Security platforms for logistics operations in MED ports

Size: px
Start display at page:

Download "Security platforms for logistics operations in MED ports"

Transcription

1 Security platforms for logistics operations in MED ports Theodoros Theodoropoulos (SEAbility Ltd) 3rd Inte-Transit Training 19 November 2014, Valencia, Spain

2 Overview Introduction-Legal framework Port related vulnerabilities and threats Counter measures and technologies Wrap-up and conclusions

3 Introduction Ports are critical to world wide trade Historically they have not been subject to comprehensive governmental regulation This has changed after 09/11, vessel attacks, piracy Global security frameworks International Ships and Ports Security (ISPS Code) Code of practice on security in ports Training wokshop, Valencia-19/11/2014

4 Introduction Overall EU legislation

5 Introduction Regulation 725/2004 Enhancing Ship and Port Facility Security Requires Ship and Port Facility Security Plans Extends the application of the ISPS Code to the ships engaged in national routes within EU Covers the area where ship/port interface takes place

6 Introduction Directive 65/2005 focuses on the rest port area (not covered by ISPS). The designation of the port area is responsibility of the member-state ( what is a port? ) Establishes the Port Security Plan (necessary procedures and actions to be undertaken) Establishes the Port Security Officer. A national Port Security Authority monitors the implementation

7 Introduction Set up a Common European secure Custom System Tighten security measures in the EU trade Requires advanced information for cargoes entering or leaving EU (similar to the 24 hour rule of USA) Introduces the Authorized Economic Operator (AEO) status Aims at enhancing the supply chain security (similar to the Green Lane Award of USA) Customs are transforming to security inspectors.

8 Introduction Implementation considerations Time sensitivity. Production has moved to just-in-time processes, with manufacturers relying on steady shipments of inputs. Public and private involvement in having the other carry the burden of financing or even planning security efforts.

9 Overview Introduction Port related vulnerabilities and threats Counter measures and technologies Wrap-up and conclusions

10 Introduction Port related vulnerabilities and threats Terrorism use of force or violence, against persons and places (such as ports) to intimidate and/or coerce a government, its citizens, or any segment thereof for political or social goals Weapons of mass destruction Misuse of containers to either transport weapons or substances required to construct them

11 Introduction Port related vulnerabilities and threats Criminality Drug dealing Contraband smuggling Cargo theft Money laundering Commercial Conspiracies Undervaluation, double invoicing, or false description of merchandise imported into the country Importation, transportation, and distribution of counterfeit goods subject to trade and copyright

12 Introduction Port related vulnerabilities and threats Other Economic espionage... Etc

13 Introduction Port related vulnerabilities and threats Risk assessment procedure

14 Introduction Port related vulnerabilities and threats Typical organizational constraints Access: Security measures may restrict use of the facility, which could affect the organization s maximization of its productivity. Commerce: Security measures may entail direct and indirect costs associated with the business function. For example, costs associated with the procurement of access credentials may be factored into end user costs.

15 Introduction Port related vulnerabilities and threats Typical organizational constraints Environment: Security measures may require that more capital resources be devoted to security versus commercial use. Thus, a facility may have to incorporate staging areas, screening points, buffer zones, and/or protected zones into the physical plant.

16 Introduction Port related vulnerabilities and threats Tools for vulnerability neutralization Access control Cargo screening and scanning Terminal vehicle and equipment tracking Intelligence

17 Overview Introduction Port related vulnerabilities and threats Counter measures and technologies Wrap-up and conclusions

18 Overall framework

19 Access control Surveillance based on CCTV cameras Intelligent video surveillance systems

20 Access control Aviation has adopted Face Recognition as the official biometrics standard Advantages Touch free, non intrusive technology Tolerance to environmental and workspace parameters Re-use of existing infrastructure. (CCTV cameras etc..)

21 Access control Disadvantages Operates better in a controlled environment

22 Access control 2D face recognition based a network based model 3D model can be constructed from the 2D model 2D-to-3D model generation technologies for enhancing 2D systems via pose normalization as well as gallery enhancement

23 Access control Lower false accept and false reject rates. Gallery enhancement Pose neutralization

24 Access control Eye and Iris sensor for Human identification human iris has extremely data-rich physical structures that are unique to eachhuman being discrimination possible even between genetic twins Unobtrusive use without physical contact

25 Access control Segmentation: defines the most suitable, usable area of the Iris, removes eyelids, deep shadow, and specular reflection Iris data stored or correlated to external data.

26 Access control Disadvantages Further research required in uncontrolled environments Motion blur causes difficulties in iris segmentation and feature extraction Interoperability between various encoding techniques

27 Counter measures and technologies : Access control Optical character recognition (OCR) Create text from image Process Segmentation: Given input image, identify individual characters Feature Extraction: From each glyph image, extract features. Classification: Classify character according to the features

28 Access control Mature technology (Assessed within Inte-Transit)

29 Access control Radio Frequency identification Already used in other domains such as e-passport, smart payments Standardized domain

30 Access control RFID is entering mobile devices Via Near Field Communications The android platform currently supports the following modes Reader/writer mode, allowing the NFC device to read and/or write passive NFC tags and stickers. P2P mode, allowing the NFC device to exchange data with other NFC peers; this operation mode is used by Android Beam. Card emulation mode, allowing the NFC device itself to act as an NFC card. The emulated NFC card can then be accessed by an external NFC reader, such as an NFC point-of-sale terminal.

31 Access control Possible application domains in the port domain Driver identification Dynamic grant of access rights through the mobile interface...

