Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Africa 24 6 2011 Port Security Pdf

1,654 views

Published on

africa port safety security workshop

  • Be the first to comment

Africa 24 6 2011 Port Security Pdf

  1. 1. Heightening port security withtechnological advancements in Africa 7/6/2011 Totem International Ltd 1
  2. 2. Heightening port security with technological advancements in Africa Firoze Zia Hussain CEO & Director Totem International Ltd, India An electronics and communication engineer who is a forward thinking and energetic professionalrecognized for high-profile turnaround achievements. Was highly decorated law enforcementprofessional with more than 10 years experience in security function. Successful and consistent recordof investigations, and crime prevention. Participant of the US State Department Young LeadersExchange Program.Successfully executed project work and technology transfer/ collaboration at Indias largest PrintedCircuit Board manufacturing plant of INDAL electronics. Pursued consultancy in Quality Circle, ISO9000,JIT, Kaizen, TQM, Taguchi’s techniques of experimentation .A widely traversed person with diversecontacts in global distribution of chemicals and security products. 7/6/2011 Totem International Ltd 2
  3. 3. Totem International Ltd
  4. 4. 7/6/2011 Totem International Ltd 4
  5. 5. 9.00am-9.30amIntroduction-Importance of Port Security 7/6/2011 Totem International Ltd 5
  6. 6. Introduction To Port Security  IMO  ISPS code(2002)  SOLAS 7/6/2011 Totem International Ltd 6
  7. 7. Importance of port security Bulk of African exports is through ports. 2% of the world trade. Trades & profits. Extensively used conveyance for transportation. Increases Africa‟s Natural Resources. 7/6/2011 Totem International Ltd 7
  8. 8. Port Security can prevent Pirates/Terrorist Attacks. Smuggling of weapons. Illegal S/W issues & Immigration. 7/6/2011 Totem International Ltd 8
  9. 9. Technological models to enhance efficiency at ports 7/6/2011 Totem International Ltd 9
  10. 10. Technologies in ports 7/6/2011 Totem International Ltd 10
  11. 11. Radio Frequency IdentificationA method of communication wirelessly with a small microchipThe chip contains a unique serial number and optional memoryA chip combined with an antenna = Intelligent Labelor RFID tag or transponder or smart tag or inlayTransponders are available as active (on-boardbattery) , semi-active (on-board battery) or passiveTypical life of around 10 years (or 100k write operation)Multiple read/write operationsNo line-of-sight requiredMultiple tags can be read at the same time 7/6/2011 Totem International Ltd 11
  12. 12. RFID Technology ADC technology. An Rfid System Compromises of One or more RF tags Two or more antennas One or more interrogators One or more host computers Appropriate software 7/6/2011 Totem International Ltd 12
  13. 13. Handheld RFID Reader
  14. 14. RFID works on different frequencies125 KHz – LF (Low Frequency)13.56 MHz – HF (High Frequency)860 -960 MHz – UHF (Ultra High Frequency)2.45 GHz – UHF / Microwave (Some Semi-Active and Active Readers are using this frequency) 7/6/2011 Totem International Ltd 14
  15. 15. Benefits Through Rfid In Ports Access Control Container Security RFID IN PORTS Container Identification and Location Activity Tracking Regulatory Compliance 7/6/2011 Totem International Ltd 15
  16. 16. GPS Technology Track the position To avoid theft Highly effective & reliable What is happening. used from any where by gps device. Device may size like awatch or button on collar 7/6/2011 Totem International Ltd 16
  17. 17. Cloud Technology 7/6/2011 Totem International Ltd 17
  18. 18. Uses of Cloud Technology Reduces Cost Increases Information Storage No longer need to concentrate in constant updates can gather information even if away 7/6/2011 Totem International Ltd 18
  19. 19. Biometrics Technology 7/6/2011 Totem International Ltd 19
  20. 20. Uses of Biometrics Increases Security. Reduces fraud. provides viable solution to port security. Can know who did what ,when and where. Increases ROI. 7/6/2011 Totem International Ltd 20
  21. 21. Wireless TechnologiesFlow of information Dock Port Side Head Employees office Sea Client s 7/6/2011 Totem International Ltd 21
