Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Tracking Cargo

August 1, 2004


U.S. Secretary of State Colin Powell tests a cargo tracking device at the APEC Conference in Thailand. Numerous governments see value in increasing transportation security.
According to the federal Transportation Security Administration, over 7 million cargo containers on more than 8,000 ships arrive in U.S. ports each year. Each international trade transaction typically involves at least 25 parties and 30 different documents – making it very difficult to accurately track what is coming into the country. The magnitude and complication inherent in U.S. trade could make seaports an attractive and potentially vulnerable target for terrorists.

A little over a year ago, the Department of Homeland Security unveiled a $300 million port security plan that expanded the Container Security Initiative (CSI) – a program designed to identify, target and search high-risk cargo. Phase II of the CSI extended protection beyond the initial 20 major ports (which account for 68 percent of all cargo entering the United States) to increase the rate of protected cargo to 80 percent.

Clearly, the federal government’s continued emphasis on homeland security highlights the need for increased diligence on all fronts, including the nation’s ports. In February of this year, President Bush responded to this need in his Fiscal 2005 budget proposal, which called for $1.9 billion for port security efforts.

A cargo tag and e-seal provide a higher level of protection.

Cargo security – no easy feat

The transit of goods from factory to destinations across international borders is presently fraught with security holes. At the core of the current port security problem is a lack of real-time supply chain visibility. Often, no mechanism exists to track and manage cargo from port-to-port, and those that do exist are neither all-encompassing nor cost efficient. As the government enacts regulations and the private sector develops new technologies for port security, the amount of data (i.e. location, source, contents, security, etc.) corresponding to specific pieces of cargo moving in and out of this country will grow exponentially. If port officials monitor and track this data properly, they can leverage the information to predict and prevent acts of terror.

National security necessitates the development of a comprehensive security infrastructure that allows parties involved in cargo movement – including the companies originally providing goods, shipping and freight companies, governments/ports receiving shipments and the end recipient of the freight – to share vital supply chain information. Recently, a public/private pilot program used new technologies and processes to design an efficient and cost-effective supply chain security system for cargo transportation between ports.

In response to the need for improved port security, the Asia-Pacific Economic Cooperation (APEC) launched the Secure Trade in the APEC Region (STAR) program in 2002. The first STAR initiative, known as the STAR Bangkok/Laem Chabang Efficient and Secure Trade (STAR/BEST), was a pilot project launched in late 2003 to demonstrate a trans-Pacific supply chain security system.

STAR/BEST developed a secure shipping line between Laem Chabang, Thailand and Seattle that created an end-to-end secure supply chain system designed by Oracle Corp., Savi Technology, and the ports of Seattle and Laem Chabang. Laem Chabang is Thailand’s main international port, shipping more than 3 million containers annually. Each year, the ports of Laem Chabang and Seattle transport approximately 20,000 containers across their trade lane alone.

Securing the supply chain

Within the STAR/BEST pilot, the Port of Laem Chabang served as the origin point, with that of Seattle serving as the destination. Laem Chabang port employees packed containers, secured them with radio frequency identification (RFID) sensor e-seals and loaded them on ships. Port officials were able to track the containers throughout their route – from ports in Taiwan and South Korea, and on to the Port of Seattle – by utilizing a real-time, Web-enabled software application with RFID capabilities from Savi and database technology from Oracle. In addition to its ability to track the location of cargo throughout the shipping line, the system included an electronic seal mechanism that would activate an alarm if a piece of cargo was opened en route.

Once they arrived at the Port of Seattle, the containers were discharged from the ships and their electronic seals checked. There, operators with handheld computers verified the containers’ contents and origin. Upon verification, receivers used handheld computers to unlock the seals and remove the container contents.

The STAR/BEST program also included a capacity building component designed to help employees of small-to-medium-sized shipping organizations, as well as involved government agencies, learn regulations and best practices in order to facilitate trade in the context of a secure environment. This training program, built on Oracle’s iLearning application, provided instructions for complying with new and existing U.S. customs requirements, such as the 24-hour manifest rule of the Computer Security Initiative. By understanding the presiding regulations before entering ports, freight handlers could work more efficiently, saving themselves much time and frustration.

When comparing the cost of the STAR/BEST program to the benefits achieved, an independent third party concluded that the ports of Laem Chabang and Seattle saved $220 per container by using these technologies and processes.

Managing new innovations, tracking new data

As the parties involved in worldwide container trade continue to adopt RFID technology, new challenges will emerge as increasingly large volumes of supply chain data – order entry, manufacturing, maintenance, receiving and inventory – flood systems.

By using Oracle 10g Database, the parties involved with the STAR/BEST program were able to track, store and manipulate RFID data in real-time, without compromising security, high availability or performance. When applied beyond the pilot project stage, this capability should allow port officials to identify hidden patterns in order fulfillment, uncover new cost reduction opportunities, and reduce business and security risks.

As the government and private sector continue to expand port security efforts, they can use the lessons learned during the STAR/BEST pilot to design new cost-effective programs for securing the global trade process. STAR/BEST exemplifies the progress made through use of new technologies, like RFID, and collaboration between private and public organizations. No one group can achieve port security alone. By working together, industry and government can develop more efficient and secure trade lines – improving business efficiencies while building a powerful tool in the war against terror.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Cargo Sealer

    See More
  • Cargo Seal For C-TPAT Shippers

    See More
  • Tractor trailer on the road

    With cargo theft on the rise, new solutions may help safeguard goods

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!