32 Access control Other Fence Vibration Sensors for intruder detection TripWires for intruder detection...

33 Access control Tracking and positioning of intra terminal equipment and vehicles GNSS enabled solutions enable meter accuracy (DGPS, low cost RTK) Solutions assessed within Inte-Transit

34 Access control (water front identification) Sea-surface targets small boats ships Sub-surface targets Divers Submersibles Combination of radar, sonar, microwave, thermal cameras

35 Access control (water front coms) Automatic Identification System (AIS) Automatically identifies & locates vessels Supplements marine radar for collision avoidance

36 Scanning Non obstructive Scanning for : Chemical, biological, radioactive, nuclear substances

37 Scanning Technologies

38 Scanning

39 Scanning

40 Counter measures and technologies: Scanning and identifying Integrated RFID-scanning in order to optimize Security Minimize impact on flow of goods

41 Intelligence In general many implementations available such as ASYCUDA, TATIS, TIMS, SOFIX Microclear, PC Clear, IBM Customs Agency Solutions and Oracle Customs, Framework Common aspects of these platforms Cargo control to monitor all movements of imported, exported and transit goods and ensure that all goods are duly cleared before release. Declaration processing to capture and process data for the assessment and collection of relevant duties and taxes.

42 Intelligence Payments and accounting to register and account for payments by importers and exporters. Risk management the targeting and selection of those consignments representing a high risk including consignments that may conceal goods seeking to evade duty and tax, illegal drugs or material for terrorism. Statistics and reporting the extraction of data for other government agencies including for the dissemination of foreign trade statistics and to generate management reports as required by Customs.

43 Customs Intelligence An efficient and effective Communications Gateway to provide legitimate access to Customs processing systems by traders and other government agencies. Intelligence and enforcement to store and exchange data for risk profiling, compliance and enforcement activity.

44 Counter measures and technologies: Customs Intelligence Current steps Development of systems that can be integrated with those in the private sector (e-customs. Example unattended custom control Valencia).

45 Customs Intelligence Future steps International e-collaboration of customs E-Borders uniform adoption or adaptation of policies and legal frameworks that will enable and recognize the interoperable use of the relevant system in both national and international respects

46 Conclusions Regulatory framework for ports defines requirements for a security platform Risk assessment can define what kind of measures are required Many technological frameworks exist some are more mature for deployment others require more research Security should not reduce competitiveness

47 Thank You

Secure container transport: challenges & barriers in the complete stakeholder chain

Secure container transport: challenges & barriers in the complete stakeholder chain Secure container transport: challenges & barriers in the complete stakeholder chain Theodoros Theodoropoulos (SEAbility Ltd) 1 st Training Workshop 19 November 2014, Valencia, Spain Overview Introduction

More information

Outline. Motivation. Maritime Security Gaps and Vulnerabilities. Maritime Security Gaps and. Motivation

Outline. Motivation. Maritime Security Gaps and Vulnerabilities. Maritime Security Gaps and. Motivation Outline Motivation Maritime Security Gaps and Vulnerabilities Technologies for Maritime Security Technology Application Summary Risk Analysis Conclusion Contact Information 2 International Ship and Port

More information

Utmaningar och transportskydd i framtida transportsystem. Sören Jägerhök och Åsa Waern

Utmaningar och transportskydd i framtida transportsystem. Sören Jägerhök och Åsa Waern Utmaningar och transportskydd i framtida transportsystem Sören Jägerhök och Åsa Waern Supply Chain Security Supply chain security refers to efforts to enhance the security of the supply chain, the transport

More information

Security of the supply chain Specific focus on air transportation. Interest of industrial platforms

Security of the supply chain Specific focus on air transportation. Interest of industrial platforms Security of the supply chain Specific focus on air transportation Interest of industrial platforms November 9 th, 2006 Presentation to the EURITRACK workshop Page 1 Cargo Flows & process (Stakeholders)

More information

3.5 Advanced Inspection Technologies (AIT)

3.5 Advanced Inspection Technologies (AIT) 3.5 Advanced Inspection Technologies (AIT) Before inspection technologies can be further discussed, a baseline definition must be established for the three types of inspections that are commonly used when

More information

SUPPLY CHAIN SECURITY

SUPPLY CHAIN SECURITY SUPPLY CHAIN SECURITY An Introduction to the Supply Chain Security Guide of The World Bank Marc H. Juhel Sector Manager, Transport The World Bank November 2009 World Bank Supply Security Guide 2009 1 Introduction

More information

Jens Froese Technische Universität Hamburg-Harburg. Harburg. Bangkok 27 th October Container Security TUHH TUHH. Maritime Logistics

Jens Froese Technische Universität Hamburg-Harburg. Harburg. Bangkok 27 th October Container Security TUHH TUHH. Maritime Logistics Jens Froese Technische Universität Hamburg-Harburg Harburg Bangkok 1 Shipping Threats 2 Shipping Threats Challenges to container security include attacks to truck drivers illegal immigration illegal transport

More information

What Future for 100% scanning WCO Third party views Part 2. Brussels, June 11th Andrew Yell - Pierre Harris

What Future for 100% scanning WCO Third party views Part 2. Brussels, June 11th Andrew Yell - Pierre Harris Questions were 1. Will service providers ready to supply expertise? 2. Is capacity building and utilization know-how on track with the technology? 3. Can timing work in synch with operator s need? What

More information

"SAFETY IN THE SEA PORTS

SAFETY IN THE SEA PORTS "SAFETY IN THE SEA PORTS Paper prepared for 22 nd Engineers International Conference At Intercontinental Hotel, Nairobi, Kenya. From 13 th - 15 TH May, 2015. MS. MARYAM MOHAMED KIDERE KENYA PORTS AUTHORITY

More information

Effective Cargo and Vehicle Inspection and Enhanced. Border Security: Mexico SAT Accelerated Cargo Inspection Initiative.

