Heightening port security with technological advancements in Africa 6/22/2011 Totem International Ltd 1 Heightening port security with technological advancements in Africa By Firoze Zia Hussain CEO & Director Totem International Ltd, India An electronics and communication engineer who is a forward thinking and energetic professional recognized for high-profile turnaround achievements. Was highly decorated law enforcement professional with more than 10 years experience in security function. Successful and consistent record of investigations, and crime prevention.
Participant of the US State Department Young Leaders Exchange Program. Successfully executed project work and technology transfer/ collaboration at India’s largest Printed Circuit Board manufacturing plant of INDAL electronics. Pursued consultancy in Quality Circle, ISO9000, JIT, Kaizen, TQM, Taguchi’s techniques of experimentation . A widely traversed person with diverse contacts in global distribution of chemicals and security products. 6/22/2011 Totem International Ltd 2 6/22/2011 Totem International Ltd 3 Introduction To Port Security ? IMO ? ISPS code(2002) ? SOLAS /22/2011 Totem International Ltd 4 Importance of port security ? Bulk of African exports is through ports. ? ? ? 2% of the world trade. Trades & profits. Extensively used conveyance for transportation. Increases Africa? s Natural Resources. ? 6/22/2011 Totem International Ltd 5 Port Security can prevent ? Pirates/Terrorist Attacks. ? Smuggling of weapons. ? Illegal S/W issues & Immigration. 6/22/2011 Totem International Ltd 6 Technological models to enhance efficiency at ports 6/22/2011 Totem International Ltd 7 Technologies’ in ports 6/22/2011 Totem International Ltd RFID Technology ? ADC technology. ? An Rfid System Compromises of ? One or more RF tags ? ? ? ? Two or more antennas One or more interrogators One or more host computers Appropriate software 6/22/2011 Totem International Ltd 9 Benefits Through Rfid In Ports Access Control Container Security RFID IN PORTS Container Identification and Location Activity Tracking Regulatory Compliance 6/22/2011 Totem International Ltd 10 GPS Technology ? Track the position ? To avoid theft ? Highly effective & reliable ? What is happening. ? used from any where by gps device. Device may size like a watch or button on collar 6/22/2011 Totem International Ltd 11 Cloud Technology 6/22/2011 Totem International Ltd 12 Uses of Cloud Technology ? Reduces Cost ? Increases Information Storage ? No longer need to concentrate in constant updates ? can gather information even if away 6/22/2011 Totem International Ltd 13 Biometrics Technology 6/22/2011 Totem International Ltd 14 Uses of Biometrics Increases Security. ? Reduces fraud. ? provides viable solution to port security. ? Can know who did what ,when and where. ? Increases ROI in areas like Loss prevention and time of attendance of employees. 6/22/2011 Totem International Ltd 15 Wireless Technologies Flow of information Dock Side Port Head office Employees Sea Clients 6/22/2011 Totem International Ltd 16 Value added Services ? ? ? ? ? ? ? ? ? ? ? ? ? Crane scheduling systems and communication Ship-to-shore communication Container operations and management RoRo facilities Customs office Harbour Masters office Emergency services Wireless network IT infrastructure Security and access control Gate management Corporate, financial, human resources Services for tenants. 6/22/2011 Totem International Ltd 17
Installing Port Perimeter Security 6/22/2011 Totem International Ltd 18 Intrusion Detection Designed to alert the authority to a specific danger. Indoor oPassive infrared detectors oUltrasonic detectors oMicrowave detectors oPhoto-electric beams oGlass break detectors oSmoke, heat &carbonmonoxide detectors 6/22/2011 Totem International Ltd 19 Out Door Sensors ? Vibration (shaker) or inertia sensors ? Passive magnetic field detection ? E-field ? Microwave barriers ? Microphonic systems ? Taut wire fence systems ? Fibre optic cable ? H-field 6/22/2011 Totem International Ltd 20
Monitored Security Solutions linked via the telephone line or cellular network or both to an Alarm Receiving Centre (ARC). ? contacting the right Authority – i. e. the police usually, or the Fire & Rescue Service (FRS) in the case of a fire – if there is an activation. ? highest standards of operation. ? 6/22/2011 Totem International Ltd 21 Passive systems ? Detects a potential security breach ? logs the information ? signals an alert on the console and or owner. 6/22/2011 Totem International Ltd 22 Reactive Systems ? ? ? ? ? known as an intrusion prevention system (IPS). uto-responds to the suspicious activity by resetting the connection. reprogramming the firewall to block network traffic from the suspected malicious source. IDPS is commonly used automatically at the command of an operator; systems that both “detect” (alert) and/or “prevent. ” 6/22/2011 Totem International Ltd 23 ?Detection/alarm ? Deter system. theft as well as vandalism. protection of your assets and resources. costs associated with . their risks associated with theft. ? 