You are on page 1of 112

Heightening port security with technological advancements in Africa

07/01/11

Totem International Ltd

Heightening port security with technological advancements in Africa

07/01/11

Totem International Ltd

Totem International Ltd

07/01/11

Totem International Ltd

9.00am-9.30am Introduction-Importance of Port Security

07/01/11

Totem International Ltd

Introduction To Port Security


IMO ISPS code(2002) SOLAS

07/01/11

Totem International Ltd

Importance of port security


Bulk of African exports is through ports.

2% of the world trade.

Trades & profits.

Extensively used conveyance for transportation.

Increases Africas Natural Resources.



07/01/11 Totem International Ltd 7

Port Security can prevent


Pirates/Terrorist Attacks. Smuggling of weapons. Illegal S/W issues & Immigration.

07/01/11

Totem International Ltd

Technological models to enhance efficiency at ports

07/01/11

Totem International Ltd

Technologies' in ports

07/01/11

Totem International Ltd

10

Radio Frequency Identification


A method of communication wirelessly with a small microchip The chip contains a unique serial number and optional memory A chip combined with an antenna = Intelligent Label or RFID tag or transponder or smart tag or inlay Transponders are available as active (on-board battery) , semi-active (on-board battery) or passive Typical life of around 10 years (or 100k write operation) Multiple read/write operations No line-of-sight required Multiple tags can be read at the same time

07/01/11

Totem International Ltd

11

RFID Technology
ADC technology. An Rfid System Compromises of qOne or more RF tags qTwo or more antennas qOne or more interrogators qOne or more host computers qAppropriate software

07/01/11 Totem International Ltd 12

Handheld RFID Reader

RFID works on different frequencies

125 KHz 13.56 MHz 860 -960 MHz


2.45 GHz

LF (Low Frequency) HF (High Frequency) UHF (Ultra High Frequency) UHF / Microwave (Some Semi-Active and Active Readers are using this frequency)
07/01/11 Totem International Ltd 14

Benefits Through Rfid In Ports


Access Control

Container Security RFID IN PORTS

Container Identification and Location

Activity Tracking

Regulatory Compliance

07/01/11

Totem International Ltd

15

GPS Technology
Track the position To avoid theft Highly effective & reliable What is happening. used from any where by gps device. Device may size like a watch or button on collar

07/01/11 Totem International Ltd 16

Cloud Technology

07/01/11

Totem International Ltd

17

Uses of Cloud Technology


Reduces Cost Increases Information Storage No longer need to concentrate in constant updates can gather information even if away

07/01/11

Totem International Ltd

18

Biometrics Technology

07/01/11

Totem International Ltd

19

Uses of Biometrics
Increases

Security. Reduces fraud. provides viable solution to port security. Can know who did what ,when and where. Increases ROI.

07/01/11

Totem International Ltd

20

Wireless Technologies
Flow of information
Dock Side Port

Head office

Employees

Sea

Clients

07/01/11

Totem International Ltd

21

Value added Services


Crane scheduling systems and communication Ship-to-shore communication Container operations and management RoRo facilities Customs office Harbour Masters office Emergency services Wireless network IT infrastructure Security and access control Gate management Corporate, financial, human resources Services for tenants.
07/01/11 Totem International Ltd 22

Installing Port Perimeter Security

9 . 30am - 10 . 00am

07/01/11

Totem International Ltd

23

Installing Port Perimeter Security

07/01/11

Totem International Ltd

24

07/01/11

Totem International Ltd

25

Perimeter Surveillance includes four basic systems


Sensors Video Detection Systems Threat assessment and Alarm Management Systems

Data Communications Systems

07/01/11 Totem International Ltd 26

Sensors
Barrier Sensors Volumetric Sensors Fence Mounted Sensors

07/01/11

Totem International Ltd

27

Video Detection Systems

07/01/11

Totem International Ltd

28

Threat Assessment and Alarm Management Systems

07/01/11

Totem International Ltd

29

07/01/11

Totem International Ltd

30

Intrusion Detection

07/01/11

Totem International Ltd

31

Data Communications Systems


07/01/11

Totem International Ltd

32

Indoor sensors
o
Passive infrared detectors Ultrasonic detectors Microwave detectors Photo-electric beams Glass break detectors Smoke, heat &carbon monoxide detectors

07/01/11

Totem International Ltd

33

Out Door Sensors


Vibration (shaker) or inertia sensors Passive magnetic field detection E-field Microwave barriers Microphonic systems Taut wire fence systems Fibre optic cable H-field
07/01/11 Totem International Ltd 34

Monitored Security Solutions


linked

via the telephone line or cellular network or both to an Alarm Receiving Centre (ARC). contacting the right Authority - i.e. the police usually, or the Fire & Rescue Service (FRS) in the case of a fire - if there is an activation. highest standards of operation.

