24 6 2011 Port Security

764 views

Published on

totem africa port security proposal

Published in: Business, Technology
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
764
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
21
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide

24 6 2011 Port Security

  1. 1. Heightening port security withtechnological advancements in Africa<br />6/24/2011<br />1<br />Totem International Ltd<br />
  2. 2. 6/24/2011<br />Totem International Ltd<br />2<br /> Heightening port security with technological advancements in Africa<br />  <br /> <br />Firoze Zia Hussain<br /> CEO & Director Totem International Ltd, India<br /> <br /> An electronics and communication engineer who is a forward thinking and energetic professional recognized for high-profile turnaround achievements. Was highly decorated law enforcement professional with more than 10 years experience in security function. Successful and consistent record of investigations, and crime prevention. Participant of the US State Department Young Leaders Exchange Program.Successfully executed project work and technology transfer/ collaboration at India's largest Printed Circuit Board manufacturing plant of INDAL electronics. Pursued consultancy in Quality Circle, ISO9000, JIT, Kaizen, TQM, Taguchi’s techniques of experimentation .A widely traversed person with diverse contacts in global distribution of chemicals and security products.<br /> <br /> <br />
  3. 3. Totem International Ltd<br />
  4. 4. 6/24/2011<br />Totem International Ltd<br />4<br />
  5. 5. 9.00am-9.30am <br />Introduction-Importance of Port Security<br />6/24/2011<br />Totem International Ltd<br />5<br />
  6. 6. Introduction To Port Security<br /><ul><li>IMO
  7. 7. ISPS code(2002)
  8. 8. SOLAS</li></ul>6/24/2011<br />6<br />Totem International Ltd<br />
  9. 9. Importance of port security<br /><ul><li>Bulk of African exports is through ports.
  10. 10. 2% of the world trade.
  11. 11. Trades & profits.
  12. 12. Extensively used conveyance for </li></ul> transportation.<br /><ul><li>Increases Africa’s Natural Resources.</li></ul>6/24/2011<br />7<br />Totem International Ltd<br />
  13. 13. Port Security can prevent<br /><ul><li>Pirates/Terrorist Attacks.
  14. 14. Smuggling of weapons.
  15. 15. Illegal S/W issues & Immigration.</li></ul>6/24/2011<br />8<br />Totem International Ltd<br />
  16. 16. Technological models to enhance efficiency at ports<br />6/24/2011<br />9<br />Totem International Ltd<br />
  17. 17. Technologies' in ports<br />6/24/2011<br />10<br />Totem International Ltd<br />
  18. 18. Radio Frequency Identification<br />6/24/2011<br />Totem International Ltd<br />11<br />A method of communication wirelessly with a small microchip<br />The chip contains a unique serial number and optional memory<br />A chip combined with an antenna = Intelligent Label<br />or RFID tag or transponder or smart tag or inlay<br />Transponders are available as active (on-board<br />battery) , semi-active (on-board battery) or passive<br />Typical life of around 10 years (or 100k write operation)<br />Multiple read/write operations<br />No line-of-sight required<br />Multiple tags can be read at the same time<br />
  19. 19. RFID Technology<br /><ul><li>ADC technology.
  20. 20. An Rfid System</li></ul> Compromises of<br /><ul><li>One or more RF tags
  21. 21. Two or more antennas
  22. 22. One or more interrogators
  23. 23. One or more host computers
  24. 24. Appropriate software</li></ul>6/24/2011<br />12<br />Totem International Ltd<br />
  25. 25. Handheld RFID Reader<br />
  26. 26. RFID works on different frequencies<br />125 KHz – LF (Low Frequency)<br />13.56 MHz – HF (High Frequency)<br />860 -960 MHz – UHF (Ultra High <br /> Frequency)<br />2.45 GHz – UHF / Microwave <br /> (Some Semi-Active <br /> and Active Readers <br /> are using this frequency)<br />6/24/2011<br />Totem International Ltd<br />14<br />
  27. 27. Benefits Through Rfid In Ports<br /> Access Control<br /> Container Security<br /> RFID IN <br /> PORTS<br />Container Identification and Location<br />Activity Tracking<br />Regulatory Compliance<br />6/24/2011<br />15<br />Totem International Ltd<br />
  28. 28. GPS Technology<br /><ul><li>Track the position
  29. 29. To avoid theft
  30. 30. Highly effective & reliable
  31. 31. What is happening.
