Port Security - Possible Technology Interventions and Solutioning

587 views

Published on

Published in: Business, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
587
On SlideShare
0
From Embeds
0
Number of Embeds
20
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Port Security - Possible Technology Interventions and Solutioning

  1. 1. Port Security POSSIBLE TECHNOLOGY INTERVENTIONS & SOLUTIONING
  2. 2. Key Security Threats in Ports Damage to, or destruction of, the port facility or of the ship, eg by explosive devices, arson, sabotage or vandalism Unauthorized access or use (incl. stowaways) Smuggling weapons or equipment (incl. WMD) Tampering with cargo, key ship equipment or systems, or ship’s stores Blockage of port entrances, locks, approaches, etc Nuclear, biological and chemical attack Types of security threats Use of the ship as a weapon or means to cause damage or destruction Hijacking or seizure of the ship or of persons on board Use of the ship to carry terrorists & their equipment
  3. 3. Port Security Measures  Ensure security performance  Control access to the port facility  Monitor port facility  Monitor restricted areas  Supervise cargo handling  Supervise handling ship’s stores  Ensure security communication is readily available
  4. 4. Port Security Technology intervention  Current security threats and patterns  Techniques used to avoid security measures  Weapons, and dangerous substances and devices  Characteristics and behaviour of persons who are likely to threaten security  Crowd management and control techniques  Security-related communications  Security equipment and systems (operation, testing, calibration, maintenance)  Inspection, control and monitoring techniques  Methods of physical searches KNOW RECOGNIZE & DETECT USE
  5. 5. Possible Port Security Solutions in line with SOLAS (Safety of Life at Sea) Convention Automated system for control access by individual Automated surveillance system for vehicles Surveillance equipment for monitoring within the terminal Surveillance equipment for monitoring within the terminal Observation room Surveillance equipment for monitoring restricted water area Fencing Surveillance equipment for monitoring peripheral area of the facility Restricted water area
  6. 6. • Base Network System Deployment over Wireless • Better Return on Investment (ROI) “One Time Investment and Re-Utilization of the SAME Infrastructure” • Common Communication Platform • Deploy RFID and GPS-based Solution for REAL-TIME Tracking of People, Vehicles within the Port Premises How can all of it be technologically brought together ?

×