Security platforms for logistics operations in MED ports
|
|
- Rodger Bradley
- 5 years ago
- Views:
Transcription
1 Security platforms for logistics operations in MED ports Theodoros Theodoropoulos (SEAbility Ltd) 3rd Inte-Transit Training 19 November 2014, Valencia, Spain
2 Overview Introduction-Legal framework Port related vulnerabilities and threats Counter measures and technologies Wrap-up and conclusions
3 Introduction Ports are critical to world wide trade Historically they have not been subject to comprehensive governmental regulation This has changed after 09/11, vessel attacks, piracy Global security frameworks International Ships and Ports Security (ISPS Code) Code of practice on security in ports Training wokshop, Valencia-19/11/2014
4 Introduction Overall EU legislation
5 Introduction Regulation 725/2004 Enhancing Ship and Port Facility Security Requires Ship and Port Facility Security Plans Extends the application of the ISPS Code to the ships engaged in national routes within EU Covers the area where ship/port interface takes place
6 Introduction Directive 65/2005 focuses on the rest port area (not covered by ISPS). The designation of the port area is responsibility of the member-state ( what is a port? ) Establishes the Port Security Plan (necessary procedures and actions to be undertaken) Establishes the Port Security Officer. A national Port Security Authority monitors the implementation
7 Introduction Set up a Common European secure Custom System Tighten security measures in the EU trade Requires advanced information for cargoes entering or leaving EU (similar to the 24 hour rule of USA) Introduces the Authorized Economic Operator (AEO) status Aims at enhancing the supply chain security (similar to the Green Lane Award of USA) Customs are transforming to security inspectors.
8 Introduction Implementation considerations Time sensitivity. Production has moved to just-in-time processes, with manufacturers relying on steady shipments of inputs. Public and private involvement in having the other carry the burden of financing or even planning security efforts.
9 Overview Introduction Port related vulnerabilities and threats Counter measures and technologies Wrap-up and conclusions
10 Introduction Port related vulnerabilities and threats Terrorism use of force or violence, against persons and places (such as ports) to intimidate and/or coerce a government, its citizens, or any segment thereof for political or social goals Weapons of mass destruction Misuse of containers to either transport weapons or substances required to construct them
11 Introduction Port related vulnerabilities and threats Criminality Drug dealing Contraband smuggling Cargo theft Money laundering Commercial Conspiracies Undervaluation, double invoicing, or false description of merchandise imported into the country Importation, transportation, and distribution of counterfeit goods subject to trade and copyright
12 Introduction Port related vulnerabilities and threats Other Economic espionage... Etc
13 Introduction Port related vulnerabilities and threats Risk assessment procedure
14 Introduction Port related vulnerabilities and threats Typical organizational constraints Access: Security measures may restrict use of the facility, which could affect the organization s maximization of its productivity. Commerce: Security measures may entail direct and indirect costs associated with the business function. For example, costs associated with the procurement of access credentials may be factored into end user costs.
15 Introduction Port related vulnerabilities and threats Typical organizational constraints Environment: Security measures may require that more capital resources be devoted to security versus commercial use. Thus, a facility may have to incorporate staging areas, screening points, buffer zones, and/or protected zones into the physical plant.
16 Introduction Port related vulnerabilities and threats Tools for vulnerability neutralization Access control Cargo screening and scanning Terminal vehicle and equipment tracking Intelligence
17 Overview Introduction Port related vulnerabilities and threats Counter measures and technologies Wrap-up and conclusions
18 Overall framework
19 Access control Surveillance based on CCTV cameras Intelligent video surveillance systems
20 Access control Aviation has adopted Face Recognition as the official biometrics standard Advantages Touch free, non intrusive technology Tolerance to environmental and workspace parameters Re-use of existing infrastructure. (CCTV cameras etc..)
21 Access control Disadvantages Operates better in a controlled environment
22 Access control 2D face recognition based a network based model 3D model can be constructed from the 2D model 2D-to-3D model generation technologies for enhancing 2D systems via pose normalization as well as gallery enhancement
23 Access control Lower false accept and false reject rates. Gallery enhancement Pose neutralization
24 Access control Eye and Iris sensor for Human identification human iris has extremely data-rich physical structures that are unique to eachhuman being discrimination possible even between genetic twins Unobtrusive use without physical contact
25 Access control Segmentation: defines the most suitable, usable area of the Iris, removes eyelids, deep shadow, and specular reflection Iris data stored or correlated to external data.
