IoT - 28 Mars 2018
Inria Tech Talk IoT - 28 Mars 2018FrenchTechCentral
 
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGYCYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGYjmical
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperJPINFOTECH JAYAPRAKASH
 
Brief introduction to digital forensics
Brief introduction to digital forensics Brief introduction to digital forensics
Brief introduction to digital forensics Detectalix
 
RC Presentation MSPCE 2016
RC Presentation MSPCE 2016RC Presentation MSPCE 2016
RC Presentation MSPCE 2016Rick Cox
 

Similar to Prov fact sheet (20)

Mmw
MmwMmw
Mmw
 
NoxEye.pptx
NoxEye.pptxNoxEye.pptx
NoxEye.pptx
 
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEODEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
 
A05510105
A05510105A05510105
A05510105
 
eForensics Free Magazine 01.12. teaser
eForensics Free Magazine 01.12. teasereForensics Free Magazine 01.12. teaser
eForensics Free Magazine 01.12. teaser
 
Private residence complex security. Technical solutions
Private residence complex security.  Technical solutionsPrivate residence complex security.  Technical solutions
Private residence complex security. Technical solutions
 
Anti evasion and evader - klaus majewski
Anti evasion and evader - klaus majewskiAnti evasion and evader - klaus majewski
Anti evasion and evader - klaus majewski
 
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
 
6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford
6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford
6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford
 
Review 1 부분4
Review 1 부분4Review 1 부분4
Review 1 부분4
 
Smart surveillance
Smart surveillanceSmart surveillance
Smart surveillance
 
Motion based security alarm
Motion based security alarmMotion based security alarm
Motion based security alarm
 
Vi system product brochure
Vi system product brochureVi system product brochure
Vi system product brochure
 
Inria Tech Talk IoT - 28 Mars 2018
Inria Tech Talk IoT - 28 Mars 2018Inria Tech Talk IoT - 28 Mars 2018
Inria Tech Talk IoT - 28 Mars 2018
 
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGYCYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
 
Cyber intrusion
Cyber intrusionCyber intrusion
Cyber intrusion
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Vapt life cycle
Vapt life cycleVapt life cycle
Vapt life cycle
 
Brief introduction to digital forensics
Brief introduction to digital forensics Brief introduction to digital forensics
Brief introduction to digital forensics
 
RC Presentation MSPCE 2016
RC Presentation MSPCE 2016RC Presentation MSPCE 2016
RC Presentation MSPCE 2016
 

More from Gianfranco Conti

Deloitte Football Money League 2013
Deloitte Football Money League 2013Deloitte Football Money League 2013
Deloitte Football Money League 2013Gianfranco Conti
 
Presentazione - ANALISI DI PATTERN DI SICUREZZA PER APPLICAZIONI BASATE SU SE...
Presentazione - ANALISI DI PATTERN DI SICUREZZA PER APPLICAZIONI BASATE SU SE...Presentazione - ANALISI DI PATTERN DI SICUREZZA PER APPLICAZIONI BASATE SU SE...
Presentazione - ANALISI DI PATTERN DI SICUREZZA PER APPLICAZIONI BASATE SU SE...Gianfranco Conti
 
AEROPORTO DI MILANO MALPENSA NUOVO “MASTER PLAN AEROPORTUALE”
AEROPORTO DI MILANO MALPENSA NUOVO “MASTER PLAN AEROPORTUALE”AEROPORTO DI MILANO MALPENSA NUOVO “MASTER PLAN AEROPORTUALE”
AEROPORTO DI MILANO MALPENSA NUOVO “MASTER PLAN AEROPORTUALE”Gianfranco Conti
 
Sicurezza-delle-centrali-nucleare-intervista-ing-v-romanello
Sicurezza-delle-centrali-nucleare-intervista-ing-v-romanelloSicurezza-delle-centrali-nucleare-intervista-ing-v-romanello
Sicurezza-delle-centrali-nucleare-intervista-ing-v-romanelloGianfranco Conti
 
The Information Assurance Mission at NSA - Hardening Tips for Mac OS X 10.6 "...
The Information Assurance Mission at NSA - Hardening Tips for Mac OS X 10.6 "...The Information Assurance Mission at NSA - Hardening Tips for Mac OS X 10.6 "...
The Information Assurance Mission at NSA - Hardening Tips for Mac OS X 10.6 "...Gianfranco Conti
 
Libro "Bianca" TG3 - La zarina fa, ma non si dice
Libro "Bianca" TG3 - La zarina fa, ma non si diceLibro "Bianca" TG3 - La zarina fa, ma non si dice
Libro "Bianca" TG3 - La zarina fa, ma non si diceGianfranco Conti
 