  22. 22. Value added Services Crane scheduling systems and communication Ship-to-shore communication Container operations and management RoRo facilities Customs office Harbour Masters office Emergency services Wireless network IT infrastructure Security and access control Gate management Corporate, financial, human resources Services for tenants. 7/6/2011 Totem International Ltd 22
  23. 23. 9.30am-10.00amInstalling Port Perimeter Security 7/6/2011 Totem International Ltd 23
  24. 24. Installing Port Perimeter Security 7/6/2011 Totem International Ltd 24
  25. 25. 7/6/2011 Totem International Ltd 25
  26. 26. Perimeter Surveillance includes four basic systems Sensors Video Detection Systems Threat assessment and Alarm Management Systems Data Communications Systems 7/6/2011 Totem International Ltd 26
  27. 27. Sensors Barrier Sensors Volumetric Sensors Fence Mounted Sensors 7/6/2011 Totem International Ltd 27
  28. 28. Video Detection Systems 7/6/2011 Totem International Ltd 28
  29. 29. Threat Assessment and Alarm Management Systems 7/6/2011 Totem International Ltd 29
  30. 30. 7/6/2011 Totem International Ltd 30
  31. 31. Intrusion Detection 7/6/2011 Totem International Ltd 31
  32. 32. Data Communications Systems 7/6/2011 Totem International Ltd 32
  33. 33. Indoor sensors Passive infrared detectorsUltrasonic detectorsMicrowave detectorsPhoto-electric beamsGlass break detectorsSmoke, heat &carbon monoxide detectors 7/6/2011 Totem International Ltd 33
  34. 34. Out Door Sensors Vibration (shaker) or inertia sensors Passive magnetic field detection E-field Microwave barriers Microphonic systems Taut wire fence systems Fibre optic cable H-field 7/6/2011 Totem International Ltd 34
  35. 35. Monitored Security Solutions linked via the telephone line or cellular network or both to an Alarm Receiving Centre (ARC). contacting the right Authority - i.e. the police usually, or the Fire & Rescue Service (FRS) in the case of a fire - if there is an activation. highest standards of operation. 7/6/2011 Totem International Ltd 35
  36. 36. Passive systems Detects a potential security breach logs the information signals an alert on the console and or owner. 7/6/2011 Totem International Ltd 36
  37. 37. Reactive Systems intrusion prevention system (IPS). auto-responds to the suspicious activity. reprogramming the firewall to block network traffic from the suspected malicious source. IDPS is used automatically at the command of an operator; systems that both "detect" (alert) and/or "prevent." 7/6/2011 Totem International Ltd 37
  38. 38. Detection/alarm system. Deter theft as well as vandalism. 24-hour protection of your assets and resources. Lower their risks associated with theft. Decreasing costs associated with . * insurance premiums. repair or replacement of property or equipment that has been damaged . 7/6/2011 Totem International Ltd 38
  39. 39. 10.00am-10.30 amAccess Control 7/6/2011 Totem International Ltd 39
  40. 40. Access Control 7/6/2011 Totem International Ltd 40
  41. 41. Installing Rfid at Ports 7/6/2011 Totem International Ltd 41
  42. 42. RFID tags1 Passive Tags have no internal power supply. electrical current induced in the antenna by the incoming rf signal. Provides power for the chip to power up and transmit .2 Active Tags contain sensors, global positioning (GPS), satellite links, other enhancements3. Semi-active tags battery is used to power sensors volatile memory. contactless smart cards 7/6/2011 Totem International Ltd 42
  43. 43. Why RFID? 7/6/2011 Totem International Ltd 43
  44. 44. Access ControlEmployee ID: Smart and SecureTradelanes (SST). Container Security Initiatives (CSI). prevent loss and possible mischief. Also contain biometric information such as a photograph. closed circuit TV (CCTV) 7/6/2011 Totem International Ltd 44
  45. 45. Vehicle ControlEquipping vehicles with RFID tags.record the exact time of entrance & exit.unlock fuel pumps and record fuel usage. 7/6/2011 Totem International Ltd 45
  46. 46. Container Security sensors to monitor environmental conditions within the container. GPS, sensors, and satellite phone capabilities to constantly report the location of the container. satellite phone portals for commercial shippers. 7/6/2011 Totem International Ltd 46
