SlideShare a Scribd company logo
1 of 3
06350<br />Ten Air Cargo Commandments for Improved Security<br />By Steve Vinsik<br />Steve Vinsik is vice president, Critical Infrastructure Protection (CIP), with responsibility for strategic leadership, practice development, and service delivery.  Steve has more than 15 years’ experience leading field operations teams that conduct research and development, application development, integration and information security programs – spanning biometric and surveillance technology integration,  security architecture, physical and logical security convergence and information systems domains.  The CIP practice supports numerous clients in the Government, Transportation, and Financial Services sectors globally.<br />Today’s air cargo shippers and ports are under more pressure than ever to handle increasing cargo volumes, manage congestion, address changing customer needs and thrive in the midst of intense competition. I have compiled a list of ten commandants that I believe air cargo shippers, service providers and international governments should follow to ensure security throughout the larger supply chain.<br />Acknowledge a public concern for air cargo security. Results released in May 2011 from the Unisys Security Index, a semi-annual survey of consumer opinion on multiple dimensions of security, showed that 56 percent of Americans saw cargo transported by air, sea or land as extremely or very vulnerable to malicious or terrorist attack. Acknowledging the public has yet to feel satisfied with the level of security surrounding air cargo transport is the first step to solving the problem.<br />Create a more international mandate. The air cargo industry needs something similar to International Maritime Organization’s (IMO) International Ship and Port Security (ISPS) code. We need to follow a global set of standards to reduce the threat of terrorism at all ports of entry to every country.<br />Apply political pressure. In November, the U.S. government introduced air cargo security legislation, but it has not yet been brought up for vote. In addition, the EU’s 27 member states are considering proposals to tighten air cargo security. The legislative limbo process does not allow us to make changes quickly enough. We need to push this issue to the top of governments’ agendas and pressure our politicians to work deliberately to solve the problem.<br />Attack the problem as a whole—not piecemeal. Addressing the problem one airfreight at a time is not enough. We need to establish a secure global supply chain that provides visibility into all key touch points of the air cargo transport life cycle.<br />Implement positive identification solutions. Simple document verification devices—like an inexpensive card reader that can verify that a driving license is valid by examining the hologram or the raised lettering of the license—are easy to implement and can make a big difference.<br />Analyze big data. Governments should leverage complex analytical targeting systems to identify the point of origin, shippers name and specific package contents for every single package. This way we won’t lose visibility into cargo as it moves along the supply chain.<br />Bolster physical security. In addition to seals, video surveillance and RFID tags on cargo and personnel, we must continually look to new, innovative technologies that help security personnel do their job better. The U.S. Customs and Border Protection’s (CBP) Automated Manifest System and Automatic Targeting System serve as example innovative solutions that ensure unauthorized personnel cannot tamper with cargo.<br />Perfect your procedural reflexes. The ability to quickly react and respond to intelligence can be the difference between life and death. By collaborating on intelligence tools and standardized data with countries around the world, we can detect and stop terrorist activities immediately.<br />Assess service providers. Service providers play a significant role in the larger supply chain. We should expand the U.S. Customs-Trade Partnership Against Terrorism and the Certified Cargo Screening Program to enable real-time compliance reporting mechanisms for continuous compliance.<br />Persist in policy and technology. Everyone involved in the air cargo supply chain can take steps toward improvement. Service providers need to proactively improve the level of data they collect at origin and throughout the shipping process, industry bodies need to expedite the creation and adoption of security data standards, and governments need to establish improved information sharing practices to get intelligence to the front lines quickly.<br />Do you have any additional ideas on what we can do, collectively, to improve air cargo security?<br /> <br />For more information visit www.unisys.com ©2011 Unisys Corporation. All rights reserved. Specifications are subject to change without notice. Unisys and the Unisys logo are registered trademarks of Unisys Corporation. All other brands and products referenced herein are acknowledged to be trademarks or registered trademarks of their respective holders.Printed in United States of AmericaAugust 2011<br />
Ten Air Cargo Commandments for Improved Security
Ten Air Cargo Commandments for Improved Security

More Related Content

Viewers also liked

Flash americanbloger
Flash americanblogerFlash americanbloger
Flash americanblogerLuis Barreiro
 
η ρωμαϊκη αυτοκρατορια μια υπερδυναμη του αρχαιου κοσμου
η ρωμαϊκη αυτοκρατορια μια υπερδυναμη του αρχαιου κοσμουη ρωμαϊκη αυτοκρατορια μια υπερδυναμη του αρχαιου κοσμου
η ρωμαϊκη αυτοκρατορια μια υπερδυναμη του αρχαιου κοσμουteo70
 