Effective Cargo and Vehicle Inspection and Enhanced. Border Security: Mexico SAT Accelerated Cargo Inspection Initiative. Effective Cargo and Vehicle Inspection and Enhanced An OSI Systems Company Border Security: Mexico SAT Accelerated Cargo Inspection Initiative An initiative by Mexico s tax administration service, Servicio

More information

Po r t. S e c u r i t y. Security Challenges in the Ports,,

Po r t. S e c u r i t y. Security Challenges in the Ports,, Po r t S e c u r i t y Security Challenges in the Ports,, Background 2 Background 3 Background 4 Background 5 Background 6 A new type of terrorism, aiming to destabilize the global economy, with long term

More information

Introduction to Homeland Security

Introduction to Homeland Security Introduction to Homeland Security Chapter 5 Safety & Security: Borders and Transportation Border Control The borders of any country are strategically important because of the critical role they play in

More information

Air Cargo & Air Supply Chain Security : Perspective From Integrators

Air Cargo & Air Supply Chain Security : Perspective From Integrators Air Cargo & Air Supply Chain Security : Perspective From Integrators Introduction The September 11 terrorist attacks in the US in 2001 has changed the whole concept of Aviation Security and has affected

More information

Session 3: TRADE FACILITATION AGREEMENTS AND e-commerce. Pashupati N. Pandey World Customs Organization

Session 3: TRADE FACILITATION AGREEMENTS AND e-commerce. Pashupati N. Pandey World Customs Organization Session 3: TRADE FACILITATION AGREEMENTS AND e-commerce - Managing Data from e-commerce Industry for goods clearance at the border Pashupati N. Pandey World Customs Organization e-mail: pn.pandey@wcoomd.org

More information

Best practices of digital technology application in transport facilitation and logistics

Best practices of digital technology application in transport facilitation and logistics 교통물류연구사업중간평가 2016.05.19 Regional Conference for Logistics Service Providers Best practices of digital technology application in transport facilitation and logistics Busan, ROK, 21. June. 2018. Kerri Ahn

More information

Discussion Paper presented at: UNECE-OSCE Roundtable on Inland Transport Security, Vienna, Austria,

Discussion Paper presented at: UNECE-OSCE Roundtable on Inland Transport Security, Vienna, Austria, Customs Perspectives on Detection of Deliberate Regulatory Violations in Global Supply Chains - the Role of Information and Data in Risk Identification Discussion Paper presented at: UNECE-OSCE Roundtable

More information

Xerox Supplier Security Requirements

Xerox Supplier Security Requirements Xerox Supplier Security Requirements Suppliers who are involved in the manufacture, storage, and transportation of Xerox products ( Suppliers ) for Xerox Corporation and / or its subsidiaries under Xerox

More information

Module Descriptions Computer-Based Training (CBT) Programme

Module Descriptions Computer-Based Training (CBT) Programme Module Descriptions Computer-Based Training (CBT) Programme MODULE NUMBER NAME DESCRIPTION 1 GENERAL COURSES This category includes general modules. These modules are meant for all students. Please note

More information

Realizing the Vision of e-port: Automatic Gates and Its Related Subsystems at the Bangkok Port

Realizing the Vision of e-port: Automatic Gates and Its Related Subsystems at the Bangkok Port Realizing the Vision of e-port: Automatic Gates and Its Related Subsystems at the Bangkok Port Mr.Som chansuthirangkool Project Director, e-port Program Port Authority of Thailand Som_c@port.co.th Objectives

More information

CBTC(Customs Border Targeting Center) Korea Customs Service

CBTC(Customs Border Targeting Center) Korea Customs Service CBTC(Customs Border Targeting Center) Korea Customs Service RISK If there is a risk of something unpleasant, there is a possibility that it will happen Risk = Threat +Vulnerabilities +Consequence

More information

Maritime and inland waterways co-operation in the OSCE area: Increasing security and protecting the environment. Part 2 / Prague, May 2008

Maritime and inland waterways co-operation in the OSCE area: Increasing security and protecting the environment. Part 2 / Prague, May 2008 Organization for Security and Co-operation in Europe Secretariat EEF.NGO/7/08 19 May 2008 ENGLISH only Conference Services The 16 th Meeting of the OSCE Economic and Environmental Forum Maritime and inland

More information

Customs and the use of technology to secure global supply chain

Customs and the use of technology to secure global supply chain Customs and the use of technology to secure global supply chain European Commission Directorate General for Wil van Heeswijk Unit B2 Risk management and Security 1 Facts & Figures 119.000 control officers

More information

Additional Information for Port of Durban

Additional Information for Port of Durban Additional Information for Port of Durban PERFORMANCE FOR YEAR: Vessels calls 4,545 Activity of the port MT s 73,074,436 Bulk Cargo Handles MT s 33,719,039 Containers Handled TEU s 2,334,999 Current yearly

More information

Customs Trade Partnership Against Terrorism An Introduction

Customs Trade Partnership Against Terrorism An Introduction Customs Trade Partnership Against Terrorism An Introduction WHO WE ARE Securing the Borders of the United States while simultaneously facilitating the flow of legitimate trade & travel It s a challenging

More information

Foreign Manufacturer Eligibility Requirements

Foreign Manufacturer Eligibility Requirements Foreign Manufacturer Eligibility Requirements (04/07/2008) To be eligible for C-TPAT, the Foreign Manufacturer must meet the following eligibility requirements: 1. Be an active Manufacturer incorporated

More information

The port as an enabler of the smart grid. Theodoros Theodoropoulos (SEAbility Ltd) Inte-Transit Training 19 November 2014, Valencia, Spain

The port as an enabler of the smart grid. Theodoros Theodoropoulos (SEAbility Ltd) Inte-Transit Training 19 November 2014, Valencia, Spain The port as an enabler of the smart grid Theodoros Theodoropoulos (SEAbility Ltd) Inte-Transit Training 19 November 2014, Valencia, Spain Overview Introduction Smart grid The port as a smart grid enabler

