Right On Track

Identifying cargo through asset tracking technologies helps shippers comply with federal mandates

September 2006 marked the fifth anniversary of the Sept. 11, 2001, attacks on the World Trade Center, sparking widespread debate on whether the United States is any safer today than it was on that fateful day in 2001. Since 9/11, much has been done to promote greater vigilance of both foreign and homegrown terrorist activities. But until another successful or unsuccessful terrorist attack, the nation may never know the complete answer.

In addition, CBP is looking at GPS tracking systems to identify trucking fleets and containers moving across borders and throughout the United States.

In an effort to make the commercial transportation system more secure, however, the federal government has signed into law the Security and Accountability for Every (SAFE) Port Act. The act calls for "implementing an international, multi-layered approach to cargo screening and port security." In part, this requires the Department of Homeland Security to implement an automated container security tracking system by April and complete a timeline for deployment of nuclear and radiological detection systems at all U.S. ports.

The SAFE Port Act works in harmony with the Greenlane Maritime Cargo Security Act, which provides incentives for shippers that demonstrate a sustained commitment to meeting the requirements of the Customs-Trade Partnerships Against Terrorism (C-TPAT). Under C-TPAT, shippers agree to develop, enhance and maintain effective security systems through global supply chains under the supervision of Customs and Border Protection (CBP). In addition, CBP is looking at GPS tracking systems to identify trucking fleets and containers moving across borders and throughout the United States.

The implications of the regulatory initiatives are significant. According to the American Association of Port Authorities, losses resulting from the closure of U.S. ports in the wake of a terrorist attack would exceed $1 billion per day. The Brookings Institution estimates the cost of port closure due to weapons of mass destruction, over time, could reach $1 trillion. If the ports were not able to resume operations for some weeks, not only would the economy be drastically affected, but the ramifications would spread to daily living issues, as well.

The good news is that technology exists to give shippers and transportation companies the ability to comply with the upcoming security provisions of the SAFE Port Act via automated container tracking. Mandated by April, automated shipping tracking systems will provide shippers and federal, state and local agencies the capability to cost effectively and securely track and identify intermodal shipments globally from origin to destination. Today, many companies are offering technology-based solutions in product mixes that can integrate with existing fleet management systems. Available systems can provide asset tracking, even down to the individual palette level, watching the item throughout its entire distribution lifecycle and protecting its manufacturer from unauthorized involvement throughout the supply chain.

C-TPAT Rollout
An in-bound shipments at its foreign port of origin will require manifests and dock personnel that meet the C-TPAT certification in order to ship goods into the United States. This certification process will require companies to comply with C-TPAT security guidelines -- guidelines that involve procedural, physical and personnel security, as well as access control, information and conveyance security.

Adopting security measures at the point of origin provides shippers the ability to ensure cargo security. Smart container technologies -- technology that monitors content position and identifies content integrity -- include logistics, security, environmental monitoring, telemetry and telecommand solutions that are implemented using a variety of protocols.

Having ensured content integrity at the point of origin, cargo is monitored via a tracking device packed within the shipment that provides cargo status data in real time using various monitoring devices. Unlike land-based transportation routes where data transmissions are conducted via cellular networks, overseas shipments pose significantly greater challenges such as the long shipment cycles and absence of cellular transmission capabilities at sea. Without cell towers to relay data back to customers, satellite transmission becomes the only methodology by which asset monitoring can take place. Currently, there are several satellite providers offering such services. While at sea, cargo data is monitored and reported back solely via satellite transmissions to customers and port authorities interested in the status of cargo en route to the port of entry.

Regardless of whether the data transmission is performed via a satellite uplink or through the use of cell towers, the medium for monitoring the geographical status and environmental integrity of assets is the Web. Using any standard Web browser, authorities interested in the disposition of assets en route can log into a secured site via any standard Web browser to track and monitor the integrity of the cargo as it continues its journey into the port.

While en route, sensors built into the tracking device assess the condition of the cargo, providing exception alerts and reports in the event that pre-determined thresholds are breached. Violations -- such as excessive shock/vibration, unauthorized access into the cargo or the cargo container, temperature parameters being exceeded, even the inclusion of unauthorized hazardous materials -- can trigger alarms, notifying the receiving port of entry well before arrival. At the actual time of the occurrence, the carrier is blocked from entering the port and kept off shore, protecting the region from potential disaster.

Cost Considerations
Although technology exists to provide asset visibility throughout the supply chain, cost is a roadblock to the deployment of effective and comprehensive safety and security services. Incrementally, the cost of equipping each container with reusable tracking devices and sensors is discouraging. Recharging, reconfiguring and shipping devices back to points of origin for redeployment adds significantly to the cost of implementation. To be a viable option, security systems must be widely adaptable in their functional deployment and reusable with only minor reconfiguring required.

One workable solution is a cholesteric liquid crystal display that, in combination with a mechanical locking mechanism, allows for remote interrogation of mechanical integrity, as well as identification of the contents of a container or trailer. If a door is breached, the display will register the compromised state of security, making the container or trailer a prime candidate for inspection.

Built-In Security
The future of security will reflect solutions that are integrated into containers and trailers during construction. Although this capability currently exists, cost remains a significant concern. However, as technology evolves, its cost is significantly lowered.

An emerging technology that will help vendors provide low-cost solutions is active wireless tagging based on the ZigBee communications protocol (IEEE 802.15.4), offering multiple sensor capabilities on low power. Within five years, by using technologies, such as ZigBee, GPS and RFID, containers, trucks and trailers will be capable of operating like fully integrated data centers. Shipments will be able to communicate and monitor variables, such as security, temperate and vibration, while going to the same destination.

The key to future system functionality will rely on the use of ZigBee and wireless mesh technology to extend the reach of a network. With mesh networking, access points continuously communicate with each other, evaluating the potential of each link. If a link is degraded, the access point determines whether a better path exists and will communicate through a more optimal node. When a shipment arrives at its destination, such networks enable data to be downloaded so the decision can be made whether or not to inspect the contents.

International and intermodal shipments are and will continue to be increasingly scrutinized. Being responsible for secure tracking and delivery of goods, transportation companies must know if anyone has unexpectedly entered an airplane or truck. Shippers must know if a container has been opened or tampered with. Waybills must be provided that detail not only a container's contents, but also the status of the container throughout its entire journey. Shore notification of an approaching shipment must be made from as far as possible.

Fortunately, current technology, such as real-time monitoring, enables personnel to respond to alerts accordingly. Auto data collection and reporting capabilities help condense the supply chain and contribute significantly to the security of ports and the transportation system as a whole.

Continuing development of technology and its inevitable decrease in cost will enable shippers and transportation companies to meet the impending demands of regulatory developments. The Greenlane Maritime Security Bill and SAFE Ports Act that together mandate international supply chain visibility into and security for all modes of transportation by which containers arrive, depart or move throughout the United States will save companies time and money through the unimpeded movement of non-suspect containers and goods.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3