24-hour ? Lower ? Decreasing * insurance premiums. repair or replacement of property or equipment that has been damaged . /22/2011 Totem International Ltd 24 Access Control 6/22/2011 Totem International Ltd 25 Installing Rfid at Ports 6/22/2011 Totem International Ltd 26 RFID tags 1. Active Tags ? contain sensors, ? global positioning (GPS), ? satellite links, other enhancements 2. Semi-active tags ? battery is used to power sensors ? volatile memory. ? contactless smart cards 6/22/2011 Totem International Ltd 27 Access Control Employee ID: ? ? ? ? ? Smart and SecureTradelanes (SST). Container Security Initiatives (CSI). prevent loss and possible mischief. Also contain biometric information such as a photograph. losed circuit TV (CCTV) 6/22/2011 Totem International Ltd 28 Vehicle Control ?Equipping tractors and other equipment with RFID tags. ?record the exact time at which a particular truck and container entered or left the terminal. ?can be used to unlock fuel pumps and record fuel usage. 6/22/2011 Totem International Ltd 29 Container Security sensors to monitor environmental conditions within the container. ? GPS, sensors, and satellite phone capabilities to constantly report the location of the container. ? satellite phone portals for commercial shippers. ? 6/22/2011
Totem International Ltd 30 Container Identification and Location ? Container Tagging ? Location Tracking ? Activity Tracking 6/22/2011 Totem International Ltd 31 Regulatory compliance (AIDC) technologies + RFID ? Assures that container integrity has been maintained ? Containers can be ‘fast tracked’ on arrival. ? 6/22/2011 Totem International Ltd 32 Containers with RFID enable shippers and carriers to: ? ? ? ? ? ? ? ? ? ? Consistently monitor container security and integrity. Speed shipments through the supply chain. Verify that a container was loaded at a secure loading point.
Significantly reduce the likelihood a tamper event happened in Transit with container accountability from point of origin to destination. Gather enough data to conduct a „virtual inspection? in advance of arrival. Guarantee that shipping containers meet governmental security regulations. Receive fast track or „green lane? handling through customs at the point of dispatch and / or the point of receipt. Avoid extensive delays in the shipment and receipt. Minimise the cost of handling. 6/22/2011 Totem International Ltd 33 Biometrics a possible solution to improve efficiency 6/22/2011
Totem International Ltd 34 Personal identity 6/22/2011 Totem International Ltd 35 Verification 6/22/2011 Totem International Ltd 36 Working principle 6/22/2011 Totem International Ltd 37 Hand geometry technology to improve efficiency 6/22/2011 Totem International Ltd 38 ? Identifies users by the shape of their hands. ? The preferred technology for highsecurity applications. Very reliable when combined with other forms of identification. Hand scanners have a twenty-six bit Wiegand output format as one of the menu choices. 6/22/2011 Totem International Ltd 39 ? ? Implementation Issues Card Reader Emulation. ?Stand Alone Access Control ? Privacy Issues ? Operation by Disabled People ? Outdoor Conditions 6/22/2011 Totem International Ltd 40 Applications Parking Lot Application ? Cash Vault Applications ? Dual Custody Applications ? Anti-passback ? Time and Attendance ? Point of Sale Applications ? Interactive Kiosks ? 6/22/2011 Totem International Ltd 41 Dealing with Nuclear Threats at Ports 6/22/2011 Totem International Ltd 42 Anatomy of a Civil Emergency Incident Primary Incident Secondary Air/Ground/Water Contamination People 6/22/2011 Totem International Ltd 3 Hazards C = Chemical B = Biological R = Radiological N = Nuclear E = Explosive 6/22/2011 Totem International Ltd 44 Examples of Hazards Chemical Warfare Agents Biological Warfare Agents Dirty Bombs White Powder Incidents 6/22/2011 Totem International Ltd 45 Chemical Warfare Agents Chemical warfare agents can be divided into the following: Lethal agents Nerve Agents Asphyxiant/blood agents Vesicant/blister Agents Pulmonary/choking Agents Non lethal agents Incapacitating agents Riot Control Agents 6/22/2011 Totem International Ltd 46 Chemical Warfare Agents Nerve Agent
Affects the communication between nerve cells, causing uncontrollable muscle stimulation Typical Symptoms: Blurred/dim vision Headache Nausea Vomiting Diarrhoea Secretions and sweating Muscle twitching Laboured breathing Seizures Loss of consciousness 6/22/2011 Nerve agent types: G- Agents Tabun (GA) Sarin (GB) Soman (GD) Cyclosarin (GF) V Agents VE VG VM VX Totem International Ltd 47 Biological Warfare Agents Biological warfare agents can be divided into the following: Lethal agents Bacteria Viruses Toxins derived from bacteria Toxins derived from plants 6/22/2011 Totem International Ltd 48
Dirty Bombs An Atom Proton (Positive) 3 Types of Ionising Radiation ? Alpha Particles ? Beta Particles ? Gamma Rays & X Rays Nucleus Neutron (Neutral) Electron (Negative) Aluminium Lead 6/22/2011 Totem International Ltd 49 Who responds and how? ? Different countries; different processes ? E. g. Israel & France: no decontamination at scene etc ? Development of “Zones” ? Hot zone, warm zone, cold zone ? Contaminated, decontamination, clean. 6/22/2011 Totem International Ltd 50 Typically Halfmask/disposable/skin protection – if nec. Typically SCBA/Gas suits Crowd Control Line Exclusion (Hot) Zone
