Technological advancements can help heighten port security in Africa by detecting potential nuclear threats. Radioactive materials could be smuggled in shipping containers and used to create dirty bombs. Port perimeters need sensors and video detection systems to monitor for radioactive contamination in vehicles and cargo. Biometrics and RFID tracking of employees and containers can also help enforce access controls and regulate the flow of goods and people. Together, modern security systems and vigilant screening processes can safeguard ports from nuclear dangers and criminal plans.
Heightening Port Security with Technological Advancements in Africa
1. Heightening port security with
technological advancements in Africa
7/6/2011 Totem International Ltd 1
2. Heightening port security with technological advancements in Africa
Firoze Zia Hussain
CEO & Director Totem International Ltd, India
An electronics and communication engineer who is a forward thinking and energetic professional
recognized for high-profile turnaround achievements. Was highly decorated law enforcement
professional with more than 10 years experience in security function. Successful and consistent record
of investigations, and crime prevention. Participant of the US State Department Young Leaders
Exchange Program.
Successfully executed project work and technology transfer/ collaboration at India's largest Printed
Circuit Board manufacturing plant of INDAL electronics. Pursued consultancy in Quality Circle, ISO9000,
JIT, Kaizen, TQM, Taguchi’s techniques of experimentation .A widely traversed person with diverse
contacts in global distribution of chemicals and security products.
7/6/2011 Totem International Ltd 2
6. Introduction To Port Security
IMO
ISPS code(2002)
SOLAS
7/6/2011 Totem International Ltd 6
7. Importance of port security
Bulk of African exports is through ports.
2% of the world trade.
Trades & profits.
Extensively used conveyance for
transportation.
Increases Africa‟s Natural Resources.
7/6/2011 Totem International Ltd 7
8. Port Security can prevent
Pirates/Terrorist Attacks.
Smuggling of weapons.
Illegal S/W issues & Immigration.
7/6/2011 Totem International Ltd 8
11. Radio Frequency Identification
A method of communication wirelessly with a small microchip
The chip contains a unique serial number and optional memory
A chip combined with an antenna = Intelligent Label
or RFID tag or transponder or smart tag or inlay
Transponders are available as active (on-board
battery) , semi-active (on-board battery) or passive
Typical life of around 10 years (or 100k write operation)
Multiple read/write operations
No line-of-sight required
Multiple tags can be read at the same time
7/6/2011 Totem International Ltd 11
12. RFID Technology
ADC technology.
An Rfid System
Compromises of
One or more RF tags
Two or more antennas
One or more interrogators
One or more host computers
Appropriate software
7/6/2011 Totem International Ltd 12
14. RFID works on different
frequencies
125 KHz – LF (Low Frequency)
13.56 MHz – HF (High Frequency)
860 -960 MHz – UHF (Ultra High
Frequency)
2.45 GHz – UHF / Microwave
(Some Semi-Active
and Active Readers
are using this frequency)
7/6/2011 Totem International Ltd 14
15. Benefits Through Rfid In Ports
Access Control
Container Security
RFID IN
PORTS Container Identification and Location
Activity Tracking
Regulatory
Compliance
7/6/2011 Totem International Ltd 15
16. GPS Technology
Track the position
To avoid theft
Highly effective & reliable
What is happening.
used from any where
by gps device.
Device may size like a
watch or button on collar
7/6/2011 Totem International Ltd 16
18. Uses of Cloud Technology
Reduces Cost
Increases Information Storage
No longer need to concentrate in constant
updates
can gather information even if away
7/6/2011 Totem International Ltd 18
20. Uses of Biometrics
Increases Security.
Reduces fraud.
provides viable solution to port security.
Can know who did what ,when and
where.
Increases ROI.
7/6/2011 Totem International Ltd 20
21. Wireless Technologies
Flow of information
Dock Port
Side
Head Employees
office
Sea Client
s
7/6/2011 Totem International Ltd 21
22. Value added Services
Crane scheduling systems and communication
Ship-to-shore communication
Container operations and management
RoRo facilities
Customs office
Harbour Masters office
Emergency services
Wireless network
IT infrastructure
Security and access control
Gate management
Corporate, financial, human resources
Services for tenants.