  32. 32. used from any where</li></ul> by gps device.<br /><ul><li>Device may size like a </li></ul>watch or button on collar<br />6/24/2011<br />16<br />Totem International Ltd<br />
  33. 33. Cloud Technology<br />6/24/2011<br />17<br />Totem International Ltd<br />
  34. 34. Uses of Cloud Technology<br /><ul><li>Reduces Cost
  35. 35. Increases Information Storage
  36. 36. No longer need to concentrate in constant updates
  37. 37. can gather information even if away</li></ul>6/24/2011<br />18<br />Totem International Ltd<br />
  38. 38. Biometrics Technology<br />6/24/2011<br />19<br />Totem International Ltd<br />
  39. 39. Uses of Biometrics<br />Increases Security.<br />Reduces fraud.<br />provides viable solution to port security.<br />Can know who did what ,when and where.<br />Increases ROI.<br />6/24/2011<br />20<br />Totem International Ltd<br />
  40. 40. Wireless Technologies<br />Flow of information <br />Port<br />Dock Side<br />Employees<br />Head office<br />Clients<br /> Sea<br />6/24/2011<br />21<br />Totem International Ltd<br />
  41. 41. Value added Services<br /><ul><li>Crane scheduling systems and communication
  42. 42. Ship-to-shore communication
  43. 43. Container operations and management
  44. 44. RoRo facilities
  45. 45. Customs office
  46. 46. Harbour Masters office
  47. 47. Emergency services
  48. 48. Wireless network
  49. 49. IT infrastructure
  50. 50. Security and access control
  51. 51. Gate management
  52. 52. Corporate, financial, human resources
  53. 53. Services for tenants.</li></ul>6/24/2011<br />22<br />Totem International Ltd<br />
  54. 54. 9.30am-10.00am<br />Installing Port Perimeter Security<br />6/24/2011<br />Totem International Ltd<br />23<br />
  55. 55. Installing Port Perimeter Security<br />6/24/2011<br />24<br />Totem International Ltd<br />
  56. 56. 6/24/2011<br />Totem International Ltd<br />25<br />
  57. 57. Perimeter Surveillance includes four basic systems<br /><ul><li>Sensors
  58. 58. Video Detection Systems
  59. 59. Threat assessment and Alarm </li></ul> Management Systems<br /><ul><li>Data Communications Systems</li></ul>6/24/2011<br />Totem International Ltd<br />26<br />
  60. 60. Sensors<br /><ul><li> Barrier Sensors
  61. 61. Volumetric Sensors
  62. 62. Fence Mounted Sensors</li></ul>6/24/2011<br />Totem International Ltd<br />27<br />
  63. 63. Video Detection Systems<br />6/24/2011<br />Totem International Ltd<br />28<br />
  64. 64. Threat Assessment and Alarm Management Systems<br />6/24/2011<br />Totem International Ltd<br />29<br />
  65. 65. 6/24/2011<br />Totem International Ltd<br />30<br />
  66. 66. Intrusion Detection<br />6/24/2011<br />Totem International Ltd<br />31<br />
  67. 67. Data Communications Systems<br />6/24/2011<br />Totem International Ltd<br />32<br />
  68. 68. Indoor sensors<br /><ul><li> Passive infrared detectors
  69. 69. Ultrasonic detectors
  70. 70. Microwave detectors
  71. 71. Photo-electric beams
  72. 72. Glass break detectors
  73. 73. Smoke, heat &carbon monoxide</li></ul> detectors<br />6/24/2011<br />33<br />Totem International Ltd<br />
  74. 74. Out Door Sensors<br /><ul><li> Vibration (shaker) or </li></ul> inertia sensors<br /><ul><li> Passive magnetic field </li></ul> detection<br /><ul><li> E-field
  75. 75.  Microwave barriers
  76. 76.  Microphonic systems
  77. 77. Taut wire fence systems
  78. 78. Fibre optic cable
  79. 79. H-field</li></ul>6/24/2011<br />34<br />Totem International Ltd<br />
