SlideShare a Scribd company logo
1 of 35
Download to read offline
The Use of Technology
in Cargo Risk Management
Prof Alwyn Hoffman
Northwest University
Alwyn.Hoffman@nwu.ac.za
082 851 6537
1q
Overview
• DTI funded projects at NWU
• Liaison with industry stakeholders
• Different approaches to cargo risk management
• Secure marking of products
• Using electronic seals and vehicle tracking systems
• Using the Internet and data analytics
• Using trade corridor management systems
• Finding an optimal mix of solutions
• Piloting of proposed new solutions
• Where to from here?
2
DTI funded projects at NWU
• Northwest University (NWU) is involved in a number of
research projects that explore possibilities to improve the
management of freight and the end-to-end management of
trade corridors by using new technologies
• One focus area is the improvement of overload control and
cross-border operations by automatically analyzing data sets
available from traffic cameras and customs systems in order
to facilitate a Green Lanes concept for compliant operators
• Another area of focus is to reduce the risk of freight in transit
from the perspective of the cargo owner by making freight
movements visible and traceable using available data
• The long term goal is to create a practically proven blue-print
that will encompass both efficiency and security requirements
using a common technology platform 3
Liaison with industry stakeholders
• Studies are being conducted in cooperation with SARS, SADC
Transit Task Team and SAAFF for regional trade corridors
• Systems were implemented at Durban harbor in cooperation
with TPT to demonstrate automated verification of electronic
seals used on containerized cargo
• Vehicle GPS tracking data is being collected for some of the
major transport operators to study deviations from plan that
contribute towards productivity losses and risk
• In cooperation with Sanral and provincial DoTs data is being
collected from existing traffic camera and WIM scale systems
to detect compliance of vehicles with overload control
measures and deviations from trip plans
• An agreement has been reached with SAAFF (freight
forwarders) to centrally collect data for all cross-border
operations to identify the reasons for delays 4
Different approaches to cargo risk
management
• Using high integrity product markings (e.g. Microdots or
Digital Signatures)
• Using physical security (armed escorts) to prevent losses
• Using 24/7 tracking of vehicles combined with electronic seals
to provide early warning of risk incidents
• Using end-to-end spot checking of cargo (based on traffic
cameras and RFID readers) plus control over hand-over
transactions to track transfer of culpability
• Using Call Centres and the Internet to systematically record
data on cargo security events, combined with Data Analytics
to detects patterns
• Using a combination of all of the above
5
The challenge is to find a common solution
that will address the needs for
6
Insurance Compliance, Cargo Protection
and Global Logistics Visibility
Key Requirements for High Integrity Supply
Chains
• Reassurance to
End-users
DESIGN
AND ENGINEERING
DISTRIBUTION
CENTERSSUPPLIERS
MANUFACTURING
PLANTS CUSTOMERS END USERS
PULL PULL PULL PULL PULL
• Product and Source
Authenticity
• Product Traceability
• Operator Liability
Tier 1: Enabling Branded Cargo Protection with
Secure Product Markings
• Traditional techniques to protect branded
products suffer from serious weaknesses:
• Holograms and security inks are easily cloned
• Serial numbers can be copied and need online
verification
• The Electronic Banking industry solved the
problem of cloned identities by using Digital
Signatures
• Branded products can be protected in the same
way by writing a unique Digital Signature into
each product identifier
• Revenue authorities can use the same authentic
markings to verify item level tax compliance
New ISO Standard for Secure Item
Marking
• Previous DTI THRIP project at NWU led to the development of
a new standard SANS1368, in cooperation with the SABS and
local industry, for the authentic marking of physical items
based on 2D barcodes or RFID
• This standard utilizes ISO standard encryption techniques and
describes the process to be followed to mark items like
manufactured products or documents in such a way that the
source of origin can be securely determined in offline mode
• The improved version ISO/IEC WD 20248: Information
technology — Automatic identification and data capture
techniques — Data structures — Digital signature meta
structure has been accepted by the relevant ISO committee
(USA, UK, China, France, etc.) 9
Tier 2: Solving the Logistics Problem: Cargo Item
Tracking Based on Passive RFID
Cargo items are marked
using both barcoding and low
cost RFID labels
Back-end system is updated to reflect
current status of cargo items to improve
logistics management and to reconcile
stock figures
Movements of items
are tracked using either
installed or handheld
RFID readers
Tier 3: Using trails of custody enabled by
passive electronic cargo seals to ensure end-
to-end secure supply chains
Passive RFID e-seal using on
containers and trucks to allow
verification of cargo security status
At each point of hand-over or delivery
the identity of the truck and status of
the cargo are automatically detected
In fully automated mode the
identity of the truck, driver and
container and status of e-seal is
detected without human
intervention and cargo flow can be
controlled automatically
Information about each
cargo event is dispatched
to central system
Details of sealing and dispatch
transactions are securely
recorded
The status of the e-seal
is verified manually
Controller
Reader
Boom
Tier 4: End-to-end monitoring of cargo
movements using existing GPS tracking and
camera systems
Certified transport operator
submits declaration to SAIA of
internal cargo sealing, weight
control, authorization of dispatch
and route plan
SAIA system identifies traffic cameras
and WIM scales along route where
vehicle should be spotted
If vehicle was not seen, if it did not
use the WIM scale lane or if the
weight changed significantly an
alarm is recorded and a supervisor is
notified
Information about cargo
movements for entire fleets is
accumulated and a behavioral
track record is created to be used
in SAIA risk assessments
Details of sealing, weighing and
dispatch transactions are
securely recorded on centralized
SAIA system
SAIA system use GPS tracking data
from certified operator to
determine when vehicle should be
spotted by traffic camera and WIM
scale
Tier 5: Using 24/7 tracking of vehicles
combined with active electronic seals to
provide early warning of risk incidents
13
demonstrate
Tier 6: Using Call Centres, the Internet
and Data Analytics
Information on cargo security
incident is communicated to Call
Centre
Internet searches are performed
to detect potentially related
commercial activities – sale of
stolen cargo
Cargo loss data is systematically
recorded in a database
representing the entire industry
Authorities are
informed about
suspicious cases
The Objective: End-To-End Audit Trails
to Track Transfer of Culpability
Step # 1: Container
trail of custody initiated
by cargo owner
Unique tag ID
E-Seal serial #
Cargo Owner ID
Encrypted Auth Code
Step # 2: Container trail
of custody appended by
Shipper
Unique tag ID
E-Seal serial #
Cargo Owner ID
Encrypted Auth Code
Shipper IDStep # 3: Container trail
of custody appended at
Customs
Unique tag ID
E-Seal serial #
Cargo Owner ID
Customs ID
Shipper ID
Encrypted Auth Code
Step # 4: Container trail
of custody appended by
Transporter
Unique tag ID
E-Seal serial #
Cargo Owner ID
Customs ID
Shipper ID
Transporter ID
Encrypted Auth Code
Step # 5: Verification
by Inspectors
Step # 6: Verification
by Recipient
Key Technologies
• Digital Signatures verified offline:
– Detects data tampering
– Detects the legal source of markings
– Detects the original document
• Web Services
– Enables Cloud and Mobile services
• Smart Phones with camera & GPS
– Personalised ownership
• QR Barcodes as read by all smart phones
• RFID – Radio Frequency Identification
– Cheap standard USB and Blue Tooth readers interface with smart phones
CID
VCS
Signer
Digital Signature
Real
Electronic
Digital Identity
Signer
Digital Signatures is a de facto International encryption Standard used widely by Banks and Web Services to create integrity
and privacy in online services.
Digital Signatures have been legalised by many countries to be prima facia evidence.
iDocTrust invented a Digital Signature [DigSig] small enough to fit into QR Barcodes and RFID Tags creating a method to
