A Port In The Storm
Maritime regulations and security systems have changed rapidly since 2001
- By Debjit Das
- Sep 01, 2012
In 2011, U.S. imports of manufactured goods exceeded $2 trillion and exports
reached approximately $1.3 trillion, reflecting an annual growth of
more than 15 percent from 2010.
A significant portion of this trade is handled by our waterways. From
ocean carriers, cruise lines, port facilities and terminals to logistics providers,
importers and exporters, ensuring smooth operations by efficiently securing and
protecting our vast maritime industry is of utmost importance—not only to the
individual organizations but also to our law enforcement and intelligence agencies.
In the maritime industry, detection and quick response to crime and terrorism is
key to the welfare of our citizens and economy.
Following the Sept. 11, 2001, terrorist attacks, the U.S. government implemented
several regulations to better protect the nation’s maritime industries. Alongside
these regulations, several advanced security systems are available to help organizations
leverage the latest technologies to protect their employees, tenants, facilities
and cargo. Let’s take a closer look at what regulations and laws have been deployed,
as well as the latest security solutions an organization could install to help
meet stringent regulations and protect against catastrophic events.
Understanding the Regulations
Keeping our vast waterways and seaports safe and secure is no simple task. The
U.S. Coast Guard’s primary responsibility is to secure our three main maritime
activities: port, vessel and facility. Some of the principle laws that support USCG’s
mission include:
- The Espionage Act of 1917, which empowered USCG to make regulations to
prevent damage to harbors and vessels during national security emergencies.
- As result of the “Red Scare,” the Magnuson Act of 1950 provided permanent
port security regulations and broad powers to search vessels in U.S. waters and
control the movement of foreign vessels in U.S. ports.
- The Ports and Waterways Safety Act of 1972, which was passed due to several
major groundings and oil spills, provided port safety authority beyond the
Magnuson Act to protect the use of port transportation facilities, and to enhance
efforts against the degradation of the marine environment.
- The Maritime Transportation Security Act of 2002, or MTSA, enacted as a result
of 9/11, provided sweeping new authorities for preventing acts of terrorism
within the U.S. maritime domain.
- The International Ship and Port Facility Security (ISPS) Code, 2002, was adopted
by the International Maritime Organization as new provisions to the International
Convention for SOLAS to enhance maritime security.
In additional to these regulations enforced by USCG, there have been other
security provisions introduced by Congress to improve overall security measures.
The creation of the Transportation Worker Identification Credential (TWIC) program
ensures that a tamper-resistant biometric credential for maritime workers must be obtained in order to access secure port facilities
and other vessels. In order to gain a TWIC,
workers must provide their biographic and biometric
information—such as fingerprints—and successfully
pass a security threat assessment conducted by the
Transportation Security Administration.
With this regulation in place, government agencies
and organizations can verify the identification of authorized
individuals and enhance the security of facilities
by minimizing the risk of unauthorized staff
and visitors gaining access to secure areas.
Finally, there have been many grants issued by
Congress and administered by the Department of
Homeland Security to aid transportation infrastructure
security efforts. One such grant is the Port Security
Grant Program (PSGP), which outlines a comprehensive
set of measures to strengthen the nation’s
critical infrastructure against risks associated with
potential terrorist attacks. The PSGP provides grant
funding to port areas for the protection of critical infrastructure
and to deter terrorism. Ports across the
United States are taking advantage of grants like this
to help make investments in technology to deploy robust
and cutting-edge security infrastructures.
Taking Security to the Next Level
Since 9/11, there are more stringent regulations on
protecting our nation’s critical infrastructure. Ports
rely on training and exercises and advancements in
technology to assist in enhancing maritime domain
awareness and risk management capabilities to prevent,
detect, respond to and recover from attacks involving
improvised explosive devices and chemical,
biological, radiological and nuclear explosives and
other non-conventional weapons.
By leveraging a comprehensive video surveillance
platform, port authorities can benefit from a more
proactive, effective approach to managing large,
geographically distributed operations. Using powerful,
fully integrated video management software will
provide more efficient operations and lower the total
cost of ownership over time. With limited staff and
expansive perimeters, ports need to rely on the bestin-
breed software to pinpoint events of interest. Having
a video management software suite that captures
video, analyzes data and provides a platform for sharing
details among government agencies is paramount.
Additionally, many ports are dependent on video
analytics. Integrated video analytics enhance situational
awareness and transform threat detection from
a manual, resource-intensive operation to an accurate
and automated process. For example, when an intruder
enters a restricted area, video analytics can quickly detect
that a virtual tripwire has been crossed, and the
video system can automatically send alerts and related
video to the appropriate security staff while repositioning
PTZ cameras to capture the intruder’s activity.
Port authorities also are leveraging powerful integrated
video solutions, such as physical information
management systems (PSIM), to rapidly detect potential
problems and emergency situations, notify the
appropriate agencies and first responders, and initiate
effective action. By deploying a PSIM solution, port
authorities can collect and analyze data from various
systems and sensors such as radar, video-based perimeter
protection, ALPR and more, creating a holistic
approach to security management. Leveraging the
combined data, port authorities can easily share and
connect with multiple agencies (e.g., port security, police
and fire departments) to provide them with access
to the information along with pre-defined workflows
for escalation and a response mechanism for certain
anticipated security and safety scenarios.