More information

Maritime Security in Logistics From Japanese Shippers point of View

Maritime Security in Logistics From Japanese Shippers point of View Maritime Security in Logistics From Japanese Shippers point of View Koji Hashimoto JMC (Japan Machinery Center for Trade and Investment) September 29 th, 2011 1 Production Network (A representative case

More information

Minimum-Security Criteria for C-TPAT Foreign Manufacturers

Minimum-Security Criteria for C-TPAT Foreign Manufacturers Minimum-Security Criteria for C-TPAT Foreign Manufacturers These minimum security criteria are fundamentally designed to be the building blocks for foreign manufacturers to institute effective security

More information

GUIDELINES FOR STRENGTHENING CONTROL OF CONTAINERS

GUIDELINES FOR STRENGTHENING CONTROL OF CONTAINERS INTER-AMERICAN DRUG ABUSE CONTROL COMMISSION CICAD Secretariat for Multidimensional Security GUIDELINES FOR STRENGTHENING CONTROL OF CONTAINERS Viña del Mar, Chile I. Introduction The international maritime

More information

ISPS CODE: NAVIGATION AND PORT SAFETY

ISPS CODE: NAVIGATION AND PORT SAFETY ISPS CODE: NAVIGATION AND PORT SAFETY PROTECTION - CONTROL- IDENTIFICATION TRACKING 02 ISPS CODE: NAVIGATION AND PORT SAFETY Ports, often located near cities, assume an essential role in the logistic transport

More information

Identity Management. ID management for people and objects

Identity Management. ID management for people and objects Identity Management ID management for people and objects System accessible assigned tokens Token means something you have. This is separate from something you know or you are. Things you carry and perform

More information

AUTOMATION OF TERMINALS AND EQUIPMENT

AUTOMATION OF TERMINALS AND EQUIPMENT AUTOMATION OF TERMINALS AND EQUIPMENT AUTOMATION OF TERMINALS AND EQUIPMENT The Maritime Industry is currently undergoing a number of changes which focuses on digitalization and autonomation with the objective

More information

Security & Defense Solutions

Security & Defense Solutions intelligent convergence TM Security & Defense Solutions Intelligent Convergence with Augusta Systems EdgeFrontier White Paper The Need for Intelligent Convergence The distributed and evolving nature of

More information

ELECTRONIC TOLL COLLECTION (ETC) AT NATIONAL HIGHWAYS TOLL PLAZAS

ELECTRONIC TOLL COLLECTION (ETC) AT NATIONAL HIGHWAYS TOLL PLAZAS ELECTRONIC TOLL COLLECTION (ETC) AT NATIONAL HIGHWAYS TOLL PLAZAS Management of User Fee Presently, Toll(User Fee) is being collected at the Toll Plazas of BOT (Toll), BOT (Annuity) and Public funded projects

More information

C2 ADVANCED MULTI-DOMAIN ENVIRONMENT AND LIVE OBSERVATION TECHNOLOGIES

C2 ADVANCED MULTI-DOMAIN ENVIRONMENT AND LIVE OBSERVATION TECHNOLOGIES C2 ADVANCED MULTI-DOMAIN ENVIRONMENT AND LIVE OBSERVATION TECHNOLOGIES FLYSEC Final Info Day and Risk-Based Security Projects Cluster meeting 28/06/2018 1 OVERVIEW 2 Source: FRONTEX THE PROBLEM IRREGULAR

More information

Video Analytics. Operational, Marketing and Security Insights from CCTV

Video Analytics. Operational, Marketing and Security Insights from CCTV Video Analytics Operational, Marketing and Security Insights from CCTV Organizations now have an opportunity to increase the returns they receive from their existing video surveillance infrastructures.

More information

Maritime Satellite Security Services

Maritime Satellite Security Services ARATOS HOMELAND SECURITY Maritime Satellite Security Services Maritime Security Importance Maritime Security becomes more important in the ever-changing global market thus: The protection of Life Ship

More information

By Dimitrios Tsamboulas National Technical University of Athens (NTUA)

By Dimitrios Tsamboulas National Technical University of Athens (NTUA) Inland Transport Security Discussion Forum OSCE-UNECE Roundtable 13 December 2011, Vienna, Austria By Dimitrios Tsamboulas National Technical University of Athens (NTUA) Timely and important topic Growing

More information

What Does the MTS Mean to Me?

What Does the MTS Mean to Me? What Does the MTS Mean to Me? The MTS helps our economy to grow, strengthens our national defense and provides a higher standard of living for all Americans. The MTS facilitates our bulk exports and imports

More information

Computer Vision Technologies and Markets

Computer Vision Technologies and Markets Computer Vision Technologies and Markets Hardware and Software for Automotive, Sports & Entertainment, Consumer, Robotics & Machine Vision, Security & Surveillance, Agriculture, Retail, and Medical Applications:

More information

COASTAL AREAS & MARITIME APPROACHES: DRUG THREAT/ VULNERABILITY RISK SELF-ASSESSMENT CHECKLIST

COASTAL AREAS & MARITIME APPROACHES: DRUG THREAT/ VULNERABILITY RISK SELF-ASSESSMENT CHECKLIST COASTAL AREAS & MARITIME APPROACHES: DRUG THREAT/ VULNERABILITY RISK SELF-ASSESSMENT CHECKLIST COASTAL AREAS & MARITIME APPROACHES: DRUG THREAT/ VULNERABILITY RISK SELF-ASSESSMENT CHECKLIST A. Measures

More information

International Conference Venice, 2 March Piraeus Port Authority, SA Yiannis Papagiannopoulos, PE, CCNP, MCSE, PE e-porting / Director