offline verify the integrity of physical documents.
• The DigSig allows the verification of the document legal source and integrity.
• The DigSig in a barcode allows offline data tamper detection.
• The DigSig in a RFID Tag allows the offline detection of the original document.
Goods
Marking
SCM Shipment
Tracking System
Supply Chain
Management System
Goods
Receive
-Items
-Boxes
Inventory
Control
-Items
-Boxes
Shipments
-Compile
-Dispatch
Shipments
-Compile
-Dispatch
Goods
Authentication
-Source
-Channel
Anti-
theftTransfer Transfer
SCTS
Data
Vault
Fraud Agent System
Retailer SystemManufacturer
System
Trusted Third Party
Certification
Authority
Overview of Typical
Supply Chain Trust Service System
SCTS System
Goods
Marking
Goods
Receive
-Items
-Boxes
Inventory
Control
-Items
-Boxes
Shipments
-Compile
-Dispatch
Shipments
-Compile
-Dispatch
Goods
Authentication
-Source
-Channel
Anti-
theftTransfer Transfer
SCTS
Data
Vault
Fraud Agent System
Retailer SystemManufacturer
System
Trusted Third Party
Certification
AuthorityStep 1
SC Principal provide
Fraud Agent wih
business rules for flow
of products
Supply Chain Trust Service
System Operation: Step 1
Supply Chain
Management System
SCTS
Data
Vault
Goods
Marking
Shipments
-Compile
-Dispatch
Manufacturer
System
Step 2
Implement iDocTrust
authentication technique:
– generate labels containing
digital certificates with secure
reference to authorised issuer
–Store copy of Digital
Signature in SCTS Data Vault
Digital
Certificates
Digital Evidence
TTP CA
Supply Chain Trust Service
System Operation: Step 2
CID
VCS
Signer
Goods
Marking
Goods
Receive
-Items
-Boxes
Inventory
Control
-Items
-Boxes
Shipments
-Compile
-Dispatch
Shipments
-Compile
-Dispatch
Goods
Authentication
-Source
-Channel
Anti-
theftTransfer Transfer
SCTS
Data
Vault
Fraud Agent System
Retailer SystemManufacturer
System
Step 3
Mark items at
manufacturer with
labels that contains
DigSig Authentication
Information
TTP CA
Supply Chain Trust Service
System Operation: Step 3
Supply Chain
Management System
Goods
Marking
Goods
Receive
-Items
-Boxes
Inventory
Control
-Items
-Boxes
Shipments
-Compile
-Dispatch
Shipments
-Compile
-Dispatch
Goods
Authentication
-Source
-Channel
Anti-
theftTransfer Transfer
SCTS
Data
Vault
Fraud Agent System
Retailer SystemManufacturer
System
Trusted Third Party
Certification
Authority
Step 4
•Capture transaction
information when
transferring products from
Manufacturer to
Distributor
•Transaction information
includes:
-Goods IDs
-Human operator biometrics
-Time
-Place
Supply Chain Trust Service
System Operation: Step 4
Supply Chain
Management System
Goods
Marking
Goods
Receive
-Items
-Boxes
Inventory
Control
-Items
-Boxes
Shipments
-Compile
-Dispatch
Shipments
-Compile
-Dispatch
Goods
Authentication
-Source
-Channel
Anti-
theftTransfer Transfer
SCTS
Data
Vault
Fraud Agent System
Retailer SystemManufacturer
System
Trusted Third Party
Certification
Authority
Step 5
Authentic Transaction
information is sent
automatically to SCM and
Fraud Agent system and
to SCTS Data Vault
Digital Evidence
Supply Chain Trust Service
System Operation: Step 5
Supply Chain
Management System
Goods
Receive
-Items
-Boxes
Inventory
Control
-Items
-Boxes
Shipments
-Compile
-Dispatch
SCTS
Data
Vault
Fraud Agent System
Trusted Third Party
Certification
Authority
Step 6
During Inventory Control
the authenticity of items
is verified offline using
DigSig information on
labels
Supply Chain Trust Service
System Operation: Step 6
Supply Chain
Management System
Goods
Receive
-Items
-Boxes
Inventory
Control
-Items
-Boxes
Shipments
-Compile
-Dispatch
SCTS
Data
Vault
Fraud Agent System
Trusted Third Party
Certification
Authority
Step 7
If discrepancy is detected
fraud detection systems
are automatically
informed
Supply Chain Trust Service
System Operation: Step 7
Supply Chain
Management System
Goods
Marking
Goods
Receive
-Items
-Boxes
Inventory
Control
-Items
-Boxes
Shipments
-Compile
-Dispatch
Shipments
-Compile
-Dispatch
Goods
Authentication
-Source
-Channel
Anti-
theftTransfer Transfer
SCTS
Data
Vault
Fraud Agent System
Retailer SystemManufacturer
System
Trusted Third Party
Certification
Authority
Step 8
•Capture transaction
information when
transferring products
from Distributor to
Retailer
•Transaction information
includes:
-Goods IDs
-Human operator biometrics
-Time
-Place
Supply Chain Trust Service
System Operation: Step 8
Supply Chain
Management System
Goods
Marking
Goods
Receive
-Items
-Boxes
Inventory
Control
-Items
-Boxes
Shipments
-Compile
-Dispatch
Shipments
-Compile
-Dispatch
Goods
Authentication
-Source
-Channel
Anti-
theftTransfer Transfer
SCTS
Data
Vault
Fraud Agent System
Retailer SystemManufacturer
System
Trusted Third Party
Certification
Authority
Step 9
Authentic Transaction
information is sent
automatically to
Distributor and Fraud
Agent system and to
SCTS Data Vault
Digital Evidence
Supply Chain Trust Service
System Operation: Step 9
Supply Chain
Management System
SCTS
Data
Vault
Fraud Agent System
Trusted Third Party
Certification
Authority
Step 10
During Inventory Control
at Retailer the
authenticity of items is
verified offline using
DigSig information on
labels
Supply Chain Trust Service
System Operation: Step 10
Goods
Authentication
-Source
-Channel
Anti-
theft
Retailer System
Goods
Receive
-Items
-Boxes
Inventory
Control
-Items
-Boxes
Shipments
-Compile
-Dispatch
SCTS
Data
Vault
Fraud Agent System
Trusted Third Party
Certification
Authority
Step 11
If discrepancy is detected
SCTS, Retailer,
Distributor and Fraud
Agent systems are
automatically informed
Supply Chain Trust Service
System Operation: Step 11
Supply Chain
Management System
Goods
Authentication
-Source
-Channel
Anti-
theft
Retailer System
Goods
Marking
Goods
Receive
-Items
-Boxes
Inventory
Control
-Items
-Boxes
Shipments
-Compile
-Dispatch
Shipments
-Compile
-Dispatch
Goods
Authentication
-Source
-Channel
Anti-
theftTransfer Transfer
SCTS
Data
Vault
Fraud Agent System
Retailer SystemManufacturer
System
Trusted Third Party
Certification
Authority
Step 12
Fraud Agent applies SC
Principal business rules
to track&trace and
discrepancy information
to generate list of
exceptions
Supply Chain Trust Service
System Operation: Step 12
Supply Chain
Management System
Goods
Marking
Goods
Receive
-Items
-Boxes
Inventory
Control
-Items
-Boxes
Shipments
-Compile
-Dispatch
Shipments
-Compile
-Dispatch
Goods
Authentication
-Source
-Channel
Anti-
theftTransfer Transfer
SCTS
Data
Vault
Fraud Agent System
Retailer SystemManufacturer
System
Trusted Third Party
Certification
Authority
Step 13
If fraudulent activities are
suspected the Fraud
Agent request a
disclosure from the SCTS
Data Vault to compile
Evidence Trail Request
Disclosure
Supply Chain Trust Service
System Operation: Step 13
Supply Chain
Management System
Goods
Marking
Goods
Receive
-Items
-Boxes
Inventory
Control
-Items
-Boxes
Shipments
-Compile
-Dispatch
Shipments
-Compile
-Dispatch
Goods
Authentication
-Source
-Channel
Anti-
theftTransfer Transfer
SCTS
Data
Vault
Fraud Agent System
Retailer SystemManufacturer
System
Trusted Third Party
Certification
Authority
Step 14
Fraud Agent provides SC
Principal with a forensic
report (including
complete Evidence Trail)
and take appropriate
action on behalf of the
SC Principal
Supply Chain Trust Service
System Operation: Step 14
Forensic
Report
Actions
against
Fraudulent
Parties
Actions
against
Fraudulent
Parties
Supply Chain
Management System
SCTS Business Model
2. Evidence
Recording
Click fee
Fraud Agent
Data Vault
1. Digital
Certification
Click fee
4. Anomaly
Detection
Subscription fee
3. Disclosure
Request
Service fee
SCTS
Disclosure & Contracting
Brand Owner
Principal
Logistics
Service Provider
Manufacturer
Distributor
Court
Service
Contract
Inspection
Agreement
Service
Level
Agreement Fraud Agent
Court Order for
Disclosure
Trace
Elements
of Anomaly
Disclosure
Recorded
Trail of
Evidence
Service
Level
Agreement
Where to from here?
• Satellite Tracking Technology used to be an effective tool in
fighting vehicle and cargo theft but is impacted by jamming
• Electronic sealing and traffic camera systems can add further
data to reduce cargo risks
• Secure product markings is however the best long term cure
against large scale cargo theft and illegal trade
• The possibility exist to link cargo risk management systems to
future Green Lanes systems to provide further benefits to
cargo owners by streamlining Trade Corridors
• NWU is conducting pilot projects with DTI and industry
organizations to create blue-prints for new logistics
performance and risk management solutions
• The transport and cargo insurance industry is invited to lend
its support through active participation of its members 35