  47. 47. Container Identification and Location Container Tagging Location Tracking Activity Tracking 7/6/2011 Totem International Ltd 47
  48. 48. Regulatory compliance (AIDC) technologies + RFID Assures that container integrity has been maintained Containers can be ‘fast tracked’ on arrival. 7/6/2011 Totem International Ltd 48
  49. 49. Containers with RFID enable shippers and carriers to: container security and integrity. Speed shipments. Verify that a container was loaded at a secure loading point. Significantly reduce the likelihood a tamper event happened in Transit with container accountability from point of origin to destination. Gather enough data to conduct a „virtual inspection‟ in advance of arrival. Guarantee that shipping containers meet governmental security regulations. Receive fast track or „green lane‟ handling through customs at the point of dispatch and / or the point of receipt. Avoid extensive delays in the shipment and receipt. Minimise the cost of handling. 7/6/2011 Totem International Ltd 49
  50. 50. Biometrics a possible solution to improve efficiency 7/6/2011 Totem International Ltd 50
  51. 51. Personal identity 7/6/2011 Totem International Ltd 51
  52. 52. Verification 7/6/2011 Totem International Ltd 52
  53. 53. Working principle 7/6/2011 Totem International Ltd 53
  54. 54. Hand geometry technology to improve efficiency 7/6/2011 Totem International Ltd 54
  55. 55.  Identifies users by the shape of their hands. The preferred technology for high- security applications. Very reliable when combined with other forms of identification. Hand scanners have a twenty-six bit Wiegand output format as one of the menu choices. 7/6/2011 Totem International Ltd 55
  56. 56. Implementation IssuesCard Reader Emulation.Stand Alone Access ControlPrivacy IssuesOperation by Disabled PeopleOutdoor Conditions 7/6/2011 Totem International Ltd 56
  57. 57. Applications Parking Lot Application Cash Vault Applications Dual Custody Applications Anti-passback Time and Attendance Point of Sale Applications Interactive Kiosks 7/6/2011 Totem International Ltd 57
  58. 58. 10.30am-11.00amDealing with Nuclear Threats at Ports 7/6/2011 Totem International Ltd 58
  59. 59. Nuclear Threats at Ports 7/6/2011 Totem International Ltd 59
  60. 60. Anatomy of a Civil Emergency Incident Primary Incident Secondary Air/Ground/WaterContamination People 7/6/2011 Totem International Ltd 60
  61. 61. HazardsC = ChemicalB = BiologicalR = RadiologicalN = NuclearE = Explosive 7/6/2011 Totem International Ltd 61
  62. 62. Examples of Hazards Chemical Warfare Agents Biological Warfare Agents Dirty Bombs White Powder Incidents 7/6/2011 Totem International Ltd 62
  63. 63. Chemical Warfare AgentsChemical warfare agents can be divided into the following: Lethal agents Nerve Agents Asphyxiant/blood agents Vesicant/blister Agents Pulmonary/choking Agents Non lethal agents Incapacitating agents Riot Control Agents 7/6/2011 Totem International Ltd 63
  64. 64. Chemical Warfare Agents Nerve AgentAffects the communication between nerve cells, causinguncontrollable muscle stimulationTypical Symptoms: Nerve agent types: Blurred/dim vision G- Agents Headache Tabun (GA) Nausea Sarin (GB) Vomiting Soman (GD) Diarrhoea Cyclosarin (GF) Secretions and sweating Muscle twitching V Agents Laboured breathing VE Seizures VG Loss of consciousness VM VX 7/6/2011 Totem International Ltd 64
  65. 65. Biological Warfare AgentsBiological warfare agents can be divided into the following: Lethal agents Bacteria Viruses Toxins derived from bacteria Toxins derived from plants 7/6/2011 Totem International Ltd 65
  66. 66. Dirty Bombs An Atom 3 Types of Ionising Radiation α β γ Proton Alpha Beta Gamma(Positive) Particles Particles Rays & X Rays NucleusNeutron(Neutral) Electron(Negative) Aluminium Lead 7/6/2011 Totem International Ltd 66
  67. 67. Who responds and how? Different countries; different processes ◦ E.g. Israel & France: no decontamination at scene etc Development of “Zones” ◦ Hot zone, warm zone, cold zone ◦ Contaminated, decontamination, clean. 7/6/2011 Totem International Ltd 67