  80. 80. Monitored Security Solutions<br />linked via the telephone line or cellular network or both to an Alarm Receiving Centre (ARC).<br />contacting the right Authority - i.e. the police usually, or the Fire & Rescue Service (FRS) in the case of a fire - if there is an activation. <br />highest standards of operation.<br />6/24/2011<br />35<br />Totem International Ltd<br />
  81. 81. Passive systems<br />6/24/2011<br />Totem International Ltd<br />36<br /><ul><li>Detects a potential security breach
  82. 82. logs the information
  83. 83. signals an alert on the console and or owner.</li></li></ul><li> Reactive Systems<br /> intrusion prevention system (IPS).<br />auto-responds to the suspicious activity.<br /> reprogramming the firewall to block network traffic from the suspected malicious source.<br /> IDPS is used automatically <br /> at the command of an operator; systems that both "detect" (alert) and/or "prevent."<br />6/24/2011<br />37<br />Totem International Ltd<br />
  84. 84. <ul><li>Detection/alarm system.
  85. 85. Deter theft as well as vandalism.
  86. 86. 24-hour protection of your assets and resources.
  87. 87. Lower their risks associated with theft.
  88. 88. Decreasing costs associated with .</li></ul> * insurance premiums.<br />repair or replacement of property or equipment that has been damaged.<br />6/24/2011<br />38<br />Totem International Ltd<br />
  89. 89. 10.00am-10.30 am<br />Access Control<br />6/24/2011<br />Totem International Ltd<br />39<br />
  90. 90. Access Control<br />6/24/2011<br />40<br />Totem International Ltd<br />
  91. 91. Installing Rfid at Ports<br />6/24/2011<br />41<br />Totem International Ltd<br />
  92. 92. RFID tags<br />1 Passive Tags<br /> have no internal power supply. <br /> electrical current induced in the antenna by the incoming rf signal.<br /> Provides power for the chip to power up and transmit .<br />2Active Tags<br />contain sensors,<br /> global positioning (GPS), <br /> satellite links,<br /> other enhancements<br />3. Semi-active tags<br /> battery is used to power sensors <br /> volatile memory.<br /> contactless smart cards<br />6/24/2011<br />42<br />Totem International Ltd<br />
  93. 93. Why RFID?<br />6/24/2011<br />Totem International Ltd<br />43<br />
  94. 94. Access Control<br />Employee ID:<br />Smart and SecureTradelanes (SST).<br />Container Security Initiatives (CSI).<br />prevent loss and possible mischief.<br />Also contain biometric information such as a photograph.<br />closed circuit TV (CCTV)<br />6/24/2011<br />44<br />Totem International Ltd<br />
  95. 95. Vehicle Control<br /><ul><li>Equipping vehicles with RFID tags.
  96. 96. record the exact time of entrance & exit.
  97. 97. unlock fuel pumps and record fuel usage.</li></ul>6/24/2011<br />45<br />Totem International Ltd<br />
  98. 98. Container Security<br />sensors to monitor environmental conditions within the container.<br />GPS, sensors, and satellite phone capabilities to constantly report the location of the container.<br />satellite phone portals for commercial shippers.<br />6/24/2011<br />46<br />Totem International Ltd<br />
  99. 99. Container Identification and Location<br /><ul><li>Container Tagging
  100. 100. Location Tracking
  101. 101. Activity Tracking</li></ul>6/24/2011<br />47<br />Totem International Ltd<br />
  102. 102. Regulatory compliance<br />(AIDC) technologies + RFID<br />Assures that container integrity has been maintained<br />Containers can be ‘fast tracked’ on arrival.<br />6/24/2011<br />48<br />Totem International Ltd<br />
  103. 103. Containers with RFID enable shippers and carriers to:<br /><ul><li>container security and integrity.