More Related Content

Similar to The use of data and technology in cargo risk management

Tanweer warehouse management solution
Tanweer warehouse management solutionTanweer warehouse management solution
Tanweer warehouse management solutionArif Ubaid
 
Blockchain_Logyca (ENG).pdf
Blockchain_Logyca (ENG).pdfBlockchain_Logyca (ENG).pdf
Blockchain_Logyca (ENG).pdfProexportColombia1
 
karsof systems e-visa
karsof systems e-visakarsof systems e-visa
karsof systems e-visaColin Valencia
 
AN INTERNET OF THINGS BASED VEHICLE PERMIT VERIFICATION SYSTEM WITH DIGITAL D...
AN INTERNET OF THINGS BASED VEHICLE PERMIT VERIFICATION SYSTEM WITH DIGITAL D...AN INTERNET OF THINGS BASED VEHICLE PERMIT VERIFICATION SYSTEM WITH DIGITAL D...
AN INTERNET OF THINGS BASED VEHICLE PERMIT VERIFICATION SYSTEM WITH DIGITAL D...ijujournal
 
Telecommunications in the logistic sector
Telecommunications in the logistic sector Telecommunications in the logistic sector
Telecommunications in the logistic sector Justino Lourenço
 
AN INTERNET OF THINGS BASED VEHICLE PERMIT VERIFICATION SYSTEM WITH DIGITAL D...
AN INTERNET OF THINGS BASED VEHICLE PERMIT VERIFICATION SYSTEM WITH DIGITAL D...AN INTERNET OF THINGS BASED VEHICLE PERMIT VERIFICATION SYSTEM WITH DIGITAL D...
AN INTERNET OF THINGS BASED VEHICLE PERMIT VERIFICATION SYSTEM WITH DIGITAL D...ijujournal
 
