SlideShare uma empresa Scribd logo
1 de 112
Baixar para ler offline
Heightening port security with
technological advancements in Africa




                 7/6/2011   Totem International Ltd   1
Heightening port security with technological advancements in Africa




                            Firoze Zia Hussain

             CEO & Director Totem International Ltd, India

 An electronics and communication engineer who is a forward thinking and energetic professional
recognized for high-profile turnaround achievements. Was highly decorated law enforcement
professional with more than 10 years experience in security function. Successful and consistent record
of investigations, and crime prevention. Participant of the US State Department Young Leaders
Exchange Program.
Successfully executed project work and technology transfer/ collaboration at India's largest Printed
Circuit Board manufacturing plant of INDAL electronics. Pursued consultancy in Quality Circle, ISO9000,
JIT, Kaizen, TQM, Taguchi’s techniques of experimentation .A widely traversed person with diverse
contacts in global distribution of chemicals and security products.




                                                 7/6/2011    Totem International Ltd                 2
Totem International Ltd
7/6/2011   Totem International Ltd   4
9.00am-9.30am
Introduction-Importance of Port Security




                    7/6/2011   Totem International Ltd   5
Introduction To Port Security


   IMO


   ISPS   code(2002)

   SOLAS




                        7/6/2011   Totem International Ltd   6
Importance of port security
   Bulk of African exports is through ports.

   2% of the world trade.

   Trades & profits.

    Extensively used conveyance for
    transportation.

   Increases Africa‟s Natural Resources.




                                   7/6/2011   Totem International Ltd   7
Port Security can prevent
 Pirates/Terrorist Attacks.
 Smuggling of   weapons.
 Illegal S/W issues & Immigration.




                        7/6/2011   Totem International Ltd   8
Technological models to enhance
      efficiency at ports




                7/6/2011   Totem International Ltd   9
Technologies' in ports




             7/6/2011   Totem International Ltd   10
Radio Frequency Identification
A method of communication wirelessly with a small microchip

The chip contains a unique serial number and optional memory

A chip combined with an antenna = Intelligent Label
or RFID tag or transponder or smart tag or inlay

Transponders are available as active (on-board
battery) , semi-active (on-board battery) or passive
Typical life of around 10 years (or 100k write operation)

Multiple read/write operations

No line-of-sight required

Multiple tags can be read at the same time


                                             7/6/2011   Totem International Ltd   11
RFID Technology
 ADC  technology.
 An Rfid System
 Compromises of
   One or more RF tags
   Two or more antennas
   One or more interrogators
   One or more host computers
   Appropriate software
                          7/6/2011   Totem International Ltd   12
Handheld RFID Reader
RFID works on different
        frequencies
125 KHz        –    LF (Low Frequency)
13.56 MHz      –    HF (High Frequency)
860 -960 MHz   –    UHF (Ultra High
                            Frequency)
2.45 GHz       –    UHF / Microwave
                   (Some Semi-Active
                    and Active Readers
                    are using this frequency)

                    7/6/2011   Totem International Ltd   14
Benefits Through Rfid In Ports

                    Access Control


                   Container Security

  RFID IN
  PORTS           Container Identification and Location


                  Activity Tracking



                  Regulatory
                  Compliance




                  7/6/2011   Totem International Ltd      15
GPS Technology
 Track the position
 To avoid theft
 Highly effective & reliable
 What is happening.
 used from any where
  by gps device.
 Device may size like a
watch or button on collar

                    7/6/2011   Totem International Ltd   16
Cloud Technology




        7/6/2011   Totem International Ltd   17
Uses of Cloud Technology
 Reduces  Cost
 Increases Information Storage
 No longer need to concentrate in constant
  updates
 can gather information even if away




                    7/6/2011   Totem International Ltd   18
Biometrics Technology




          7/6/2011   Totem International Ltd   19
Uses of Biometrics
 Increases Security.
 Reduces fraud.
 provides viable solution to port security.
 Can know who did what ,when and
  where.
 Increases ROI.




                       7/6/2011   Totem International Ltd   20
Wireless Technologies
Flow of information

           Dock                          Port
           Side




  Head                                               Employees
  office




              Sea                       Client
                                        s



                       7/6/2011   Totem International Ltd        21
Value added Services
   Crane scheduling systems and communication
   Ship-to-shore communication
   Container operations and management
   RoRo facilities
   Customs office
   Harbour Masters office
   Emergency services
   Wireless network
   IT infrastructure
   Security and access control
   Gate management
   Corporate, financial, human resources
   Services for tenants.


                            7/6/2011   Totem International Ltd   22
9.30am-10.00am
Installing Port Perimeter Security




                7/6/2011   Totem International Ltd   23
Installing Port Perimeter
         Security




               7/6/2011   Totem International Ltd   24
7/6/2011   Totem International Ltd   25
Perimeter Surveillance includes four
            basic systems
 Sensors


 Video   Detection Systems

 Threat assessment
                 and Alarm
  Management Systems

 Data   Communications Systems

                       7/6/2011   Totem International Ltd   26
Sensors
 Barrier Sensors
 Volumetric Sensors
 Fence Mounted Sensors




                     7/6/2011   Totem International Ltd   27
Video Detection Systems




            7/6/2011   Totem International Ltd   28
Threat Assessment and Alarm
   Management Systems




              7/6/2011   Totem International Ltd   29
7/6/2011   Totem International Ltd   30
Intrusion Detection




            7/6/2011   Totem International Ltd   31
Data Communications Systems




             7/6/2011   Totem International Ltd   32
Indoor sensors

 Passive infrared detectors
Ultrasonic detectors
Microwave detectors
Photo-electric beams
Glass break detectors
Smoke, heat &carbon monoxide
 detectors




                      7/6/2011   Totem International Ltd   33
Out Door Sensors

 Vibration (shaker) or
  inertia sensors
 Passive magnetic field
  detection
 E-field
 Microwave barriers
 Microphonic systems
 Taut wire fence systems
 Fibre optic cable
 H-field
                      7/6/2011   Totem International Ltd   34
Monitored Security Solutions
 linked via the telephone line or cellular
  network or both to an Alarm Receiving
  Centre (ARC).
 contacting the right Authority - i.e. the
  police usually, or the Fire & Rescue
  Service (FRS) in the case of a fire - if
  there is an activation.
 highest standards of operation.


                      7/6/2011   Totem International Ltd   35
Passive systems
 Detects  a potential security breach
 logs the information
 signals an alert on the console and or
  owner.




                    7/6/2011   Totem International Ltd   36
Reactive Systems
  intrusion prevention system (IPS).
 auto-responds to the suspicious activity.
 reprogramming the firewall to block
  network traffic from the suspected
  malicious source.
 IDPS is used automatically
 at the command of an operator; systems
  that both "detect" (alert) and/or "prevent."

                      7/6/2011   Totem International Ltd   37
Detection/alarm    system.
 Deter   theft as well as vandalism.
 24-hour   protection of your assets and resources.
 Lower   their risks associated with theft.
 Decreasing   costs associated with .
  * insurance premiums.

     repair or replacement of property or equipment that has been damaged            .




                                                7/6/2011   Totem International Ltd       38
10.00am-10.30 am
Access Control



          7/6/2011   Totem International Ltd   39
Access Control




        7/6/2011   Totem International Ltd   40
Installing Rfid at Ports




            7/6/2011   Totem International Ltd   41
RFID tags

1 Passive Tags
     have no internal power supply.
     electrical current induced in the antenna by the incoming rf signal.
     Provides power for the chip to power up and transmit .

2 Active Tags
     contain sensors,
     global positioning (GPS),
     satellite links,
    other enhancements

3. Semi-active tags
     battery is used to power sensors
     volatile memory.
     contactless smart cards



                                      7/6/2011   Totem International Ltd     42
Why RFID?




