Right On Track

Identifying cargo through asset tracking technologies helps shippers comply with federal mandates

September 2006 marked the fifth anniversary of the Sept. 11, 2001, attacks on the World Trade Center, sparking widespread debate on whether the United States is any safer today than it was on that fateful day in 2001. Since 9/11, much has been done to promote greater vigilance of both foreign and homegrown terrorist activities. But until another successful or unsuccessful terrorist attack, the nation may never know the complete answer.

In addition, CBP is looking at GPS tracking systems to identify trucking fleets and containers moving across borders and throughout the United States.

In an effort to make the commercial transportation system more secure, however, the federal government has signed into law the Security and Accountability for Every (SAFE) Port Act. The act calls for "implementing an international, multi-layered approach to cargo screening and port security." In part, this requires the Department of Homeland Security to implement an automated container security tracking system by April and complete a timeline for deployment of nuclear and radiological detection systems at all U.S. ports.

The SAFE Port Act works in harmony with the Greenlane Maritime Cargo Security Act, which provides incentives for shippers that demonstrate a sustained commitment to meeting the requirements of the Customs-Trade Partnerships Against Terrorism (C-TPAT). Under C-TPAT, shippers agree to develop, enhance and maintain effective security systems through global supply chains under the supervision of Customs and Border Protection (CBP). In addition, CBP is looking at GPS tracking systems to identify trucking fleets and containers moving across borders and throughout the United States.

The implications of the regulatory initiatives are significant. According to the American Association of Port Authorities, losses resulting from the closure of U.S. ports in the wake of a terrorist attack would exceed $1 billion per day. The Brookings Institution estimates the cost of port closure due to weapons of mass destruction, over time, could reach $1 trillion. If the ports were not able to resume operations for some weeks, not only would the economy be drastically affected, but the ramifications would spread to daily living issues, as well.

The good news is that technology exists to give shippers and transportation companies the ability to comply with the upcoming security provisions of the SAFE Port Act via automated container tracking. Mandated by April, automated shipping tracking systems will provide shippers and federal, state and local agencies the capability to cost effectively and securely track and identify intermodal shipments globally from origin to destination. Today, many companies are offering technology-based solutions in product mixes that can integrate with existing fleet management systems. Available systems can provide asset tracking, even down to the individual palette level, watching the item throughout its entire distribution lifecycle and protecting its manufacturer from unauthorized involvement throughout the supply chain.

C-TPAT Rollout
An in-bound shipments at its foreign port of origin will require manifests and dock personnel that meet the C-TPAT certification in order to ship goods into the United States. This certification process will require companies to comply with C-TPAT security guidelines -- guidelines that involve procedural, physical and personnel security, as well as access control, information and conveyance security.

Adopting security measures at the point of origin provides shippers the ability to ensure cargo security. Smart container technologies -- technology that monitors content position and identifies content integrity -- include logistics, security, environmental monitoring, telemetry and telecommand solutions that are implemented using a variety of protocols.

Having ensured content integrity at the point of origin, cargo is monitored via a tracking device packed within the shipment that provides cargo status data in real time using various monitoring devices. Unlike land-based transportation routes where data transmissions are conducted via cellular networks, overseas shipments pose significantly greater challenges such as the long shipment cycles and absence of cellular transmission capabilities at sea. Without cell towers to relay data back to customers, satellite transmission becomes the only methodology by which asset monitoring can take place. Currently, there are several satellite providers offering such services. While at sea, cargo data is monitored and reported back solely via satellite transmissions to customers and port authorities interested in the status of cargo en route to the port of entry.

Regardless of whether the data transmission is performed via a satellite uplink or through the use of cell towers, the medium for monitoring the geographical status and environmental integrity of assets is the Web. Using any standard Web browser, authorities interested in the disposition of assets en route can log into a secured site via any standard Web browser to track and monitor the integrity of the cargo as it continues its journey into the port.