Tracking Tools For Air Cargo Modernization
Tracking Tools For Air Cargo ModernizationTracking Tools For Air Cargo Modernization
Tracking Tools For Air Cargo ModernizationPaul Fink
 
SMARTIE
SMARTIESMARTIE
SMARTIEDunavNET
 
Electronic intermediaries &; e enabled logistic management &; tracking system
Electronic intermediaries &; e enabled logistic management &; tracking systemElectronic intermediaries &; e enabled logistic management &; tracking system
Electronic intermediaries &; e enabled logistic management &; tracking systemMithisar Basumatary
 
8 introduction to references
8 introduction to references8 introduction to references
8 introduction to referencesDevanshu Suman
 
Overview of Supply Chain and Logistics Technology & Parcel System
Overview of Supply Chain and Logistics Technology & Parcel SystemOverview of Supply Chain and Logistics Technology & Parcel System
Overview of Supply Chain and Logistics Technology & Parcel SystemKunj Joshi 🎤
 
Build a Supply Chain 4.0 ecosystem using Blockchain
Build a Supply Chain 4.0 ecosystem using BlockchainBuild a Supply Chain 4.0 ecosystem using Blockchain
Build a Supply Chain 4.0 ecosystem using BlockchainBluecrux
 
Air Freight Forwarding Solutions: Tracking Capabilities | The Enterprise World
Air Freight Forwarding Solutions: Tracking Capabilities | The Enterprise WorldAir Freight Forwarding Solutions: Tracking Capabilities | The Enterprise World
Air Freight Forwarding Solutions: Tracking Capabilities | The Enterprise WorldTEWMAGAZINE
 
January 2013 world Pipeline magazine Article
January  2013 world Pipeline magazine ArticleJanuary  2013 world Pipeline magazine Article
January 2013 world Pipeline magazine ArticleLayne Tucker
 
COVID green label
COVID green labelCOVID green label
COVID green labelArchna Menon
 
smart security infrastructure
smart security infrastructuresmart security infrastructure
smart security infrastructureShreyas Satpute
 
Smart Security Infrastructure
Smart Security InfrastructureSmart Security Infrastructure
Smart Security InfrastructureGAURAV. H .TANDON
 
Location Based Services - IoT Enabled Solutions for Real-Time Location Update...
Location Based Services - IoT Enabled Solutions for Real-Time Location Update...Location Based Services - IoT Enabled Solutions for Real-Time Location Update...
Location Based Services - IoT Enabled Solutions for Real-Time Location Update...Tata Tele Business Services
 

Similar to The use of data and technology in cargo risk management (20)

Tanweer warehouse management solution
Tanweer warehouse management solutionTanweer warehouse management solution
Tanweer warehouse management solution
 
Blockchain_Logyca (ENG).pdf
Blockchain_Logyca (ENG).pdfBlockchain_Logyca (ENG).pdf
Blockchain_Logyca (ENG).pdf
 
karsof systems e-visa
karsof systems e-visakarsof systems e-visa
karsof systems e-visa
 
AN INTERNET OF THINGS BASED VEHICLE PERMIT VERIFICATION SYSTEM WITH DIGITAL D...
AN INTERNET OF THINGS BASED VEHICLE PERMIT VERIFICATION SYSTEM WITH DIGITAL D...AN INTERNET OF THINGS BASED VEHICLE PERMIT VERIFICATION SYSTEM WITH DIGITAL D...
AN INTERNET OF THINGS BASED VEHICLE PERMIT VERIFICATION SYSTEM WITH DIGITAL D...
 
Telecommunications in the logistic sector
Telecommunications in the logistic sector Telecommunications in the logistic sector
Telecommunications in the logistic sector
 
AN INTERNET OF THINGS BASED VEHICLE PERMIT VERIFICATION SYSTEM WITH DIGITAL D...
AN INTERNET OF THINGS BASED VEHICLE PERMIT VERIFICATION SYSTEM WITH DIGITAL D...AN INTERNET OF THINGS BASED VEHICLE PERMIT VERIFICATION SYSTEM WITH DIGITAL D...
AN INTERNET OF THINGS BASED VEHICLE PERMIT VERIFICATION SYSTEM WITH DIGITAL D...
 
Tracking Tools For Air Cargo Modernization
Tracking Tools For Air Cargo ModernizationTracking Tools For Air Cargo Modernization
Tracking Tools For Air Cargo Modernization
 
SMARTIE
SMARTIESMARTIE
SMARTIE
 
Electronic intermediaries &; e enabled logistic management &; tracking system
Electronic intermediaries &; e enabled logistic management &; tracking systemElectronic intermediaries &; e enabled logistic management &; tracking system
Electronic intermediaries &; e enabled logistic management &; tracking system
 
8 introduction to references
8 introduction to references8 introduction to references
8 introduction to references
 
Overview of Supply Chain and Logistics Technology & Parcel System
Overview of Supply Chain and Logistics Technology & Parcel SystemOverview of Supply Chain and Logistics Technology & Parcel System
Overview of Supply Chain and Logistics Technology & Parcel System
 
Build a Supply Chain 4.0 ecosystem using Blockchain
Build a Supply Chain 4.0 ecosystem using BlockchainBuild a Supply Chain 4.0 ecosystem using Blockchain
Build a Supply Chain 4.0 ecosystem using Blockchain
 
Use of Technologies in Logistics
Use of Technologies in Logistics Use of Technologies in Logistics
Use of Technologies in Logistics
 
Air Freight Forwarding Solutions: Tracking Capabilities | The Enterprise World
Air Freight Forwarding Solutions: Tracking Capabilities | The Enterprise WorldAir Freight Forwarding Solutions: Tracking Capabilities | The Enterprise World
Air Freight Forwarding Solutions: Tracking Capabilities | The Enterprise World
 
January 2013 world Pipeline magazine Article
January  2013 world Pipeline magazine ArticleJanuary  2013 world Pipeline magazine Article
January 2013 world Pipeline magazine Article
 
COVID green label
COVID green labelCOVID green label
COVID green label
 
smart security infrastructure
smart security infrastructuresmart security infrastructure
smart security infrastructure
 
archana50337.pptx
archana50337.pptxarchana50337.pptx
archana50337.pptx
 
Smart Security Infrastructure
Smart Security InfrastructureSmart Security Infrastructure
Smart Security Infrastructure
 
Location Based Services - IoT Enabled Solutions for Real-Time Location Update...
Location Based Services - IoT Enabled Solutions for Real-Time Location Update...Location Based Services - IoT Enabled Solutions for Real-Time Location Update...
Location Based Services - IoT Enabled Solutions for Real-Time Location Update...
 