International Conference Venice, 2 March Piraeus Port Authority, SA Yiannis Papagiannopoulos, PE, CCNP, MCSE, PE e-porting / Director International Conference Venice, 2 March 2012 Piraeus Port Authority, SA Yiannis Papagiannopoulos, PE, CCNP, MCSE, PE e-porting / Director The reason for Port & supply chain security The terror attacks

More information

Brexit smoothing the transition for EU parcels and supply chain operators

Brexit smoothing the transition for EU parcels and supply chain operators Prime Vision B.V. Olof Palmestraat 10 2616 LR Delft The Netherlands Tel + 31 (0) 15 219 2090 info@primevision.com www.primevision.com Brexit smoothing the transition for EU parcels and supply chain operators

More information

MEASURES TO PREVENT UNLAWFUL ACTS AGAINST PASSENGERS AND CREWS ON BOARD SHIPS ***

MEASURES TO PREVENT UNLAWFUL ACTS AGAINST PASSENGERS AND CREWS ON BOARD SHIPS *** INTERNATIONAL MARITIME ORGANIZATION 4 ALBERT EMBANKMENT LONDON SE1 7SR Telephone: 020-7735 7611 Fax: 020-7587 3210 Telex: 23588 IMOLDN G IMO E Ref. T1/13.01 MSC/Circ.443 26 September 1986 MEASURES TO PREVENT

More information

RFID Interoperability Working Group

RFID Interoperability Working Group RFID Interoperability Working Group 2012 ITS Canada Annual Meeting Quebec City, Quebec June 12, 2012 Pierre Bolduc, Transport Canada ITS Office Thomas Kwan, Transport Canada Pacific Region CONTACT Pierre

More information

OCTOPUS THE NEXT GENERATION OF COMMAND AND CONTROL Summary

OCTOPUS THE NEXT GENERATION OF COMMAND AND CONTROL Summary OCTOPUS THE NEXT GENERATION OF COMMAND AND CONTROL Summary OCTOPUS is a new and innovative Physical Security Information Management system (PSIM), which combines a comprehensive security management software

More information

AAPA. Terminal and Container Cargo Security. Mark Tierney Senior Director Security and Compliance Maersk Inc

AAPA. Terminal and Container Cargo Security. Mark Tierney Senior Director Security and Compliance Maersk Inc AAPA Terminal and Container Cargo Security Mark Tierney Senior Director Security and Compliance Maersk Inc A.P. Moller is committed to show constant care and to prevent breaches of security associated

More information

ABSTACT 2016 GENERAL SECURITY GUIDELINES AND OPERATIONAL PROCEDURES

ABSTACT 2016 GENERAL SECURITY GUIDELINES AND OPERATIONAL PROCEDURES ABSTACT 2016 GENERAL SECURITY GUIDELINES AND OPERATIONAL PROCEDURES www.alpiworld.com PHISYCAL SECURITY AND ACCESS CONTROL 1. Physical Security The premises, in which goods are deposited, kept and handled

More information

Company Security Officer. Day 1

Company Security Officer. Day 1 0900 1000 Introduction and Enrolment Company Security Officer Day 1 1000 1100 History of Maritime Security and current threat Introduction to ISPS Code, Introduction to terrorism and the impact on ports

More information

Rail Carrier Minimum-Security Criteria

Rail Carrier Minimum-Security Criteria Rail Carrier Minimum-Security Criteria (08/28/2006) Rail carriers must conduct a comprehensive assessment of their security practices based upon the following C-TPAT minimum-security criteria. Recognizing

More information

OIL & GAS INFRASTRUCTURES PROTECTION

OIL & GAS INFRASTRUCTURES PROTECTION OIL & GAS INFRASTRUCTURES PROTECTION OIL & GAS INFRASTRUCTURES PROTECTION Leonardo s Critical Infrastructure capabilities deliver surveillance and security systems to the Oil & Gas upstream, midstream

More information

China/Hong Kong - EU Smart and secure trade lanes (SSTL) project

China/Hong Kong - EU Smart and secure trade lanes (SSTL) project China/Hong Kong - EU Smart and secure trade lanes (SSTL) project What s in it for participating companies? Summary The SSTL project, the first and so far only viability test of the potential of the WCO

More information

Trade Logistics and Facilitation

Trade Logistics and Facilitation Trade Logistics and Facilitation Customs and Border Management: New insights on an old problem Gerard McLinden International Trade Department Typical perspectives My goods were stuck in Customs for 3 weeks

More information

John F. Fevelo Chief Operating Officer. Metro One Loss Prevention Service Group, Inc. 900 South Ave. Staten Island, N.Y

John F. Fevelo Chief Operating Officer. Metro One Loss Prevention Service Group, Inc. 900 South Ave. Staten Island, N.Y John F. Fevelo Chief Operating Officer Metro One Loss Prevention Services Group, Inc. 900 South Ave. Staten Island, N.Y. 10314 718-370-6778 Speech Outline Delivered to the Transportation and Logistics

More information

Security Procedure - Participation / Certification in Foreign Customs Administrations Supply Chain Security Programs

Security Procedure - Participation / Certification in Foreign Customs Administrations Supply Chain Security Programs Customs-Trade Partnership Against Terrorism (C-TPAT) Minimum-Security Criteria Importers Importers must conduct a comprehensive assessment of their international supply chains, based upon the following

More information

Visibility that s Visionary: How Advanced Technologies are Transforming Capabilities in the plant and the warehouse

Visibility that s Visionary: How Advanced Technologies are Transforming Capabilities in the plant and the warehouse Visibility that s Visionary: How Advanced Technologies are Transforming Capabilities in the plant and the warehouse Presented by: Mark Wheeler PRESENTATION TITLE 2017 MHI Copyright claimed for audiovisual