26 Access control Disadvantages Further research required in uncontrolled environments Motion blur causes difficulties in iris segmentation and feature extraction Interoperability between various encoding techniques
27 Counter measures and technologies : Access control Optical character recognition (OCR) Create text from image Process Segmentation: Given input image, identify individual characters Feature Extraction: From each glyph image, extract features. Classification: Classify character according to the features
28 Access control Mature technology (Assessed within Inte-Transit)
29 Access control Radio Frequency identification Already used in other domains such as e-passport, smart payments Standardized domain
30 Access control RFID is entering mobile devices Via Near Field Communications The android platform currently supports the following modes Reader/writer mode, allowing the NFC device to read and/or write passive NFC tags and stickers. P2P mode, allowing the NFC device to exchange data with other NFC peers; this operation mode is used by Android Beam. Card emulation mode, allowing the NFC device itself to act as an NFC card. The emulated NFC card can then be accessed by an external NFC reader, such as an NFC point-of-sale terminal.
31 Access control Possible application domains in the port domain Driver identification Dynamic grant of access rights through the mobile interface...
32 Access control Other Fence Vibration Sensors for intruder detection TripWires for intruder detection...
33 Access control Tracking and positioning of intra terminal equipment and vehicles GNSS enabled solutions enable meter accuracy (DGPS, low cost RTK) Solutions assessed within Inte-Transit
34 Access control (water front identification) Sea-surface targets small boats ships Sub-surface targets Divers Submersibles Combination of radar, sonar, microwave, thermal cameras
35 Access control (water front coms) Automatic Identification System (AIS) Automatically identifies & locates vessels Supplements marine radar for collision avoidance
36 Scanning Non obstructive Scanning for : Chemical, biological, radioactive, nuclear substances
37 Scanning Technologies
38 Scanning
39 Scanning
40 Counter measures and technologies: Scanning and identifying Integrated RFID-scanning in order to optimize Security Minimize impact on flow of goods
41 Intelligence In general many implementations available such as ASYCUDA, TATIS, TIMS, SOFIX Microclear, PC Clear, IBM Customs Agency Solutions and Oracle Customs, Framework Common aspects of these platforms Cargo control to monitor all movements of imported, exported and transit goods and ensure that all goods are duly cleared before release. Declaration processing to capture and process data for the assessment and collection of relevant duties and taxes.
42 Intelligence Payments and accounting to register and account for payments by importers and exporters. Risk management the targeting and selection of those consignments representing a high risk including consignments that may conceal goods seeking to evade duty and tax, illegal drugs or material for terrorism. Statistics and reporting the extraction of data for other government agencies including for the dissemination of foreign trade statistics and to generate management reports as required by Customs.
43 Customs Intelligence An efficient and effective Communications Gateway to provide legitimate access to Customs processing systems by traders and other government agencies. Intelligence and enforcement to store and exchange data for risk profiling, compliance and enforcement activity.
44 Counter measures and technologies: Customs Intelligence Current steps Development of systems that can be integrated with those in the private sector (e-customs. Example unattended custom control Valencia).
45 Customs Intelligence Future steps International e-collaboration of customs E-Borders uniform adoption or adaptation of policies and legal frameworks that will enable and recognize the interoperable use of the relevant system in both national and international respects
46 Conclusions Regulatory framework for ports defines requirements for a security platform Risk assessment can define what kind of measures are required Many technological frameworks exist some are more mature for deployment others require more research Security should not reduce competitiveness
47 Thank You
Secure container transport: challenges & barriers in the complete stakeholder chain
Secure container transport: challenges & barriers in the complete stakeholder chain Theodoros Theodoropoulos (SEAbility Ltd) 1 st Training Workshop 19 November 2014, Valencia, Spain Overview Introduction
More informationOutline. Motivation. Maritime Security Gaps and Vulnerabilities. Maritime Security Gaps and. Motivation
Outline Motivation Maritime Security Gaps and Vulnerabilities Technologies for Maritime Security Technology Application Summary Risk Analysis Conclusion Contact Information 2 International Ship and Port
More informationUtmaningar och transportskydd i framtida transportsystem. Sören Jägerhök och Åsa Waern
Utmaningar och transportskydd i framtida transportsystem Sören Jägerhök och Åsa Waern Supply Chain Security Supply chain security refers to efforts to enhance the security of the supply chain, the transport
More informationSecurity of the supply chain Specific focus on air transportation. Interest of industrial platforms
Security of the supply chain Specific focus on air transportation Interest of industrial platforms November 9 th, 2006 Presentation to the EURITRACK workshop Page 1 Cargo Flows & process (Stakeholders)
More information3.5 Advanced Inspection Technologies (AIT)
3.5 Advanced Inspection Technologies (AIT) Before inspection technologies can be further discussed, a baseline definition must be established for the three types of inspections that are commonly used when
More informationSUPPLY CHAIN SECURITY
SUPPLY CHAIN SECURITY An Introduction to the Supply Chain Security Guide of The World Bank Marc H. Juhel Sector Manager, Transport The World Bank November 2009 World Bank Supply Security Guide 2009 1 Introduction
More informationJens Froese Technische Universität Hamburg-Harburg. Harburg. Bangkok 27 th October Container Security TUHH TUHH. Maritime Logistics
Jens Froese Technische Universität Hamburg-Harburg Harburg Bangkok 1 Shipping Threats 2 Shipping Threats Challenges to container security include attacks to truck drivers illegal immigration illegal transport
More informationWhat Future for 100% scanning WCO Third party views Part 2. Brussels, June 11th Andrew Yell - Pierre Harris
Questions were 1. Will service providers ready to supply expertise? 2. Is capacity building and utilization know-how on track with the technology? 3. Can timing work in synch with operator s need? What
More information"SAFETY IN THE SEA PORTS
"SAFETY IN THE SEA PORTS Paper prepared for 22 nd Engineers International Conference At Intercontinental Hotel, Nairobi, Kenya. From 13 th - 15 TH May, 2015. MS. MARYAM MOHAMED KIDERE KENYA PORTS AUTHORITY
More informationEffective Cargo and Vehicle Inspection and Enhanced. Border Security: Mexico SAT Accelerated Cargo Inspection Initiative.