07/01/11

Totem International Ltd

35

Passive systems
Detects a potential security breach logs the information signals an alert on the console and or owner.

07/01/11

Totem International Ltd

36

Reactive Systems
intrusion prevention system (IPS). auto-responds to the suspicious activity. reprogramming the firewall to block network traffic from the suspected malicious source. IDPS is used automatically at the command of an operator; systems that both "detect" (alert) and/or "prevent."

07/01/11 Totem International Ltd 37

Detection/alarm system. Deter theft as well as vandalism. 24-hour protection of your assets and resources. Lower their risks associated with theft. Decreasing costs associated with . * insurance premiums. repair or replacement of property or equipment that has been damaged

07/01/11

Totem International Ltd

38

Access

10.00am-10.30 am

Control

07/01/11

Totem International Ltd

39

Access Control

07/01/11

Totem International Ltd

40

Installing Rfid at Ports

07/01/11

Totem International Ltd

41

RFID tags 1 Passive Tags have no internal power supply. electrical current induced in the antenna by the incoming rf signal. Provides power for the chip to power up and transmit .

2 Active Tags contain sensors, global positioning (GPS), satellite links, other enhancements

3. Semi-active tags battery is used to power sensors volatile memory. 07/01/11 contactless smart cards

Totem International Ltd

42

Why RFID?

07/01/11

Totem International Ltd

43

Access Control

Employee ID:
Smart

and SecureTradelanes (SST). Container Security Initiatives (CSI). prevent loss and possible mischief. Also contain biometric information such as a photograph. closed circuit TV (CCTV)

07/01/11

Totem International Ltd

44

Vehicle Control
Equipping vehicles with RFID tags. record the exact time of entrance & exit. unlock fuel pumps and record fuel usage.

07/01/11

Totem International Ltd

45

Container Security
sensors

to monitor environmental conditions within the container. GPS, sensors, and satellite phone capabilities to constantly report the location of the container. satellite phone portals for commercial shippers.

07/01/11

Totem International Ltd

46

Container Identification and Location


Container Tagging Location Tracking Activity Tracking

07/01/11

Totem International Ltd

47

Regulatory compliance
(AIDC)

technologies + RFID Assures that container integrity has been maintained Containers can be fast tracked on arrival.

07/01/11

Totem International Ltd

48

Containers with RFID enable shippers and carriers to:


container security and integrity. Speed shipments. Verify that a container was loaded at a secure loading point. Significantly reduce the likelihood a tamper event happened in Transit with container accountability from point of origin to destination. Gather enough data to conduct a virtual inspection in advance of arrival. Guarantee that shipping containers meet governmental security regulations. Receive fast track or green lane handling through customs at the point of dispatch and / or the point of receipt. Avoid extensive delays in the shipment and receipt. Minimise the cost of handling. 07/01/11 Totem International Ltd

49

Biometrics a possible solution to improve efficiency


07/01/11

Totem International Ltd

50

Personal identity

07/01/11

Totem International Ltd

51

Verification

07/01/11

Totem International Ltd

52

Working principle

07/01/11

Totem International Ltd

53

Hand geometry technology to improve efficiency

07/01/11

Totem International Ltd

54

Identifies users by the shape of their hands. The preferred technology for high-security applications. Very reliable when combined with other forms of identification. Hand scanners have a twenty-six bit Wiegand output format as one of the menu choices.
07/01/11 Totem International Ltd

55

Implementation Issues
Card Reader Emulation. Stand Alone Access Control Privacy Issues Operation by Disabled People Outdoor Conditions

07/01/11

Totem International Ltd

56

Applications
Parking

Lot Application Cash Vault Applications Dual Custody Applications Anti-passback Time and Attendance Point of Sale Applications Interactive Kiosks

07/01/11

Totem International Ltd

57

Dealing with Nuclear Threats at Ports

10 . 30am - 11 . 00am

07/01/11

Totem International Ltd

58

Nuclear Threats at Ports

07/01/11

Totem International Ltd

59

Anatomy of a Civil Emergency Incident

Primary

Incident
Secondary

Air / Ground / Water

Contamination
People

07/01/11

Totem International Ltd

60

Hazards

C = Chemical B = Biological R = Radiological N = Nuclear E = Explosive

07/01/11

Totem International Ltd

61

Examples of Hazards
Chemical Warfare Agents

Biological Warfare Agents

Dirty Bombs

White Powder Incidents


07/01/11 Totem International Ltd 62

Chemical Warfare Agents


Chemical warfare agents can be divided into the following :