     7/6/2011   Totem International Ltd   43
Access Control
Employee ID:
   Smart and SecureTradelanes (SST).
   Container Security Initiatives (CSI).
   prevent loss and possible mischief.
   Also contain biometric information such as a photograph.
   closed circuit TV (CCTV)




                             7/6/2011   Totem International Ltd   44
Vehicle Control
Equipping vehicles  with RFID tags.
record the exact time of entrance & exit.
unlock fuel pumps and record fuel usage.




                         7/6/2011   Totem International Ltd   45
Container Security
 sensors to monitor environmental conditions
  within the container.
 GPS, sensors, and satellite phone capabilities to
  constantly report the location of the container.
 satellite phone portals for commercial shippers.




                         7/6/2011   Totem International Ltd   46
Container Identification and
          Location
 Container Tagging
 Location Tracking
 Activity Tracking




                      7/6/2011   Totem International Ltd   47
Regulatory compliance
 (AIDC) technologies + RFID
 Assures that container integrity has
  been maintained
 Containers can be ‘fast tracked’ on
  arrival.




                     7/6/2011   Totem International Ltd   48
Containers with RFID enable
  shippers and carriers to:
   container security and integrity.
   Speed shipments.
   Verify that a container was loaded at a secure loading point.
   Significantly reduce the likelihood a tamper event happened in
   Transit with container accountability from point of origin to
    destination.
   Gather enough data to conduct a „virtual inspection‟ in advance
    of arrival.
   Guarantee that shipping containers meet governmental security
    regulations.
   Receive fast track or „green lane‟ handling through customs at
    the point of dispatch and / or the point of receipt.
    Avoid extensive delays in the shipment and receipt.
   Minimise the cost of handling.
                                   7/6/2011   Totem International Ltd   49
Biometrics a possible solution to
        improve efficiency




                    7/6/2011   Totem International Ltd   50
Personal identity




          7/6/2011   Totem International Ltd   51
Verification




         7/6/2011   Totem International Ltd   52
Working principle




          7/6/2011   Totem International Ltd   53
Hand geometry technology to
    improve efficiency




               7/6/2011   Totem International Ltd   54
 Identifies users   by the shape of their
    hands.

    The preferred technology for high-
    security applications.

    Very reliable when combined with other
    forms of identification.

   Hand scanners have a twenty-six bit
    Wiegand output format as one of the
    menu choices.
                         7/6/2011   Totem International Ltd   55
Implementation Issues
Card Reader Emulation.
Stand Alone Access Control
Privacy Issues
Operation by Disabled People
Outdoor Conditions




                                7/6/2011   Totem International Ltd   56
Applications
 Parking Lot Application
 Cash Vault Applications
 Dual Custody Applications
 Anti-passback
 Time and Attendance
 Point of Sale Applications
 Interactive Kiosks



                      7/6/2011   Totem International Ltd   57
10.30am-11.00am
Dealing with Nuclear Threats at Ports




                  7/6/2011   Totem International Ltd   58
Nuclear Threats at Ports




             7/6/2011   Totem International Ltd   59
Anatomy of a Civil Emergency Incident



                Primary

     Incident
                Secondary



                Air/Ground/Water

Contamination
                People


                          7/6/2011   Totem International Ltd   60
Hazards


C = Chemical
B = Biological
R = Radiological
N = Nuclear
E = Explosive


       7/6/2011   Totem International Ltd   61
Examples of Hazards


   Chemical Warfare Agents



   Biological Warfare Agents



   Dirty Bombs



   White Powder Incidents
             7/6/2011   Totem International Ltd   62
Chemical Warfare Agents

Chemical warfare agents can be divided into the following:
                     Lethal agents
                     Nerve Agents

                     Asphyxiant/blood agents

                     Vesicant/blister Agents

                     Pulmonary/choking Agents

                     Non lethal agents
                     Incapacitating agents

                     Riot Control Agents
                               7/6/2011   Totem International Ltd   63
Chemical Warfare Agents
        Nerve Agent

Affects the communication between nerve cells, causing
uncontrollable muscle stimulation

Typical Symptoms:                        Nerve agent types:
  Blurred/dim vision                     G- Agents
  Headache                                Tabun (GA)
  Nausea                                  Sarin (GB)
  Vomiting                                Soman (GD)
  Diarrhoea                               Cyclosarin (GF)
  Secretions and sweating
  Muscle twitching
                                         V Agents
  Laboured breathing                      VE
  Seizures                                VG
  Loss of consciousness                   VM
                                          VX
                              7/6/2011    Totem International Ltd   64
Biological Warfare Agents
Biological warfare agents can be divided into the following:

                 Lethal agents



                     Bacteria

                     Viruses

                     Toxins derived
                     from bacteria

                     Toxins derived
                     from plants


                                 7/6/2011   Totem International Ltd   65
Dirty Bombs
                An Atom        3 Types of Ionising Radiation
                                          α              β          γ
 Proton                                Alpha            Beta      Gamma
(Positive)                            Particles       Particles   Rays &
                                                                  X Rays
             Nucleus
Neutron
(Neutral)


 Electron
(Negative)

                                Aluminium


                                           Lead

                           7/6/2011    Totem International Ltd         66
Who responds and how?

   Different countries; different processes
    ◦ E.g. Israel & France: no decontamination at
      scene etc
   Development of “Zones”
    ◦ Hot zone, warm zone, cold zone
    ◦ Contaminated, decontamination, clean.




                         7/6/2011   Totem International Ltd   67
Typically Half-
                  mask/disposable/skin
                   protection – if nec.



                            Typically
                          SCBA/Gas suits                                                 Crowd Control Line

                                  Exclusion (Hot) Zone

                                                                             Decontamination Line

                                                                                Hot Line
 Typically Full-face/                                                                       Protection
                                      Protection Level A               Protection
appropriate filter/suit                                                                      Level C
                                                                        Level B
   or P&SA/ suit
                          Contamination Reduction (Warm) Zone


                                  Support (Cold) Zone

                                                    7/6/2011   Totem International Ltd                   68
Zone Description
                                   Dynamic situation
       Hot Zone                    Warm Zone                        Cold Zone
  Convenient barrier to                                     Outer cordon - control public
                               Decontamination zone
 contain primary source                                         access (& escape!)
                               Typically last zone to be     Typically 2nd zone to be
 1st zone to be created
                                         created                      created
                                 Expect Monitoring of
  Entry likely before
                              Secondary contamination         Monitoring only to ensure
Detection, Identification,
                             once hot zone detection and        contamination-free
       Monitoring
                                identification complete
  Possibly unknown
                             Hazards should be identified    Should be non-hazardous
      Hazards
 Contamination from           Contamination only from
                                                            Should be contamination-free
   Primary Source               Secondary Sources
Contamination Possibly        Contamination should be
                                                            Should be contamination-free
     above IDLH                    below IDLH
                                                               Typically minimal if any
                        Typically negative pressure or
Typically use SCBA (and                                             protection: post-
                         powered filtering respirators
    Gas-tight suits if                                       decontamination clothing;
                           and full skin protection -
       necessary)                                         possibly MFR-type respirators
                            minimum liquid-tight.
                                                                      as safeguard
                                             7/6/2011 Totem International Ltd           69
Desired Response




Fire Service                Police                  Fire & Ambulance
Hot Zone                    Warm & Cold Zone            Warm Zone
Detection, Identification   Reconnaissance              Triage
  & Monitoring              Crime Scene                 Mass Decontamination
Reconnaissance                 Management               Casualty Transport
Search & Rescue             Firearms use
                                       7/6/2011 Totem International Ltd    70
Dealing with the Nuclear Threats




                7/6/2011   Totem International Ltd   71
7/6/2011   Totem International Ltd   72
7/6/2011   Totem International Ltd   73
7/6/2011   Totem International Ltd   74
11.00am - 11.30am
Morning Refreshments & Networking




                 7/6/2011   Totem International Ltd   75
11.30am -12.00pm
Benefits of Electronic Surveillance




                  7/6/2011   Totem International Ltd   76
Benefits of Electronic surveillance
  Installing Night vision equipment
    They are good when you want to get a better look at a
     specific object and then return to normal viewing
      Conditions.