More from Tristan Wiggill

Business Fleet Africa May 2023.pdf
Business Fleet Africa May 2023.pdfBusiness Fleet Africa May 2023.pdf
Business Fleet Africa May 2023.pdfTristan Wiggill
 
Business Fleet Africa April 2023.pdf
Business Fleet Africa April 2023.pdfBusiness Fleet Africa April 2023.pdf
Business Fleet Africa April 2023.pdfTristan Wiggill
 
Business Fleet Africa March 2023.pdf
Business Fleet Africa March 2023.pdfBusiness Fleet Africa March 2023.pdf
Business Fleet Africa March 2023.pdfTristan Wiggill
 
Business Fleet Africa January 2023.pdf
Business Fleet Africa January 2023.pdfBusiness Fleet Africa January 2023.pdf
Business Fleet Africa January 2023.pdfTristan Wiggill
 
Business Fleet Africa December 2022.pdf
Business Fleet Africa December 2022.pdfBusiness Fleet Africa December 2022.pdf
Business Fleet Africa December 2022.pdfTristan Wiggill
 
Business Fleet Africa November 2022.pdf
Business Fleet Africa November 2022.pdfBusiness Fleet Africa November 2022.pdf
Business Fleet Africa November 2022.pdfTristan Wiggill
 
Business Fleet Africa October 2022.pdf
Business Fleet Africa October 2022.pdfBusiness Fleet Africa October 2022.pdf
Business Fleet Africa October 2022.pdfTristan Wiggill
 
How do we keep Gauteng moving?
How do we keep Gauteng moving?How do we keep Gauteng moving?
How do we keep Gauteng moving?Tristan Wiggill
 
Gauteng Transport Authority update
Gauteng Transport Authority updateGauteng Transport Authority update
Gauteng Transport Authority updateTristan Wiggill
 
Road Funding in South Africa
Road Funding in South AfricaRoad Funding in South Africa
Road Funding in South AfricaTristan Wiggill
 
Self regulation and road funding perspectives from the road transport managem...
Self regulation and road funding perspectives from the road transport managem...Self regulation and road funding perspectives from the road transport managem...
Self regulation and road funding perspectives from the road transport managem...Tristan Wiggill
 
Roads: So how do we pay for them?
Roads: So how do we pay for them?Roads: So how do we pay for them?
Roads: So how do we pay for them?Tristan Wiggill
 
Road funding from a freight forwarding and logistics perspective
Road funding from a freight forwarding and logistics perspectiveRoad funding from a freight forwarding and logistics perspective
Road funding from a freight forwarding and logistics perspectiveTristan Wiggill
 
Feedback on DRiVE: Distance-based Road user charge Voluntary Experiment
Feedback on DRiVE: Distance-based Road user charge Voluntary ExperimentFeedback on DRiVE: Distance-based Road user charge Voluntary Experiment
Feedback on DRiVE: Distance-based Road user charge Voluntary ExperimentTristan Wiggill
 
E-tolls: The Impact on Development in Gauteng
E-tolls: The Impact on Development in GautengE-tolls: The Impact on Development in Gauteng
E-tolls: The Impact on Development in GautengTristan Wiggill
 
Transport and the economy: Understanding the relationship...and the dangers
Transport and the economy: Understanding the relationship...and the dangersTransport and the economy: Understanding the relationship...and the dangers
Transport and the economy: Understanding the relationship...and the dangersTristan Wiggill
 
Sout Africa's fuel price
Sout Africa's fuel priceSout Africa's fuel price
Sout Africa's fuel priceTristan Wiggill
 
The Future of National Roads: The 2030 Roads Plan and a Sustainable Funding M...
The Future of National Roads: The 2030 Roads Plan and a Sustainable Funding M...The Future of National Roads: The 2030 Roads Plan and a Sustainable Funding M...
The Future of National Roads: The 2030 Roads Plan and a Sustainable Funding M...Tristan Wiggill
 
Beneficiaries of an optimally designed transportation system
Beneficiaries of an optimally designed transportation system Beneficiaries of an optimally designed transportation system
Beneficiaries of an optimally designed transportation system Tristan Wiggill
 
Road Funds and Road User Charging in SADC
Road Funds and Road User Charging in SADC Road Funds and Road User Charging in SADC
Road Funds and Road User Charging in SADC Tristan Wiggill
 

More from Tristan Wiggill (20)

Business Fleet Africa May 2023.pdf
Business Fleet Africa May 2023.pdfBusiness Fleet Africa May 2023.pdf
Business Fleet Africa May 2023.pdf
 
Business Fleet Africa April 2023.pdf
Business Fleet Africa April 2023.pdfBusiness Fleet Africa April 2023.pdf
Business Fleet Africa April 2023.pdf
 
Business Fleet Africa March 2023.pdf
Business Fleet Africa March 2023.pdfBusiness Fleet Africa March 2023.pdf
Business Fleet Africa March 2023.pdf
 
Business Fleet Africa January 2023.pdf
Business Fleet Africa January 2023.pdfBusiness Fleet Africa January 2023.pdf
Business Fleet Africa January 2023.pdf
 
Business Fleet Africa December 2022.pdf
Business Fleet Africa December 2022.pdfBusiness Fleet Africa December 2022.pdf
Business Fleet Africa December 2022.pdf
 
Business Fleet Africa November 2022.pdf
Business Fleet Africa November 2022.pdfBusiness Fleet Africa November 2022.pdf
Business Fleet Africa November 2022.pdf
 
Business Fleet Africa October 2022.pdf
Business Fleet Africa October 2022.pdfBusiness Fleet Africa October 2022.pdf
Business Fleet Africa October 2022.pdf
 
How do we keep Gauteng moving?
How do we keep Gauteng moving?How do we keep Gauteng moving?
How do we keep Gauteng moving?
 
Gauteng Transport Authority update
Gauteng Transport Authority updateGauteng Transport Authority update
Gauteng Transport Authority update
 
Road Funding in South Africa
Road Funding in South AfricaRoad Funding in South Africa
Road Funding in South Africa
 
Self regulation and road funding perspectives from the road transport managem...
Self regulation and road funding perspectives from the road transport managem...Self regulation and road funding perspectives from the road transport managem...
Self regulation and road funding perspectives from the road transport managem...
 