Effective Cargo and Vehicle Inspection and Enhanced An OSI Systems Company Border Security: Mexico SAT Accelerated Cargo Inspection Initiative An initiative by Mexico s tax administration service, Servicio
More informationPo r t. S e c u r i t y. Security Challenges in the Ports,,
Po r t S e c u r i t y Security Challenges in the Ports,, Background 2 Background 3 Background 4 Background 5 Background 6 A new type of terrorism, aiming to destabilize the global economy, with long term
More informationIntroduction to Homeland Security
Introduction to Homeland Security Chapter 5 Safety & Security: Borders and Transportation Border Control The borders of any country are strategically important because of the critical role they play in
More informationAir Cargo & Air Supply Chain Security : Perspective From Integrators
Air Cargo & Air Supply Chain Security : Perspective From Integrators Introduction The September 11 terrorist attacks in the US in 2001 has changed the whole concept of Aviation Security and has affected
More informationSession 3: TRADE FACILITATION AGREEMENTS AND e-commerce. Pashupati N. Pandey World Customs Organization
Session 3: TRADE FACILITATION AGREEMENTS AND e-commerce - Managing Data from e-commerce Industry for goods clearance at the border Pashupati N. Pandey World Customs Organization e-mail: pn.pandey@wcoomd.org
More informationBest practices of digital technology application in transport facilitation and logistics
교통물류연구사업중간평가 2016.05.19 Regional Conference for Logistics Service Providers Best practices of digital technology application in transport facilitation and logistics Busan, ROK, 21. June. 2018. Kerri Ahn
More informationDiscussion Paper presented at: UNECE-OSCE Roundtable on Inland Transport Security, Vienna, Austria,
Customs Perspectives on Detection of Deliberate Regulatory Violations in Global Supply Chains - the Role of Information and Data in Risk Identification Discussion Paper presented at: UNECE-OSCE Roundtable
More informationXerox Supplier Security Requirements
Xerox Supplier Security Requirements Suppliers who are involved in the manufacture, storage, and transportation of Xerox products ( Suppliers ) for Xerox Corporation and / or its subsidiaries under Xerox
More informationModule Descriptions Computer-Based Training (CBT) Programme
Module Descriptions Computer-Based Training (CBT) Programme MODULE NUMBER NAME DESCRIPTION 1 GENERAL COURSES This category includes general modules. These modules are meant for all students. Please note
More informationRealizing the Vision of e-port: Automatic Gates and Its Related Subsystems at the Bangkok Port
Realizing the Vision of e-port: Automatic Gates and Its Related Subsystems at the Bangkok Port Mr.Som chansuthirangkool Project Director, e-port Program Port Authority of Thailand Som_c@port.co.th Objectives
More informationCBTC(Customs Border Targeting Center) Korea Customs Service
CBTC(Customs Border Targeting Center) Korea Customs Service RISK If there is a risk of something unpleasant, there is a possibility that it will happen Risk = Threat +Vulnerabilities +Consequence
More informationMaritime and inland waterways co-operation in the OSCE area: Increasing security and protecting the environment. Part 2 / Prague, May 2008
Organization for Security and Co-operation in Europe Secretariat EEF.NGO/7/08 19 May 2008 ENGLISH only Conference Services The 16 th Meeting of the OSCE Economic and Environmental Forum Maritime and inland
More informationCustoms and the use of technology to secure global supply chain
Customs and the use of technology to secure global supply chain European Commission Directorate General for Wil van Heeswijk Unit B2 Risk management and Security 1 Facts & Figures 119.000 control officers
More informationAdditional Information for Port of Durban
Additional Information for Port of Durban PERFORMANCE FOR YEAR: Vessels calls 4,545 Activity of the port MT s 73,074,436 Bulk Cargo Handles MT s 33,719,039 Containers Handled TEU s 2,334,999 Current yearly
More informationCustoms Trade Partnership Against Terrorism An Introduction