  104. 104. Speed shipments.
  105. 105. Verify that a container was loaded at a secure loading point.
  106. 106. Significantly reduce the likelihood a tamper event happened in
  107. 107. Transit with container accountability from point of origin to</li></ul> destination.<br /><ul><li>Gather enough data to conduct a ‘virtual inspection’ in advance</li></ul> of arrival.<br /><ul><li>Guarantee that shipping containers meet governmental security</li></ul> regulations.<br /><ul><li>Receive fast track or ‘green lane’ handling through customs at</li></ul> the point of dispatch and / or the point of receipt.<br /><ul><li> Avoid extensive delays in the shipment and receipt.
  108. 108. Minimise the cost of handling.</li></ul>6/24/2011<br />49<br />Totem International Ltd<br />
  109. 109. Biometrics a possible solution to improve efficiency<br />6/24/2011<br />50<br />Totem International Ltd<br />
  110. 110. Personal identity<br />6/24/2011<br />51<br />Totem International Ltd<br />
  111. 111. Verification<br />6/24/2011<br />52<br />Totem International Ltd<br />
  112. 112. Working principle<br />6/24/2011<br />53<br />Totem International Ltd<br />
  113. 113. Hand geometry technology to improve efficiency<br />6/24/2011<br />54<br />Totem International Ltd<br />
  114. 114. <ul><li>Identifies users by the shape of their hands.
  115. 115. The preferred technology for high-security applications.
  116. 116. Very reliable when combined with other forms of identification.
  117. 117. Hand scanners have a twenty-six bit Wiegand output format as one of the menu choices.</li></ul>6/24/2011<br />55<br />Totem International Ltd<br />
  118. 118. Implementation Issues<br /><ul><li>Card Reader Emulation.
  119. 119. Stand Alone Access Control
  120. 120. Privacy Issues
  121. 121. Operation by Disabled People
  122. 122. Outdoor Conditions</li></ul>6/24/2011<br />56<br />Totem International Ltd<br />
  123. 123. Applications<br />Parking Lot Application<br />Cash Vault Applications<br />Dual Custody Applications<br />Anti-passback<br />Time and Attendance<br />Point of Sale Applications<br />Interactive Kiosks<br />6/24/2011<br />57<br />Totem International Ltd<br />
  124. 124. 10.30am-11.00am<br />Dealing with Nuclear Threats at Ports<br />6/24/2011<br />Totem International Ltd<br />58<br />
  125. 125. Nuclear Threats at Ports<br />6/24/2011<br />59<br />Totem International Ltd<br />
  126. 126. Anatomy of a Civil Emergency Incident<br />Primary<br />Incident<br />Secondary<br />Air/Ground/Water<br />Contamination<br />People<br />6/24/2011<br />60<br />Totem International Ltd<br />
  127. 127. Hazards<br /> C = Chemical<br /> B = Biological<br /> R = Radiological<br /> N = Nuclear<br /> E = Explosive<br />6/24/2011<br />61<br />Totem International Ltd<br />
  128. 128. Examples of Hazards<br />Chemical Warfare Agents<br />Biological Warfare Agents<br />Dirty Bombs<br />White Powder Incidents<br />6/24/2011<br />62<br />Totem International Ltd<br />
  129. 129. Chemical Warfare Agents<br />Chemical warfare agents can be divided into the following:<br />Lethal agents<br />Nerve Agents <br />Asphyxiant/blood agents<br />Vesicant/blister Agents<br />Pulmonary/choking Agents<br />Non lethal agents<br /> Incapacitating agents<br /> Riot Control Agents<br />6/24/2011<br />63<br />Totem International Ltd<br />