Roads: So how do we pay for them?
Roads: So how do we pay for them?Roads: So how do we pay for them?
Roads: So how do we pay for them?
 
Road funding from a freight forwarding and logistics perspective
Road funding from a freight forwarding and logistics perspectiveRoad funding from a freight forwarding and logistics perspective
Road funding from a freight forwarding and logistics perspective
 
Feedback on DRiVE: Distance-based Road user charge Voluntary Experiment
Feedback on DRiVE: Distance-based Road user charge Voluntary ExperimentFeedback on DRiVE: Distance-based Road user charge Voluntary Experiment
Feedback on DRiVE: Distance-based Road user charge Voluntary Experiment
 
E-tolls: The Impact on Development in Gauteng
E-tolls: The Impact on Development in GautengE-tolls: The Impact on Development in Gauteng
E-tolls: The Impact on Development in Gauteng
 
Transport and the economy: Understanding the relationship...and the dangers
Transport and the economy: Understanding the relationship...and the dangersTransport and the economy: Understanding the relationship...and the dangers
Transport and the economy: Understanding the relationship...and the dangers
 
Sout Africa's fuel price
Sout Africa's fuel priceSout Africa's fuel price
Sout Africa's fuel price
 
The Future of National Roads: The 2030 Roads Plan and a Sustainable Funding M...
The Future of National Roads: The 2030 Roads Plan and a Sustainable Funding M...The Future of National Roads: The 2030 Roads Plan and a Sustainable Funding M...
The Future of National Roads: The 2030 Roads Plan and a Sustainable Funding M...
 
Beneficiaries of an optimally designed transportation system
Beneficiaries of an optimally designed transportation system Beneficiaries of an optimally designed transportation system
Beneficiaries of an optimally designed transportation system
 
Road Funds and Road User Charging in SADC
Road Funds and Road User Charging in SADC Road Funds and Road User Charging in SADC
Road Funds and Road User Charging in SADC
 

Recently uploaded

Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...lizamodels9
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...lizamodels9
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...lizamodels9
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfOrient Homes
 
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCRsoniya singh
 
Non Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxNon Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxAbhayThakur200703
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedKaiNexus
 
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | DelhiFULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | DelhiMalviyaNagarCallGirl
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
NewBase 22 April 2024 Energy News issue - 1718 by Khaled Al Awadi (AutoRe...
NewBase  22 April  2024  Energy News issue - 1718 by Khaled Al Awadi  (AutoRe...NewBase  22 April  2024  Energy News issue - 1718 by Khaled Al Awadi  (AutoRe...
NewBase 22 April 2024 Energy News issue - 1718 by Khaled Al Awadi (AutoRe...Khaled Al Awadi
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdfOrient Homes
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 

Recently uploaded (20)

Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
 
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
 
Non Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxNon Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptx
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
 
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | DelhiFULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
NewBase 22 April 2024 Energy News issue - 1718 by Khaled Al Awadi (AutoRe...
NewBase  22 April  2024  Energy News issue - 1718 by Khaled Al Awadi  (AutoRe...NewBase  22 April  2024  Energy News issue - 1718 by Khaled Al Awadi  (AutoRe...
NewBase 22 April 2024 Energy News issue - 1718 by Khaled Al Awadi (AutoRe...
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdf
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
Best Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting PartnershipBest Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting Partnership
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 

