S
PHERE
29
Information contained in the RFID tag is
captured on the Internet-based security
software platform which facilitates the necessary
information exchanges and makes data readily
available to authorised parties. Phase 2 adds more
security layers, including a grid of sensor tech-
nologies for detecting environmental changes
inside containers, surveillance cameras, biometric
identification, and satellite tracking for in-transit
visibility.
At the terminal in-gate, a hand-held device
reads the container’s security status then
sends the information to the security software
platform.The device enables authorised person-
nel to capture and verify key information, which
is available for customs authorities to determine
pre-loading inspections.
Once security is verified, the container enters the
terminal to be loaded.Tracking occurs when the sen-
sor systems affixed on the container pass through the fixed
readers installed in the node. At the point of loading, the
sealed containers are scanned again through readers mount-
ed on quay cranes, providing a final security confirmation.
3
4
5
Following the typical 10-day journey
across the Pacific Ocean, the vessel
berthed at the Port of Seattle, where
strategically placed RFID readers record-
ed their location and security status.
After Customs clearance to exit the
Port of Seattle, the smart containers were
loaded onto the chassis of a regional
trucker and transported to a distribution
facility where key events continued to be
captured and transmitted. Authorised
personnel then unlocked the sensor sys-
tem using an encrypted code.The event
was recorded and transmitted to the
Transportation Security System software,
enabling complete information verifica-
tion and the instant creation of a docu-
mented audit trail. From there, the mer-
chandise was shipped to retail stores
throughout the American Northwest –
efficiently, safely and securely.
S
AFETY
F
IRST
Meredith points out that, as a major
container terminal operator, it is natural
for HPH to be well advanced in securi-
ty applications. “We are in 32 locations
and smuggling may occur in some of
these,” he says.
“HPH and the other participants of
SST are committed to enlisting a strate-
gic group of multinational shippers who
can implement end-to-end and port-to-
destination container security.”
Shippers’ requirements go back fur-
ther than the ports, linking back to point
of origin at the loading docks and facto-
ries. The unbroken origin-to-destination
process will naturally require collabora-
tion with the shipper’s other physical net-
work partners, which include carriers and
forwarders in addition to port operators.
“Shippers should use whatever
process and technology that will allow
them to monitor the location and sensor
activity of the containers carrying their
goods as they move through their supply
chain,” Meredith asserts.“We believe Safe
and SecureTradelanes provides them with
this service and we think that the effort
we have already put into it will be seen in
a good light by all players internationally.”
To date, SST is probably the most
far-reaching container security initia-
tive globally.
C
OMMERCIAL
B
ENEFITS
While the new technology brings addi-
tional expenses, Meredith believes it will
also result in savings. “Everyone partici-
pating will benefit from increased con-
tainer security and the shippers them-
selves will be the main winners,” he says.
Commercial benefits will include
better supply chain visibility, bringing
“substitution cost savings” such as a
Everyone
will benefit
and the shippers
themselves
will be the
main winners
1...,21,22,23,24,25,26,27,28,29,30 32,33,34,35,36,37,38