Intelligent Protection - The next generation of Intermodal security

Intelligent Protection

The next generation of intermodal security

Intelligent ProtectionCargo theft is the costliest crime in America, reporting an estimated $25 billion in merchandise stolen, with incidents on the rise, according to the International Cargo Security Council. Moreover, the American Association of Ports Authorities cites that there is $60 billion in indirect costs associated with cargo theft.

Insurance prices for shipping high-value loads are on the rise. In many cases, 10 percent of the value of the cargo is paid to insurance companies; this figure may equate to millions of dollars. Why is it so high? Because most shipping containers are handled by up to five different intermodal freight transportation methods from origin to destination. This makes it very difficult for insurance companies to discern when and where a theft or damage incident took place and therefore, it is difficult to hold a particular transportation entity liable for the loss.

The Costly Issue of Cargo

Founded in 1995, Charleston, S.C.-based UEC Electronics, LLC (UEC) is one of more than 250 defense contractors providing next-generation technology for both the private and public sectors. A female-owned, small business, UEC specializes in a variety of engineering expertise, including security; electronics; hybrid power generation; smart power distribution; and automated systems for military, aerospace and industrial customers. Currently, UEC is working toward a solution for one of the security industry’s most pressing problems—intelligent asset protection.

When a container arrives at its final destination and the purchaser discovers pilferage, they file a claim. Insurance companies respond the only way they can— they pass the costs of losses on to their customers through increased premiums, who in turn, pass it on to consumers.

Not only is unsecure cargo costly, it also is dangerous. Terrorist activity resulted in the creation of the Department of Homeland Security, which clearly recognizes the vulnerability of our seaports. A decade ago, approximately 2 percent of the estimated 252 million container shipments worldwide were inspected, with approximately 17 million containers entering the United States on an annual basis. The United States has 360 commercial ports and 3,200 cargo and passenger handling facilities, according the U.S. Coast Guard. This provided terrorists a 98 percent probability of success to use a container as a potential bomb or for carrying nefarious supplies into the country.

As a result, custom authorities expressed the need for a means to implement Electronics Declaration and Electronics Acquittals for inbound freight to enable a streamlined process to ensure that the contents of freight containers correspond with manifest changes. In addition, the physical status of container sealing mechanisms can be automatically detected before goods are cleared. Goods destined for export will be detected at border posts and sealing mechanisms verified against inbound status enabling identification of discrepancies.

Traditional bolt seals and padlocks for shipping containers and cargo trailers are a mere bolt-cutter away from easy access and do not address today’s security challenges, which include uncontrolled or poorly controlled access to cargo (assets), unclear responsibility for shortage and damage; cargo access required by multiple disparate parties; poor or non-existent tracking of goods; lack of cargo access traceability; expensive key management and lock replacement; secure oncontainer manifest storage and the high cost of frequent customs inspections.

With a combination of innovation and current technologies, this vicious cycle can now be managed more effectively.

A ‘Core’ Solution

Philip Ufkes, principal of Security Enhancement Systems (SES), worked with UEC Electronics to develop a patent-pending, keyless, electronic-locking device called the Core Defender. This newcomer in the market is the product the cargo, transportation and storage markets have been longing for. The device combines a rugged, stainless-steel, dual-ratcheting lock mechanism that fixes easily to and secures the keeper bars on any standard shipping container or cargo trailer with intelligent keyless access control, providing a real-time log of container lock, unlock, or tamper events, including the date, time and operator.

The base Core Defender incorporates two levels of intrusion and tamper detection. The novel, secure, keyless access ensures that when international shipment is required, the load is accessible by customs and border authorities, and a record of that inspection is maintained digitally along with the electronic manifest. The incorporation of an intelligent security device is a means to not only discourage theft but also determine a geographical location where a theft occurred and specifically identify anyone who had access to the cargo.

Why is this product and technology a significant game changer? Theft has been an unresolvable, uncontrollable and an extremely costly occurrence in the asset transportation and storage industry. Disgruntled drivers, unappreciated dispatchers, and current and former employees who are supplementing their incomes are most often to blame. Electronic access traceability combined with dynamic access codes provide leadership with the tools to quickly identify and proactively prevent problems before they impact their customer, insurance premiums or the bottom line.

