17
IT Solutions for IT Solutions for Security & Trade Security & Trade Facilitation Facilitation Susan Evans Susan Evans Business Development, EMEA Business Development, EMEA

IT Solutions for Security & Trade Facilitation Susan Evans Business Development, EMEA

Embed Size (px)

Citation preview

Page 1: IT Solutions for Security & Trade Facilitation Susan Evans Business Development, EMEA

IT Solutions for IT Solutions for Security & Trade FacilitationSecurity & Trade Facilitation

Susan EvansSusan EvansBusiness Development, EMEABusiness Development, EMEA

Page 2: IT Solutions for Security & Trade Facilitation Susan Evans Business Development, EMEA

All Rights Reserved. Confidential

Agenda

• The Challenge• Requirements• A Technology Approach• Case Study

Page 3: IT Solutions for Security & Trade Facilitation Susan Evans Business Development, EMEA

All Rights Reserved. Confidential

The Challenge

• Limited visibility of movements of goods• Limited information of trading partners• Lack of existing infrastructure• Security Breach

– When did it happen– Who was in custody of the goods

• Acceptance of new processes & technology

Page 4: IT Solutions for Security & Trade Facilitation Susan Evans Business Development, EMEA

All Rights Reserved. Confidential

Requirements

• A solution that provides security• A solution that provides visibility and data

– Forensics for improving supply chain security

• A solution that automates and improves supply chain efficiency

• An adaptable solution that meets differing objectives– Theft– Smuggling– Bombs and Weapons of Mass Destruction

Page 5: IT Solutions for Security & Trade Facilitation Susan Evans Business Development, EMEA

All Rights Reserved. Confidential

A typical supply chain Network includes…

• Movement Vehicle

• Container (sea)

• Pallet

• Master Carton

• Item

ActiveRFID

Satellite

Passive RFID

BarCode

• ULD (air)

Semi-Passive

RFID

Paper

Page 6: IT Solutions for Security & Trade Facilitation Susan Evans Business Development, EMEA

All Rights Reserved. Confidential

A Technology Solution

• Radio Frequency Identification Device (RFID)– Hardware Device for Security

• Software Application that collects the information and makes available to users– Transportation Security System

• A Network that supports the RFID technology

Page 7: IT Solutions for Security & Trade Facilitation Susan Evans Business Development, EMEA

All Rights Reserved. Confidential

A Typical RFID Network Includes…

Applications for user interaction

Enterprise systems for coordinated decision making

Local systems for site coordination

ZONES

APPLICATIONS

Distribution CenterWarehouseManufacturer Store

Web Browser AlertsEnterprise Software

ENTERPRISE Other Enterprise

SITES

ASSETS

RFID readers

RFID tags (Active or EPC/Passive)

Page 8: IT Solutions for Security & Trade Facilitation Susan Evans Business Development, EMEA

All Rights Reserved. Confidential

36 countries and growing

400 nodes – Airports, Seaports, Rail Terminals, Consolidation Points

250,000 conveyances tracked

Open network, international (ISO) and technology standards-based system

Integrated with a number of complementary technologies (sensors, GPS, handheld devices)

Technology infrastructure available for global container security

US Govt. Dept. Total Asset Visibility Network

Macedonia

BremerhavenAntwerp

Port BrindisiBeaumont

McGuire Air Force Base

Page 9: IT Solutions for Security & Trade Facilitation Susan Evans Business Development, EMEA

All Rights Reserved. Confidential

READER

SIGNPOST

BEACON MODE

SIGNPOST MODE

TAMPER EVENT

Tag ID

Seal Condition

Tag ID

Tamper Condition

2.4GHz or otherBackhaul

RADIO ACCESS POINT

PORT HARDWARE INFRASTRUCTURE

SAVI SITE MANAGER

Signpost ID

123 KHz

Tag ID + Signpost ID +

Seal Condition433 MHz

SAVI MOBILE READER POD

AND HANDHELD

Seal/Tag Commands

433MHz

Seal/Tag Commands

433MHz / 123 KHz

Tag ID

Tamper Condition

Tag ID

Tamper Condition

Tag ID

Tamper Condition

Tag ID

Tamper Condition

SMART SEAL TAG

Tag ID

Seal Condition

Tag ID

Seal Condition

Tag ID

Seal Condition

Page 10: IT Solutions for Security & Trade Facilitation Susan Evans Business Development, EMEA