  130. 130. Chemical Warfare Agents<br />Nerve Agent<br />Affects the communication between nerve cells, causing <br />uncontrollable muscle stimulation <br />Typical Symptoms:<br />Nerve agent types:<br />G- Agents<br />Tabun (GA) <br /> Sarin (GB) <br /> Soman (GD)<br /> Cyclosarin (GF)<br />V Agents<br /> VE<br /> VG<br /> VM<br /> VX<br />Blurred/dim vision<br />Headache<br />Nausea<br />Vomiting<br />Diarrhoea<br />Secretions and sweating<br />Muscle twitching<br />Laboured breathing<br />Seizures<br />Loss of consciousness<br />6/24/2011<br />64<br />Totem International Ltd<br />
  131. 131. Biological Warfare Agents<br />Biological warfare agents can be divided into the following:<br />Lethal agents<br />Bacteria<br />Viruses<br />Toxins derived from bacteria<br />Toxins derived from plants<br />6/24/2011<br />65<br />Totem International Ltd<br />
  132. 132. Proton<br />(Positive)<br />Nucleus<br />Neutron<br />(Neutral)<br />Electron<br />(Negative)<br />Dirty Bombs<br />3 Types of Ionising Radiation<br />An Atom<br />β<br />Beta<br />Particles<br />γ<br />Gamma<br />Rays&<br />X Rays<br />α<br />Alpha<br />Particles<br />Aluminium<br />Lead<br />6/24/2011<br />66<br />Totem International Ltd<br />
  133. 133. Who responds and how?<br />Different countries; different processes<br />E.g. Israel & France: no decontamination at scene etc<br />Development of “Zones” <br />Hot zone, warm zone, cold zone<br />Contaminated, decontamination, clean.<br />6/24/2011<br />67<br />Totem International Ltd<br />
  134. 134. Exclusion (Hot) Zone<br />Access Control Points<br />Contamination Reduction (Warm) Zone<br />Wind<br />Drainage<br />Support (Cold) Zone<br />Typically Half-mask/disposable/skin protection – if nec.<br />Typically SCBA/Gas suits<br />Crowd Control Line<br />Decontamination Line<br />Hot Line<br />Typically Full-face/ appropriate filter/suit or P&SA/ suit<br />Protection Level C<br />Protection Level B<br />Protection Level A<br />6/24/2011<br />68<br />Totem International Ltd<br />
  135. 135. Zone Description<br />6/24/2011<br />69<br />Totem International Ltd<br />
  136. 136. Desired Response<br />Police<br />Warm & Cold Zone<br />Reconnaissance<br />Crime SceneManagement<br />Firearms use<br />Fire & Ambulance<br />Warm Zone<br />Triage<br />Mass Decontamination<br />Casualty Transport<br />Fire Service<br />Hot Zone<br />Detection, Identification & Monitoring<br />Reconnaissance<br />Search & Rescue<br />6/24/2011<br />70<br />Totem International Ltd<br />
  137. 137. Dealing with the Nuclear Threats<br />6/24/2011<br />Totem International Ltd<br />71<br />
  138. 138. 6/24/2011<br />Totem International Ltd<br />72<br />
  139. 139. 6/24/2011<br />Totem International Ltd<br />73<br />
  140. 140. 6/24/2011<br />Totem International Ltd<br />74<br />
  141. 141. 11.00am - 11.30am<br /> Morning Refreshments & Networking<br />6/24/2011<br />Totem International Ltd<br />75<br />
  142. 142. 11.30am -12.00pm<br /> Benefits of Electronic Surveillance<br />6/24/2011<br />Totem International Ltd<br />76<br />
  143. 143. Benefits of Electronic surveillance<br /> Installing Night vision equipment<br /><ul><li>They are good when you want to get a better look at a</li></ul> specific object and then return to normal viewing <br /> Conditions.<br /><ul><li>Have a single lens or stereo lens, depending on the model , excellent for constant viewing, such as moving around in a dark building.