Decontamination Line Hot Line Typically Full-face/ appropriate filter/suit or P&SA/ suit Protection Level A Protection Level B Protection Level C Contamination Reduction (Warm) Zone Support (Cold) Zone 6/22/2011 Totem International Ltd 51 Zone Description Hot Zone Convenient barrier to contain primary source 1st zone to be created Entry likely before Detection, Identification, Monitoring Possibly unknown Hazards Contamination from Primary Source Contamination Possibly above IDLH Dynamic situation Warm Zone Decontamination zone Typically last zone to be created Expect Monitoring of Secondary contamination once hot zone detection nd identification complete Hazards should be identified Contamination only from Secondary Sources Contamination should be below IDLH Cold Zone Outer cordon – control public access (& escape! ) Typically 2nd zone to be created Monitoring only to ensure contamination-free Should be non-hazardous Should be contamination-free Should be contamination-free Typically minimal if any Typically negative pressure or Typically use SCBA (and protection: postpowered filtering respirators Gas-tight suits if decontamination clothing; and full skin protection necessary) possibly MFR-type respirators minimum liquid-tight. s safeguard 6/22/2011 Totem International Ltd 52 Desired Response Fire Service Police Fire & Ambulance Warm & Cold Zone Warm Zone Hot Zone Triage Detection, Identification & Reconnaissance Crime Scene Mass Decontamination Monitoring Management Casualty Transport Reconnaissance 53 Firearms use6/22/2011 Totem International Ltd Search & Rescue Benefits of Electronic surveillance Installing Night vision equipment ? They are good when you want to get a better look at a specific object and then return to normal viewing Conditions. ?
Have a single lens or stereo lens, depending on the model , excellent for constant viewing, such as moving around in a dark building. ? Cameras with night-vision technology can send the image to a monitor for display or to a VCR for recording. When night-vision capability is desired in a permanent location, such as on a building or as part of the equipment in a helicopter, cameras are used.. 6/22/2011 Totem International Ltd 54 Purpose of Night vision Camera’s To locate enemy targets at night For navigation, surveillance and targeting It reveals whether an area has been disturbed.
To discover items that have been hidden by criminals, including money, drugs and bodies. ? Changes to areas such as walls can be seen using thermal imaging. ? ? ? ? 6/22/2011 Totem International Ltd 55 Thermal imaging cameras ? All thermal imaging cameras have infrared detector. use these cameras to locate targets, track people, intelligence gathering and surveillance used for surveillance and security. can detect the minute temperature changes and this is generated as an image on a screen. ? ? ? ? now cameras are available for other purposes like sensing sailing boats. /22/2011 Totem International Ltd 56 Benefits of Low lux camera’s 6/22/2011 Totem International Ltd 57 High mega pixel cameras ? IP security cameras provide optimum picture quality and better frame. ? These cameras use inexpensive sensors and mechanical shutters to control exposure and time ?Offers a way to increase the detailed capture within an image without sacrificing the area of the camera. 6/22/2011 Totem International Ltd 58 Crisis response and management Likely situations at the port: ? Theft of containerized cargo ? high-risk containers ?
Terrorist Attacks ? Smuggling ? Explosion ? Thefts during loading and unloading of cargo 6/22/2011 Totem International Ltd 59 How to deal with such situations ? X-ray and Radiation Portal Monitors(RPM) ? Intelligent video systems ? Crane-mounted sensors ? Radio Frequency Identification (RFID) tags ? Intelligent device management ? Maritime domain awareness 6/22/2011 Totem International Ltd 60 Loss and theft prevention 6/22/2011 Totem International Ltd 61 ROI for security equipment and technology ? Are my employees being honest about their hours worked A security director can view and download incident online without having to pull the incident from the DVR. Remote access can save a business in fleet expenses, travel expenditures, and time and resource management. Be in multiple places at one time. A win-win for all parties anytime, anywhere access. Convergence opens new ROI opportunities for security providers, who are investing R&D dollars to position themselves at the forefront of the convergence revolution. 6/22/2011 Totem International Ltd 62 ? ? ? ? Using surveillance to prevent theft ? ? ? ?
Generates hypotheses Monitor trends Detect clusters and outbreaks objectives can be met very rapidly and often more accurately than with other reporting systems. 6/22/2011 Totem International Ltd 63 Reducing possibility of missing containers and missing cargo in containers RFID Tags Cloud devices IDS SURVIELLENCE DEVICES Container Tracking Activity Tracking 6/22/2011 Totem InternationalWireless Ltd technology 64 Thank You Firoze Zia Hussain CEO & Director, Totem International Ltd. Email :[email protected] com ph no:+91 9618621234 Totem International Ltd. 6 ,Totem house, Punjagutta, Hyderabad 500082, India 6/22/2011 Totem International Ltd 65