7/6/2011 Totem International Ltd 22
26. Perimeter Surveillance includes four
basic systems
Sensors
Video Detection Systems
Threat assessment
and Alarm
Management Systems
Data Communications Systems
7/6/2011 Totem International Ltd 26
34. Out Door Sensors
Vibration (shaker) or
inertia sensors
Passive magnetic field
detection
E-field
Microwave barriers
Microphonic systems
Taut wire fence systems
Fibre optic cable
H-field
7/6/2011 Totem International Ltd 34
35. Monitored Security Solutions
linked via the telephone line or cellular
network or both to an Alarm Receiving
Centre (ARC).
contacting the right Authority - i.e. the
police usually, or the Fire & Rescue
Service (FRS) in the case of a fire - if
there is an activation.
highest standards of operation.
7/6/2011 Totem International Ltd 35
36. Passive systems
Detects a potential security breach
logs the information
signals an alert on the console and or
owner.
7/6/2011 Totem International Ltd 36
37. Reactive Systems
intrusion prevention system (IPS).
auto-responds to the suspicious activity.
reprogramming the firewall to block
network traffic from the suspected
malicious source.
IDPS is used automatically
at the command of an operator; systems
that both "detect" (alert) and/or "prevent."
7/6/2011 Totem International Ltd 37
38. Detection/alarm system.
Deter theft as well as vandalism.
24-hour protection of your assets and resources.
Lower their risks associated with theft.
Decreasing costs associated with .
* insurance premiums.
repair or replacement of property or equipment that has been damaged .
7/6/2011 Totem International Ltd 38
42. RFID tags
1 Passive Tags
have no internal power supply.
electrical current induced in the antenna by the incoming rf signal.
Provides power for the chip to power up and transmit .
2 Active Tags
contain sensors,
global positioning (GPS),
satellite links,
other enhancements
3. Semi-active tags
battery is used to power sensors
volatile memory.
contactless smart cards
7/6/2011 Totem International Ltd 42
44. Access Control
Employee ID:
Smart and SecureTradelanes (SST).
Container Security Initiatives (CSI).
prevent loss and possible mischief.
Also contain biometric information such as a photograph.
closed circuit TV (CCTV)
7/6/2011 Totem International Ltd 44
45. Vehicle Control
Equipping vehicles with RFID tags.
record the exact time of entrance & exit.
unlock fuel pumps and record fuel usage.
7/6/2011 Totem International Ltd 45
46. Container Security
sensors to monitor environmental conditions
within the container.
GPS, sensors, and satellite phone capabilities to
constantly report the location of the container.
satellite phone portals for commercial shippers.
7/6/2011 Totem International Ltd 46
47. Container Identification and
Location
Container Tagging
Location Tracking
Activity Tracking
7/6/2011 Totem International Ltd 47
48. Regulatory compliance
(AIDC) technologies + RFID
Assures that container integrity has
been maintained
Containers can be ‘fast tracked’ on
arrival.
7/6/2011 Totem International Ltd 48
49. Containers with RFID enable
shippers and carriers to:
container security and integrity.
Speed shipments.
Verify that a container was loaded at a secure loading point.
Significantly reduce the likelihood a tamper event happened in
Transit with container accountability from point of origin to
destination.
Gather enough data to conduct a „virtual inspection‟ in advance
of arrival.
Guarantee that shipping containers meet governmental security
regulations.
Receive fast track or „green lane‟ handling through customs at
the point of dispatch and / or the point of receipt.
Avoid extensive delays in the shipment and receipt.
Minimise the cost of handling.
7/6/2011 Totem International Ltd 49
50. Biometrics a possible solution to
improve efficiency
7/6/2011 Totem International Ltd 50
55. Identifies users by the shape of their
hands.
The preferred technology for high-
security applications.
Very reliable when combined with other
forms of identification.
Hand scanners have a twenty-six bit
Wiegand output format as one of the
menu choices.
7/6/2011 Totem International Ltd 55
56. Implementation Issues
Card Reader Emulation.