    Have a single lens or stereo lens, depending on the
     model , excellent for constant viewing, such as moving
     around in a dark building.



    Cameras with night-vision technology can send the
     image to a monitor for display or to a VCR for
     recording. When night-vision capability is desired in a
     permanent location, such as on a building or as part of
     the equipment in a helicopter, cameras are used..
                                        7/6/2011   Totem International Ltd   77
Purpose of Night vision Camera’s
   To locate enemy targets at night
   For navigation, surveillance and targeting
   It reveals whether an area has been disturbed.
   To discover items that have been hidden by criminals,
    including money, drugs and bodies.
   Changes to areas such as walls can be seen using
    thermal imaging.




                            7/6/2011   Totem International Ltd   78
Thermal imaging cameras
    All thermal imaging
    cameras have infrared detector.

   use these cameras to locate targets,
    track people, intelligence gathering
    and surveillance

   used for surveillance and security.

    can detect the minute temperature
    changes and this is generated as an
    image on a screen.

   now cameras are available for other
    purposes like sensing sailing boats.


                                      7/6/2011   Totem International Ltd   79
7/6/2011   Totem International Ltd   80
Benefits of Low lux camera’s




                7/6/2011   Totem International Ltd   81
High mega pixel cameras
 IP security cameras provide
optimum picture quality and better
frame.




 These cameras use
inexpensive sensors and
mechanical shutters to control
exposure and time




Offers a way to increase the
detailed capture within an image
without sacrificing the area of the
camera.
                                      7/6/2011   Totem International Ltd   82
12.00pm-1.00pm
Crisis Response & Management




               7/6/2011   Totem International Ltd   83
Crisis response and management

Likely situations at the port:
 Theft of containerized cargo
 high-risk containers
 Terrorist Attacks
 Smuggling
 Explosion
 Thefts during loading and unloading of cargo



                       7/6/2011   Totem International Ltd   84
Theft of Cargo can be avoided
  through Rfid Technology




              7/6/2011   Totem International Ltd   85
Vehicle Control




          7/6/2011   Totem International Ltd   86
 Vehicle  access control
 Vehicle identification & tracking
 Trailer identification & tracking
 Transport, fleet & yard management
 Driver authorisation
 Parking management
 Machine safety & auto shut of



                    7/6/2011   Totem International Ltd   87
Boom Barriers




      7/6/2011   Totem International Ltd   88
Bollards




     7/6/2011   Totem International Ltd   89
Walk Through Metal Detector
 scanning from both sides
 provides superior detection
 superior target analysis
uniformity and performance
ferrous and non-ferrous weapons detection
designed for mass transit, loss prevention




                                     7/6/2011   Totem International Ltd   90
Digital Signal Processor (DSP) Based
  Technology

 Audible and Visual Alarms

 Entry Pacing Lights
 Floor Mounting Option




      7/6/2011   Totem International Ltd   91
Integrated Gps Reciever & Antena
    Wireless Radio Design
    Tilt & dead reckoning System
    WPAN
    WWAN
    WLAN
    Bar code Reader Support




7/6/2011   Totem International Ltd   92
Under Vehicle Scanners




           7/6/2011   Totem International Ltd   93
    High Security Facilities
    Live & Continuous Under Belly Video Scanning
    Capture number plate and driver image
    Count vehicles & space
    Log Vehicular Details




                         7/6/2011   Totem International Ltd   94
How to deal with such situations

  X-ray and Radiation Portal Monitors(RPM)
 Intelligent video systems
 Crane-mounted sensors
 Radio Frequency Identification (RFID) tags
 Intelligent device management
 Maritime domain awareness




                      7/6/2011   Totem International Ltd   95
1.00pm- 2.15 pm
Networking Lunch




         7/6/2011   Totem International Ltd   96
2.15pm - 3.30pm
Loss and theft prevention



             7/6/2011   Totem International Ltd   97
ROI for security equipment and
         technology
    Are my employees being honest about their hours worked

    A security director can view and download incident online
     without having to pull the incident from the DVR.

    Remote access can save a business in fleet expenses, travel
     expenditures, and time and resource management.

    Be in multiple places at one time.

    A win-win for all parties anytime, anywhere access.

    Convergence opens new ROI opportunities for security
     providers, who are investing R&D dollars to position themselves
     at the forefront of the convergence revolution.
                                    7/6/2011   Totem International Ltd   98
Using surveillance to prevent theft
     Generates hypotheses
     Monitor trends
     Detect clusters and outbreaks
     objectives can be met very rapidly and often more
      accurately than with other reporting systems.




                            7/6/2011   Totem International Ltd   99
Reducing possibility of missing containers and
       missing cargo in containers
                                              RFID Tags


                                              Cloud devices


                                                     IDS

                                              SURVIELLENCE
                                              DEVICES


                                               Container Tracking



                                               Activity Tracking


                       7/6/2011                    Wireless
                                  Totem International Ltd          100
Rfid Tags




      7/6/2011   Totem International Ltd   101
RFID Asset Tracking




          7/6/2011   Totem International Ltd   102
7/6/2011   Totem International Ltd   103
Cloud Devices




        7/6/2011   Totem International Ltd   104
Intrusion Detectors




         7/6/2011   Totem International Ltd   105
Surveillance Devices



                           Works day&            night
                           Infrared
                           intelligence
                           No special
                           software needed
                           Captures all
                           images

             7/6/2011   Totem International Ltd           106
7/6/2011   Totem International Ltd   107
Features

captures a full 10-print record in well
under 10 seconds.

using a two capture process instead of
the traditional three capture 4 Slap process.
.
No other external power source is
required.

Applications range from

 Enrolment,

 Verification/identification,

 Physical/logical access

 Quick look-up applications.

Complete enrolment application available
 7/6/2011   Totem International Ltd        108
3.30pm - 4.00 pm
Afternoon Refreshments & Networking




                  7/6/2011   Totem International Ltd   109
4.00pm - 4.30pm
  Case Studies




        7/6/2011   Totem International Ltd   110
4.30pm-5.00pm
Question & Answer Session




             7/6/2011   Totem International Ltd   111
Thank You

         Firoze Zia Hussain
 CEO & Director, Totem International Ltd.
     Email :firoze@totemint.com
       ph no:+91 9618621234




Totem International Ltd. 6 ,Totem house, Punjagutta, Hyderabad 500082, India
                                      7/6/2011   Totem International Ltd       112

Mais conteúdo relacionado

Mais procurados

Panpisco Technologies Intelligent CCTV Solutions
Panpisco Technologies Intelligent CCTV SolutionsPanpisco Technologies Intelligent CCTV Solutions
Panpisco Technologies Intelligent CCTV SolutionsPanpisco Technologies
 
C72 Mobile Computer
C72 Mobile ComputerC72 Mobile Computer
C72 Mobile ComputerAnkit Kumar
 
Omni Id Corp Pres Emea
Omni Id Corp Pres EmeaOmni Id Corp Pres Emea
Omni Id Corp Pres EmeaChrisHood
 
219 ndd la2000(mercury)-en
219 ndd la2000(mercury)-en219 ndd la2000(mercury)-en
219 ndd la2000(mercury)-enAngie Camacho
 
Quality Assessment of Qualcomm Patents for the IoT(Internet of Things) Connec...
Quality Assessment of Qualcomm Patents for the IoT(Internet of Things) Connec...Quality Assessment of Qualcomm Patents for the IoT(Internet of Things) Connec...
Quality Assessment of Qualcomm Patents for the IoT(Internet of Things) Connec...Alex G. Lee, Ph.D. Esq. CLP
 
지브라프린터 Zebra P4T 열전사감열 모바일프린터 매뉴얼
지브라프린터 Zebra P4T 열전사감열 모바일프린터 매뉴얼지브라프린터 Zebra P4T 열전사감열 모바일프린터 매뉴얼
지브라프린터 Zebra P4T 열전사감열 모바일프린터 매뉴얼HION IT
 