More information

RE: Docket No. USTR Comments on the Transatlantic Trade and Investment Partnership

RE: Docket No. USTR Comments on the Transatlantic Trade and Investment Partnership Submitted electronically to http://www.regulations.gov May 8, 2013 David Weiner, Deputy Assistant USTR for Europe U.S. Trade Representative RE: Docket No. USTR 2013 0019 Comments on the Transatlantic Trade

More information

23.7 billion billion CHALLENGES AND OPPORTUNITIES ENHANCING SECURITY AND CONNECTIVITY WITH DIGITAL TRANSFORMATION

23.7 billion billion CHALLENGES AND OPPORTUNITIES ENHANCING SECURITY AND CONNECTIVITY WITH DIGITAL TRANSFORMATION MARITIME DRIVING DIGITAL INNOVATION FOR FUTURE GROWTH Enhancing Security and Connectivity 24 Ang Mo Kio Street 65, Singapore 569061 mktg.elect@stengg.com www.stengg.com CHALLENGES AND OPPORTUNITIES ENHANCING

More information

Luca Abatello, CEO, Circle. Extended smart ports and international fast trade lane: challenges and concrete experiences

Luca Abatello, CEO, Circle. Extended smart ports and international fast trade lane: challenges and concrete experiences Luca Abatello, CEO, Circle Extended smart ports and international fast trade lane: challenges and concrete experiences The Ports of the Future; Digitalisation & Fast Trade Lane; Internet of Things & Blockchain;

More information

Supply Chain Security Management Systems The ISO Link

Supply Chain Security Management Systems The ISO Link Supply Chain Security Management Systems The ISO 28000 Link Topics Security threats, risks and vulnerabilities Impact on Business Initiatives in the Region. ISO 28000 Family of Standards Who s got ISO28000

More information

CURRENT SECURITY ENVIRONMENT

CURRENT SECURITY ENVIRONMENT Border Crossings Muhammad Anwar, CMILT Chief Executive Custom Syndicate (International Logistics Solutions Providers) Lahore-Pakistan www.customsyndicate.com OBJECTIVES To provide a better understanding

More information

SICK Airport Innovations. Sensors and solutions

SICK Airport Innovations. Sensors and solutions SICK Airport Innovations Sensors and solutions THIS IS SICK Airport innovations The most important processes at an airport take place on the ground. Numerous logistics processes at the airport run smoothly

More information

European Union Customs approach towards the use of modern technologies

European Union Customs approach towards the use of modern technologies European Union Customs approach towards the use of modern technologies Wil van Heeswijk Directorate General for Taxation and Customs Union Risk management and Security unit 1 My topics for today 1. 1.

More information

Comments in Response to Customs and Border Protection s Request for Information Regarding Smart and Secure Containers.

Comments in Response to Customs and Border Protection s Request for Information Regarding Smart and Secure Containers. Comments in Response to Customs and Border Protection s Request for Information Regarding Smart and Secure Containers I. Introduction February 17, 2004 The World Shipping Council hereby submits the following

More information

Security Management. How do we implement the Regulations? Marc Volders - MAY 31, 2006

Security Management. How do we implement the Regulations? Marc Volders - MAY 31, 2006 Security Management How do we implement the Regulations? Marc Volders - MAY 31, 2006 Theme Security in the supply chain How do we as a logistics service provider need to prepare ourselves as well as our

More information

drone detection and neutralization system

drone detection and neutralization system drone detection and neutralization system Response to growing market needs Demand for non-military counter-drone systems is driven by: the sudden growth of the unregulated drone market is causing more

More information

Cargo Security: The Calm Before the Storm --

Cargo Security: The Calm Before the Storm -- Cargo Security: The Calm Before the Storm -- Productivity, Regulation & Technology Transportation Research Forum Annual Meeting Transportation Security Plenary Session March 7, 2005 Michael Wolfe noriver@att.net

More information

SEAL INTEGRITY PROGRAMME APPENDIX TO ANNEX I FRAMEWORK OF STANDARDS TO SECURE AND FACILITATE GLOBAL TRADE

SEAL INTEGRITY PROGRAMME APPENDIX TO ANNEX I FRAMEWORK OF STANDARDS TO SECURE AND FACILITATE GLOBAL TRADE SEAL INTEGRITY PROGRAMME APPENDIX TO ANNEX I FRAMEWORK OF STANDARDS TO SECURE AND FACILITATE GLOBAL TRADE APPENDIX TO ANNEX 1 SEAL INTEGRITY PROGRAMME FOR SECURE CONTAINER SHIPMENTS INTRODUCTION Importance

More information

Port Community System Singapore Experience

Port Community System Singapore Experience Port Community System Singapore Experience AGENDA Singapore Need for Efficient Trade Facilitation Port Community System An Overview Single Window System - Introduction Challenges, Benefits & Lessons Learned

More information

CBP Daily Operations

CBP Daily Operations Our Mission Detect and prevent terrorists and terrorist weapons from entering the United States, while facilitating the orderly and efficient flow of legitimate trade and people at and through our Nation

More information

Sensor networks: Opportunities and Challenges Report from Session 3 Transportation

Sensor networks: Opportunities and Challenges Report from Session 3 Transportation What are the benefits? What are the drivers and obstacles? Readiness What are the needs of society and customers? Strong efficiency gains for supply-side (infrastructure providers and transport services)

More information

Corporate Plan SUMMARY

Corporate Plan SUMMARY Corporate Plan SUMMARY 2007-2009 Table of Contents 1.0 INTRODUCTION 3 Scope and Funtions of the Authority 5 2.0 GUIDING PRINCIPLES FOR OUR BUSINESS 6 3.0 GOALS, OBJECTIVES AND STRATEGIES 7 Key Result Areas:

