Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Containing Cargo

August 1, 2005
Ocean cargo container security ranks as the top concern among executives responsible for supply chain operations at the largest global import and export companies, according to research firm A.T. Kearney and conducted in collaboration with the Inter-national Cargo Security Council.

Executives interviewed for the report believe that new technology solutions, such as radio frequency identification or RFID-enabled “smart boxes,” could enhance container security as well as improve container visibility throughout the supply chain. Some security executives feel that a weapon of mass destruction smuggled into the U.S. in a cargo container could happen. More often the concern is escalating cargo theft as well as attention to making the supply chain more efficient.

The Illinois International Port District is using Siemens and VistaScape’s SiteIQ technology to protect the facility and monitor cargo.

Cargo container impact

The Kearney study pointed out that container shipments account for 90 percent of world trade, are growing at a 5 percent compound annual rate and an average of about 14 containers come into U.S. ports every minute. Today, about 95 percent of these containers are not inspected for weapons of mass destruction or other types of security threats.

Beyond RFID, there are other cargo security strategies.

For example, Rainbow CCTV (Irvine, Calif.) security zoom lenses with auto iris are used extensively by Odyssey Automotive Specialty, one of the country’s leading niche vehicle suppliers. New Jersey-based Odyssey supplies a range of vehicles from SUV and sedan response units to rescue and utility vehicles for the emergency services, box trucks and cargo vans.

TransCore of Harrisburg, Pa., specializes in trailer tracking sensors, including a first-of-its-kind infrared cargo sensor and temperature sensor, now has integrated the technology into its GlobalWave satellite communications products. The system allows users to monitor, manage, track and communicate with remote and mobile assets from a Web interface.

Another company, Avery Dennison of Pasadena, Calif., follows Kearney’s advice with tamper-evident RFID tags on cargo and containers. In conjunction with RF Code, the two firms market Secure Strap security monitoring and electronic seal technology. The new product leverages RF Code’s TAVIS data management platform, active RFID technology and Avery Dennison’s tamper sensor.

New tamper-evident RFID tags can monitor, track and locate containers and other physical assets.

Tamper and RFID

The Secure Strap tags contain electronic seal technology for tamper monitoring, tracking and locating of containers and other physical assets. Secure Strap consists of a radio lock (an active RFID real-time locating device) that is attached to a fiber-optic tamper sensor cable. If the cable is compromised in any manner, Secure Strap will send out a radio distress signal indicating its identification code and a tamper indication signal. An encrypted reset key will allow reuse of the radio lock component of the Secure Strap system.

The Illinois International Port District has selected Siemens Building Technologies of Buffalo Grove, Ill., to provide perimeter surveillance security improvements to its Iroquois Landing and Calumet Harbor facilities. Siemens will manage the design and construction of an automated wide-area perimeter surveillance system that can combine data from multiple security systems and sensors – such as video cameras and intrusion detection devices – and show it in one situational display.

The sophisticated system provides security operators with a bird’s-eye view of the entire port facility on a three-dimensional map in real time.

For More Information

Check these sources – the International Cargo Security Council at www.icsc.org; Rainbow CCTV at www.rainbowcctv.com; TransCore and its commercial vehicle tracking at www.transcore.com; Avery Dennison at www.averydennison.com; and Siemens Building Technologies at www.sbt.siemens.com. Also check out the LINX search, powered by Google, on the Security magazine Web site at www.securitymagazine.com for articles on port, cargo and supply chain security.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC0819-Cyber-Feat-slide1_900px

    IBM: security response planning on the rise, but containing attacks remains an issue

    See More
  • Dispelling the Dangerous Myth of Data Breach Fatigue; cyber security news

    UK-Based Security Company Exposes Database Containing More than 5 Billion Records

    See More
  • password

    450% surge in security breaches containing usernames and passwords

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing