This report describes an evaluation performed on three face recognition systems manufactured by Identix Incorporated (formerly Visionics Corporation). The evaluation follows the methodology proposed in "An Introduction to Evaluating Biometric Systems," by P. J. Phillips, A. Martin, C. L. Wilson and M. Przybocki in IEEE Computer, February 2000, pp. 56-63. This methodology proposes a three-step evaluation protocol: a top-level technology evaluation, followed by a scenario evaluation and an operational evaluation. A technology evaluation was performed via the Facial Recognition Vendor Test 2000 (FRVT 2000) in May/June 2000. Technologies identified as best candidates for this scenario from FRVT 2000 results were chosen for this scenario evaluation. The goal for this evaluation was to assess the overall capabilities of entire systems for two chokepoint scenarios: verification and watch list. Verification is a one-to-one process where a person presents an identity claim and the system determines if the live face image matches the face image stored under that identity within a certain threshold. An example of a verification application is doorway access control. The watch list scenario is a one-to-many process where a person's live face image is compared to each face image in a watch list and an alarm is triggered if a confidence match exceeds a certain threshold. An example of a watch list application is searching for known terrorists passing through an airport metal detector.