Container Security: Is It Working?
First published in Logistics Management (online). Currently, the U.S. uses four categories of security technology in the global supply chain. Follow along as Jim Giermanski, Chairman, Powers Global Holdings Inc, defines each category, examines where they are in the evolutionary process, and then assesses which type of technology is most effective. Here's what he has to say:
Jim Giermanski’s October 1 2009 Logistics Management article on container security is a fascinating read. Since September 11, 2001, and the creation of the Department of Homeland Security (DHS), there have been four distinct phases of security involving containers moving in the global supply chain: the maritime phase, the port-to-port phase, the origin-to-destination phase, and the electronic chain-of-custody phase.
Each of these phases has seen recent advancement in the security technology employed to keep up with more sophisticated demand and government requirements; and, of course, each type of technology does something very distinct from the other. Essentially, the United States uses four categories of security technology to help carry out the phases defined above. Each category represents a “crawl before you walk” process; each maturing into different security hardware and processes over time. In general, the order is as follows:
1. doors-only security with mechanical barrier seals and electronic door seals (e-seals) that utilize Radio Frequency Identification (RFID);
2. doors-plus security that utilizes door seals combined with satellite for tracking;
3. scanning security; and
4. chain-of-custody satellite and satellite-cellular combinations that detect and report internal container integrity with active supply chain management functions.
Click HERE to read the full article. Access the Logistics Management WEB site by clicking www.logisticsmgmt.com.
Jim Giermanski is also a frequent contributor to the MarEx e-newsletter and our print vehicle, THE MARITIME EXECUTIVE.