A PSIM solution fuels more effective incident
management through four distinct functions:
Planning. The PSIM solution should enable organizations
to plan security layouts, develop policies
and procedures and evaluate contingency plans. The
PSIM solution also should allow users to run virtual
threat scenarios. Additionally, 3-D geospatial site representations
are extremely useful in helping security
managers determine optimal placement of security
equipment.
Training. The PSIM solution should offer a unified
security interface and simulations of realistic security
situations for training security personnel and other
staff to improve emergency preparedness.
Real-time monitoring and control. The PSIM solution
should seamlessly correlate data from a multitude
of security sensors and systems, providing an
integrated, real-time view of activity and related information:
for example, incident alerts, the type of
incident and its location, the closest hospitals and the driving route from the incident to the
hospital to assist first responders.
Reporting and debriefing. The PSIM
solutions should provide complete incident
information—including what
transpired and how staff reacted—for
improving the organization’s ability to
handle future incidents.
By consolidating security system
planning and monitoring and providing
standard operating procedures,
simulations and reporting, PSIM systems
enable ports to improve the speed,
efficiency and intelligence of responses
while reducing costs and minimizing
compliance risks.
IP cameras are important to port
facilities because they provide visual
cues as to what activities are happening
in various locations. Being able to
pull multiple streams of video at different
frame rates provides organizations
with increased situational awareness to
more promptly and effectively respond
to threats. Additionally, comprehensive
video management software applications
provide automatic camera detection
and configuration, centralized
administration and management, and
automated, system-wide camera health
monitoring, diagnostics and alerts.
With a wide array of fixed, PTZ dome,
PTZ, vandal-proof and outdoor IP
camera options available on the market,
IP cameras have become a costeffective
option for security systems.
Although IP video software provides
live viewing, recording, and retrieval
of video, some organizations
are turning to more advanced NVR
platforms that can offer simultaneous
viewing of multiple cameras, as well
as multiple recording modes. Versatile
NVRs help capture high-quality video
images and interface with a variety of
security and business systems. This interoperability
provides organizations
with a more complete view of remote
events and operations and serves as a
time-saving approach to security and
operational efficiency.
Using NVRs to capture camera feeds
is not enough. It is important to find
corresponding video management software
that enables system integrators and
security operators to centrally configure,
view, manage and monitor the functioning
of NVRs enterprise-wide. By simplifying
video system administration
and viewing, these software applications
can help reinforce operational standards
and uniformity in dispersed operations,
enabling a more proactive, efficient approach
to security.
All of these technology solutions offer
security professionals and port facilities
the ability to monitor facilities 24/7
in real time and to proactively safeguard
critical areas, assets and resources.
A Real-Time Look at Port Security
The Port of Los Angeles encompasses
7,500 acres, 43 miles of waterfront and
27 cargo terminals. Safeguarding miles
of waterfront and multiple land-based
facilities can be a daunting task, and
prior to 2006, the port operated with
only a few analog cameras across its expansive
grounds.
Leveraging funding from the Port
Security Grant Program, officials designed
a new security system that would upgrade a disparate system into an integrated
solution. After an extensive
evaluation process, the organization
selected the Nextiva IP video portfolio
from Verint Video Intelligence Solutions,
including Nextiva VMS, integrated
analytics, encoders/decoders and
wireless devices. In order to successfully
implement the new security platform,
the port worked in phases to deploy the
most important elements first.
The IP video solution integrates
with more than 350 cameras from thirdparty
manufacturers to monitor highly
critical areas. Captured data is then
transmitted to a state-of-the-art threat
detection center for central monitoring.
Today, the port secures its expansive
waterfront and perimeters by creating
custom detection rules with analytics
that secure tangible and virtual perimeters
or borders.
From 2007 to 2008, port police
implemented geographic information
system (GIS) technology in support of
its security initiatives. Integrated with
VMS and third-party cameras, port
officials are able to leverage enterprise
GIS so that staff in the threat detection
center can pinpoint locations of their
first responders in the field while having
a complete view of activities.
In the final phase, the port searched
for a solution that would support field
personnel in responding to real-time
emergency situations and provide the
right information to the right people
at the right time. In 2010, the port deployed
an integrated third-party solution
that delivers clear transmission
of high-quality images to any authorized
smartphone or handheld computer.
This innovative solution ensures
that an officer can view real-time images
being shared between the field and
the threat detection center.
For the Port of Los Angeles, central
monitoring at the threat detection center,
combined with the use of innovative
technology, enhances situational
awareness around its properties and
transforms what used to be a manual,
resource-intensive operation into an efficient,
accurate and automated process.
Shipshape Security Operations
Worldwide port and maritime operations
and their associated facilities and infrastructure
collectively represent one of the
single greatest unaddressed challenges
to the security of nations and the global
economy today. From their geographically
dispersed facilities and stringent
government regulations to the threat of
terrorism and movement of cargo over
land and water, ports remain vulnerable
and require strategic initiatives.
Technology alone cannot secure
ports and shipping, nor can adding
additional security procedures, physical
barriers or additional manpower
fully mitigate the risk. What will work
is an integrated, carefully planned
approach that incorporates the best
elements of technical, physical, procedural
and information security disciplines
into a comprehensive
strategy.
This article originally appeared in the September 2012 issue of Security Today.