Aci airport traffic report february 2011
Aci airport traffic report   february 2011Aci airport traffic report   february 2011
Aci airport traffic report february 2011Gianfranco Conti
 
Contratto di programma ENAC - SEA Piano Investimenti 2011 - 8 febbraio 2011
Contratto di programma ENAC - SEA Piano Investimenti 2011 - 8 febbraio 2011Contratto di programma ENAC - SEA Piano Investimenti 2011 - 8 febbraio 2011
Contratto di programma ENAC - SEA Piano Investimenti 2011 - 8 febbraio 2011Gianfranco Conti
 
Mxp schede c_d_parte_prima
Mxp schede c_d_parte_primaMxp schede c_d_parte_prima
Mxp schede c_d_parte_primaGianfranco Conti
 
Mxp schede c_d_parte_terza
Mxp schede c_d_parte_terzaMxp schede c_d_parte_terza
Mxp schede c_d_parte_terzaGianfranco Conti
 
Mxp schede c_d_parte_seconda
Mxp schede c_d_parte_secondaMxp schede c_d_parte_seconda
Mxp schede c_d_parte_secondaGianfranco Conti
 
Programma lavori interventi_mxp
Programma lavori interventi_mxpProgramma lavori interventi_mxp
Programma lavori interventi_mxpGianfranco Conti
 
12 estadisticas diciembre_2010
12 estadisticas diciembre_201012 estadisticas diciembre_2010
12 estadisticas diciembre_2010Gianfranco Conti
 
Pr 061210 october_2010_stats_final
Pr 061210 october_2010_stats_finalPr 061210 october_2010_stats_final
Pr 061210 october_2010_stats_finalGianfranco Conti
 
Pr 050111 november_stats_final
Pr 050111 november_stats_finalPr 050111 november_stats_final
Pr 050111 november_stats_finalGianfranco Conti
 
Ballondor award men_player_finalx
Ballondor award men_player_finalxBallondor award men_player_finalx
Ballondor award men_player_finalxGianfranco Conti
 

More from Gianfranco Conti (20)

Deloitte Football Money League 2013
Deloitte Football Money League 2013Deloitte Football Money League 2013
Deloitte Football Money League 2013
 
Presentazione - ANALISI DI PATTERN DI SICUREZZA PER APPLICAZIONI BASATE SU SE...
Presentazione - ANALISI DI PATTERN DI SICUREZZA PER APPLICAZIONI BASATE SU SE...Presentazione - ANALISI DI PATTERN DI SICUREZZA PER APPLICAZIONI BASATE SU SE...
Presentazione - ANALISI DI PATTERN DI SICUREZZA PER APPLICAZIONI BASATE SU SE...
 
AEROPORTO DI MILANO MALPENSA NUOVO “MASTER PLAN AEROPORTUALE”
AEROPORTO DI MILANO MALPENSA NUOVO “MASTER PLAN AEROPORTUALE”AEROPORTO DI MILANO MALPENSA NUOVO “MASTER PLAN AEROPORTUALE”
AEROPORTO DI MILANO MALPENSA NUOVO “MASTER PLAN AEROPORTUALE”
 
Sicurezza-delle-centrali-nucleare-intervista-ing-v-romanello
Sicurezza-delle-centrali-nucleare-intervista-ing-v-romanelloSicurezza-delle-centrali-nucleare-intervista-ing-v-romanello
Sicurezza-delle-centrali-nucleare-intervista-ing-v-romanello
 
The Information Assurance Mission at NSA - Hardening Tips for Mac OS X 10.6 "...
The Information Assurance Mission at NSA - Hardening Tips for Mac OS X 10.6 "...The Information Assurance Mission at NSA - Hardening Tips for Mac OS X 10.6 "...
The Information Assurance Mission at NSA - Hardening Tips for Mac OS X 10.6 "...
 
Libro "Bianca" TG3 - La zarina fa, ma non si dice
Libro "Bianca" TG3 - La zarina fa, ma non si diceLibro "Bianca" TG3 - La zarina fa, ma non si dice
Libro "Bianca" TG3 - La zarina fa, ma non si dice
 
Aci airport traffic report february 2011
Aci airport traffic report   february 2011Aci airport traffic report   february 2011
Aci airport traffic report february 2011
 
Contratto di programma ENAC - SEA Piano Investimenti 2011 - 8 febbraio 2011
Contratto di programma ENAC - SEA Piano Investimenti 2011 - 8 febbraio 2011Contratto di programma ENAC - SEA Piano Investimenti 2011 - 8 febbraio 2011
Contratto di programma ENAC - SEA Piano Investimenti 2011 - 8 febbraio 2011
 