The use of data and technology in cargo risk management

  • 1. The Use of Technology in Cargo Risk Management Prof Alwyn Hoffman Northwest University Alwyn.Hoffman@nwu.ac.za 082 851 6537 1q
  • 2. Overview • DTI funded projects at NWU • Liaison with industry stakeholders • Different approaches to cargo risk management • Secure marking of products • Using electronic seals and vehicle tracking systems • Using the Internet and data analytics • Using trade corridor management systems • Finding an optimal mix of solutions • Piloting of proposed new solutions • Where to from here? 2
  • 3. DTI funded projects at NWU • Northwest University (NWU) is involved in a number of research projects that explore possibilities to improve the management of freight and the end-to-end management of trade corridors by using new technologies • One focus area is the improvement of overload control and cross-border operations by automatically analyzing data sets available from traffic cameras and customs systems in order to facilitate a Green Lanes concept for compliant operators • Another area of focus is to reduce the risk of freight in transit from the perspective of the cargo owner by making freight movements visible and traceable using available data • The long term goal is to create a practically proven blue-print that will encompass both efficiency and security requirements using a common technology platform 3
  • 4. Liaison with industry stakeholders • Studies are being conducted in cooperation with SARS, SADC Transit Task Team and SAAFF for regional trade corridors • Systems were implemented at Durban harbor in cooperation with TPT to demonstrate automated verification of electronic seals used on containerized cargo • Vehicle GPS tracking data is being collected for some of the major transport operators to study deviations from plan that contribute towards productivity losses and risk • In cooperation with Sanral and provincial DoTs data is being collected from existing traffic camera and WIM scale systems to detect compliance of vehicles with overload control measures and deviations from trip plans • An agreement has been reached with SAAFF (freight forwarders) to centrally collect data for all cross-border operations to identify the reasons for delays 4
  • 5. Different approaches to cargo risk management • Using high integrity product markings (e.g. Microdots or Digital Signatures) • Using physical security (armed escorts) to prevent losses • Using 24/7 tracking of vehicles combined with electronic seals to provide early warning of risk incidents • Using end-to-end spot checking of cargo (based on traffic cameras and RFID readers) plus control over hand-over transactions to track transfer of culpability • Using Call Centres and the Internet to systematically record data on cargo security events, combined with Data Analytics to detects patterns • Using a combination of all of the above 5
  • 6. The challenge is to find a common solution that will address the needs for 6 Insurance Compliance, Cargo Protection and Global Logistics Visibility
  • 7. Key Requirements for High Integrity Supply Chains • Reassurance to End-users DESIGN AND ENGINEERING DISTRIBUTION CENTERSSUPPLIERS MANUFACTURING PLANTS CUSTOMERS END USERS PULL PULL PULL PULL PULL • Product and Source Authenticity • Product Traceability • Operator Liability
  • 8. Tier 1: Enabling Branded Cargo Protection with Secure Product Markings • Traditional techniques to protect branded products suffer from serious weaknesses: • Holograms and security inks are easily cloned • Serial numbers can be copied and need online verification • The Electronic Banking industry solved the problem of cloned identities by using Digital Signatures • Branded products can be protected in the same way by writing a unique Digital Signature into each product identifier • Revenue authorities can use the same authentic markings to verify item level tax compliance
  • 9. New ISO Standard for Secure Item Marking • Previous DTI THRIP project at NWU led to the development of a new standard SANS1368, in cooperation with the SABS and local industry, for the authentic marking of physical items based on 2D barcodes or RFID • This standard utilizes ISO standard encryption techniques and describes the process to be followed to mark items like manufactured products or documents in such a way that the source of origin can be securely determined in offline mode • The improved version ISO/IEC WD 20248: Information technology — Automatic identification and data capture techniques — Data structures — Digital signature meta structure has been accepted by the relevant ISO committee (USA, UK, China, France, etc.) 9
  • 10. Tier 2: Solving the Logistics Problem: Cargo Item Tracking Based on Passive RFID Cargo items are marked using both barcoding and low cost RFID labels Back-end system is updated to reflect current status of cargo items to improve logistics management and to reconcile stock figures Movements of items are tracked using either installed or handheld RFID readers
  • 11. Tier 3: Using trails of custody enabled by passive electronic cargo seals to ensure end- to-end secure supply chains Passive RFID e-seal using on containers and trucks to allow verification of cargo security status At each point of hand-over or delivery the identity of the truck and status of the cargo are automatically detected In fully automated mode the identity of the truck, driver and container and status of e-seal is detected without human intervention and cargo flow can be controlled automatically Information about each cargo event is dispatched to central system Details of sealing and dispatch transactions are securely recorded The status of the e-seal is verified manually Controller Reader Boom
  • 12. Tier 4: End-to-end monitoring of cargo movements using existing GPS tracking and camera systems Certified transport operator submits declaration to SAIA of internal cargo sealing, weight control, authorization of dispatch and route plan SAIA system identifies traffic cameras and WIM scales along route where vehicle should be spotted If vehicle was not seen, if it did not use the WIM scale lane or if the weight changed significantly an alarm is recorded and a supervisor is notified Information about cargo movements for entire fleets is accumulated and a behavioral track record is created to be used in SAIA risk assessments Details of sealing, weighing and dispatch transactions are securely recorded on centralized SAIA system SAIA system use GPS tracking data from certified operator to determine when vehicle should be spotted by traffic camera and WIM scale
  • 13. Tier 5: Using 24/7 tracking of vehicles combined with active electronic seals to provide early warning of risk incidents 13 demonstrate
  • 14. Tier 6: Using Call Centres, the Internet and Data Analytics Information on cargo security incident is communicated to Call Centre Internet searches are performed to detect potentially related commercial activities – sale of stolen cargo Cargo loss data is systematically recorded in a database representing the entire industry Authorities are informed about suspicious cases
  • 15. The Objective: End-To-End Audit Trails to Track Transfer of Culpability Step # 1: Container trail of custody initiated by cargo owner Unique tag ID E-Seal serial # Cargo Owner ID Encrypted Auth Code Step # 2: Container trail of custody appended by Shipper Unique tag ID E-Seal serial # Cargo Owner ID Encrypted Auth Code Shipper IDStep # 3: Container trail of custody appended at Customs Unique tag ID E-Seal serial # Cargo Owner ID Customs ID Shipper ID Encrypted Auth Code Step # 4: Container trail of custody appended by Transporter Unique tag ID E-Seal serial # Cargo Owner ID Customs ID Shipper ID Transporter ID Encrypted Auth Code Step # 5: Verification by Inspectors Step # 6: Verification by Recipient
  • 16. Key Technologies • Digital Signatures verified offline: – Detects data tampering – Detects the legal source of markings – Detects the original document • Web Services – Enables Cloud and Mobile services • Smart Phones with camera & GPS – Personalised ownership • QR Barcodes as read by all smart phones • RFID – Radio Frequency Identification – Cheap standard USB and Blue Tooth readers interface with smart phones CID VCS Signer
  • 17. Digital Signature Real Electronic Digital Identity Signer Digital Signatures is a de facto International encryption Standard used widely by Banks and Web Services to create integrity and privacy in online services. Digital Signatures have been legalised by many countries to be prima facia evidence. iDocTrust invented a Digital Signature [DigSig] small enough to fit into QR Barcodes and RFID Tags creating a method to offline verify the integrity of physical documents. • The DigSig allows the verification of the document legal source and integrity. • The DigSig in a barcode allows offline data tamper detection. • The DigSig in a RFID Tag allows the offline detection of the original document.