Customs Trade Partnership Against Terrorism An Introduction WHO WE ARE Securing the Borders of the United States while simultaneously facilitating the flow of legitimate trade & travel It s a challenging
More informationForeign Manufacturer Eligibility Requirements
Foreign Manufacturer Eligibility Requirements (04/07/2008) To be eligible for C-TPAT, the Foreign Manufacturer must meet the following eligibility requirements: 1. Be an active Manufacturer incorporated
More informationThe port as an enabler of the smart grid. Theodoros Theodoropoulos (SEAbility Ltd) Inte-Transit Training 19 November 2014, Valencia, Spain
The port as an enabler of the smart grid Theodoros Theodoropoulos (SEAbility Ltd) Inte-Transit Training 19 November 2014, Valencia, Spain Overview Introduction Smart grid The port as a smart grid enabler
More informationMaritime Security in Logistics From Japanese Shippers point of View
Maritime Security in Logistics From Japanese Shippers point of View Koji Hashimoto JMC (Japan Machinery Center for Trade and Investment) September 29 th, 2011 1 Production Network (A representative case
More informationMinimum-Security Criteria for C-TPAT Foreign Manufacturers
Minimum-Security Criteria for C-TPAT Foreign Manufacturers These minimum security criteria are fundamentally designed to be the building blocks for foreign manufacturers to institute effective security
More informationGUIDELINES FOR STRENGTHENING CONTROL OF CONTAINERS
INTER-AMERICAN DRUG ABUSE CONTROL COMMISSION CICAD Secretariat for Multidimensional Security GUIDELINES FOR STRENGTHENING CONTROL OF CONTAINERS Viña del Mar, Chile I. Introduction The international maritime
More informationISPS CODE: NAVIGATION AND PORT SAFETY
ISPS CODE: NAVIGATION AND PORT SAFETY PROTECTION - CONTROL- IDENTIFICATION TRACKING 02 ISPS CODE: NAVIGATION AND PORT SAFETY Ports, often located near cities, assume an essential role in the logistic transport
More informationIdentity Management. ID management for people and objects
Identity Management ID management for people and objects System accessible assigned tokens Token means something you have. This is separate from something you know or you are. Things you carry and perform
More informationAUTOMATION OF TERMINALS AND EQUIPMENT
AUTOMATION OF TERMINALS AND EQUIPMENT AUTOMATION OF TERMINALS AND EQUIPMENT The Maritime Industry is currently undergoing a number of changes which focuses on digitalization and autonomation with the objective
More informationSecurity & Defense Solutions
intelligent convergence TM Security & Defense Solutions Intelligent Convergence with Augusta Systems EdgeFrontier White Paper The Need for Intelligent Convergence The distributed and evolving nature of
More informationELECTRONIC TOLL COLLECTION (ETC) AT NATIONAL HIGHWAYS TOLL PLAZAS
ELECTRONIC TOLL COLLECTION (ETC) AT NATIONAL HIGHWAYS TOLL PLAZAS Management of User Fee Presently, Toll(User Fee) is being collected at the Toll Plazas of BOT (Toll), BOT (Annuity) and Public funded projects
More informationC2 ADVANCED MULTI-DOMAIN ENVIRONMENT AND LIVE OBSERVATION TECHNOLOGIES
C2 ADVANCED MULTI-DOMAIN ENVIRONMENT AND LIVE OBSERVATION TECHNOLOGIES FLYSEC Final Info Day and Risk-Based Security Projects Cluster meeting 28/06/2018 1 OVERVIEW 2 Source: FRONTEX THE PROBLEM IRREGULAR
More informationVideo Analytics. Operational, Marketing and Security Insights from CCTV
Video Analytics Operational, Marketing and Security Insights from CCTV Organizations now have an opportunity to increase the returns they receive from their existing video surveillance infrastructures.
More informationMaritime Satellite Security Services
ARATOS HOMELAND SECURITY Maritime Satellite Security Services Maritime Security Importance Maritime Security becomes more important in the ever-changing global market thus: The protection of Life Ship
More informationBy Dimitrios Tsamboulas National Technical University of Athens (NTUA)
Inland Transport Security Discussion Forum OSCE-UNECE Roundtable 13 December 2011, Vienna, Austria By Dimitrios Tsamboulas National Technical University of Athens (NTUA) Timely and important topic Growing
More informationWhat Does the MTS Mean to Me?