How does this technology work? A Dynamic Access Code (DAC) is transmitted to the device via secure encrypted Bluetooth technology. Once authenticated, the operator may lock or unlock the device or download the electronic manifest. Keys and combinations are ancient technology. Smartphones have become a ubiquitous do-all computing device for various applications and are an essential part of our daily lives. Core Defender uses the operator’s cell phone or any smart device as a highly secure access channel—no cellular signal required.

The DAC is provided automatically by a resident software app that accesses the central system via a secure internet connection. Optionally, when no internet access is available, the company dispatcher can provide the required code. A record of the code acquisition is maintained for traceability. The DAC is only valid for a predetermined period of time and is unique to that particular device; optionally, the device may be configured with a static access code. A simple system entry removes the operator from the list of authorized users; no keys to collect, locks to re-core or replace. Expensive and burdensome key-management logistics are a thing of the past.

In addition to the features above, lock, unlock and tamper events are logged throughout transit and are available for review at any time by authorized staff. The manifest is safely and securely stored electronically within the lock—no more lost or damaged paperwork. The security products provide real-time visibility of the chain of custody and provides a comprehensive audit trail. This is useful for the DoD and other government entities where asset security is a significant issue and challenge. It also provides a cost-effective, secure, auditable, easily managed, enhanced security system—an unseen product eagerly needed by the market.

Beyond the Product

UEC seeks to combine its engineering and manufacturing expertise to provide its customers with a unique opportunity to realize the full potential of their intellectual property, minimize schedule and development risk, and improve product quality.

Entrepreneurial product development, such as the Core Defender, provides a creative departure from EIC’s primary DoD and aerospace engineering and manufacturing activities. We continue to diversify our work to include private sector projects. Key to UEC’s success is using our in-house engineering talent and sourcing from Charleston’s growing pool of engineers, which ranks among the nation’s fastest growing. UEC’s cargo theft protection is an example of how the same workforce that produces technology for the military also is providing innovation for private industry.

This article originally appeared in the July 2013 issue of Security Today.


  • CISA Kicks Off 20th Anniversary of Cybersecurity Awareness Month

    CISA Kicks Off 20th Anniversary of Cybersecurity Awareness Month

    The Cybersecurity and Infrastructure Security Agency (CISA) recently announced the kickoff of the 20th Cybersecurity Awareness Month. Throughout October, CISA and the National Cybersecurity Alliance (NCA) will focus on ways to “Secure Our World” by educating the public on how to stay safe online. Read Now

  • Cybersecurity Awareness Month: Top Five Action Items to Elevate Your Data Security Posture Management and Secure Your Data

    October is Cybersecurity Awareness Month, and every year most tips for security hygiene and staying safe have not changed. We’ve seen them all – use strong passwords, deploy multi-factor authentication (MFA), be vigilant to spot phishing attacks, regularly update software and patch your systems. These are great recommended ongoing tips and are as relevant today as they’ve ever been. But times have changed and these best practices can no longer be the bare minimum. Read Now

  • Boosting Safety and Efficiency

    Boosting Safety and Efficiency

    In alignment with the state of Mississippi’s mission of “Empowering Mississippi citizens to stay connected and engaged with their government,” Salient's CompleteView VMS is being installed throughout more than 150 state boards, commissions and agencies in order to ensure safety for thousands of constituents who access state services daily. Read Now

  • Live From GSX: Post-Show Review

    Live From GSX: Post-Show Review

    This year’s Live From GSX program was a rousing success! Again, we’d like to thank our partners, and IPVideo, for working with us and letting us broadcast their solutions to the industry. You can follow our Live From GSX 2023 page to keep up with post-show developments and announcements. And if you’re interested in working with us in 2024, please don’t hesitate to ask about our Live From programs for ISC West in March or next year’s GSX. Read Now

    • Industry Events
    • GSX

Featured Cybersecurity

New Products

  • ResponderLink


    Shooter Detection Systems (SDS), an company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • XS4 Original+

    XS4 Original+

    The SALTO XS4 Original+ design is based on the same proven housing and mechanical mechanisms of the XS4 Original. The XS4 Original+, however, is embedded with SALTO’s BLUEnet real-time functionality and SVN-Flex capability that enables SALTO stand-alone smart XS4 Original+ locks to update user credentials directly at the door. Compatible with the array of SALTO platform solutions including SALTO Space data-on-card, SALTO KS Keys as a Service cloud-based access solution, and SALTO’s JustIn Mobile technology for digital keys. The XS4 Original+ also includes RFID Mifare DESFire, Bluetooth LE and NFC technology functionality. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3