Tevatron_Technologies_Design_Services_Corporate_Profile
Tevatron_Technologies_Design_Services_Corporate_ProfileTevatron_Technologies_Design_Services_Corporate_Profile
Tevatron_Technologies_Design_Services_Corporate_ProfileSaket Shrivastava
 
IRJET- Examination Room Guidance System using RFID and Arduino
IRJET-  	  Examination Room Guidance System using RFID and ArduinoIRJET-  	  Examination Room Guidance System using RFID and Arduino
IRJET- Examination Room Guidance System using RFID and ArduinoIRJET Journal
 
Tevatron technologies design_services_corporate_profile
Tevatron technologies design_services_corporate_profileTevatron technologies design_services_corporate_profile
Tevatron technologies design_services_corporate_profileJayant Kaintura
 
Rfid Roadii For Wal Mart Provider C
Rfid Roadii For Wal Mart Provider CRfid Roadii For Wal Mart Provider C
Rfid Roadii For Wal Mart Provider CJacky Fu
 

Mais procurados (19)

Panpisco Technologies Intelligent CCTV Solutions
Panpisco Technologies Intelligent CCTV SolutionsPanpisco Technologies Intelligent CCTV Solutions
Panpisco Technologies Intelligent CCTV Solutions
 
2 Hurrey Ibm
2 Hurrey Ibm2 Hurrey Ibm
2 Hurrey Ibm
 
C72 Mobile Computer
C72 Mobile ComputerC72 Mobile Computer
C72 Mobile Computer
 
Omni Id Corp Pres Emea
Omni Id Corp Pres EmeaOmni Id Corp Pres Emea
Omni Id Corp Pres Emea
 
16f84 a pic
16f84 a pic16f84 a pic
16f84 a pic
 
Anviz8 page FINAL
Anviz8 page FINALAnviz8 page FINAL
Anviz8 page FINAL
 
ZK54 Biometric Access Control Terminal
ZK54 Biometric Access Control TerminalZK54 Biometric Access Control Terminal
ZK54 Biometric Access Control Terminal
 
219 ndd la2000(mercury)-en
219 ndd la2000(mercury)-en219 ndd la2000(mercury)-en
219 ndd la2000(mercury)-en
 
ZKSoftware F11 Access control terminal
ZKSoftware F11 Access control terminalZKSoftware F11 Access control terminal
ZKSoftware F11 Access control terminal
 
Quality Assessment of Qualcomm Patents for the IoT(Internet of Things) Connec...
Quality Assessment of Qualcomm Patents for the IoT(Internet of Things) Connec...Quality Assessment of Qualcomm Patents for the IoT(Internet of Things) Connec...
Quality Assessment of Qualcomm Patents for the IoT(Internet of Things) Connec...
 
Nfc total solution
Nfc total solutionNfc total solution
Nfc total solution
 
Arrow israel
Arrow israelArrow israel
Arrow israel
 
Catalogo 6110
Catalogo 6110 Catalogo 6110
Catalogo 6110
 
지브라프린터 Zebra P4T 열전사감열 모바일프린터 매뉴얼
지브라프린터 Zebra P4T 열전사감열 모바일프린터 매뉴얼지브라프린터 Zebra P4T 열전사감열 모바일프린터 매뉴얼
지브라프린터 Zebra P4T 열전사감열 모바일프린터 매뉴얼
 
Tevatron_Technologies_Design_Services_Corporate_Profile
Tevatron_Technologies_Design_Services_Corporate_ProfileTevatron_Technologies_Design_Services_Corporate_Profile
Tevatron_Technologies_Design_Services_Corporate_Profile
 
IRJET- Examination Room Guidance System using RFID and Arduino
IRJET-  	  Examination Room Guidance System using RFID and ArduinoIRJET-  	  Examination Room Guidance System using RFID and Arduino
IRJET- Examination Room Guidance System using RFID and Arduino
 
Tevatron technologies design_services_corporate_profile
Tevatron technologies design_services_corporate_profileTevatron technologies design_services_corporate_profile
Tevatron technologies design_services_corporate_profile
 
Rfid Roadii For Wal Mart Provider C
Rfid Roadii For Wal Mart Provider CRfid Roadii For Wal Mart Provider C
Rfid Roadii For Wal Mart Provider C
 
Test
TestTest
Test
 

Destaque

SMi Group's 5th annual conference on International Port Security
SMi Group's 5th annual conference on International Port SecuritySMi Group's 5th annual conference on International Port Security
SMi Group's 5th annual conference on International Port SecurityDale Butler
 
Port security
Port securityPort security
Port securityborepatch
 
How to configure port security in cisco switch
How to configure port security in cisco switchHow to configure port security in cisco switch
How to configure port security in cisco switchIT Tech
 
Microsoft office excel
Microsoft office excelMicrosoft office excel
Microsoft office excelINEM
 
Tantra totem
Tantra totemTantra totem
Tantra totemRonCruz
 
Secret Society of Transformational Leadership
Secret Society of Transformational LeadershipSecret Society of Transformational Leadership
Secret Society of Transformational LeadershipNatalie Griego-Pavon, PMP
 
Totem Pole Presentation
Totem Pole PresentationTotem Pole Presentation
Totem Pole Presentationamandaplavich
 
Peoples of the {Pacific Northwest Coast
Peoples of the {Pacific Northwest CoastPeoples of the {Pacific Northwest Coast
Peoples of the {Pacific Northwest CoastPaulVMcDowell
 
09.Ahap.Stories.Totempole1
09.Ahap.Stories.Totempole109.Ahap.Stories.Totempole1
09.Ahap.Stories.Totempole1Caryn Meirs
 

Destaque (20)

SMi Group's 5th annual conference on International Port Security
SMi Group's 5th annual conference on International Port SecuritySMi Group's 5th annual conference on International Port Security
SMi Group's 5th annual conference on International Port Security
 
Port security
Port securityPort security
Port security
 
How to configure port security in cisco switch
How to configure port security in cisco switchHow to configure port security in cisco switch
How to configure port security in cisco switch
 
Container Security Initiative CSI
Container Security Initiative CSIContainer Security Initiative CSI
Container Security Initiative CSI
 
Port Security
Port SecurityPort Security
Port Security
 
They Said About Love
They Said About LoveThey Said About Love
They Said About Love
 
Chinese Tantra Totem
Chinese Tantra TotemChinese Tantra Totem
Chinese Tantra Totem
 
Totem e tribù
Totem e tribùTotem e tribù
Totem e tribù
 
6 mcmh rashomon
6 mcmh rashomon6 mcmh rashomon
6 mcmh rashomon
 
Microsoft office excel
Microsoft office excelMicrosoft office excel
Microsoft office excel
 
Tantra totem
Tantra totemTantra totem
Tantra totem
 
Port security
Port securityPort security
Port security
 
Secret Society of Transformational Leadership
Secret Society of Transformational LeadershipSecret Society of Transformational Leadership
Secret Society of Transformational Leadership
 
Ryunusuke Akutawagawa
Ryunusuke AkutawagawaRyunusuke Akutawagawa
Ryunusuke Akutawagawa
 
10 mcmh reformation
10 mcmh reformation10 mcmh reformation
10 mcmh reformation
 
Totem poles
Totem polesTotem poles
Totem poles
 
Totem Pole Presentation
Totem Pole PresentationTotem Pole Presentation
Totem Pole Presentation
 
In a grove
In a groveIn a grove
In a grove
 
Peoples of the {Pacific Northwest Coast
Peoples of the {Pacific Northwest CoastPeoples of the {Pacific Northwest Coast
Peoples of the {Pacific Northwest Coast
 
09.Ahap.Stories.Totempole1
09.Ahap.Stories.Totempole109.Ahap.Stories.Totempole1
09.Ahap.Stories.Totempole1
 

Semelhante a Heightening Port Security with Technological Advancements in Africa

Epc Design Implementation Safety Security Totem International Ltd Ceo Firo...
Epc  Design Implementation Safety Security  Totem International Ltd Ceo  Firo...Epc  Design Implementation Safety Security  Totem International Ltd Ceo  Firo...
Epc Design Implementation Safety Security Totem International Ltd Ceo Firo...Firoze Hussain
 
