Checkpoint security articles