Mxp schede c_d_parte_prima
Mxp schede c_d_parte_primaMxp schede c_d_parte_prima
Mxp schede c_d_parte_prima
 
Mxp schede c_d_parte_terza
Mxp schede c_d_parte_terzaMxp schede c_d_parte_terza
Mxp schede c_d_parte_terza
 
Mxp schede c_d_parte_seconda
Mxp schede c_d_parte_secondaMxp schede c_d_parte_seconda
Mxp schede c_d_parte_seconda
 
Mxp scheda a
Mxp scheda aMxp scheda a
Mxp scheda a
 
Mxp relazione tecnica
Mxp relazione tecnicaMxp relazione tecnica
Mxp relazione tecnica
 
Programma lavori interventi_mxp
Programma lavori interventi_mxpProgramma lavori interventi_mxp
Programma lavori interventi_mxp
 
12 estadisticas diciembre_2010
12 estadisticas diciembre_201012 estadisticas diciembre_2010
12 estadisticas diciembre_2010
 
Apt paris 2010
Apt paris 2010Apt paris 2010
Apt paris 2010
 
Pr 061210 october_2010_stats_final
Pr 061210 october_2010_stats_finalPr 061210 october_2010_stats_final
Pr 061210 october_2010_stats_final
 
Pr 050111 november_stats_final
Pr 050111 november_stats_finalPr 050111 november_stats_final
Pr 050111 november_stats_final
 
Ballondor award men_player_finalx
Ballondor award men_player_finalxBallondor award men_player_finalx
Ballondor award men_player_finalx
 
Pr 041010 aug_stats_final
Pr 041010 aug_stats_finalPr 041010 aug_stats_final
Pr 041010 aug_stats_final
 

Recently uploaded

A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...lizamodels9
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc.../:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...lizamodels9
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
Non Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxNon Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxAbhayThakur200703
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Serviceankitnayak356677
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 

Recently uploaded (20)

Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc.../:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
Non Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxNon Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptx
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
 
Best Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting PartnershipBest Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting Partnership
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 

Prov fact sheet

  • 1. FACT SHEET ProVision ™ Advanced Imaging Technology Designed for use at security checkpoints in airports, courthouses, correctional institutions, embassies and other facilities, the TSA-approved ProVision quickly screens subjects using safe active millimeter wave (MMW) radio frequency technology to detect concealed objects made of any type of material. Effective Detection Privacy ProVision quickly creates a 3-D black and white ProVision offers multiple levels of privacy protection silhouette of the subject that reveals concealed that can be customized to support customer-specific objects. Operators can locate weapons, operational procedures. explosives, other banned items or even • Silhouettes: Analysts simply see a 3-D black and intellectual property. white silhouette that makes it virtually impossible to • TSA qualified Advanced Imaging Technology identify anyone. (AIT) system • Blurring: The system provides options that allow • Detects all types of materials (metallic and blurring of faces and other areas of the body. non-metallic): liquids, gels, plastics, metals, • Remote Monitoring: The system enables analysts ceramics, etc. to be stationed in separate rooms, where they • Detects all types of objects: weapons, cannot see the individual being screened. These standard and home-made explosives, off-site analysts can then alert security personnel at contraband, drugs, money, papers, etc the checkpoint of any suspicious objects so a directed search can be performed. High Throughput • Image Disposition: Images cannot be saved after ProVision is built for high checkpoint throughput. security personnel review them. A quick scan provides checkpoint personnel • Non-Invasive: Reduces the need for intrusive with the data they need to confidently pass an pat-down searches. individual through a checkpoint. • Networking: Provides an additional layer of privacy • Two-second scan time for a complete multi- because the analyst does not know which scanner directional view. generated the image. • Scans 200–400 people per hour depending on application. • Reduces need for time-consuming and intrusive pat-down searches. Safe Technology Leveraging harmless radio waves, ProVision offers advanced imaging—without any health risks. • The signals created by ProVision are 10,000 times lower than other commercial radio frequency devices. • ProVision does not use X-rays or ionizing radiation. L-3 Communications Security & Detection Systems www.L-3com.com/sds L-3 Communications, Security & Detection Systems (“L-3”) has made all reasonable efforts to ensure that the information in this document is accurate and complete, and disclaims any and all warranties for such accuracy and completeness. L-3 shall not be held liable for any technical or editorial errors or omissions contained herein, or for incidental, special, or consequential damages concerning the furnishing or use of this document. The information contained in this document is subject to change without notice. This brochure consists of L-3 Communications Corporation general capabilities information that does not contain controlled technical data as defined within the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR)Part 734.7-11. © 2009 All rights reserved. L-3 Communications, Security & Detection Systems Inc. PROV_FS_17NOV09