Totem Cloud Rfid Solutions (3)
Totem Cloud Rfid Solutions (3)Totem Cloud Rfid Solutions (3)
Totem Cloud Rfid Solutions (3)Firoze Hussain
 
Totem cloud rfid solutions (3)
Totem cloud rfid solutions (3)Totem cloud rfid solutions (3)
Totem cloud rfid solutions (3)Firoze Hussain
 
Trend of the ICT Standardization
Trend of the ICT StandardizationTrend of the ICT Standardization
Trend of the ICT StandardizationShoichi Sakane
 
HH QUALCOMM UplinQ - the next 10 billion mobile devices
HH QUALCOMM UplinQ - the next 10 billion mobile devicesHH QUALCOMM UplinQ - the next 10 billion mobile devices
HH QUALCOMM UplinQ - the next 10 billion mobile devicesSatya Harish
 
Applying internet of things on the maritime sector
Applying internet of things on the maritime sectorApplying internet of things on the maritime sector
Applying internet of things on the maritime sectorsally sanhory
 
Voice securityprotocol review
Voice securityprotocol reviewVoice securityprotocol review
Voice securityprotocol reviewFabio Pietrosanti
 
CONASENSE 2022_Jens Hagemeyer presentation
CONASENSE 2022_Jens Hagemeyer presentationCONASENSE 2022_Jens Hagemeyer presentation
CONASENSE 2022_Jens Hagemeyer presentationVEDLIoT Project
 
J.-P. Seifert; Security-Aware Android Applications for the Enterprise
J.-P. Seifert; Security-Aware Android Applications for the EnterpriseJ.-P. Seifert; Security-Aware Android Applications for the Enterprise
J.-P. Seifert; Security-Aware Android Applications for the EnterpriseDroidcon Berlin
 
SMEC ICT Business Division
SMEC ICT Business DivisionSMEC ICT Business Division
SMEC ICT Business DivisionHarry Sohn
 
IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9Arvind Tiwary
 
Villas intelligent surveillance
Villas intelligent surveillanceVillas intelligent surveillance
Villas intelligent surveillancebappyni
 
IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secu...
IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secu...IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secu...
IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secu...Mikael Falkvidd
 
Main Innovations of the SerIoT project
Main Innovations of the SerIoT project Main Innovations of the SerIoT project
Main Innovations of the SerIoT project SerIoT project
 
IoT digest. March 2018
IoT digest. March 2018IoT digest. March 2018
IoT digest. March 2018ElifTech
 
IoT Week 2021_Jens Hagemeyer presentation
IoT Week 2021_Jens Hagemeyer presentationIoT Week 2021_Jens Hagemeyer presentation
IoT Week 2021_Jens Hagemeyer presentationVEDLIoT Project
 
Aut Presentation V3
Aut Presentation V3Aut Presentation V3
Aut Presentation V3jsymonds
 

Semelhante a Heightening Port Security with Technological Advancements in Africa (20)

Epc Design Implementation Safety Security Totem International Ltd Ceo Firo...
Epc  Design Implementation Safety Security  Totem International Ltd Ceo  Firo...Epc  Design Implementation Safety Security  Totem International Ltd Ceo  Firo...
Epc Design Implementation Safety Security Totem International Ltd Ceo Firo...
 
Totem Cloud Rfid Solutions (3)
Totem Cloud Rfid Solutions (3)Totem Cloud Rfid Solutions (3)
Totem Cloud Rfid Solutions (3)
 
Totem cloud rfid solutions (3)
Totem cloud rfid solutions (3)Totem cloud rfid solutions (3)
Totem cloud rfid solutions (3)
 
RFID
RFIDRFID
RFID
 
Trend of the ICT Standardization
Trend of the ICT StandardizationTrend of the ICT Standardization
Trend of the ICT Standardization
 
HH QUALCOMM UplinQ - the next 10 billion mobile devices
HH QUALCOMM UplinQ - the next 10 billion mobile devicesHH QUALCOMM UplinQ - the next 10 billion mobile devices
HH QUALCOMM UplinQ - the next 10 billion mobile devices
 
Applying internet of things on the maritime sector
Applying internet of things on the maritime sectorApplying internet of things on the maritime sector
Applying internet of things on the maritime sector
 
推動數位革命
推動數位革命推動數位革命
推動數位革命
 
Voice securityprotocol review
Voice securityprotocol reviewVoice securityprotocol review
Voice securityprotocol review
 
CONASENSE 2022_Jens Hagemeyer presentation
CONASENSE 2022_Jens Hagemeyer presentationCONASENSE 2022_Jens Hagemeyer presentation
CONASENSE 2022_Jens Hagemeyer presentation
 
J.-P. Seifert; Security-Aware Android Applications for the Enterprise
J.-P. Seifert; Security-Aware Android Applications for the EnterpriseJ.-P. Seifert; Security-Aware Android Applications for the Enterprise
J.-P. Seifert; Security-Aware Android Applications for the Enterprise
 
SMEC ICT Business Division
SMEC ICT Business DivisionSMEC ICT Business Division
SMEC ICT Business Division
 
IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9
 
Villas intelligent surveillance
Villas intelligent surveillanceVillas intelligent surveillance
Villas intelligent surveillance
 
EENA 2018 - Multimedia usage in a PSAP
EENA 2018 - Multimedia usage in a PSAP  EENA 2018 - Multimedia usage in a PSAP
EENA 2018 - Multimedia usage in a PSAP
 
IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secu...
IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secu...IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secu...
IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secu...
 
Main Innovations of the SerIoT project
Main Innovations of the SerIoT project Main Innovations of the SerIoT project
Main Innovations of the SerIoT project
 
IoT digest. March 2018
IoT digest. March 2018IoT digest. March 2018
IoT digest. March 2018
 
IoT Week 2021_Jens Hagemeyer presentation
IoT Week 2021_Jens Hagemeyer presentationIoT Week 2021_Jens Hagemeyer presentation
IoT Week 2021_Jens Hagemeyer presentation
 
Aut Presentation V3
Aut Presentation V3Aut Presentation V3
Aut Presentation V3
 

Mais de Firoze Hussain

Totem mep solutions catalogue 2013
Totem mep solutions catalogue   2013Totem mep solutions catalogue   2013
Totem mep solutions catalogue 2013Firoze Hussain
 
totem Catalogue Sept 2012
totem Catalogue Sept 2012totem Catalogue Sept 2012
totem Catalogue Sept 2012Firoze Hussain
 
totem Catalogue Sept 2012 safety security
totem Catalogue Sept 2012 safety securitytotem Catalogue Sept 2012 safety security
totem Catalogue Sept 2012 safety securityFiroze Hussain
 
Catalogue 2012 safety security and power quality management
Catalogue 2012 safety security and power quality managementCatalogue 2012 safety security and power quality management
Catalogue 2012 safety security and power quality managementFiroze Hussain
 
3rd Annual Cloud Computing Summit 2011
3rd Annual Cloud Computing Summit 20113rd Annual Cloud Computing Summit 2011
3rd Annual Cloud Computing Summit 2011Firoze Hussain
 
totem int Online Catalogue Sept11
totem int Online Catalogue Sept11totem int Online Catalogue Sept11
totem int Online Catalogue Sept11Firoze Hussain
 
Online Catalogue 9 July2011
Online Catalogue 9 July2011Online Catalogue 9 July2011
Online Catalogue 9 July2011Firoze Hussain
 
16 Page Catalogue 7 June11
16 Page Catalogue 7 June1116 Page Catalogue 7 June11
16 Page Catalogue 7 June11Firoze Hussain
 
Ecil totem coal ash moisture content monitor
Ecil totem coal ash moisture content monitorEcil totem coal ash moisture content monitor
Ecil totem coal ash moisture content monitorFiroze Hussain
 
PPE & Welding Accessories 2011
PPE & Welding Accessories 2011PPE & Welding Accessories 2011
PPE & Welding Accessories 2011Firoze Hussain
 