What Does the MTS Mean to Me? The MTS helps our economy to grow, strengthens our national defense and provides a higher standard of living for all Americans. The MTS facilitates our bulk exports and imports
More informationComputer Vision Technologies and Markets
Computer Vision Technologies and Markets Hardware and Software for Automotive, Sports & Entertainment, Consumer, Robotics & Machine Vision, Security & Surveillance, Agriculture, Retail, and Medical Applications:
More informationCOASTAL AREAS & MARITIME APPROACHES: DRUG THREAT/ VULNERABILITY RISK SELF-ASSESSMENT CHECKLIST
COASTAL AREAS & MARITIME APPROACHES: DRUG THREAT/ VULNERABILITY RISK SELF-ASSESSMENT CHECKLIST COASTAL AREAS & MARITIME APPROACHES: DRUG THREAT/ VULNERABILITY RISK SELF-ASSESSMENT CHECKLIST A. Measures
More informationInternational Conference Venice, 2 March Piraeus Port Authority, SA Yiannis Papagiannopoulos, PE, CCNP, MCSE, PE e-porting / Director
International Conference Venice, 2 March 2012 Piraeus Port Authority, SA Yiannis Papagiannopoulos, PE, CCNP, MCSE, PE e-porting / Director The reason for Port & supply chain security The terror attacks
More informationBrexit smoothing the transition for EU parcels and supply chain operators
Prime Vision B.V. Olof Palmestraat 10 2616 LR Delft The Netherlands Tel + 31 (0) 15 219 2090 info@primevision.com www.primevision.com Brexit smoothing the transition for EU parcels and supply chain operators
More informationMEASURES TO PREVENT UNLAWFUL ACTS AGAINST PASSENGERS AND CREWS ON BOARD SHIPS ***
INTERNATIONAL MARITIME ORGANIZATION 4 ALBERT EMBANKMENT LONDON SE1 7SR Telephone: 020-7735 7611 Fax: 020-7587 3210 Telex: 23588 IMOLDN G IMO E Ref. T1/13.01 MSC/Circ.443 26 September 1986 MEASURES TO PREVENT
More informationRFID Interoperability Working Group
RFID Interoperability Working Group 2012 ITS Canada Annual Meeting Quebec City, Quebec June 12, 2012 Pierre Bolduc, Transport Canada ITS Office Thomas Kwan, Transport Canada Pacific Region CONTACT Pierre
More informationOCTOPUS THE NEXT GENERATION OF COMMAND AND CONTROL Summary
OCTOPUS THE NEXT GENERATION OF COMMAND AND CONTROL Summary OCTOPUS is a new and innovative Physical Security Information Management system (PSIM), which combines a comprehensive security management software
More informationAAPA. Terminal and Container Cargo Security. Mark Tierney Senior Director Security and Compliance Maersk Inc
AAPA Terminal and Container Cargo Security Mark Tierney Senior Director Security and Compliance Maersk Inc A.P. Moller is committed to show constant care and to prevent breaches of security associated
More informationABSTACT 2016 GENERAL SECURITY GUIDELINES AND OPERATIONAL PROCEDURES
ABSTACT 2016 GENERAL SECURITY GUIDELINES AND OPERATIONAL PROCEDURES www.alpiworld.com PHISYCAL SECURITY AND ACCESS CONTROL 1. Physical Security The premises, in which goods are deposited, kept and handled
More informationCompany Security Officer. Day 1
0900 1000 Introduction and Enrolment Company Security Officer Day 1 1000 1100 History of Maritime Security and current threat Introduction to ISPS Code, Introduction to terrorism and the impact on ports
More informationRail Carrier Minimum-Security Criteria
Rail Carrier Minimum-Security Criteria (08/28/2006) Rail carriers must conduct a comprehensive assessment of their security practices based upon the following C-TPAT minimum-security criteria. Recognizing
More informationOIL & GAS INFRASTRUCTURES PROTECTION
OIL & GAS INFRASTRUCTURES PROTECTION OIL & GAS INFRASTRUCTURES PROTECTION Leonardo s Critical Infrastructure capabilities deliver surveillance and security systems to the Oil & Gas upstream, midstream
More informationChina/Hong Kong - EU Smart and secure trade lanes (SSTL) project
China/Hong Kong - EU Smart and secure trade lanes (SSTL) project What s in it for participating companies? Summary The SSTL project, the first and so far only viability test of the potential of the WCO
More informationTrade Logistics and Facilitation
Trade Logistics and Facilitation Customs and Border Management: New insights on an old problem Gerard McLinden International Trade Department Typical perspectives My goods were stuck in Customs for 3 weeks
More informationJohn F. Fevelo Chief Operating Officer. Metro One Loss Prevention Service Group, Inc. 900 South Ave. Staten Island, N.Y