Holiday In France
Holiday In  FranceHoliday In  France
Holiday In FranceTom Kuipers
 
Presentación peonzas
Presentación peonzasPresentación peonzas
Presentación peonzasstraid
 
WPO工具概览
WPO工具概览WPO工具概览
WPO工具概览youalab
 
Power Quality Experts
Power Quality ExpertsPower Quality Experts
Power Quality Expertsnashberg
 
ο άγιος γεώργιος σκοτώνει το δράκο
ο άγιος γεώργιος σκοτώνει το δράκοο άγιος γεώργιος σκοτώνει το δράκο
ο άγιος γεώργιος σκοτώνει το δράκοteo70
 
William shakespeare
William shakespeareWilliam shakespeare
William shakespeareAmilleya
 
λιθάνθρακας
λιθάνθρακαςλιθάνθρακας
λιθάνθρακαςteo70
 

Viewers also liked (17)

Lect01 slides
Lect01 slidesLect01 slides
Lect01 slides
 
Need to know YA 2015
Need to know YA 2015Need to know YA 2015
Need to know YA 2015
 
Flash americanbloger
Flash americanblogerFlash americanbloger
Flash americanbloger
 
Dubai conference
Dubai conferenceDubai conference
Dubai conference
 
Solar Impulse
Solar  ImpulseSolar  Impulse
Solar Impulse
 
Marley
MarleyMarley
Marley
 
η ρωμαϊκη αυτοκρατορια μια υπερδυναμη του αρχαιου κοσμου
η ρωμαϊκη αυτοκρατορια μια υπερδυναμη του αρχαιου κοσμουη ρωμαϊκη αυτοκρατορια μια υπερδυναμη του αρχαιου κοσμου
η ρωμαϊκη αυτοκρατορια μια υπερδυναμη του αρχαιου κοσμου
 
Biting
BitingBiting
Biting
 
Holiday In France
Holiday In  FranceHoliday In  France
Holiday In France
 
Presentación peonzas
Presentación peonzasPresentación peonzas
Presentación peonzas
 
WPO工具概览
WPO工具概览WPO工具概览
WPO工具概览
 
Campaign slides1 15
Campaign slides1 15Campaign slides1 15
Campaign slides1 15
 
Power Quality Experts
Power Quality ExpertsPower Quality Experts
Power Quality Experts
 
ο άγιος γεώργιος σκοτώνει το δράκο
ο άγιος γεώργιος σκοτώνει το δράκοο άγιος γεώργιος σκοτώνει το δράκο
ο άγιος γεώργιος σκοτώνει το δράκο
 
William shakespeare
William shakespeareWilliam shakespeare
William shakespeare
 
Iptv
IptvIptv
Iptv
 
λιθάνθρακας
λιθάνθρακαςλιθάνθρακας
λιθάνθρακας
 

Similar to Ten Air Cargo Commandments for Improved Security

1Transportation Security ProposalStudent’s Nam
1Transportation Security ProposalStudent’s Nam1Transportation Security ProposalStudent’s Nam
1Transportation Security ProposalStudent’s NamMerrileeDelvalle969
 
Speaker 5 Capt D N Goswami
Speaker 5 Capt D N GoswamiSpeaker 5 Capt D N Goswami
Speaker 5 Capt D N Goswamicmmindia2017
 
The big-data-a-twenty-first-century-arms-race
The big-data-a-twenty-first-century-arms-raceThe big-data-a-twenty-first-century-arms-race
The big-data-a-twenty-first-century-arms-raceHop Trieu Sung
 
Big Data: A Twenty-First Century Arms Race
Big Data: A Twenty-First Century Arms RaceBig Data: A Twenty-First Century Arms Race
Big Data: A Twenty-First Century Arms RaceDotmappers1
 
15 hauer making safety management knwledge based
15 hauer making safety management knwledge based15 hauer making safety management knwledge based
15 hauer making safety management knwledge basedSierra Francisco Justo
 
Safety Target Coordination Report
Safety Target Coordination ReportSafety Target Coordination Report
Safety Target Coordination ReportRyan Klitzsch
 
Mass transit security awareness white paper
Mass transit security awareness white paperMass transit security awareness white paper
Mass transit security awareness white paperzcelik
 
Passas CA and Trade TC10-Spring2016
Passas CA and Trade TC10-Spring2016Passas CA and Trade TC10-Spring2016
Passas CA and Trade TC10-Spring2016Nikos Passas
 
2020 Autonomous Vehicles Readiness Index
2020 Autonomous Vehicles Readiness Index2020 Autonomous Vehicles Readiness Index
2020 Autonomous Vehicles Readiness IndexMassa Critica
 