Prps Presentation Ficci
Prps Presentation FicciPrps Presentation Ficci
Prps Presentation FicciFiroze Hussain
 
Abloy Company Profile 4pg
Abloy Company Profile 4pgAbloy Company Profile 4pg
Abloy Company Profile 4pgFiroze Hussain
 

Mais de Firoze Hussain (20)

Totem mep solutions catalogue 2013
Totem mep solutions catalogue   2013Totem mep solutions catalogue   2013
Totem mep solutions catalogue 2013
 
Catalogue march 2013
Catalogue march 2013Catalogue march 2013
Catalogue march 2013
 
Homsec 2013
Homsec 2013Homsec 2013
Homsec 2013
 
totem Catalogue Sept 2012
totem Catalogue Sept 2012totem Catalogue Sept 2012
totem Catalogue Sept 2012
 
totem Catalogue Sept 2012 safety security
totem Catalogue Sept 2012 safety securitytotem Catalogue Sept 2012 safety security
totem Catalogue Sept 2012 safety security
 
Catalogue 2012 safety security and power quality management
Catalogue 2012 safety security and power quality managementCatalogue 2012 safety security and power quality management
Catalogue 2012 safety security and power quality management
 
3rd Annual Cloud Computing Summit 2011
3rd Annual Cloud Computing Summit 20113rd Annual Cloud Computing Summit 2011
3rd Annual Cloud Computing Summit 2011
 
Catalogue 19 sept11
Catalogue 19 sept11Catalogue 19 sept11
Catalogue 19 sept11
 
totem int Online Catalogue Sept11
totem int Online Catalogue Sept11totem int Online Catalogue Sept11
totem int Online Catalogue Sept11
 
Online Catalogue 9 July2011
Online Catalogue 9 July2011Online Catalogue 9 July2011
Online Catalogue 9 July2011
 
16 Page Catalogue 7 June11
16 Page Catalogue 7 June1116 Page Catalogue 7 June11
16 Page Catalogue 7 June11
 
Kerala Ti C 9.3.11
Kerala  Ti C 9.3.11Kerala  Ti C 9.3.11
Kerala Ti C 9.3.11
 
16 Catalogue 24 Mar11
16 Catalogue  24 Mar1116 Catalogue  24 Mar11
16 Catalogue 24 Mar11
 
Ecil totem coal ash moisture content monitor
Ecil totem coal ash moisture content monitorEcil totem coal ash moisture content monitor
Ecil totem coal ash moisture content monitor
 
PPE & Welding Accessories 2011
PPE & Welding Accessories 2011PPE & Welding Accessories 2011
PPE & Welding Accessories 2011
 
Prps Presentation Ficci
Prps Presentation FicciPrps Presentation Ficci
Prps Presentation Ficci
 
totem security
totem securitytotem security
totem security
 
Abloy Company Profile 4pg
Abloy Company Profile 4pgAbloy Company Profile 4pg
Abloy Company Profile 4pg
 