John F. Fevelo Chief Operating Officer Metro One Loss Prevention Services Group, Inc. 900 South Ave. Staten Island, N.Y. 10314 718-370-6778 Speech Outline Delivered to the Transportation and Logistics
More informationSecurity Procedure - Participation / Certification in Foreign Customs Administrations Supply Chain Security Programs
Customs-Trade Partnership Against Terrorism (C-TPAT) Minimum-Security Criteria Importers Importers must conduct a comprehensive assessment of their international supply chains, based upon the following
More informationVisibility that s Visionary: How Advanced Technologies are Transforming Capabilities in the plant and the warehouse
Visibility that s Visionary: How Advanced Technologies are Transforming Capabilities in the plant and the warehouse Presented by: Mark Wheeler PRESENTATION TITLE 2017 MHI Copyright claimed for audiovisual
More informationRE: Docket No. USTR Comments on the Transatlantic Trade and Investment Partnership
Submitted electronically to http://www.regulations.gov May 8, 2013 David Weiner, Deputy Assistant USTR for Europe U.S. Trade Representative RE: Docket No. USTR 2013 0019 Comments on the Transatlantic Trade
More information23.7 billion billion CHALLENGES AND OPPORTUNITIES ENHANCING SECURITY AND CONNECTIVITY WITH DIGITAL TRANSFORMATION
MARITIME DRIVING DIGITAL INNOVATION FOR FUTURE GROWTH Enhancing Security and Connectivity 24 Ang Mo Kio Street 65, Singapore 569061 mktg.elect@stengg.com www.stengg.com CHALLENGES AND OPPORTUNITIES ENHANCING
More informationLuca Abatello, CEO, Circle. Extended smart ports and international fast trade lane: challenges and concrete experiences
Luca Abatello, CEO, Circle Extended smart ports and international fast trade lane: challenges and concrete experiences The Ports of the Future; Digitalisation & Fast Trade Lane; Internet of Things & Blockchain;
More informationSupply Chain Security Management Systems The ISO Link
Supply Chain Security Management Systems The ISO 28000 Link Topics Security threats, risks and vulnerabilities Impact on Business Initiatives in the Region. ISO 28000 Family of Standards Who s got ISO28000
More informationCURRENT SECURITY ENVIRONMENT
Border Crossings Muhammad Anwar, CMILT Chief Executive Custom Syndicate (International Logistics Solutions Providers) Lahore-Pakistan www.customsyndicate.com OBJECTIVES To provide a better understanding
More informationSICK Airport Innovations. Sensors and solutions
SICK Airport Innovations Sensors and solutions THIS IS SICK Airport innovations The most important processes at an airport take place on the ground. Numerous logistics processes at the airport run smoothly
More informationEuropean Union Customs approach towards the use of modern technologies
European Union Customs approach towards the use of modern technologies Wil van Heeswijk Directorate General for Taxation and Customs Union Risk management and Security unit 1 My topics for today 1. 1.
More informationComments in Response to Customs and Border Protection s Request for Information Regarding Smart and Secure Containers.
Comments in Response to Customs and Border Protection s Request for Information Regarding Smart and Secure Containers I. Introduction February 17, 2004 The World Shipping Council hereby submits the following
More informationSecurity Management. How do we implement the Regulations? Marc Volders - MAY 31, 2006
Security Management How do we implement the Regulations? Marc Volders - MAY 31, 2006 Theme Security in the supply chain How do we as a logistics service provider need to prepare ourselves as well as our
More informationdrone detection and neutralization system
drone detection and neutralization system Response to growing market needs Demand for non-military counter-drone systems is driven by: the sudden growth of the unregulated drone market is causing more
More informationCargo Security: The Calm Before the Storm --
Cargo Security: The Calm Before the Storm -- Productivity, Regulation & Technology Transportation Research Forum Annual Meeting Transportation Security Plenary Session March 7, 2005 Michael Wolfe noriver@att.net
More informationSEAL INTEGRITY PROGRAMME APPENDIX TO ANNEX I FRAMEWORK OF STANDARDS TO SECURE AND FACILITATE GLOBAL TRADE
