imagine a network of camera-like-sensors that ¬

IDENTIFY INDIVIDUALS IN A CROWD CARRYING CONCEALED WEAPONS OR EXPLOSIVE DEVICES

Through The Use Of Artificial Intelligence And Safe Radio Spectrum Technology.

Deter
Attacks

Extended
Safe Zone

Assist and inform a proportionate security response

Unobtrusive
Security

Covert operations managed remotely

Continuous learning as attack modus operandi evolve

Provide an audit trail to post incidence inquiries

High detection rates/Low false positives

download product brochure

Our Technology

Networked camera-like sensors process with artificial intelligence harmless millimeter-wave signals that permeate clothing at frequencies between 75 and 110GHz.

Powered by a powerful combination of ¬

Proprietary
millimeter-wave
techniques

Artificial
Intelligence

Innovative mathematics

100%
Safe

Networked integration

Digital
processing

Traditional
Security

Today’s detection systems are woefully inadequate to protect citizens in public places and venues. Detecting concealed threats has so far been technologically difficult and very expensive and has resulted in leaving people unprotected in the majority of venues.

VS

Early Threat
Discovery

Radio Physics answers the need for detecting concealed person borne threats well in advance of security inspections, enabling early intervention by security operators to safeguard the public.

Limited to short range (up to 7-10 meters) - Not stand-off

Remote inspection (up to 30 meters) of suspects without the need to approach

Requires staff & human interaction

Autonomous and covert identification of security risks

Queues & disruption to travel

Real time, no need to stop at security

Expensive equipment & set-up costs

Autonomous operation remove the need and cost of human interaction

Limited to short range (up to 7-10 meters) - Not stand-off

Requires staff & human interaction

Queues & disruption to travel

Expensive equipment & set-up costs

Remote inspection (up to 30 meters) of suspects without the need to approach

Autonomous and covert identification of security risks

Real time, no need to stop at security

Autonomous operation remove the need and cost of human interaction