Brochure
BrochureBrochure
Brochure
 
Agenda
AgendaAgenda
Agenda
 

Heightening Port Security with Technological Advancements in Africa

  • 1. Heightening port security with technological advancements in Africa 7/6/2011 Totem International Ltd 1
  • 2. Heightening port security with technological advancements in Africa Firoze Zia Hussain CEO & Director Totem International Ltd, India An electronics and communication engineer who is a forward thinking and energetic professional recognized for high-profile turnaround achievements. Was highly decorated law enforcement professional with more than 10 years experience in security function. Successful and consistent record of investigations, and crime prevention. Participant of the US State Department Young Leaders Exchange Program. Successfully executed project work and technology transfer/ collaboration at India's largest Printed Circuit Board manufacturing plant of INDAL electronics. Pursued consultancy in Quality Circle, ISO9000, JIT, Kaizen, TQM, Taguchi’s techniques of experimentation .A widely traversed person with diverse contacts in global distribution of chemicals and security products. 7/6/2011 Totem International Ltd 2
  • 4. 7/6/2011 Totem International Ltd 4
  • 5. 9.00am-9.30am Introduction-Importance of Port Security 7/6/2011 Totem International Ltd 5
  • 6. Introduction To Port Security  IMO  ISPS code(2002)  SOLAS 7/6/2011 Totem International Ltd 6
  • 7. Importance of port security  Bulk of African exports is through ports.  2% of the world trade.  Trades & profits.  Extensively used conveyance for transportation.  Increases Africa‟s Natural Resources. 7/6/2011 Totem International Ltd 7
  • 8. Port Security can prevent  Pirates/Terrorist Attacks.  Smuggling of weapons.  Illegal S/W issues & Immigration. 7/6/2011 Totem International Ltd 8
  • 9. Technological models to enhance efficiency at ports 7/6/2011 Totem International Ltd 9
  • 10. Technologies' in ports 7/6/2011 Totem International Ltd 10
  • 11. Radio Frequency Identification A method of communication wirelessly with a small microchip The chip contains a unique serial number and optional memory A chip combined with an antenna = Intelligent Label or RFID tag or transponder or smart tag or inlay Transponders are available as active (on-board battery) , semi-active (on-board battery) or passive Typical life of around 10 years (or 100k write operation) Multiple read/write operations No line-of-sight required Multiple tags can be read at the same time 7/6/2011 Totem International Ltd 11
  • 12. RFID Technology  ADC technology.  An Rfid System Compromises of  One or more RF tags  Two or more antennas  One or more interrogators  One or more host computers  Appropriate software 7/6/2011 Totem International Ltd 12
  • 14. RFID works on different frequencies 125 KHz – LF (Low Frequency) 13.56 MHz – HF (High Frequency) 860 -960 MHz – UHF (Ultra High Frequency) 2.45 GHz – UHF / Microwave (Some Semi-Active and Active Readers are using this frequency) 7/6/2011 Totem International Ltd 14
  • 15. Benefits Through Rfid In Ports Access Control Container Security RFID IN PORTS Container Identification and Location Activity Tracking Regulatory Compliance 7/6/2011 Totem International Ltd 15
  • 16. GPS Technology  Track the position  To avoid theft  Highly effective & reliable  What is happening.  used from any where by gps device.  Device may size like a watch or button on collar 7/6/2011 Totem International Ltd 16
  • 17. Cloud Technology 7/6/2011 Totem International Ltd 17
  • 18. Uses of Cloud Technology  Reduces Cost  Increases Information Storage  No longer need to concentrate in constant updates  can gather information even if away 7/6/2011 Totem International Ltd 18
  • 19. Biometrics Technology 7/6/2011 Totem International Ltd 19
  • 20. Uses of Biometrics  Increases Security.  Reduces fraud.  provides viable solution to port security.  Can know who did what ,when and where.  Increases ROI. 7/6/2011 Totem International Ltd 20
  • 21. Wireless Technologies Flow of information Dock Port Side Head Employees office Sea Client s 7/6/2011 Totem International Ltd 21
  • 22. Value added Services  Crane scheduling systems and communication  Ship-to-shore communication  Container operations and management  RoRo facilities  Customs office  Harbour Masters office  Emergency services  Wireless network  IT infrastructure  Security and access control  Gate management  Corporate, financial, human resources  Services for tenants. 7/6/2011 Totem International Ltd 22
  • 23. 9.30am-10.00am Installing Port Perimeter Security 7/6/2011 Totem International Ltd 23
  • 24. Installing Port Perimeter Security 7/6/2011 Totem International Ltd 24
  • 25. 7/6/2011 Totem International Ltd 25
  • 26. Perimeter Surveillance includes four basic systems  Sensors  Video Detection Systems  Threat assessment and Alarm Management Systems  Data Communications Systems 7/6/2011 Totem International Ltd 26
  • 27. Sensors  Barrier Sensors  Volumetric Sensors  Fence Mounted Sensors 7/6/2011 Totem International Ltd 27
  • 28. Video Detection Systems 7/6/2011 Totem International Ltd 28
  • 29. Threat Assessment and Alarm Management Systems 7/6/2011 Totem International Ltd 29
  • 30. 7/6/2011 Totem International Ltd 30
  • 31. Intrusion Detection 7/6/2011 Totem International Ltd 31
  • 32. Data Communications Systems 7/6/2011 Totem International Ltd 32
  • 33. Indoor sensors  Passive infrared detectors Ultrasonic detectors Microwave detectors Photo-electric beams Glass break detectors Smoke, heat &carbon monoxide detectors 7/6/2011 Totem International Ltd 33
  • 34. Out Door Sensors  Vibration (shaker) or inertia sensors  Passive magnetic field detection  E-field  Microwave barriers  Microphonic systems  Taut wire fence systems  Fibre optic cable  H-field 7/6/2011 Totem International Ltd 34
  • 35. Monitored Security Solutions  linked via the telephone line or cellular network or both to an Alarm Receiving Centre (ARC).  contacting the right Authority - i.e. the police usually, or the Fire & Rescue Service (FRS) in the case of a fire - if there is an activation.  highest standards of operation. 7/6/2011 Totem International Ltd 35
  • 36. Passive systems  Detects a potential security breach  logs the information  signals an alert on the console and or owner. 7/6/2011 Totem International Ltd 36
  • 37. Reactive Systems  intrusion prevention system (IPS).  auto-responds to the suspicious activity.  reprogramming the firewall to block network traffic from the suspected malicious source.  IDPS is used automatically  at the command of an operator; systems that both "detect" (alert) and/or "prevent." 7/6/2011 Totem International Ltd 37
  • 38. Detection/alarm system.  Deter theft as well as vandalism.  24-hour protection of your assets and resources.  Lower their risks associated with theft.  Decreasing costs associated with . * insurance premiums. repair or replacement of property or equipment that has been damaged . 7/6/2011 Totem International Ltd 38
  • 39. 10.00am-10.30 am Access Control 7/6/2011 Totem International Ltd 39
  • 40. Access Control 7/6/2011 Totem International Ltd 40
  • 41. Installing Rfid at Ports 7/6/2011 Totem International Ltd 41
  • 42. RFID tags 1 Passive Tags  have no internal power supply.  electrical current induced in the antenna by the incoming rf signal.  Provides power for the chip to power up and transmit . 2 Active Tags  contain sensors,  global positioning (GPS),  satellite links, other enhancements 3. Semi-active tags  battery is used to power sensors  volatile memory.  contactless smart cards 7/6/2011 Totem International Ltd 42
  • 43. Why RFID? 7/6/2011 Totem International Ltd 43
  • 44. Access Control Employee ID:  Smart and SecureTradelanes (SST).  Container Security Initiatives (CSI).  prevent loss and possible mischief.  Also contain biometric information such as a photograph.  closed circuit TV (CCTV) 7/6/2011 Totem International Ltd 44
  • 45. Vehicle Control Equipping vehicles with RFID tags. record the exact time of entrance & exit. unlock fuel pumps and record fuel usage. 7/6/2011 Totem International Ltd 45
  • 46. Container Security  sensors to monitor environmental conditions within the container.  GPS, sensors, and satellite phone capabilities to constantly report the location of the container.  satellite phone portals for commercial shippers. 7/6/2011 Totem International Ltd 46
  • 47. Container Identification and Location  Container Tagging  Location Tracking  Activity Tracking 7/6/2011 Totem International Ltd 47
  • 48. Regulatory compliance  (AIDC) technologies + RFID  Assures that container integrity has been maintained  Containers can be ‘fast tracked’ on arrival. 7/6/2011 Totem International Ltd 48
  • 49. Containers with RFID enable shippers and carriers to:  container security and integrity.  Speed shipments.  Verify that a container was loaded at a secure loading point.  Significantly reduce the likelihood a tamper event happened in  Transit with container accountability from point of origin to destination.  Gather enough data to conduct a „virtual inspection‟ in advance of arrival.  Guarantee that shipping containers meet governmental security regulations.  Receive fast track or „green lane‟ handling through customs at the point of dispatch and / or the point of receipt.  Avoid extensive delays in the shipment and receipt.  Minimise the cost of handling. 7/6/2011 Totem International Ltd 49
  • 50. Biometrics a possible solution to improve efficiency 7/6/2011 Totem International Ltd 50
  • 51. Personal identity 7/6/2011 Totem International Ltd 51
  • 52. Verification 7/6/2011 Totem International Ltd 52
  • 53. Working principle 7/6/2011 Totem International Ltd 53
  • 54. Hand geometry technology to improve efficiency 7/6/2011 Totem International Ltd 54
  • 55.  Identifies users by the shape of their hands.  The preferred technology for high- security applications.  Very reliable when combined with other forms of identification.  Hand scanners have a twenty-six bit Wiegand output format as one of the menu choices. 7/6/2011 Totem International Ltd 55
  • 56. Implementation Issues Card Reader Emulation. Stand Alone Access Control Privacy Issues Operation by Disabled People Outdoor Conditions 7/6/2011 Totem International Ltd 56
  • 57. Applications  Parking Lot Application  Cash Vault Applications  Dual Custody Applications  Anti-passback  Time and Attendance  Point of Sale Applications  Interactive Kiosks 7/6/2011 Totem International Ltd 57