SEAL INTEGRITY PROGRAMME APPENDIX TO ANNEX I FRAMEWORK OF STANDARDS TO SECURE AND FACILITATE GLOBAL TRADE APPENDIX TO ANNEX 1 SEAL INTEGRITY PROGRAMME FOR SECURE CONTAINER SHIPMENTS INTRODUCTION Importance
More informationPort Community System Singapore Experience
Port Community System Singapore Experience AGENDA Singapore Need for Efficient Trade Facilitation Port Community System An Overview Single Window System - Introduction Challenges, Benefits & Lessons Learned
More informationCBP Daily Operations
Our Mission Detect and prevent terrorists and terrorist weapons from entering the United States, while facilitating the orderly and efficient flow of legitimate trade and people at and through our Nation
More informationSensor networks: Opportunities and Challenges Report from Session 3 Transportation
What are the benefits? What are the drivers and obstacles? Readiness What are the needs of society and customers? Strong efficiency gains for supply-side (infrastructure providers and transport services)
More informationCorporate Plan SUMMARY
Corporate Plan SUMMARY 2007-2009 Table of Contents 1.0 INTRODUCTION 3 Scope and Funtions of the Authority 5 2.0 GUIDING PRINCIPLES FOR OUR BUSINESS 6 3.0 GOALS, OBJECTIVES AND STRATEGIES 7 Key Result Areas:
More informationAUTOMATE YOUR SUPPLY CHAIN WITH MOBILE DATA COLLECTION SOFTWARE
RFgen Mobile Foundations for Oracle E-Business Suite AUTOMATE YOUR SUPPLY CHAIN WITH MOBILE DATA COLLECTION SOFTWARE REDUCE COST MAXIMIZE PRODUCTIVITY IMPROVE ACCURACY INCREASE EFFICIENCY SUPPLY CHAIN
More informationAEO program. (Authorized Economic Operator) Customs & Tariff Bureau Ministry of Finance, Japan
AEO program (Authorized Economic Operator) Customs & Tariff Bureau Ministry of Finance, Japan International background The global trading system is vulnerable to terrorist exploitation while the international
More informationAEO. (Authorized Economic Operator) Challenges of Japan Customs. Customs & Tariff Bureau, Ministry of Finance, Japan
AEO (Authorized Economic Operator) Challenges of Japan Customs Customs & Tariff Bureau, Ministry of Finance, Japan International background The global trading system is vulnerable to terrorist exploitation
More informationA Message for Brokers Letter And Security Guidelines for Brokers
A Message for Brokers Letter And Security Guidelines for Brokers Kingchem LLC is a participant in the Customs-Trade Partnership Against Terrorism (C-TPAT). C-TPAT is a voluntary joint government-business
More informationVeien mot det autonome skip
Veien mot det autonome skip Jann Peter Strand Product Manager Automation & Control Rolls-Royce Marine AS Board Member Norwegian Forum for Autonomous Ships (NFAS) The information in this document is the
More informationSMART FLEET MANAGEMENT
SMART FLEET MANAGEMENT UPGRADE TO A SAFER, SMARTER AND A MORE CONNECTED FLEET EXPERIENCE LIVE TRACKING Real-time tracking (refreshed every 2 to 20 seconds, based on curves and turns) with live speed, journey
More informationGerard McLinden Kees Van Der Meer World Bank
Lao PDR Trade Development Facility Risk Management Workshop 28 January 2011 Gerard McLinden Kees Van Der Meer Overview Context Aims of border management Di Drivers for change A changing paradigm International
More informationRFid based Toll Collection System
For more Project details visit: http://www.projectsof8051.com/rfid-based-highway-toll-tax-collection-system/ Code Project Title 1515 RFid Based Highway Toll Tax Collection System Synopsis for RFid based
More information100 Percent Screening of Cargo Containers (Session 3A: Security II)
100 Percent Screening of Cargo Containers (Session 3A: Security II) MTS R&T Coordination Conference November 16-17, 17, 2004 Washington, D.C. Victor J. Orphan Science Applications International Corporation
More informationCURE FOR THE COUNTERFEITING PANDEMIC IN THE AUTOMOTIVE INDUSTRY
RFID IOT NFC Confidex and Sasken proudly present the Dynamic Parts Authentication TM CURE FOR THE COUNTERFEITING PANDEMIC IN THE AUTOMOTIVE INDUSTRY JUNE 2017 INTRODUCTION Apparel, accessories, music,
More informationVEHICLE REGISTRATION & TRACKING
VEHICLE REGISTRATION & TRACKING Vehicle Ownership & Road Safety Management WHITE PAPER www.muehlbauer.de 1 Requirements... 3 Need for Tracking... 3 Benefits... 3 2 Key Elements... 4 Vehicle Registration...