  144. 144. Cameras with night-vision technology can send the image to a monitor for display or to a VCR for recording. When night-vision capability is desired in a permanent location, such as on a building or as part of the equipment in a helicopter, cameras are used..</li></ul>6/24/2011<br />77<br />Totem International Ltd<br />
  145. 145. Purpose of Night vision Camera’s<br />To locate enemy targets at night<br />For navigation, surveillance and targeting<br />It reveals whether an area has been disturbed.<br />To discover items that have been hidden by criminals, including money, drugs and bodies. <br />Changes to areas such as walls can be seen using thermal imaging.<br />6/24/2011<br />78<br />Totem International Ltd<br />
  146. 146. Thermal imaging cameras<br /><ul><li>All thermal imaging</li></ul> cameras have infrared detector.<br /><ul><li>use these cameras to locate targets, track people, intelligence gathering and surveillance
  147. 147. used for surveillance and security.
  148. 148. can detect the minute temperature changes and this is generated as an image on a screen.
  149. 149. now cameras are available for other purposes like sensing sailing boats.</li></ul>6/24/2011<br />79<br />Totem International Ltd<br />
  150. 150. 6/24/2011<br />Totem International Ltd<br />80<br />
  151. 151. Benefits of Low lux camera’s<br />6/24/2011<br />81<br />Totem International Ltd<br />
  152. 152. High mega pixel cameras<br /><ul><li> IP security cameras provide optimum picture quality and better frame.
  153. 153.  These cameras use inexpensive sensors and mechanical shutters to control exposure and time
  154. 154. Offers a way to increase the detailed capture within an image without sacrificing the area of the camera.</li></ul>6/24/2011<br />82<br />Totem International Ltd<br />
  155. 155. 12.00pm-1.00pm<br /> Crisis Response & Management<br />6/24/2011<br />Totem International Ltd<br />83<br />
  156. 156. Crisis response and management<br />Likely situations at the port:<br /><ul><li>Theft of containerized cargo
  157. 157. high-risk containers
  158. 158. Terrorist Attacks
  159. 159. Smuggling
  160. 160. Explosion
  161. 161. Thefts during loading and unloading of cargo</li></ul>6/24/2011<br />84<br />Totem International Ltd<br />
  162. 162. Theft of Cargo can be avoided through Rfid Technology<br />6/24/2011<br />Totem International Ltd<br />85<br />
  163. 163. Vehicle Control<br />6/24/2011<br />Totem International Ltd<br />86<br />
  164. 164. <ul><li>Vehicle access control
  165. 165. Vehicle identification & tracking
  166. 166. Trailer identification & tracking
  167. 167. Transport, fleet & yard management
  168. 168. Driver authorisation
  169. 169. Parking management
  170. 170. Machine safety & auto shut of</li></ul>6/24/2011<br />Totem International Ltd<br />87<br />
  171. 171. Boom Barriers<br />6/24/2011<br />Totem International Ltd<br />88<br />
  172. 172. Bollards<br />6/24/2011<br />Totem International Ltd<br />89<br />
  173. 173. Walk Through Metal Detector<br />6/24/2011<br />Totem International Ltd<br />90<br /> scanning from both sides<br /> provides superior detection<br />superior target analysis<br />uniformity and performance<br />ferrous and non-ferrous weapons detection<br />designed for mass transit, loss prevention <br />
  174. 174. 6/24/2011<br />Totem International Ltd<br />91<br /><ul><li>Digital Signal Processor (DSP) Based </li></ul> Technology<br /><ul><li>Audible and Visual Alarms
  175. 175. Entry Pacing Lights
  176. 176. Floor Mounting Option</li></li></ul><li><ul><li>Integrated GpsReciever & Antena
  177. 177. Wireless Radio Design
  178. 178. Tilt & dead reckoning System
  179. 179. WPAN
  180. 180. WWAN
  181. 181. WLAN
  182. 182. Bar code Reader Support</li></ul>6/24/2011<br />Totem International Ltd<br />92<br />
  183. 183. Under Vehicle Scanners<br />6/24/2011<br />Totem International Ltd<br />93<br />
  184. 184. <ul><li> High Security Facilities