  • 58. 10.30am-11.00am Dealing with Nuclear Threats at Ports 7/6/2011 Totem International Ltd 58
  • 59. Nuclear Threats at Ports 7/6/2011 Totem International Ltd 59
  • 60. Anatomy of a Civil Emergency Incident Primary Incident Secondary Air/Ground/Water Contamination People 7/6/2011 Totem International Ltd 60
  • 61. Hazards C = Chemical B = Biological R = Radiological N = Nuclear E = Explosive 7/6/2011 Totem International Ltd 61
  • 62. Examples of Hazards Chemical Warfare Agents Biological Warfare Agents Dirty Bombs White Powder Incidents 7/6/2011 Totem International Ltd 62
  • 63. Chemical Warfare Agents Chemical warfare agents can be divided into the following: Lethal agents Nerve Agents Asphyxiant/blood agents Vesicant/blister Agents Pulmonary/choking Agents Non lethal agents Incapacitating agents Riot Control Agents 7/6/2011 Totem International Ltd 63
  • 64. Chemical Warfare Agents Nerve Agent Affects the communication between nerve cells, causing uncontrollable muscle stimulation Typical Symptoms: Nerve agent types: Blurred/dim vision G- Agents Headache Tabun (GA) Nausea Sarin (GB) Vomiting Soman (GD) Diarrhoea Cyclosarin (GF) Secretions and sweating Muscle twitching V Agents Laboured breathing VE Seizures VG Loss of consciousness VM VX 7/6/2011 Totem International Ltd 64
  • 65. Biological Warfare Agents Biological warfare agents can be divided into the following: Lethal agents Bacteria Viruses Toxins derived from bacteria Toxins derived from plants 7/6/2011 Totem International Ltd 65
  • 66. Dirty Bombs An Atom 3 Types of Ionising Radiation α β γ Proton Alpha Beta Gamma (Positive) Particles Particles Rays & X Rays Nucleus Neutron (Neutral) Electron (Negative) Aluminium Lead 7/6/2011 Totem International Ltd 66
  • 67. Who responds and how?  Different countries; different processes ◦ E.g. Israel & France: no decontamination at scene etc  Development of “Zones” ◦ Hot zone, warm zone, cold zone ◦ Contaminated, decontamination, clean. 7/6/2011 Totem International Ltd 67
  • 68. Typically Half- mask/disposable/skin protection – if nec. Typically SCBA/Gas suits Crowd Control Line Exclusion (Hot) Zone Decontamination Line Hot Line Typically Full-face/ Protection Protection Level A Protection appropriate filter/suit Level C Level B or P&SA/ suit Contamination Reduction (Warm) Zone Support (Cold) Zone 7/6/2011 Totem International Ltd 68
  • 69. Zone Description Dynamic situation Hot Zone Warm Zone Cold Zone Convenient barrier to Outer cordon - control public Decontamination zone contain primary source access (& escape!) Typically last zone to be Typically 2nd zone to be 1st zone to be created created created Expect Monitoring of Entry likely before Secondary contamination Monitoring only to ensure Detection, Identification, once hot zone detection and contamination-free Monitoring identification complete Possibly unknown Hazards should be identified Should be non-hazardous Hazards Contamination from Contamination only from Should be contamination-free Primary Source Secondary Sources Contamination Possibly Contamination should be Should be contamination-free above IDLH below IDLH Typically minimal if any Typically negative pressure or Typically use SCBA (and protection: post- powered filtering respirators Gas-tight suits if decontamination clothing; and full skin protection - necessary) possibly MFR-type respirators minimum liquid-tight. as safeguard 7/6/2011 Totem International Ltd 69
  • 70. Desired Response Fire Service Police Fire & Ambulance Hot Zone Warm & Cold Zone Warm Zone Detection, Identification Reconnaissance Triage & Monitoring Crime Scene Mass Decontamination Reconnaissance Management Casualty Transport Search & Rescue Firearms use 7/6/2011 Totem International Ltd 70
  • 71. Dealing with the Nuclear Threats 7/6/2011 Totem International Ltd 71
  • 72. 7/6/2011 Totem International Ltd 72
  • 73. 7/6/2011 Totem International Ltd 73
  • 74. 7/6/2011 Totem International Ltd 74
  • 75. 11.00am - 11.30am Morning Refreshments & Networking 7/6/2011 Totem International Ltd 75
  • 76. 11.30am -12.00pm Benefits of Electronic Surveillance 7/6/2011 Totem International Ltd 76
  • 77. Benefits of Electronic surveillance Installing Night vision equipment  They are good when you want to get a better look at a specific object and then return to normal viewing Conditions.  Have a single lens or stereo lens, depending on the model , excellent for constant viewing, such as moving around in a dark building.  Cameras with night-vision technology can send the image to a monitor for display or to a VCR for recording. When night-vision capability is desired in a permanent location, such as on a building or as part of the equipment in a helicopter, cameras are used.. 7/6/2011 Totem International Ltd 77
  • 78. Purpose of Night vision Camera’s  To locate enemy targets at night  For navigation, surveillance and targeting  It reveals whether an area has been disturbed.  To discover items that have been hidden by criminals, including money, drugs and bodies.  Changes to areas such as walls can be seen using thermal imaging. 7/6/2011 Totem International Ltd 78
  • 79. Thermal imaging cameras  All thermal imaging cameras have infrared detector.  use these cameras to locate targets, track people, intelligence gathering and surveillance  used for surveillance and security.  can detect the minute temperature changes and this is generated as an image on a screen.  now cameras are available for other purposes like sensing sailing boats. 7/6/2011 Totem International Ltd 79
  • 80. 7/6/2011 Totem International Ltd 80
  • 81. Benefits of Low lux camera’s 7/6/2011 Totem International Ltd 81
  • 82. High mega pixel cameras  IP security cameras provide optimum picture quality and better frame.  These cameras use inexpensive sensors and mechanical shutters to control exposure and time Offers a way to increase the detailed capture within an image without sacrificing the area of the camera. 7/6/2011 Totem International Ltd 82
  • 83. 12.00pm-1.00pm Crisis Response & Management 7/6/2011 Totem International Ltd 83
  • 84. Crisis response and management Likely situations at the port:  Theft of containerized cargo  high-risk containers  Terrorist Attacks  Smuggling  Explosion  Thefts during loading and unloading of cargo 7/6/2011 Totem International Ltd 84
  • 85. Theft of Cargo can be avoided through Rfid Technology 7/6/2011 Totem International Ltd 85
  • 86. Vehicle Control 7/6/2011 Totem International Ltd 86
  • 87.  Vehicle access control  Vehicle identification & tracking  Trailer identification & tracking  Transport, fleet & yard management  Driver authorisation  Parking management  Machine safety & auto shut of 7/6/2011 Totem International Ltd 87
  • 88. Boom Barriers 7/6/2011 Totem International Ltd 88
  • 89. Bollards 7/6/2011 Totem International Ltd 89
  • 90. Walk Through Metal Detector scanning from both sides provides superior detection superior target analysis uniformity and performance ferrous and non-ferrous weapons detection designed for mass transit, loss prevention 7/6/2011 Totem International Ltd 90
  • 91. Digital Signal Processor (DSP) Based Technology Audible and Visual Alarms Entry Pacing Lights Floor Mounting Option 7/6/2011 Totem International Ltd 91
  • 92. Integrated Gps Reciever & Antena Wireless Radio Design Tilt & dead reckoning System WPAN WWAN WLAN Bar code Reader Support 7/6/2011 Totem International Ltd 92
  • 93. Under Vehicle Scanners 7/6/2011 Totem International Ltd 93
  • 94. High Security Facilities Live & Continuous Under Belly Video Scanning Capture number plate and driver image Count vehicles & space Log Vehicular Details 7/6/2011 Totem International Ltd 94
  • 95. How to deal with such situations  X-ray and Radiation Portal Monitors(RPM)  Intelligent video systems  Crane-mounted sensors  Radio Frequency Identification (RFID) tags  Intelligent device management  Maritime domain awareness 7/6/2011 Totem International Ltd 95
  • 96. 1.00pm- 2.15 pm Networking Lunch 7/6/2011 Totem International Ltd 96
  • 97. 2.15pm - 3.30pm Loss and theft prevention 7/6/2011 Totem International Ltd 97
  • 98. ROI for security equipment and technology  Are my employees being honest about their hours worked  A security director can view and download incident online without having to pull the incident from the DVR.  Remote access can save a business in fleet expenses, travel expenditures, and time and resource management.  Be in multiple places at one time.  A win-win for all parties anytime, anywhere access.  Convergence opens new ROI opportunities for security providers, who are investing R&D dollars to position themselves at the forefront of the convergence revolution. 7/6/2011 Totem International Ltd 98
  • 99. Using surveillance to prevent theft  Generates hypotheses  Monitor trends  Detect clusters and outbreaks  objectives can be met very rapidly and often more accurately than with other reporting systems. 7/6/2011 Totem International Ltd 99
  • 100. Reducing possibility of missing containers and missing cargo in containers RFID Tags Cloud devices IDS SURVIELLENCE DEVICES Container Tracking Activity Tracking 7/6/2011 Wireless Totem International Ltd 100
  • 101. Rfid Tags 7/6/2011 Totem International Ltd 101
  • 102. RFID Asset Tracking 7/6/2011 Totem International Ltd 102
  • 103. 7/6/2011 Totem International Ltd 103
  • 104. Cloud Devices 7/6/2011 Totem International Ltd 104
  • 105. Intrusion Detectors 7/6/2011 Totem International Ltd 105
  • 106. Surveillance Devices Works day& night Infrared intelligence No special software needed Captures all images 7/6/2011 Totem International Ltd 106
  • 107. 7/6/2011 Totem International Ltd 107
  • 108. Features captures a full 10-print record in well under 10 seconds. using a two capture process instead of the traditional three capture 4 Slap process. . No other external power source is required. Applications range from  Enrolment,  Verification/identification,  Physical/logical access  Quick look-up applications. Complete enrolment application available 7/6/2011 Totem International Ltd 108
  • 109. 3.30pm - 4.00 pm Afternoon Refreshments & Networking 7/6/2011 Totem International Ltd 109
  • 110. 4.00pm - 4.30pm Case Studies 7/6/2011 Totem International Ltd 110
  • 111. 4.30pm-5.00pm Question & Answer Session 7/6/2011 Totem International Ltd 111
  • 112. Thank You Firoze Zia Hussain CEO & Director, Totem International Ltd. Email :firoze@totemint.com ph no:+91 9618621234 Totem International Ltd. 6 ,Totem house, Punjagutta, Hyderabad 500082, India 7/6/2011 Totem International Ltd 112