A Royal Dutch Treat

We've written about cargo, port and airport security in the past, but there's nothing like seeing a port first-hand to understand how it all works. Without an up close and personal view, much is left to the imagination of how seagoing vessels arrive in port to unload, only to depart a few days later with hundreds of loaded containers.

Thanks to the Netherlands Foreign Investment Agency in The Hague, Netherlands, learning about cargo security at the Port of Rotterdam and airport security at Schiphol Airport became a first-hand experience for me. The Port of Rotterdam is the largest port and industrial area in Europe and is in constant development. It also is in close coexistence with housing, industry and transportation infrastructure. Port officials are currently developing more land to increase utility of the port.

While in Rotterdam, I talked with Capt. Jaap C. Lems, director, chief harbor master and port security officer, who said security is top of mind for cargo and shipping employees, as well as thousands of longshoremen and stevedores.

"We have invested millions of dollars in security and use X-ray to scan everything," Lems said. "We also employ fixed and mobile scanning equipment and radiation portal monitors, and customs employs risk analysis factors for everything that comes through this port."

Security in a port this size is not only about what you can see, so there are measures taken for potential incidents unseen, which includes underwater security. The Port of Rotterdam has implemented sensors on the water's surface to ensure that cargo vessels can reach port safely. The port's 160 terminals require the use of radar.

The Netherlands has established a safety region to minimize risks and potential threats from terrorism, fire and emergency response. Twenty cities form the safety region, which has established regional fire and police departments. Also, the department of risk and crisis management includes the Rotterdam Port Authority and harbor master, the environmental department and hazmat advisors.

"Everything is in place for the port authority to conduct high throughput scanning of containers," Lems said. "Based on risk analysis, up to 10 percent of all containers are scanned. Security as a whole is the responsibility of the port authority."

Making certain only authorized ships enter the port, officers in the harbor crisis center work around the clock to monitor the cargo entering the terminal. All vessels, by law, must contact the harbor master at least 24 hours before entering harbor waters to inform them of their type of cargo. This secures docking reservations and ensures that the vessels are met by harbor crews in an inflatable craft. Port authority duty officers are alerted before a ship arrives at the harbor.

If an unidentified vessel were to steer toward the port channels, or if a suspicious vessel moved into the harbor, security officials would be dispatched to investigate. If a situation escalated, the U.S. equivalent of the Coast Guard would appear, weapons at the ready. The harbor has a network of cameras in place to observe all the comings and goings of seagoing vessels. A suspicious vessel would get a special inspection from a port authority pilot, who would board the vessel for the remainder of the trip inside the harbor.

Schiphol airport in Amsterdam is an international way station, a crossroads for local and regional tourist trade, and an economy all its own. It also is home to local and regional mass transportation, as well as a stopping-off point for a European Union high-speed train network.

One security measure in place at Schiphol, which has been rather controversial in the United States, is the fullbody scan, which uses radio waves, not X-rays. The system uses millimeter wave technology, which creates a full-body image by means of reflection. The person steps into a cylindrical device fully clothed, but the generated image is almost completely naked, with the face shielded. The scan reveals all metal, plastic and ceramic objects on the body.

"The airport is in the beginning stages of Phase 2, where we will install as many as 4,000 digital cameras," said Miro Jerkovic, security policy and projects, and senior manager of research and development. "The fiber-optic backbone connects to all five control rooms on the airport, including cameras on the cargo platform and plaza, license plate recognition, air terminal gates and at the railways."

Perhaps the most obvious of security tactics are the constant patrols of (heavily) armed police. At any time, there are about 50 pairs of security officers, and as I am told, at least that many patrols of undercover police.

This article originally appeared in the issue of .

About the Author

Ralph C. Jensen is the Publisher of Security Today magazine.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3