Professional Documents
Culture Documents
07/01/11
07/01/11
07/01/11
07/01/11
07/01/11
07/01/11
07/01/11
Technologies' in ports
07/01/11
10
07/01/11
11
RFID Technology
ADC technology. An Rfid System Compromises of qOne or more RF tags qTwo or more antennas qOne or more interrogators qOne or more host computers qAppropriate software
2.45 GHz
LF (Low Frequency) HF (High Frequency) UHF (Ultra High Frequency) UHF / Microwave (Some Semi-Active and Active Readers are using this frequency)
07/01/11 Totem International Ltd 14
Activity Tracking
Regulatory Compliance
07/01/11
15
GPS Technology
Track the position To avoid theft Highly effective & reliable What is happening. used from any where by gps device. Device may size like a watch or button on collar
07/01/11 Totem International Ltd 16
Cloud Technology
07/01/11
17
07/01/11
18
Biometrics Technology
07/01/11
19
Uses of Biometrics
Increases
Security. Reduces fraud. provides viable solution to port security. Can know who did what ,when and where. Increases ROI.
07/01/11
20
Wireless Technologies
Flow of information
Dock Side Port
Head office
Employees
Sea
Clients
07/01/11
21
9 . 30am - 10 . 00am
07/01/11
23
07/01/11
24
07/01/11
25
Sensors
Barrier Sensors Volumetric Sensors Fence Mounted Sensors
07/01/11
27
07/01/11
28
07/01/11
29
07/01/11
30
Intrusion Detection
07/01/11
31
07/01/11
32
Indoor sensors
o
Passive infrared detectors Ultrasonic detectors Microwave detectors Photo-electric beams Glass break detectors Smoke, heat &carbon monoxide detectors
07/01/11
33
via the telephone line or cellular network or both to an Alarm Receiving Centre (ARC). contacting the right Authority - i.e. the police usually, or the Fire & Rescue Service (FRS) in the case of a fire - if there is an activation. highest standards of operation.
07/01/11
35
Passive systems
Detects a potential security breach logs the information signals an alert on the console and or owner.
07/01/11
36
Reactive Systems
intrusion prevention system (IPS). auto-responds to the suspicious activity. reprogramming the firewall to block network traffic from the suspected malicious source. IDPS is used automatically at the command of an operator; systems that both "detect" (alert) and/or "prevent."
Detection/alarm system. Deter theft as well as vandalism. 24-hour protection of your assets and resources. Lower their risks associated with theft. Decreasing costs associated with . * insurance premiums. repair or replacement of property or equipment that has been damaged
07/01/11
38
Access
10.00am-10.30 am
Control
07/01/11
39
Access Control
07/01/11
40
07/01/11
41
RFID tags 1 Passive Tags have no internal power supply. electrical current induced in the antenna by the incoming rf signal. Provides power for the chip to power up and transmit .
2 Active Tags contain sensors, global positioning (GPS), satellite links, other enhancements
3. Semi-active tags battery is used to power sensors volatile memory. 07/01/11 contactless smart cards
42
Why RFID?
07/01/11
43
Access Control
Employee ID:
Smart
and SecureTradelanes (SST). Container Security Initiatives (CSI). prevent loss and possible mischief. Also contain biometric information such as a photograph. closed circuit TV (CCTV)
07/01/11
44
Vehicle Control
Equipping vehicles with RFID tags. record the exact time of entrance & exit. unlock fuel pumps and record fuel usage.
07/01/11
45
Container Security
sensors
to monitor environmental conditions within the container. GPS, sensors, and satellite phone capabilities to constantly report the location of the container. satellite phone portals for commercial shippers.
07/01/11
46
07/01/11
47
Regulatory compliance
(AIDC)
technologies + RFID Assures that container integrity has been maintained Containers can be fast tracked on arrival.
07/01/11
48
49
07/01/11
50
Personal identity
07/01/11
51
Verification
07/01/11
52
Working principle
07/01/11
53
07/01/11
54
Identifies users by the shape of their hands. The preferred technology for high-security applications. Very reliable when combined with other forms of identification. Hand scanners have a twenty-six bit Wiegand output format as one of the menu choices.