All Rights Reserved. Confidential

Examples of RFID Tags

ST-604

ST-654

ST-602

ST-645 New ST-645EJB ESeal

General Asset Tracking Security Tags

RFID Tags

Smart Lables

Future Tags will be smaller than a grain of rice

Intelligent LabelsIntelligent Labels

SHIP TO: SHIP FROM:

COMMANDING OFFICER DDSP SUSQUEHANNA, PA 15230

CHEMICAL SUPPLIER CHEMICAL COMPANY INSTITUTE, WV 23456

TCN:

NSN:

CAGE:

MSDS #:

GTIN:

HCC:

AHRIST DATA:

AWHGEAA$0F00090XX

5310011987585

AWHGE 00098756100013CHEM WT:

ABCDE 10000A1

SHIP TO: SHIP FROM:

COMMANDING OFFICER DDSP SUSQUEHANNA, PA 15230

CHEMICAL SUPPLIER CHEMICAL COMPANY INSTITUTE, WV 23456

TCN:

NSN:

CAGE:

MSDS #:

GTIN:

HCC:

AHRIST DATA:

AWHGEAA$0F00090XX

5310011987585

AWHGE 00098756100013CHEM WT:

ABCDE 10000A1

Bar codes give way to Intelligent Labels (Passive RFID tags)

Page 11: IT Solutions for Security & Trade Facilitation Susan Evans Business Development, EMEA

All Rights Reserved. Confidential

Case Study: Smart & Secure Tradelanes

Phase One Results:• Increased security• Complete, accurate information• Timely information transfer• Compliance• Economic justification

Page 12: IT Solutions for Security & Trade Facilitation Susan Evans Business Development, EMEA

Click for

APEC STARBEST Video Clip

Page 13: IT Solutions for Security & Trade Facilitation Susan Evans Business Development, EMEA

All Rights Reserved. Confidential

SST: Phase II

– Phase I results proved that SST is a viable and effective system for improving global supply chain security and efficiency

– The geographical, technological, and informational deliverables and benefits of SST were powerful but limited during Phase I

– The capabilities of SST are nonetheless suitable for expanding it on a large scale

– Phase II builds upon the existing capabilities of SST, and refines and expands its benefits through a three-part process

– Enlarge the circle of partners to develop improvements for both the SST system and the management of individual supply chains

– Expand the number of locations served, technologies available, and information provided to users

– Collaborate closely with the ISO to develop global standards for supply chain security

– Phase II presents an opportunity for users to implement a completely integrated, end-to-end supply chain security and management system that is truly global

Page 14: IT Solutions for Security & Trade Facilitation Susan Evans Business Development, EMEA

All Rights Reserved. Confidential

SST Applications forSecuring Transit Transport

• Nato relief to Afghanistan• SST for Africa

– Corridor Specific Applications

• Integration with customs systems• Tracking transit goods

– East Africa– Kuwait– Pakistan

Page 15: IT Solutions for Security & Trade Facilitation Susan Evans Business Development, EMEA

Questions?

Page 16: IT Solutions for Security & Trade Facilitation Susan Evans Business Development, EMEA

Appendix:

Page 17: IT Solutions for Security & Trade Facilitation Susan Evans Business Development, EMEA

All Rights Reserved. Confidential

Smart Container – Evolution of RFID for Security and TrackingSST I Bolt Tag SST I New Design Single Use EJ

Brooks TagSmart Container with Sensors

•Monitors presence and integrity of ISO bolt seal•Generates immediate alarm upon bolt removal or breakage•Re-usable tag•5 year battery life•Up to 300 feet range •32 K bytes of read/write memory

•To be used in OSC Trials•Enhanced version of previous ST-645•Less prone to breakage -- lies within protective envelope of container•Rubberize arms fits any hasp and makes tag easier to install.•Bolt is easier to cut•Tough and Durable

•Co-developed by Savi and EJ Brooks•Compatible with Savi Fixed Readers and Mobile Readers•Single Use Bolt Seal

–lower cost–bolt can be cut once

•Designed for Pardo Hole Containers

–Longer bolt

•Security, Tracking, and Status of Container•Easy to install•Replaceable battery for long lasting life•Senses when doors are open or closed•Integrated light detection circuit for additional intrusion detection•Temperature, humidity, and shock sensors add value for intrusion detection and integrity of goods monitoring•Expansion port for integration with other sensors