Stand Alone Access Control
Privacy Issues
Operation by Disabled People
Outdoor Conditions
7/6/2011 Totem International Ltd 56
57. Applications
Parking Lot Application
Cash Vault Applications
Dual Custody Applications
Anti-passback
Time and Attendance
Point of Sale Applications
Interactive Kiosks
7/6/2011 Totem International Ltd 57
60. Anatomy of a Civil Emergency Incident
Primary
Incident
Secondary
Air/Ground/Water
Contamination
People
7/6/2011 Totem International Ltd 60
61. Hazards
C = Chemical
B = Biological
R = Radiological
N = Nuclear
E = Explosive
7/6/2011 Totem International Ltd 61
62. Examples of Hazards
Chemical Warfare Agents
Biological Warfare Agents
Dirty Bombs
White Powder Incidents
7/6/2011 Totem International Ltd 62
63. Chemical Warfare Agents
Chemical warfare agents can be divided into the following:
Lethal agents
Nerve Agents
Asphyxiant/blood agents
Vesicant/blister Agents
Pulmonary/choking Agents
Non lethal agents
Incapacitating agents
Riot Control Agents
7/6/2011 Totem International Ltd 63
64. Chemical Warfare Agents
Nerve Agent
Affects the communication between nerve cells, causing
uncontrollable muscle stimulation
Typical Symptoms: Nerve agent types:
Blurred/dim vision G- Agents
Headache Tabun (GA)
Nausea Sarin (GB)
Vomiting Soman (GD)
Diarrhoea Cyclosarin (GF)
Secretions and sweating
Muscle twitching
V Agents
Laboured breathing VE
Seizures VG
Loss of consciousness VM
VX
7/6/2011 Totem International Ltd 64
65. Biological Warfare Agents
Biological warfare agents can be divided into the following:
Lethal agents
Bacteria
Viruses
Toxins derived
from bacteria
Toxins derived
from plants
7/6/2011 Totem International Ltd 65
66. Dirty Bombs
An Atom 3 Types of Ionising Radiation
α β γ
Proton Alpha Beta Gamma
(Positive) Particles Particles Rays &
X Rays
Nucleus
Neutron
(Neutral)
Electron
(Negative)
Aluminium
Lead
7/6/2011 Totem International Ltd 66
67. Who responds and how?
Different countries; different processes
◦ E.g. Israel & France: no decontamination at
scene etc
Development of “Zones”
◦ Hot zone, warm zone, cold zone
◦ Contaminated, decontamination, clean.
7/6/2011 Totem International Ltd 67
68. Typically Half-
mask/disposable/skin
protection – if nec.
Typically
SCBA/Gas suits Crowd Control Line
Exclusion (Hot) Zone
Decontamination Line
Hot Line
Typically Full-face/ Protection
Protection Level A Protection
appropriate filter/suit Level C
Level B
or P&SA/ suit
Contamination Reduction (Warm) Zone
Support (Cold) Zone
7/6/2011 Totem International Ltd 68
69. Zone Description
Dynamic situation
Hot Zone Warm Zone Cold Zone
Convenient barrier to Outer cordon - control public
Decontamination zone
contain primary source access (& escape!)
Typically last zone to be Typically 2nd zone to be
1st zone to be created
created created
Expect Monitoring of
Entry likely before
Secondary contamination Monitoring only to ensure
Detection, Identification,
once hot zone detection and contamination-free
Monitoring
identification complete
Possibly unknown
Hazards should be identified Should be non-hazardous
Hazards
Contamination from Contamination only from
Should be contamination-free
Primary Source Secondary Sources
Contamination Possibly Contamination should be
Should be contamination-free
above IDLH below IDLH
Typically minimal if any
Typically negative pressure or
Typically use SCBA (and protection: post-
powered filtering respirators
Gas-tight suits if decontamination clothing;
and full skin protection -
necessary) possibly MFR-type respirators
minimum liquid-tight.
as safeguard
7/6/2011 Totem International Ltd 69
70. Desired Response
Fire Service Police Fire & Ambulance
Hot Zone Warm & Cold Zone Warm Zone
Detection, Identification Reconnaissance Triage
& Monitoring Crime Scene Mass Decontamination
Reconnaissance Management Casualty Transport
Search & Rescue Firearms use
7/6/2011 Totem International Ltd 70
71. Dealing with the Nuclear Threats
7/6/2011 Totem International Ltd 71
77. Benefits of Electronic surveillance
Installing Night vision equipment
They are good when you want to get a better look at a
specific object and then return to normal viewing
Conditions.
Have a single lens or stereo lens, depending on the
model , excellent for constant viewing, such as moving
around in a dark building.