07/01/11 Totem International Ltd
55
Implementation Issues
Card Reader Emulation. Stand Alone Access Control Privacy Issues Operation by Disabled People Outdoor Conditions
07/01/11
56
Applications
Parking
Lot Application Cash Vault Applications Dual Custody Applications Anti-passback Time and Attendance Point of Sale Applications Interactive Kiosks
07/01/11
57
10 . 30am - 11 . 00am
07/01/11
58
07/01/11
59
Primary
Incident
Secondary
Contamination
People
07/01/11
60
Hazards
07/01/11
61
Examples of Hazards
Chemical Warfare Agents
Dirty Bombs
Lethal agents
Nerve Agents Asphyxiant / blood agents Vesicant / blister Agents Pulmonary / choking Agents
Typical Symptoms : Blurred / dim vision Headache Nausea Vomiting Diarrhoea Secretions and sweating Muscle twitching Laboured breathing Seizures Loss of consciousness
V Agents
07/01/11
64
Bacteria Viruses Toxins derived from bacteria Toxins derived from plants
07/01/11
65
Dirty Bombs
An Atom
Proton (Positive) Alpha Beta Gamma Particle Particles Rays & s X Rays
Nucleus
Neutron (Neutral)
Different
07/01/11
67
Decontamination Line Hot Line Protect ion Level B Protect ion Level C
Zone Description
Hot Zone Convenient barrier to contain primary source 1st zone to be created Entry likely before Detection, Identification, Monitoring Possibly unknown Hazards Contamination from Primary Source Contamination Possibly above IDLH Dynamic situation Warm Zone Decontamination zone Typically last zone to be created Expect Monitoring of Secondary contamination once hot zone detection and identification complete Hazards should be identified Contamination only from Secondary Sources Contamination should be below IDLH Cold Zone Outer cordon - control public access (& escape!) Typically 2nd zone to be created Monitoring only to ensure contamination-free Should be non-hazardous Should be contamination-free Should be contamination-free
Typically minimal if any Typically negative pressure or Typically use SCBA (and protection: postpowered filtering respirators Gas-tight suits if decontamination clothing; and full skin protection necessary) possibly MFR-type respirators minimum liquid-tight. as safeguard 07/01/11 Totem International Ltd 69
Desired Response
Fire Service
Hot Zone Detection, Identification & Monitoring Reconnaissance Search & Rescue
Police
Warm & Cold Zone Reconnaissance Crime Scene Management Firearms use
07/01/11
07/01/11
71
07/01/11
72
07/01/11
73
07/01/11
74
&
07/01/11
75
- 12 . 00pm
11 . 30am
07/01/11
76
They are good when you want to get a better look at a specific object and then return to normal viewing Conditions.
Have a single lens or stereo lens, depending on the model , excellent for constant viewing, such as moving around in a dark building. Cameras with night-vision technology can send the image to a monitor for display or to a VCR for recording. When night-vision capability is desired in a permanent location, such as on a building or as part of the equipment in a helicopter, cameras are used..
07/01/11
77
locate enemy targets at night For navigation, surveillance and targeting It reveals whether an area has been disturbed. To discover items that have been hidden by criminals, including money, drugs and bodies. Changes to areas such as walls can be seen using thermal imaging.
07/01/11
78
use these cameras to locate targets, track people, intelligence gathering and surveillance
can detect the minute temperature changes and this is generated as an image on a screen.
07/01/11
80
07/01/11
81
07/01/11
82
07/01/11
83
Likely situations at the port: Theft of containerized cargo high-risk containers Terrorist Attacks Smuggling Explosion Thefts during loading and unloading of cargo
07/01/11
84
07/01/11
85
Vehicle Control
07/01/11
86
Vehicle access control Vehicle identification & tracking Trailer identification & tracking Transport, fleet & yard management Driver authorisation Parking management Machine safety & auto shut of
07/01/11
87
Boom Barriers
07/01/11
88
Bollards
07/01/11
89
07/01/11
90
Digital Signal Processor (DSP) Based Technology Audible and Visual Alarms Entry Pacing Lights Floor Mounting Option
07/01/11
91
Integrated Gps Reciever & Antena Wireless Radio Design Tilt & dead reckoning System WPAN WWAN WLAN Bar code Reader Support
07/01/11
92
07/01/11
93
07/01/11
94
07/01/11
95
2 . 15 pm
1 . 00pm -
Networking Lunch
07/01/11
96
07/01/11
97
A security director can view and download incident online without having to pull the incident from the DVR. access can save a business in fleet expenses, travel expenditures, and time and resource management. in multiple places at one time. for all parties anytime, anywhere access.
07/01/11 Totem International Ltd 98
Remote
Be
A win-win
hypotheses Monitor trends Detect clusters and outbreaks objectives can be met very rapidly and often more accurately than with other reporting systems.
07/01/11
99
Cloud
devices
Container Tracking
Activity Tracking
07/01/11
Wireless technology
100
Rfid Tags
07/01/11
101
07/01/11
102
07/01/11
103
Cloud Devices
07/01/11
104
Intrusion Detectors
07/01/11
105
Surveillance Devices
Works day& night Infrared intelligence No special software needed Captures all images
07/01/11
106
07/01/11
107
Features
captures a full 10-print record in well under 10 seconds. using a two capture process instead of the traditional three capture 4 Slap process. . No other external power source is required.
3 . 30pm -
07/01/11
109
4 . 30pm
4 . 00pm Case
Studies
07/01/11
110
5 . 00pm
4 . 30pm -
07/01/11
111
Thank You
Firoze Zia Hussain CEO & Director, Totem International Ltd. Email :firoze@totemint.com ph no:+91 9618621234