Anti-Terror-Compliance

Since 9/11, security issues have to  be considered critical when it comes to company performance. Therefore , public instances have been taking different measures in terms of security which already have an impact on port performances and costs (e.g. ISPS code - The International Ship and Port Facility Security by the International Maritime Organization, C-TPAT - Customs Trade Partnership Against Terrorism, AMS - Automated Manifest System or CSI - Container Security Initiative set up by the United States).

However, this is only the beginning: the latest American law makes it mandatory for ports to scan 100% of all containers destined to the United States from year 2012 on (using a radiation detection and nonintrusive imagery systems, data obtained having to be transmitted in real time to the United States). This represents an unbearable task in the current situation of the port chain because of the control process not being adapted to port constraints (inspection time, false alarm rate, and associated costs) and implying detrimental effects to overall port productivity and service quality (because it implies perturbation of nominal operation process, false alarms and additional delays). In order not to endanger the European ports and global supply chain competitiveness (and finally European economy) but with aim to ensure the required level of security in ports, innovative solutions have to be found and implemented. Thus, this research project focuses on:

  • Compliance at minimum cost – Fulfilling compliance requirements at high cost efficiency.
  • Compliance in advance – Accomplishing security checks outside or in front of the terminal / harbor without delay and guaranteeing that checked container, cargo, trains, trailer etc. arrive unmodified at the terminal / harbor (tamperproof).
  • Compliance-based increase in time efficiency – Using access control to accelerate internal processes at the terminal / harbor or at least without disturbing port operations. Sharing required information to not scan / screen containers twice. Receive necessary information from other partners as early as possible to optimize own processes.
  • Compliance implementation – Developing a prototypical application. Built-up a security system by integrating hinterland terminals. Using technologies such as RFID (eSeal etc.).Assure that integrated, extended information is not misused.
  • Integration of intervention forces / public authorities – Develop and establish interacting procedures to handle contaminated containers. Clarify judicial responsibility when releasing a container.