Smoother Sailing

Port, vessel operators need to meet challenges of complying with ISPS, other regulations

The maritime industry is clearly one of the most powerful drivers of international commerce and economic vitality in the world. The statistics are astounding, including a worldwide fleet of nearly 11 million marine containers, a transportation cargo unit that can hold up to 500 computer monitors.

The European Union, which is the main trading partner for two-thirds of the world, exports and imports more than EUR 1,000 billion a year. The global ocean-liner shipping industry owns approximately $155 billion in vessels, containers, marine terminals and other direct operating assets in service around the world. Almost 16 million Americans work in port-related jobs, producing $210 billion in federal, state and local taxes annually.

A Global Shift
Security in the maritime industry has seen major changes since Sept. 11, 2001. Two months after 9/11, the International Maritime Organization agreed to develop new measures for enhancing the security and safety of ships and ports. By December 2002, the IMO had defined and ratified its comprehensive approach as the International Code for the Security of Ships and of Port Facilities (ISPS).

The ISPS code’s primary objective is to establish a framework for IMO’s contracting governments to cooperate in taking preventive measures against security and safety threats that could affect the maritime industry. ISPS also outlines a methodology for ports and vessel operators to assess their levels of security risk and describes mandates they must fulfill to comply. As required by ISPS, contracting IMO governments have begun to pass legislation that mirrors the new code’s requirements and compliance deadlines.

In the United States, the Coast Guard, working with government agencies such as the Department of Homeland Security, is responsible for monitoring compliance at ports and on vessels.

The ISPS Requirements
ISPS requires companies and agencies involved in maritime trade implement an unprecedented range of security and safety measures. For many port and vessel operators, the process of installing security systems that comply with the new requirements will continue to be a daunting task. Three of the industry concerns are the following:

The high cost of compliance. Although contracting governments are obligated to help fund the costs of added security in their countries, the financial burden of installing new equipment, training people and managing new security systems ultimately rests with port and vessel operators. For many operators, the question of how they will fund the high costs of compliance is the single biggest concern they have with the legal requirements.

Best efforts may not be not good enough. Never before have port and vessel operators been required to comprehensively assess security needs and implement a plan for reliably reducing security and safety risks. For these operators, the process of outlining and implementing an effective plan that both meets regulatory requirements and stays within the limits of their operational cost structure may be a challenge they are unable to fulfill, despite their best efforts.

Minimal compliance. It is likely that many ports and vessels will try their luck, waiting to see what actions enforcement agencies take with others who are noncompliant before deciding to make a full commitment to security and safety. While some may slip through the cracks for a time, most who fail to comply face stiff fines and lost business opportunities from boycotts by other ships and ports.

Conventional Security
The face of security and safety at ports has changed little during the last century. Almost all conventional security and safety systems available continue to be built around the same four fundamental characteristics that such systems have shared for decades.

Typically, these characteristics result in systems that are unreliable at promoting security and safety and are difficult and costly for the average business and government agency to implement and manage. These four characteristics of conventional security are the following:

Security-specific. Most conventional security and safety systems work in a vacuum, separate from other business processes. These systems in no way enhance business productivity or otherwise assist managers.

Paper-based. Conventional security systems typically rely on paper forms of ID, such as driver’s licenses and Social Security cards, to verify the identity of people seeking access to secure areas of a facility. Paper forms of ID—which colleagues can share and criminals can steal or forge—are inherently unreliable. The process of screening paper-based IDs typically requires recording data by writing it down or making photocopies—a timeconsuming process that risks infringing on privacy rights.

People-driven. In order to screen paper forms of ID and track the movement of individuals throughout a facility, an organization needs security personnel. Security personnel are often difficult to train, costly to hire and undependable.

Point-oriented. Conventional security systems are designed to secure specific points or areas of concern at a facility. Specific points include cargo, entrances to a vessel and equipment. Because conventional approaches focus on specific points, one facility may have several disparate security systems serviced by different vendors.

For instance, a CCTV system installed by one vendor for monitoring cargo may work independently of an access-control system installed by another vendor for granting access to truckers who transport cargo. A facility that relies on point-based solutions is inefficient, poorly accommodates change in security needs and can quickly become unmanageable.

For certain applications, conventional security systems that use decentralized paper- and people-based systems may be an effective, if not optimal, approach for promoting reliable security and business efficiency. The manager of a small corporate office with a couple dozen employees and a handful of daily visitors may determine that hiring a security guard or two to screen building badges suffices for the company’s security needs.