While en route, sensors built into the tracking device assess the condition of the cargo, providing exception alerts and reports in the event that pre-determined thresholds are breached. Violations -- such as excessive shock/vibration, unauthorized access into the cargo or the cargo container, temperature parameters being exceeded, even the inclusion of unauthorized hazardous materials -- can trigger alarms, notifying the receiving port of entry well before arrival. At the actual time of the occurrence, the carrier is blocked from entering the port and kept off shore, protecting the region from potential disaster.

Cost Considerations
Although technology exists to provide asset visibility throughout the supply chain, cost is a roadblock to the deployment of effective and comprehensive safety and security services. Incrementally, the cost of equipping each container with reusable tracking devices and sensors is discouraging. Recharging, reconfiguring and shipping devices back to points of origin for redeployment adds significantly to the cost of implementation. To be a viable option, security systems must be widely adaptable in their functional deployment and reusable with only minor reconfiguring required.

One workable solution is a cholesteric liquid crystal display that, in combination with a mechanical locking mechanism, allows for remote interrogation of mechanical integrity, as well as identification of the contents of a container or trailer. If a door is breached, the display will register the compromised state of security, making the container or trailer a prime candidate for inspection.

Built-In Security
The future of security will reflect solutions that are integrated into containers and trailers during construction. Although this capability currently exists, cost remains a significant concern. However, as technology evolves, its cost is significantly lowered.

An emerging technology that will help vendors provide low-cost solutions is active wireless tagging based on the ZigBee communications protocol (IEEE 802.15.4), offering multiple sensor capabilities on low power. Within five years, by using technologies, such as ZigBee, GPS and RFID, containers, trucks and trailers will be capable of operating like fully integrated data centers. Shipments will be able to communicate and monitor variables, such as security, temperate and vibration, while going to the same destination.

The key to future system functionality will rely on the use of ZigBee and wireless mesh technology to extend the reach of a network. With mesh networking, access points continuously communicate with each other, evaluating the potential of each link. If a link is degraded, the access point determines whether a better path exists and will communicate through a more optimal node. When a shipment arrives at its destination, such networks enable data to be downloaded so the decision can be made whether or not to inspect the contents.

International and intermodal shipments are and will continue to be increasingly scrutinized. Being responsible for secure tracking and delivery of goods, transportation companies must know if anyone has unexpectedly entered an airplane or truck. Shippers must know if a container has been opened or tampered with. Waybills must be provided that detail not only a container's contents, but also the status of the container throughout its entire journey. Shore notification of an approaching shipment must be made from as far as possible.

Fortunately, current technology, such as real-time monitoring, enables personnel to respond to alerts accordingly. Auto data collection and reporting capabilities help condense the supply chain and contribute significantly to the security of ports and the transportation system as a whole.

Continuing development of technology and its inevitable decrease in cost will enable shippers and transportation companies to meet the impending demands of regulatory developments. The Greenlane Maritime Security Bill and SAFE Ports Act that together mandate international supply chain visibility into and security for all modes of transportation by which containers arrive, depart or move throughout the United States will save companies time and money through the unimpeded movement of non-suspect containers and goods.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Surveillance Cameras Provide Peace of Mind for New Florida Homeowners

    Managing a large estate is never easy. Tack on 2 acres of property and keeping track of the comings and goings of family and visitors becomes nearly impossible. Needless to say, the new owner of a $10 million spec home in Florida was eager for a simple way to monitor and manage his 15,000-square-foot residence, 2,800-square-foot clubhouse and expansive outdoor areas. Read Now

  • Survey: 72% of CISOs Are Concerned Generative AI Solutions Could Result In Security Breach

    Metomic recently released its “2024 CISO Survey: Insights from the Security Leaders Keeping Critical Business Data Safe.” Metomic surveyed more than 400 Chief Information Security Officers (CISOs) from the U.S. and UK to gain deeper insights on the state of data security. The report includes survey findings on various cybersecurity issues, including security leaders’ top priorities and challenges, SaaS app usage across their organization, and biggest concerns with implementing generative AI solutions. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

Featured Cybersecurity

Webinars

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3