Lethal agents
Nerve Agents Asphyxiant / blood agents Vesicant / blister Agents Pulmonary / choking Agents

Incapacitating agents Riot Control Agents


07/01/11 Totem International Ltd 63

Non lethal agents

Chemical Warfare Agents


Nerve Agent Affects the communication between nerve cells, causing uncontrollable muscle stimulation

Typical Symptoms : Blurred / dim vision Headache Nausea Vomiting Diarrhoea Secretions and sweating Muscle twitching Laboured breathing Seizures Loss of consciousness

Nerve agent types : G - Agents


Tabun ( GA ) Sarin ( GB ) Soman ( GD ) Cyclosarin ( GF )
VE VG VM VX

V Agents

07/01/11

Totem International Ltd

64

Biological Warfare Agents


Lethal agents

Biological warfare agents can be divided into the following

Bacteria Viruses Toxins derived from bacteria Toxins derived from plants

07/01/11

Totem International Ltd

65

Dirty Bombs
An Atom
Proton (Positive) Alpha Beta Gamma Particle Particles Rays & s X Rays

3 Types of Ionising Radiatio

Nucleus
Neutron (Neutral)

Electron (Negative) Aluminium Lead


07/01/11 Totem International Ltd 66

Who responds and how? countries; different processes of Zones

Different

E.g. Israel & France: no decontamination at scene etc


Development

Hot zone, warm zone, cold zone Contaminated, decontamination, clean.

07/01/11

Totem International Ltd

67

Typically Half-mask/disposable/skin protection if nec.

Ac Typically SCBA/Gas suits ce ss Po Co Exclusion ( Hot ) Zone in nt ts ro l

Crowd Control Line

Decontamination Line Hot Line Protect ion Level B Protect ion Level C

Protection ll-face/ appropriate filter/suit or P&SA/ suit Level A

Contamination Reduction ( Warm ) Zone Support ( Cold ) Zone


07/01/11 Totem International Ltd 68

Zone Description
Hot Zone Convenient barrier to contain primary source 1st zone to be created Entry likely before Detection, Identification, Monitoring Possibly unknown Hazards Contamination from Primary Source Contamination Possibly above IDLH Dynamic situation Warm Zone Decontamination zone Typically last zone to be created Expect Monitoring of Secondary contamination once hot zone detection and identification complete Hazards should be identified Contamination only from Secondary Sources Contamination should be below IDLH Cold Zone Outer cordon - control public access (& escape!) Typically 2nd zone to be created Monitoring only to ensure contamination-free Should be non-hazardous Should be contamination-free Should be contamination-free

Typically minimal if any Typically negative pressure or Typically use SCBA (and protection: postpowered filtering respirators Gas-tight suits if decontamination clothing; and full skin protection necessary) possibly MFR-type respirators minimum liquid-tight. as safeguard 07/01/11 Totem International Ltd 69

Desired Response

Fire Service

Hot Zone Detection, Identification & Monitoring Reconnaissance Search & Rescue

Police

Warm & Cold Zone Reconnaissance Crime Scene Management Firearms use
07/01/11

Fire & Ambulance

Warm Zone Triage Mass Decontamination Casualty Transport


Totem International Ltd 70

Dealing with the Nuclear Threats

07/01/11

Totem International Ltd

71

07/01/11

Totem International Ltd

72

07/01/11

Totem International Ltd

73

07/01/11

Totem International Ltd

74

11 . 00am - 11 . 30am Morning Refreshments Networking

&

07/01/11

Totem International Ltd

75

- 12 . 00pm

11 . 30am

Benefits of Electronic Surveillance

07/01/11

Totem International Ltd

76

Benefits of Electronic surveillance

Installing Night vision equipment

They are good when you want to get a better look at a specific object and then return to normal viewing Conditions.

Have a single lens or stereo lens, depending on the model , excellent for constant viewing, such as moving around in a dark building. Cameras with night-vision technology can send the image to a monitor for display or to a VCR for recording. When night-vision capability is desired in a permanent location, such as on a building or as part of the equipment in a helicopter, cameras are used..

07/01/11

Totem International Ltd

77

Purpose of Night vision Cameras


To

locate enemy targets at night For navigation, surveillance and targeting It reveals whether an area has been disturbed. To discover items that have been hidden by criminals, including money, drugs and bodies. Changes to areas such as walls can be seen using thermal imaging.