  68. 68. Typically Half- mask/disposable/skin protection – if nec. Typically SCBA/Gas suits Crowd Control Line Exclusion (Hot) Zone Decontamination Line Hot Line Typically Full-face/ Protection Protection Level A Protectionappropriate filter/suit Level C Level B or P&SA/ suit Contamination Reduction (Warm) Zone Support (Cold) Zone 7/6/2011 Totem International Ltd 68
  69. 69. Zone Description Dynamic situation Hot Zone Warm Zone Cold Zone Convenient barrier to Outer cordon - control public Decontamination zone contain primary source access (& escape!) Typically last zone to be Typically 2nd zone to be 1st zone to be created created created Expect Monitoring of Entry likely before Secondary contamination Monitoring only to ensureDetection, Identification, once hot zone detection and contamination-free Monitoring identification complete Possibly unknown Hazards should be identified Should be non-hazardous Hazards Contamination from Contamination only from Should be contamination-free Primary Source Secondary SourcesContamination Possibly Contamination should be Should be contamination-free above IDLH below IDLH Typically minimal if any Typically negative pressure orTypically use SCBA (and protection: post- powered filtering respirators Gas-tight suits if decontamination clothing; and full skin protection - necessary) possibly MFR-type respirators minimum liquid-tight. as safeguard 7/6/2011 Totem International Ltd 69
  70. 70. Desired ResponseFire Service Police Fire & AmbulanceHot Zone Warm & Cold Zone Warm ZoneDetection, Identification Reconnaissance Triage & Monitoring Crime Scene Mass DecontaminationReconnaissance Management Casualty TransportSearch & Rescue Firearms use 7/6/2011 Totem International Ltd 70
  71. 71. Dealing with the Nuclear Threats 7/6/2011 Totem International Ltd 71
  72. 72. 7/6/2011 Totem International Ltd 72
  73. 73. 7/6/2011 Totem International Ltd 73
  74. 74. 7/6/2011 Totem International Ltd 74
  75. 75. 11.00am - 11.30amMorning Refreshments & Networking 7/6/2011 Totem International Ltd 75
  76. 76. 11.30am -12.00pmBenefits of Electronic Surveillance 7/6/2011 Totem International Ltd 76
  77. 77. Benefits of Electronic surveillance Installing Night vision equipment  They are good when you want to get a better look at a specific object and then return to normal viewing Conditions.  Have a single lens or stereo lens, depending on the model , excellent for constant viewing, such as moving around in a dark building.  Cameras with night-vision technology can send the image to a monitor for display or to a VCR for recording. When night-vision capability is desired in a permanent location, such as on a building or as part of the equipment in a helicopter, cameras are used.. 7/6/2011 Totem International Ltd 77
  78. 78. Purpose of Night vision Camera’s  To locate enemy targets at night  For navigation, surveillance and targeting  It reveals whether an area has been disturbed.  To discover items that have been hidden by criminals, including money, drugs and bodies.  Changes to areas such as walls can be seen using thermal imaging. 7/6/2011 Totem International Ltd 78
  79. 79. Thermal imaging cameras All thermal imaging cameras have infrared detector. use these cameras to locate targets, track people, intelligence gathering and surveillance used for surveillance and security. can detect the minute temperature changes and this is generated as an image on a screen. now cameras are available for other purposes like sensing sailing boats. 7/6/2011 Totem International Ltd 79
  80. 80. 7/6/2011 Totem International Ltd 80
  81. 81. Benefits of Low lux camera’s 7/6/2011 Totem International Ltd 81
  82. 82. High mega pixel cameras IP security cameras provideoptimum picture quality and betterframe. These cameras useinexpensive sensors andmechanical shutters to controlexposure and timeOffers a way to increase thedetailed capture within an imagewithout sacrificing the area of thecamera. 7/6/2011 Totem International Ltd 82
  83. 83. 12.00pm-1.00pmCrisis Response & Management 7/6/2011 Totem International Ltd 83
  84. 84. Crisis response and managementLikely situations at the port: Theft of containerized cargo high-risk containers Terrorist Attacks Smuggling Explosion Thefts during loading and unloading of cargo 7/6/2011 Totem International Ltd 84
  85. 85. Theft of Cargo can be avoided through Rfid Technology 7/6/2011 Totem International Ltd 85