  185. 185. Live & Continuous Under Belly Video Scanning
  186. 186. Capture number plate and driver image
  187. 187. Count vehicles & space
  188. 188. Log Vehicular Details</li></ul>6/24/2011<br />Totem International Ltd<br />94<br />
  189. 189. How to deal with such situations<br /><ul><li>X-ray and Radiation Portal Monitors(RPM)
  190. 190. Intelligent video systems
  191. 191. Crane-mounted sensors
  192. 192. Radio Frequency Identification (RFID) tags
  193. 193. Intelligent device management
  194. 194. Maritime domain awareness</li></ul>6/24/2011<br />95<br />Totem International Ltd<br />
  195. 195. 1.00pm- 2.15 pm <br /> Networking Lunch<br />6/24/2011<br />Totem International Ltd<br />96<br />
  196. 196. 2.15pm - 3.30pm<br />Loss and theft prevention<br />6/24/2011<br />97<br />Totem International Ltd<br />
  197. 197. ROI for security equipment and technology<br />Are my employees being honest about their hours worked<br /> A security director can view and download incident online without having to pull the incident from the DVR.<br />Remote access can save a business in fleet expenses, travel expenditures, and time and resource management.<br />Be in multiple places at one time.<br />A win-win for all parties anytime, anywhere access.<br />Convergence opens new ROI opportunities for security providers, who are investing R&D dollars to position themselves at the forefront of the convergence revolution.<br />6/24/2011<br />98<br />Totem International Ltd<br />
  198. 198. Using surveillance to prevent theft<br />Generates hypotheses<br />Monitor trends<br />Detect clusters and outbreaks<br />objectives can be met very rapidly and often more accurately than with other reporting systems.<br />6/24/2011<br />99<br />Totem International Ltd<br />
  199. 199. Reducing possibility of missing containers and missing cargo in containers<br />RFID Tags<br />Cloud devices<br /> IDS<br />SURVIELLENCE DEVICES<br />Container Tracking<br />Activity Tracking<br />Wireless technology<br />6/24/2011<br />100<br />Totem International Ltd<br />
  200. 200. Rfid Tags<br />6/24/2011<br />Totem International Ltd<br />101<br />
  201. 201. RFID Asset Tracking<br />6/24/2011<br />Totem International Ltd<br />102<br />
  202. 202. 6/24/2011<br />Totem International Ltd<br />103<br />
  203. 203. Cloud Devices<br />6/24/2011<br />Totem International Ltd<br />104<br />
  204. 204. Intrusion Detectors<br />6/24/2011<br />Totem International Ltd<br />105<br />
  205. 205. Surveillance Devices<br /><ul><li>Works day& night
  206. 206. Infrared intelligence
  207. 207. No special software needed
  208. 208. Captures all images</li></ul>6/24/2011<br />Totem International Ltd<br />106<br />
  209. 209. 6/24/2011<br />Totem International Ltd<br />107<br />
  210. 210. 6/24/2011<br />Totem International Ltd<br />108<br />Features<br /><ul><li>captures a full 10-print record in well under 10 seconds.
  211. 211. using a two capture process instead of</li></ul>the traditional three capture 4 Slap process.<br />.<br /><ul><li>No other external power source is required.</li></ul>Applications range from<br /><ul><li>Enrolment,
  212. 212. Verification/identification,
  213. 213. Physical/logical access
  214. 214. Quick look-up applications.
  215. 215. Complete enrolment application available</li></li></ul><li> 3.30pm - 4.00 pm<br /> Afternoon Refreshments & Networking<br />6/24/2011<br />Totem International Ltd<br />109<br />
  216. 216. 4.00pm - 4.30pm<br /> Case Studies<br />6/24/2011<br />Totem International Ltd<br />110<br />
  217. 217. 4.30pm-5.00pm<br /> Question & Answer Session<br />6/24/2011<br />Totem International Ltd<br />111<br />
  218. 218. Thank You<br /> Firoze Zia Hussain<br /> CEO & Director, Totem International Ltd.<br /> Email :firoze@totemint.com<br /> ph no:+91 9618621234<br />6/24/2011<br />Totem International Ltd<br />112<br /> Totem International Ltd. 6 ,Totem house, Punjagutta, Hyderabad 500082, India<br />

×