More informationHanane BECHA, PhD in Computer Science
Hanane BECHA, PhD in Computer Science h.becha@traxens.com Smart Containers for better Borders Management WCO IT 2018 Conference & Exhibition 6-8 June, Lima, Peru 2 Roles: 1- Innovation & Standards Senior
More informationSecurity Model. Jointly implement a security model within each segment of the supply chain Production Transportation Importation Distribution
C-TPAT Membership Importers Brokers / Forwarders / Consolidators Carriers (Air, Sea, Rail, Truck) Port Authorities / Terminal Operators Foreign Manufacturers (Mexico and Canada) WHAT REALLY HAPPENS Security
More informationCONNECTED LOGISTICS. Denis SENPERE Inspirage Europe Vejle, October 2 nd Inspirage / Oracle All rights reserved. Courtesy Alstom / Amtrak
CONNECTED LOGISTICS Denis SENPERE Inspirage Europe Vejle, October 2 nd 2018 1 1 2017 Inspirage / Oracle All rights reserved 1 2017 Inspirage / ICP Solution / Oracle All rights reserved Courtesy Alstom
More informationAUTOMATE YOUR SUPPLY CHAIN WITH MOBILE DATA COLLECTION SOFTWARE
RFgen Mobile Foundations for Oracle E-Business Suite AUTOMATE YOUR SUPPLY CHAIN WITH MOBILE DATA COLLECTION SOFTWARE REDUCE COST MAXIMIZE PRODUCTIVITY IMPROVE ACCURACY INCREASE EFFICIENCY SUPPLY CHAIN
More informationTCO INVOLVEMENT IN NON-DRUG CRIME
UNCLASSIFIED//FOUO OF TCO INVOLVEMENT IN NON-DRUG CRIME Group Members: Eliasz Krawczuk Crumpton Group, LLC Emily Woodard Fiat Chrysler Automobiles Erin M. DHS Kevin P. DHS Mariko Kawaguchi Element Case,
More informationMARITIME SECURITY CURRENT STATUS (ISO/TC8) ANSI HOMELAND SECURITY STANDARDS PANEL 9 th Annual Plenary Meeting Arlington, VIRGINIA /10
MARITIME SECURITY CURRENT STATUS (ISO/TC8) ANSI HOMELAND SECURITY STANDARDS PANEL 9 th Annual Plenary Meeting Arlington, VIRGINIA 2010-11-09/10 CAPT. CHARLES H. PIERSALL Chairman, ISO/TC8 Ships & Marine
More informationChapter 16. using math in sales. Section 16.1 Sales Transactions. Section 16.2 Cash Registers. Section 16.3 Purchasing, Invoicing, and Shipping
Chapter 16 using math in sales Section 16.1 Sales Transactions Section 16.2 Cash Registers Section 16.3 Purchasing, Invoicing, and Shipping Section 16.1 Sales Transactions PREDICT What kinds of math does
More informationTerms of Reference. Purchase of aerial surveillance service for the EU external land borders
Annex II Terms of Reference Purchase of aerial surveillance service for the EU external land borders Ref. No: Frontex/ Purchase of aerial border surveillance service aircraft equipped with multi-intelligence
More informationRC & TACKLING TRADE BASED MONEY LAUNDERING (TBML) risk compliance RISK & COMPLIANCE MAGAZINE. risk & compliance REPRINTED FROM: APR-JUN 2018 ISSUE
R E P R I N T RC & risk compliance & TACKLING TRADE BASED MON LAUNDERING (TBML) REPRINTED FROM: RISK & COMPLIANCE MAGAZINE APR-JUN 2018 ISSUE RC & risk & compliance Visit the website to request a free
More informationWCO ICT Conference Developing IT Project Proposals A Strategic Perspective
WCO ICT Conference Developing IT Project Proposals A Strategic Perspective June 2016 E X P E R I E N C E I N N O V A T I O N D E L I V E R Y 2 Challenges Shaping Customs Context SERVICE LEVELS INCREASING
More informationC-TPAT Security Standards. Importers
C-TPAT Security Standards Importers Importers must conduct a comprehensive self-assessment of their international supply chains based upon the following C-TPAT security standards. Appropriate security
More informationInternet of Things (IoT) Applications at Hong Kong International Airport
Internet of Things (IoT) Applications at Hong Kong International Airport Ir Alex Kwan, Executive Director Engineering and Technology, HK Airport Authority Smart Airport Vision Primary Goals are better
More informationPakistan Supply Chain Security (PSCS) Code
Pakistan Supply Chain Security (PSCS) Code 1.0 Introduction Following September 11, 2001 incident, the attention of international community has been focused on security. Supply chain is considered one
More informationC-TPAT Minimum Security Requirements Importers
Customs and Border Protection, U.S. Department of Homeland Security C-TPAT Minimum Security Requirements Importers Released March, 2005 Prepared by Prep4Audit, LLC Version 2: August, 2014 www.prep4audit.com
More informationRFID in Containerization
RFID in Containerization Panagiotis S. Tsilingiris * Harilaos N. Psaraftis^ DimitriosV. Lyridis^ * Department of Management Science & Engineering, Stanford University ^Laboratory for Maritime Transport,National
More informationSingapore Customs Secure Trade Partnership. Supply Chain Security
Singapore Customs Secure Trade Partnership Supply Chain Security Globalization and free trade will continue to be the impetus for the phenomenal growth in cargo containers transshipment that constitutes
More informationNorth America s SuperCorridor Coalition, Inc. Tri-national, non-profit, multi-modal trade and transportation coalition for the efficient and secure
North America s SuperCorridor Coalition, Inc. Tri-national, non-profit, multi-modal trade and transportation coalition for the efficient and secure movement of freight NASCO s Mission & Purpose Mission:
More information