07/01/11

Totem International Ltd

78

Thermal imaging cameras


All thermal imaging cameras have infrared detector.

use these cameras to locate targets, track people, intelligence gathering and surveillance

used for surveillance and security.

can detect the minute temperature changes and this is generated as an image on a screen.

now cameras are available for other 07/01/11


Totem International Ltd 79

07/01/11

Totem International Ltd

80

Benefits of Low lux cameras

07/01/11

Totem International Ltd

81

High mega pixel cameras


IP security cameras provide optimum picture quality and better frame. These cameras use inexpensive sensors and mechanical shutters to control exposure and time Offers a way to increase the detailed capture within an image without sacrificing the area of the camera.

07/01/11

Totem International Ltd

82

12 . 00pm - 1 . 00pm Crisis Response & Management

07/01/11

Totem International Ltd

83

Crisis response and management

Likely situations at the port: Theft of containerized cargo high-risk containers Terrorist Attacks Smuggling Explosion Thefts during loading and unloading of cargo

07/01/11

Totem International Ltd

84

Theft of Cargo can be avoided through Rfid Technology

07/01/11

Totem International Ltd

85

Vehicle Control

07/01/11

Totem International Ltd

86

Vehicle access control Vehicle identification & tracking Trailer identification & tracking Transport, fleet & yard management Driver authorisation Parking management Machine safety & auto shut of

07/01/11

Totem International Ltd

87

Boom Barriers

07/01/11

Totem International Ltd

88

Bollards

07/01/11

Totem International Ltd

89

Walk Through Metal Detector


scanning from both sides provides superior detection superior target analysis uniformity and performance ferrous and non-ferrous weapons detection designed for mass transit, loss prevention

07/01/11

Totem International Ltd

90

Digital Signal Processor (DSP) Based Technology Audible and Visual Alarms Entry Pacing Lights Floor Mounting Option

07/01/11

Totem International Ltd

91

Integrated Gps Reciever & Antena Wireless Radio Design Tilt & dead reckoning System WPAN WWAN WLAN Bar code Reader Support

07/01/11

Totem International Ltd

92

Under Vehicle Scanners

07/01/11

Totem International Ltd

93

High Security Facilities


Live & Continuous Under Belly Video Scanning Capture number plate and driver image Count vehicles & space Log Vehicular Details

07/01/11

Totem International Ltd

94

How to deal with such situations


X-ray and Radiation Portal Monitors(RPM) Intelligent video systems Crane-mounted sensors Radio Frequency Identification (RFID) tags Intelligent device management Maritime domain awareness

07/01/11

Totem International Ltd

95

2 . 15 pm

1 . 00pm -

Networking Lunch

07/01/11

Totem International Ltd

96

2.15pm - 3.30pm Loss and theft prevention

07/01/11

Totem International Ltd

97

ROI for security equipment and technology


Are

my employees being honest about their hours worked

A security director can view and download incident online without having to pull the incident from the DVR. access can save a business in fleet expenses, travel expenditures, and time and resource management. in multiple places at one time. for all parties anytime, anywhere access.
07/01/11 Totem International Ltd 98

Remote

Be

A win-win

Using surveillance to prevent theft


Generates

hypotheses Monitor trends Detect clusters and outbreaks objectives can be met very rapidly and often more accurately than with other reporting systems.

07/01/11

Totem International Ltd

99

Reducing possibility of missing containers and missing cargo in containers


RFID Tags

Cloud

devices

IDS SURVIELLENCE DEVICES

Container Tracking

Activity Tracking

07/01/11

Totem International Ltd

Wireless technology
100

Rfid Tags

07/01/11

Totem International Ltd

101

RFID Asset Tracking

07/01/11

Totem International Ltd

102

07/01/11

Totem International Ltd

103

Cloud Devices

07/01/11

Totem International Ltd

104

Intrusion Detectors

07/01/11

Totem International Ltd

105

Surveillance Devices

Works day& night Infrared intelligence No special software needed Captures all images

07/01/11

Totem International Ltd

106

07/01/11

Totem International Ltd

107

Features
captures a full 10-print record in well under 10 seconds. using a two capture process instead of the traditional three capture 4 Slap process. . No other external power source is required.

Applications range from


Enrolment, Verification/identification, Physical/logical access Quick look-up applications. Complete enrolment application available
07/01/11 Totem International Ltd 108

4 . 00 pm Afternoon Refreshments & Networking

3 . 30pm -

07/01/11

Totem International Ltd

109

4 . 30pm

4 . 00pm Case

Studies

07/01/11

Totem International Ltd

110

5 . 00pm

4 . 30pm -

Question & Answer Session

07/01/11

Totem International Ltd

111

Thank You

Firoze Zia Hussain CEO & Director, Totem International Ltd. Email :firoze@totemint.com ph no:+91 9618621234

Totem International Ltd. 6 ,Totem house, Punjagutta, Hyderabad 500082, India


07/01/11 Totem International Ltd 112

You might also like