Automated Vehicles: lead or follow
Automated Vehicles: lead or followAutomated Vehicles: lead or follow
Automated Vehicles: lead or followAdvisian
 
1 4Rough Draft Research PaperFrancisco Leo
1 4Rough Draft Research PaperFrancisco Leo1 4Rough Draft Research PaperFrancisco Leo
1 4Rough Draft Research PaperFrancisco LeoAbbyWhyte974
 
1 4Rough Draft Research PaperFrancisco Leo
1 4Rough Draft Research PaperFrancisco Leo1 4Rough Draft Research PaperFrancisco Leo
1 4Rough Draft Research PaperFrancisco LeoMartineMccracken314
 
12 part framework to structure safety assessment for autonomous driving
12 part framework to structure safety assessment for autonomous driving12 part framework to structure safety assessment for autonomous driving
12 part framework to structure safety assessment for autonomous drivingZiaullah Mirza
 
Global Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityGlobal Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityDominic Karunesudas
 
The Port Security Plan - Management of Tasks and Responsibilities.docx
The Port Security Plan - Management of Tasks and Responsibilities.docxThe Port Security Plan - Management of Tasks and Responsibilities.docx
The Port Security Plan - Management of Tasks and Responsibilities.docxoreo10
 

Similar to Ten Air Cargo Commandments for Improved Security (20)

FS_WP_Rapiscan_111014
FS_WP_Rapiscan_111014FS_WP_Rapiscan_111014
FS_WP_Rapiscan_111014
 
1Transportation Security ProposalStudent’s Nam
1Transportation Security ProposalStudent’s Nam1Transportation Security ProposalStudent’s Nam
1Transportation Security ProposalStudent’s Nam
 
TCRP-LRD47-ULinkOCIP
TCRP-LRD47-ULinkOCIPTCRP-LRD47-ULinkOCIP
TCRP-LRD47-ULinkOCIP
 
Speaker 5 Capt D N Goswami
Speaker 5 Capt D N GoswamiSpeaker 5 Capt D N Goswami
Speaker 5 Capt D N Goswami
 
The big-data-a-twenty-first-century-arms-race
The big-data-a-twenty-first-century-arms-raceThe big-data-a-twenty-first-century-arms-race
The big-data-a-twenty-first-century-arms-race
 
Big Data: A Twenty-First Century Arms Race
Big Data: A Twenty-First Century Arms RaceBig Data: A Twenty-First Century Arms Race
Big Data: A Twenty-First Century Arms Race
 
15 hauer making safety management knwledge based
15 hauer making safety management knwledge based15 hauer making safety management knwledge based
15 hauer making safety management knwledge based
 
Safety Target Coordination Report
Safety Target Coordination ReportSafety Target Coordination Report
Safety Target Coordination Report
 
Mass transit security awareness white paper
Mass transit security awareness white paperMass transit security awareness white paper
Mass transit security awareness white paper
 
Passas CA and Trade TC10-Spring2016
Passas CA and Trade TC10-Spring2016Passas CA and Trade TC10-Spring2016
Passas CA and Trade TC10-Spring2016
 
2020 Autonomous Vehicles Readiness Index
2020 Autonomous Vehicles Readiness Index2020 Autonomous Vehicles Readiness Index
2020 Autonomous Vehicles Readiness Index
 
Automated Vehicles: lead or follow
Automated Vehicles: lead or followAutomated Vehicles: lead or follow
Automated Vehicles: lead or follow
 
1 4Rough Draft Research PaperFrancisco Leo
1 4Rough Draft Research PaperFrancisco Leo1 4Rough Draft Research PaperFrancisco Leo
1 4Rough Draft Research PaperFrancisco Leo
 
1 4Rough Draft Research PaperFrancisco Leo
1 4Rough Draft Research PaperFrancisco Leo1 4Rough Draft Research PaperFrancisco Leo
1 4Rough Draft Research PaperFrancisco Leo
 
12 part framework to structure safety assessment for autonomous driving
12 part framework to structure safety assessment for autonomous driving12 part framework to structure safety assessment for autonomous driving
12 part framework to structure safety assessment for autonomous driving
 
Global Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityGlobal Partnership Key to Cyber Security
Global Partnership Key to Cyber Security
 
The Port Security Plan - Management of Tasks and Responsibilities.docx
The Port Security Plan - Management of Tasks and Responsibilities.docxThe Port Security Plan - Management of Tasks and Responsibilities.docx
The Port Security Plan - Management of Tasks and Responsibilities.docx
 
EPAR_UW_324_DFS Consumer Protection_3.31.16
EPAR_UW_324_DFS Consumer Protection_3.31.16EPAR_UW_324_DFS Consumer Protection_3.31.16
EPAR_UW_324_DFS Consumer Protection_3.31.16
 
GDRR Opening Workshop - Transportation System Reliability: Challenges and Opp...
GDRR Opening Workshop - Transportation System Reliability: Challenges and Opp...GDRR Opening Workshop - Transportation System Reliability: Challenges and Opp...
GDRR Opening Workshop - Transportation System Reliability: Challenges and Opp...
 