Managing People, Openings and Assets
In the complex world of maritime trade, a system of security that relies on paper and people to track, manage and monitor vulnerable assets is both inefficient and undependable. Instead, ports need to integrate the security and safety requirements for every element and activity that takes place at a facility. These elements and activities may be categorized as people, openings and assets.

For instance, a ship’s openings include the engine control room, electrical control/ equipment room, cargo storage area, bridge and steering gear room. A port’s people include longshoremen, crew, administrators, maintenance workers and truck drivers. Assets for both a port and vessel may include the vessels, equipment, vehicles, containers and cargo.

Ports need to link people, openings and assets through a connected IT infrastructure based on an expandable, open architecture. Data is generated through the power of electronics—access cards with electronic codes or biometric identifiers replacing paper IDs and significantly reducing the number of security personnel required for screening.

By using an open architecture, a port’s system will easily accommodate the addition of new security applications—for example, a remote-monitoring system— as modules to a shared database.

A Better Mousetrap
The result is a highly reliable system that coordinates remote monitoring, access control, time and attendance, CCTV surveillance, and other technologies and processes designed to secure a facility. As a result, a typical port and vessel could enhance security and safety while promoting efficiencies. The following are some key applications to consider:

Track crew at ports of call. Under ISPS, vessels must maintain and manage records showing the last five ports each crew member visited. While a conventional security system using paper-based tracking systems would be hard-pressed to fulfill this challenge, ports can leverage time and attendance with access control technologies to easily generate the required information.

Verify truckers. Likewise, ports need to screen truckers. By using biometric readers with smart-card chips, the two largest ports in Europe—Rotterdam, The Netherlands, and Antwerp, Belgium— have implemented a fast method of identifying drivers, avoiding costly transport delays and ensuring the highest security.

The hand geometry template has only nine digits, leaving plenty of room on the smart-card chip for additional information. At the entrance, drivers identify themselves by using their cards with the hand geometry reader. Scan information of the left hand is compared with the template information on the smart card. The drivers repeat the process upon leaving.

The biometrically enhanced smartcard system ensures that information cannot be manipulated or changed. Drivers do not have to remember specific information such as a PIN, the smart card cannot be transferred to other people and mistakes such as typing in incorrect ID numbers are impossible.

Automated response to different security levels. If an emergency or threat to security arises, the port’s system should be able to quickly adopt different levels of access control, such as might be defined according to different MARSEC levels, for authorized and unauthorized people.

For instance, in an emergency that requires people to exit a vessel quickly, all major exits would open rapidly and automatically. For another threat, the system may close certain exits or allow only people with specific authorization to pass.

Minimize costs for damage claims. Many port managers contend that their facilities are responsible for no more than one-third of the total cost they pay annually to settle claims for damaged containers. But they traditionally have not had a mechanism for proving their innocence. By facilitating the generation of easy-tonavigate reports and video clips that show at what time and location a container was harmed, the security system could minimize costs from unfair claims.

Identification cards. The IMO has called upon contracting governments to issue seafarer ID cards that can be used to verify someone to all personnel in the maritime transportation industry. In similar fashion, the United States is finalizing plans for a prototype phase of the Transportation Worker Identification Credential, an electronic smart card that contains coded information, such as biometric identifiers and bar codes, for 15 million U.S. transportation workers.

The Time to Act is Now
Conventional security and safety approaches are inadequate for the unique demands of a maritime environment. Port and vessel operators need to meet the challenges of complying with ISPS and other regulations. By creating an overall plan with an integrated, open architecture solution, port security systems can act as a foundation for accommodating a growing body of legislation and the industry’s increasing reliance on technology. Such an approach will help operators save costs now and in the future while ensuring that a port’s people, openings and assets are secure.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West
  • Live From ISC West 2024: Post-Show Recap

    ISC West 2024 is complete. And from start to finish, the entire conference was a huge success with almost 30,000 people in attendance. Read Now

    • Industry Events
    • ISC West
  • ISC West 2024 is a Rousing Success

    The 2024 ISC West security tradeshow marked a pivotal moment in the industry, showcasing cutting-edge technology and innovative solutions to address evolving security challenges. Exhibitors left the event with a profound sense of satisfaction, as they witnessed a high level of engagement from attendees and forged valuable connections with potential clients and partners. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance. 3