More information

AUTOMATE YOUR SUPPLY CHAIN WITH MOBILE DATA COLLECTION SOFTWARE

AUTOMATE YOUR SUPPLY CHAIN WITH MOBILE DATA COLLECTION SOFTWARE RFgen Mobile Foundations for Oracle E-Business Suite AUTOMATE YOUR SUPPLY CHAIN WITH MOBILE DATA COLLECTION SOFTWARE REDUCE COST MAXIMIZE PRODUCTIVITY IMPROVE ACCURACY INCREASE EFFICIENCY SUPPLY CHAIN

More information

AEO program. (Authorized Economic Operator) Customs & Tariff Bureau Ministry of Finance, Japan

AEO program. (Authorized Economic Operator) Customs & Tariff Bureau Ministry of Finance, Japan AEO program (Authorized Economic Operator) Customs & Tariff Bureau Ministry of Finance, Japan International background The global trading system is vulnerable to terrorist exploitation while the international

More information

AEO. (Authorized Economic Operator) Challenges of Japan Customs. Customs & Tariff Bureau, Ministry of Finance, Japan

AEO. (Authorized Economic Operator) Challenges of Japan Customs. Customs & Tariff Bureau, Ministry of Finance, Japan AEO (Authorized Economic Operator) Challenges of Japan Customs Customs & Tariff Bureau, Ministry of Finance, Japan International background The global trading system is vulnerable to terrorist exploitation

More information

A Message for Brokers Letter And Security Guidelines for Brokers

A Message for Brokers Letter And Security Guidelines for Brokers A Message for Brokers Letter And Security Guidelines for Brokers Kingchem LLC is a participant in the Customs-Trade Partnership Against Terrorism (C-TPAT). C-TPAT is a voluntary joint government-business

More information

Veien mot det autonome skip

Veien mot det autonome skip Veien mot det autonome skip Jann Peter Strand Product Manager Automation & Control Rolls-Royce Marine AS Board Member Norwegian Forum for Autonomous Ships (NFAS) The information in this document is the

More information

SMART FLEET MANAGEMENT

SMART FLEET MANAGEMENT SMART FLEET MANAGEMENT UPGRADE TO A SAFER, SMARTER AND A MORE CONNECTED FLEET EXPERIENCE LIVE TRACKING Real-time tracking (refreshed every 2 to 20 seconds, based on curves and turns) with live speed, journey

More information

Gerard McLinden Kees Van Der Meer World Bank

Gerard McLinden Kees Van Der Meer World Bank Lao PDR Trade Development Facility Risk Management Workshop 28 January 2011 Gerard McLinden Kees Van Der Meer Overview Context Aims of border management Di Drivers for change A changing paradigm International

More information

RFid based Toll Collection System

RFid based Toll Collection System For more Project details visit: http://www.projectsof8051.com/rfid-based-highway-toll-tax-collection-system/ Code Project Title 1515 RFid Based Highway Toll Tax Collection System Synopsis for RFid based

More information

100 Percent Screening of Cargo Containers (Session 3A: Security II)

100 Percent Screening of Cargo Containers (Session 3A: Security II) 100 Percent Screening of Cargo Containers (Session 3A: Security II) MTS R&T Coordination Conference November 16-17, 17, 2004 Washington, D.C. Victor J. Orphan Science Applications International Corporation

More information

CURE FOR THE COUNTERFEITING PANDEMIC IN THE AUTOMOTIVE INDUSTRY

CURE FOR THE COUNTERFEITING PANDEMIC IN THE AUTOMOTIVE INDUSTRY RFID IOT NFC Confidex and Sasken proudly present the Dynamic Parts Authentication TM CURE FOR THE COUNTERFEITING PANDEMIC IN THE AUTOMOTIVE INDUSTRY JUNE 2017 INTRODUCTION Apparel, accessories, music,

More information

VEHICLE REGISTRATION & TRACKING

VEHICLE REGISTRATION & TRACKING VEHICLE REGISTRATION & TRACKING Vehicle Ownership & Road Safety Management WHITE PAPER www.muehlbauer.de 1 Requirements... 3 Need for Tracking... 3 Benefits... 3 2 Key Elements... 4 Vehicle Registration...

More information

Hanane BECHA, PhD in Computer Science

Hanane BECHA, PhD in Computer Science Hanane BECHA, PhD in Computer Science h.becha@traxens.com Smart Containers for better Borders Management WCO IT 2018 Conference & Exhibition 6-8 June, Lima, Peru 2 Roles: 1- Innovation & Standards Senior

More information

Security Model. Jointly implement a security model within each segment of the supply chain Production Transportation Importation Distribution

Security Model. Jointly implement a security model within each segment of the supply chain Production Transportation Importation Distribution C-TPAT Membership Importers Brokers / Forwarders / Consolidators Carriers (Air, Sea, Rail, Truck) Port Authorities / Terminal Operators Foreign Manufacturers (Mexico and Canada) WHAT REALLY HAPPENS Security

More information

CONNECTED LOGISTICS. Denis SENPERE Inspirage Europe Vejle, October 2 nd Inspirage / Oracle All rights reserved. Courtesy Alstom / Amtrak

CONNECTED LOGISTICS. Denis SENPERE Inspirage Europe Vejle, October 2 nd Inspirage / Oracle All rights reserved. Courtesy Alstom / Amtrak CONNECTED LOGISTICS Denis SENPERE Inspirage Europe Vejle, October 2 nd 2018 1 1 2017 Inspirage / Oracle All rights reserved 1 2017 Inspirage / ICP Solution / Oracle All rights reserved Courtesy Alstom