  • 18. Goods Marking SCM Shipment Tracking System Supply Chain Management System Goods Receive -Items -Boxes Inventory Control -Items -Boxes Shipments -Compile -Dispatch Shipments -Compile -Dispatch Goods Authentication -Source -Channel Anti- theftTransfer Transfer SCTS Data Vault Fraud Agent System Retailer SystemManufacturer System Trusted Third Party Certification Authority Overview of Typical Supply Chain Trust Service System SCTS System
  • 19. Goods Marking Goods Receive -Items -Boxes Inventory Control -Items -Boxes Shipments -Compile -Dispatch Shipments -Compile -Dispatch Goods Authentication -Source -Channel Anti- theftTransfer Transfer SCTS Data Vault Fraud Agent System Retailer SystemManufacturer System Trusted Third Party Certification AuthorityStep 1 SC Principal provide Fraud Agent wih business rules for flow of products Supply Chain Trust Service System Operation: Step 1 Supply Chain Management System
  • 20. SCTS Data Vault Goods Marking Shipments -Compile -Dispatch Manufacturer System Step 2 Implement iDocTrust authentication technique: – generate labels containing digital certificates with secure reference to authorised issuer –Store copy of Digital Signature in SCTS Data Vault Digital Certificates Digital Evidence TTP CA Supply Chain Trust Service System Operation: Step 2 CID VCS Signer
  • 21. Goods Marking Goods Receive -Items -Boxes Inventory Control -Items -Boxes Shipments -Compile -Dispatch Shipments -Compile -Dispatch Goods Authentication -Source -Channel Anti- theftTransfer Transfer SCTS Data Vault Fraud Agent System Retailer SystemManufacturer System Step 3 Mark items at manufacturer with labels that contains DigSig Authentication Information TTP CA Supply Chain Trust Service System Operation: Step 3 Supply Chain Management System
  • 22. Goods Marking Goods Receive -Items -Boxes Inventory Control -Items -Boxes Shipments -Compile -Dispatch Shipments -Compile -Dispatch Goods Authentication -Source -Channel Anti- theftTransfer Transfer SCTS Data Vault Fraud Agent System Retailer SystemManufacturer System Trusted Third Party Certification Authority Step 4 •Capture transaction information when transferring products from Manufacturer to Distributor •Transaction information includes: -Goods IDs -Human operator biometrics -Time -Place Supply Chain Trust Service System Operation: Step 4 Supply Chain Management System
  • 23. Goods Marking Goods Receive -Items -Boxes Inventory Control -Items -Boxes Shipments -Compile -Dispatch Shipments -Compile -Dispatch Goods Authentication -Source -Channel Anti- theftTransfer Transfer SCTS Data Vault Fraud Agent System Retailer SystemManufacturer System Trusted Third Party Certification Authority Step 5 Authentic Transaction information is sent automatically to SCM and Fraud Agent system and to SCTS Data Vault Digital Evidence Supply Chain Trust Service System Operation: Step 5 Supply Chain Management System
  • 24. Goods Receive -Items -Boxes Inventory Control -Items -Boxes Shipments -Compile -Dispatch SCTS Data Vault Fraud Agent System Trusted Third Party Certification Authority Step 6 During Inventory Control the authenticity of items is verified offline using DigSig information on labels Supply Chain Trust Service System Operation: Step 6 Supply Chain Management System
  • 25. Goods Receive -Items -Boxes Inventory Control -Items -Boxes Shipments -Compile -Dispatch SCTS Data Vault Fraud Agent System Trusted Third Party Certification Authority Step 7 If discrepancy is detected fraud detection systems are automatically informed Supply Chain Trust Service System Operation: Step 7 Supply Chain Management System
  • 26. Goods Marking Goods Receive -Items -Boxes Inventory Control -Items -Boxes Shipments -Compile -Dispatch Shipments -Compile -Dispatch Goods Authentication -Source -Channel Anti- theftTransfer Transfer SCTS Data Vault Fraud Agent System Retailer SystemManufacturer System Trusted Third Party Certification Authority Step 8 •Capture transaction information when transferring products from Distributor to Retailer •Transaction information includes: -Goods IDs -Human operator biometrics -Time -Place Supply Chain Trust Service System Operation: Step 8 Supply Chain Management System
  • 27. Goods Marking Goods Receive -Items -Boxes Inventory Control -Items -Boxes Shipments -Compile -Dispatch Shipments -Compile -Dispatch Goods Authentication -Source -Channel Anti- theftTransfer Transfer SCTS Data Vault Fraud Agent System Retailer SystemManufacturer System Trusted Third Party Certification Authority Step 9 Authentic Transaction information is sent automatically to Distributor and Fraud Agent system and to SCTS Data Vault Digital Evidence Supply Chain Trust Service System Operation: Step 9 Supply Chain Management System
  • 28. SCTS Data Vault Fraud Agent System Trusted Third Party Certification Authority Step 10 During Inventory Control at Retailer the authenticity of items is verified offline using DigSig information on labels Supply Chain Trust Service System Operation: Step 10 Goods Authentication -Source -Channel Anti- theft Retailer System
  • 29. Goods Receive -Items -Boxes Inventory Control -Items -Boxes Shipments -Compile -Dispatch SCTS Data Vault Fraud Agent System Trusted Third Party Certification Authority Step 11 If discrepancy is detected SCTS, Retailer, Distributor and Fraud Agent systems are automatically informed Supply Chain Trust Service System Operation: Step 11 Supply Chain Management System Goods Authentication -Source -Channel Anti- theft Retailer System
  • 30. Goods Marking Goods Receive -Items -Boxes Inventory Control -Items -Boxes Shipments -Compile -Dispatch Shipments -Compile -Dispatch Goods Authentication -Source -Channel Anti- theftTransfer Transfer SCTS Data Vault Fraud Agent System Retailer SystemManufacturer System Trusted Third Party Certification Authority Step 12 Fraud Agent applies SC Principal business rules to track&trace and discrepancy information to generate list of exceptions Supply Chain Trust Service System Operation: Step 12 Supply Chain Management System
  • 31. Goods Marking Goods Receive -Items -Boxes Inventory Control -Items -Boxes Shipments -Compile -Dispatch Shipments -Compile -Dispatch Goods Authentication -Source -Channel Anti- theftTransfer Transfer SCTS Data Vault Fraud Agent System Retailer SystemManufacturer System Trusted Third Party Certification Authority Step 13 If fraudulent activities are suspected the Fraud Agent request a disclosure from the SCTS Data Vault to compile Evidence Trail Request Disclosure Supply Chain Trust Service System Operation: Step 13 Supply Chain Management System
  • 32. Goods Marking Goods Receive -Items -Boxes Inventory Control -Items -Boxes Shipments -Compile -Dispatch Shipments -Compile -Dispatch Goods Authentication -Source -Channel Anti- theftTransfer Transfer SCTS Data Vault Fraud Agent System Retailer SystemManufacturer System Trusted Third Party Certification Authority Step 14 Fraud Agent provides SC Principal with a forensic report (including complete Evidence Trail) and take appropriate action on behalf of the SC Principal Supply Chain Trust Service System Operation: Step 14 Forensic Report Actions against Fraudulent Parties Actions against Fraudulent Parties Supply Chain Management System
  • 33. SCTS Business Model 2. Evidence Recording Click fee Fraud Agent Data Vault 1. Digital Certification Click fee 4. Anomaly Detection Subscription fee 3. Disclosure Request Service fee
  • 34. SCTS Disclosure & Contracting Brand Owner Principal Logistics Service Provider Manufacturer Distributor Court Service Contract Inspection Agreement Service Level Agreement Fraud Agent Court Order for Disclosure Trace Elements of Anomaly Disclosure Recorded Trail of Evidence Service Level Agreement
  • 35. Where to from here? • Satellite Tracking Technology used to be an effective tool in fighting vehicle and cargo theft but is impacted by jamming • Electronic sealing and traffic camera systems can add further data to reduce cargo risks • Secure product markings is however the best long term cure against large scale cargo theft and illegal trade • The possibility exist to link cargo risk management systems to future Green Lanes systems to provide further benefits to cargo owners by streamlining Trade Corridors • NWU is conducting pilot projects with DTI and industry organizations to create blue-prints for new logistics performance and risk management solutions • The transport and cargo insurance industry is invited to lend its support through active participation of its members 35