14 june
14 june14 june
14 june
 

Recently uploaded

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 

Recently uploaded (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 

Ten Air Cargo Commandments for Improved Security

  • 1. 06350<br />Ten Air Cargo Commandments for Improved Security<br />By Steve Vinsik<br />Steve Vinsik is vice president, Critical Infrastructure Protection (CIP), with responsibility for strategic leadership, practice development, and service delivery.  Steve has more than 15 years’ experience leading field operations teams that conduct research and development, application development, integration and information security programs – spanning biometric and surveillance technology integration,  security architecture, physical and logical security convergence and information systems domains.  The CIP practice supports numerous clients in the Government, Transportation, and Financial Services sectors globally.<br />Today’s air cargo shippers and ports are under more pressure than ever to handle increasing cargo volumes, manage congestion, address changing customer needs and thrive in the midst of intense competition. I have compiled a list of ten commandants that I believe air cargo shippers, service providers and international governments should follow to ensure security throughout the larger supply chain.<br />Acknowledge a public concern for air cargo security. Results released in May 2011 from the Unisys Security Index, a semi-annual survey of consumer opinion on multiple dimensions of security, showed that 56 percent of Americans saw cargo transported by air, sea or land as extremely or very vulnerable to malicious or terrorist attack. Acknowledging the public has yet to feel satisfied with the level of security surrounding air cargo transport is the first step to solving the problem.<br />Create a more international mandate. The air cargo industry needs something similar to International Maritime Organization’s (IMO) International Ship and Port Security (ISPS) code. We need to follow a global set of standards to reduce the threat of terrorism at all ports of entry to every country.<br />Apply political pressure. In November, the U.S. government introduced air cargo security legislation, but it has not yet been brought up for vote. In addition, the EU’s 27 member states are considering proposals to tighten air cargo security. The legislative limbo process does not allow us to make changes quickly enough. We need to push this issue to the top of governments’ agendas and pressure our politicians to work deliberately to solve the problem.<br />Attack the problem as a whole—not piecemeal. Addressing the problem one airfreight at a time is not enough. We need to establish a secure global supply chain that provides visibility into all key touch points of the air cargo transport life cycle.<br />Implement positive identification solutions. Simple document verification devices—like an inexpensive card reader that can verify that a driving license is valid by examining the hologram or the raised lettering of the license—are easy to implement and can make a big difference.<br />Analyze big data. Governments should leverage complex analytical targeting systems to identify the point of origin, shippers name and specific package contents for every single package. This way we won’t lose visibility into cargo as it moves along the supply chain.<br />Bolster physical security. In addition to seals, video surveillance and RFID tags on cargo and personnel, we must continually look to new, innovative technologies that help security personnel do their job better. The U.S. Customs and Border Protection’s (CBP) Automated Manifest System and Automatic Targeting System serve as example innovative solutions that ensure unauthorized personnel cannot tamper with cargo.<br />Perfect your procedural reflexes. The ability to quickly react and respond to intelligence can be the difference between life and death. By collaborating on intelligence tools and standardized data with countries around the world, we can detect and stop terrorist activities immediately.<br />Assess service providers. Service providers play a significant role in the larger supply chain. We should expand the U.S. Customs-Trade Partnership Against Terrorism and the Certified Cargo Screening Program to enable real-time compliance reporting mechanisms for continuous compliance.<br />Persist in policy and technology. Everyone involved in the air cargo supply chain can take steps toward improvement. Service providers need to proactively improve the level of data they collect at origin and throughout the shipping process, industry bodies need to expedite the creation and adoption of security data standards, and governments need to establish improved information sharing practices to get intelligence to the front lines quickly.<br />Do you have any additional ideas on what we can do, collectively, to improve air cargo security?<br /> <br />For more information visit www.unisys.com ©2011 Unisys Corporation. All rights reserved. Specifications are subject to change without notice. Unisys and the Unisys logo are registered trademarks of Unisys Corporation. All other brands and products referenced herein are acknowledged to be trademarks or registered trademarks of their respective holders.Printed in United States of AmericaAugust 2011<br />