Cameras with night-vision technology can send the
image to a monitor for display or to a VCR for
recording. When night-vision capability is desired in a
permanent location, such as on a building or as part of
the equipment in a helicopter, cameras are used..
7/6/2011 Totem International Ltd 77
78. Purpose of Night vision Camera’s
To locate enemy targets at night
For navigation, surveillance and targeting
It reveals whether an area has been disturbed.
To discover items that have been hidden by criminals,
including money, drugs and bodies.
Changes to areas such as walls can be seen using
thermal imaging.
7/6/2011 Totem International Ltd 78
79. Thermal imaging cameras
All thermal imaging
cameras have infrared detector.
use these cameras to locate targets,
track people, intelligence gathering
and surveillance
used for surveillance and security.
can detect the minute temperature
changes and this is generated as an
image on a screen.
now cameras are available for other
purposes like sensing sailing boats.
7/6/2011 Totem International Ltd 79
81. Benefits of Low lux camera’s
7/6/2011 Totem International Ltd 81
82. High mega pixel cameras
IP security cameras provide
optimum picture quality and better
frame.
These cameras use
inexpensive sensors and
mechanical shutters to control
exposure and time
Offers a way to increase the
detailed capture within an image
without sacrificing the area of the
camera.
7/6/2011 Totem International Ltd 82
84. Crisis response and management
Likely situations at the port:
Theft of containerized cargo
high-risk containers
Terrorist Attacks
Smuggling
Explosion
Thefts during loading and unloading of cargo
7/6/2011 Totem International Ltd 84
85. Theft of Cargo can be avoided
through Rfid Technology
7/6/2011 Totem International Ltd 85
90. Walk Through Metal Detector
scanning from both sides
provides superior detection
superior target analysis
uniformity and performance
ferrous and non-ferrous weapons detection
designed for mass transit, loss prevention
7/6/2011 Totem International Ltd 90
91. Digital Signal Processor (DSP) Based
Technology
Audible and Visual Alarms
Entry Pacing Lights
Floor Mounting Option
7/6/2011 Totem International Ltd 91
92. Integrated Gps Reciever & Antena
Wireless Radio Design
Tilt & dead reckoning System
WPAN
WWAN
WLAN
Bar code Reader Support
7/6/2011 Totem International Ltd 92
94. High Security Facilities
Live & Continuous Under Belly Video Scanning
Capture number plate and driver image
Count vehicles & space
Log Vehicular Details
7/6/2011 Totem International Ltd 94
95. How to deal with such situations
X-ray and Radiation Portal Monitors(RPM)
Intelligent video systems
Crane-mounted sensors
Radio Frequency Identification (RFID) tags
Intelligent device management
Maritime domain awareness
7/6/2011 Totem International Ltd 95
98. ROI for security equipment and
technology
Are my employees being honest about their hours worked
A security director can view and download incident online
without having to pull the incident from the DVR.
Remote access can save a business in fleet expenses, travel
expenditures, and time and resource management.
Be in multiple places at one time.
A win-win for all parties anytime, anywhere access.
Convergence opens new ROI opportunities for security
providers, who are investing R&D dollars to position themselves
at the forefront of the convergence revolution.
7/6/2011 Totem International Ltd 98
99. Using surveillance to prevent theft
Generates hypotheses
Monitor trends
Detect clusters and outbreaks
objectives can be met very rapidly and often more
accurately than with other reporting systems.
7/6/2011 Totem International Ltd 99
100. Reducing possibility of missing containers and
missing cargo in containers
RFID Tags
Cloud devices
IDS
SURVIELLENCE
DEVICES
Container Tracking
Activity Tracking
7/6/2011 Wireless
Totem International Ltd 100
101. Rfid Tags
7/6/2011 Totem International Ltd 101
106. Surveillance Devices
Works day& night
Infrared
intelligence
No special
software needed
Captures all
images
7/6/2011 Totem International Ltd 106
108. Features
captures a full 10-print record in well
under 10 seconds.
using a two capture process instead of
the traditional three capture 4 Slap process.
.
No other external power source is
required.
Applications range from
Enrolment,
Verification/identification,
Physical/logical access
Quick look-up applications.
Complete enrolment application available
7/6/2011 Totem International Ltd 108