More information

AUTOMATE YOUR SUPPLY CHAIN WITH MOBILE DATA COLLECTION SOFTWARE

AUTOMATE YOUR SUPPLY CHAIN WITH MOBILE DATA COLLECTION SOFTWARE RFgen Mobile Foundations for Oracle E-Business Suite AUTOMATE YOUR SUPPLY CHAIN WITH MOBILE DATA COLLECTION SOFTWARE REDUCE COST MAXIMIZE PRODUCTIVITY IMPROVE ACCURACY INCREASE EFFICIENCY SUPPLY CHAIN

More information

TCO INVOLVEMENT IN NON-DRUG CRIME

TCO INVOLVEMENT IN NON-DRUG CRIME UNCLASSIFIED//FOUO OF TCO INVOLVEMENT IN NON-DRUG CRIME Group Members: Eliasz Krawczuk Crumpton Group, LLC Emily Woodard Fiat Chrysler Automobiles Erin M. DHS Kevin P. DHS Mariko Kawaguchi Element Case,

More information

MARITIME SECURITY CURRENT STATUS (ISO/TC8) ANSI HOMELAND SECURITY STANDARDS PANEL 9 th Annual Plenary Meeting Arlington, VIRGINIA /10

MARITIME SECURITY CURRENT STATUS (ISO/TC8) ANSI HOMELAND SECURITY STANDARDS PANEL 9 th Annual Plenary Meeting Arlington, VIRGINIA /10 MARITIME SECURITY CURRENT STATUS (ISO/TC8) ANSI HOMELAND SECURITY STANDARDS PANEL 9 th Annual Plenary Meeting Arlington, VIRGINIA 2010-11-09/10 CAPT. CHARLES H. PIERSALL Chairman, ISO/TC8 Ships & Marine

More information

Chapter 16. using math in sales. Section 16.1 Sales Transactions. Section 16.2 Cash Registers. Section 16.3 Purchasing, Invoicing, and Shipping

Chapter 16. using math in sales. Section 16.1 Sales Transactions. Section 16.2 Cash Registers. Section 16.3 Purchasing, Invoicing, and Shipping Chapter 16 using math in sales Section 16.1 Sales Transactions Section 16.2 Cash Registers Section 16.3 Purchasing, Invoicing, and Shipping Section 16.1 Sales Transactions PREDICT What kinds of math does

More information

Terms of Reference. Purchase of aerial surveillance service for the EU external land borders

Terms of Reference. Purchase of aerial surveillance service for the EU external land borders Annex II Terms of Reference Purchase of aerial surveillance service for the EU external land borders Ref. No: Frontex/ Purchase of aerial border surveillance service aircraft equipped with multi-intelligence

More information

RC & TACKLING TRADE BASED MONEY LAUNDERING (TBML) risk compliance RISK & COMPLIANCE MAGAZINE. risk & compliance REPRINTED FROM: APR-JUN 2018 ISSUE

RC & TACKLING TRADE BASED MONEY LAUNDERING (TBML) risk compliance RISK & COMPLIANCE MAGAZINE. risk & compliance REPRINTED FROM: APR-JUN 2018 ISSUE R E P R I N T RC & risk compliance & TACKLING TRADE BASED MON LAUNDERING (TBML) REPRINTED FROM: RISK & COMPLIANCE MAGAZINE APR-JUN 2018 ISSUE RC & risk & compliance Visit the website to request a free

More information

WCO ICT Conference Developing IT Project Proposals A Strategic Perspective

WCO ICT Conference Developing IT Project Proposals A Strategic Perspective WCO ICT Conference Developing IT Project Proposals A Strategic Perspective June 2016 E X P E R I E N C E I N N O V A T I O N D E L I V E R Y 2 Challenges Shaping Customs Context SERVICE LEVELS INCREASING

More information

C-TPAT Security Standards. Importers

C-TPAT Security Standards. Importers C-TPAT Security Standards Importers Importers must conduct a comprehensive self-assessment of their international supply chains based upon the following C-TPAT security standards. Appropriate security

More information

Internet of Things (IoT) Applications at Hong Kong International Airport

Internet of Things (IoT) Applications at Hong Kong International Airport Internet of Things (IoT) Applications at Hong Kong International Airport Ir Alex Kwan, Executive Director Engineering and Technology, HK Airport Authority Smart Airport Vision Primary Goals are better

More information

Pakistan Supply Chain Security (PSCS) Code

Pakistan Supply Chain Security (PSCS) Code Pakistan Supply Chain Security (PSCS) Code 1.0 Introduction Following September 11, 2001 incident, the attention of international community has been focused on security. Supply chain is considered one

More information

C-TPAT Minimum Security Requirements Importers

C-TPAT Minimum Security Requirements Importers Customs and Border Protection, U.S. Department of Homeland Security C-TPAT Minimum Security Requirements Importers Released March, 2005 Prepared by Prep4Audit, LLC Version 2: August, 2014 www.prep4audit.com

More information

RFID in Containerization

RFID in Containerization RFID in Containerization Panagiotis S. Tsilingiris * Harilaos N. Psaraftis^ DimitriosV. Lyridis^ * Department of Management Science & Engineering, Stanford University ^Laboratory for Maritime Transport,National

More information

Singapore Customs Secure Trade Partnership. Supply Chain Security

Singapore Customs Secure Trade Partnership. Supply Chain Security Singapore Customs Secure Trade Partnership Supply Chain Security Globalization and free trade will continue to be the impetus for the phenomenal growth in cargo containers transshipment that constitutes

More information

North America s SuperCorridor Coalition, Inc. Tri-national, non-profit, multi-modal trade and transportation coalition for the efficient and secure

North America s SuperCorridor Coalition, Inc. Tri-national, non-profit, multi-modal trade and transportation coalition for the efficient and secure North America s SuperCorridor Coalition, Inc. Tri-national, non-profit, multi-modal trade and transportation coalition for the efficient and secure movement of freight NASCO s Mission & Purpose Mission:

More information