  86. 86. Vehicle Control 7/6/2011 Totem International Ltd 86
  87. 87.  Vehicle access control Vehicle identification & tracking Trailer identification & tracking Transport, fleet & yard management Driver authorisation Parking management Machine safety & auto shut of 7/6/2011 Totem International Ltd 87
  88. 88. Boom Barriers 7/6/2011 Totem International Ltd 88
  89. 89. Bollards 7/6/2011 Totem International Ltd 89
  90. 90. Walk Through Metal Detector scanning from both sides provides superior detection superior target analysisuniformity and performanceferrous and non-ferrous weapons detectiondesigned for mass transit, loss prevention 7/6/2011 Totem International Ltd 90
  91. 91. Digital Signal Processor (DSP) Based Technology Audible and Visual Alarms Entry Pacing Lights Floor Mounting Option 7/6/2011 Totem International Ltd 91
  92. 92. Integrated Gps Reciever & Antena Wireless Radio Design Tilt & dead reckoning System WPAN WWAN WLAN Bar code Reader Support7/6/2011 Totem International Ltd 92
  93. 93. Under Vehicle Scanners 7/6/2011 Totem International Ltd 93
  94. 94.  High Security Facilities Live & Continuous Under Belly Video Scanning Capture number plate and driver image Count vehicles & space Log Vehicular Details 7/6/2011 Totem International Ltd 94
  95. 95. How to deal with such situations X-ray and Radiation Portal Monitors(RPM) Intelligent video systems Crane-mounted sensors Radio Frequency Identification (RFID) tags Intelligent device management Maritime domain awareness 7/6/2011 Totem International Ltd 95
  96. 96. 1.00pm- 2.15 pmNetworking Lunch 7/6/2011 Totem International Ltd 96
  97. 97. 2.15pm - 3.30pmLoss and theft prevention 7/6/2011 Totem International Ltd 97
  98. 98. ROI for security equipment and technology  Are my employees being honest about their hours worked  A security director can view and download incident online without having to pull the incident from the DVR.  Remote access can save a business in fleet expenses, travel expenditures, and time and resource management.  Be in multiple places at one time.  A win-win for all parties anytime, anywhere access.  Convergence opens new ROI opportunities for security providers, who are investing R&D dollars to position themselves at the forefront of the convergence revolution. 7/6/2011 Totem International Ltd 98
  99. 99. Using surveillance to prevent theft  Generates hypotheses  Monitor trends  Detect clusters and outbreaks  objectives can be met very rapidly and often more accurately than with other reporting systems. 7/6/2011 Totem International Ltd 99
  100. 100. Reducing possibility of missing containers and missing cargo in containers RFID Tags Cloud devices IDS SURVIELLENCE DEVICES Container Tracking Activity Tracking 7/6/2011 Wireless Totem International Ltd 100
  101. 101. Rfid Tags 7/6/2011 Totem International Ltd 101
  102. 102. RFID Asset Tracking 7/6/2011 Totem International Ltd 102
  103. 103. 7/6/2011 Totem International Ltd 103
  104. 104. Cloud Devices 7/6/2011 Totem International Ltd 104
  105. 105. Intrusion Detectors 7/6/2011 Totem International Ltd 105
  106. 106. Surveillance Devices Works day& night Infrared intelligence No special software needed Captures all images 7/6/2011 Totem International Ltd 106
  107. 107. 7/6/2011 Totem International Ltd 107
  108. 108. Featurescaptures a full 10-print record in wellunder 10 seconds.using a two capture process instead ofthe traditional three capture 4 Slap process..No other external power source isrequired.Applications range from Enrolment, Verification/identification, Physical/logical access Quick look-up applications.Complete enrolment application available 7/6/2011 Totem International Ltd 108
  109. 109. 3.30pm - 4.00 pmAfternoon Refreshments & Networking 7/6/2011 Totem International Ltd 109
  110. 110. 4.00pm - 4.30pm Case Studies 7/6/2011 Totem International Ltd 110
  111. 111. 4.30pm-5.00pmQuestion & Answer Session 7/6/2011 Totem International Ltd 111
  112. 112. Thank You Firoze Zia Hussain CEO & Director, Totem International Ltd. Email :firoze@totemint.com ph no:+91 9618621234Totem International Ltd. 6 ,Totem house, Punjagutta, Hyderabad 500082, India 7/6/2011 Totem International Ltd 112

×