CBP and Smart Containers: What Does It Know?

Dr. Jim Giermanski, chairman of Powers Global Holdings, gives us a break down of both RFID and Satellite Communications, two container security device technologies.

In January 2009, Customs and Border Protection (CBP) will conduct a pilot program to test a type of container security device (CSD) used to make containers smart. The test will take place with containers crossing the border into the United States from Mexico. That sounds like a good thing. A deeper look will suggest something else.

It is truly incredible that container security as the U.S. government sees it, that is, as the Department of Homeland Security (DHS) and the Department of Defense (DOD) see it, seems to be focused on Radio Frequency Identification (RFID), probably the worst technology for that use. It also seems that, in spite of all the money available to these two giant agencies, and the research entities used by them or could used by them, they seem to have little appreciation for the value of not just smart container usage, but also CSD technology. I hope in this short treatment of two CSD technologies, that the reader will see the stark differences between RFID and Satellite Communications technology. I will take the essential and specific elements of each and make a comparison.

RFID

RFID is a radio frequency based technology. As such, it is regulated by the Federal Communications Commission (FCC). The FCC has decided that for container security, certain frequencies must, not should, but must be used. These frequencies are published. Anyone who desires to transmit or receive these signals can do so by purchasing an off-the-shelf transmitter and receiver. Without getting into the difference between active and passive RFID, the essential issue is that its use requires the transmission and reception of a radio frequency (RF) signal. The FCC also specifies the strength or amplitude of that signal, and the duration of that signal. All of this information is publicly available.

1. RFID Benefits

In general, RFID has been in use for a long time. Its hardware and its application in certain environments are hallmarks of efficiency and effectiveness in the control of handling and warehousing products, specifically in conditions and settings where antennas and transponders, and environmental conditions are controllable. Bar-coding, pallet control, and item-control such as that used by retailers in attaching RFID tags to garments, electronic equipment boxes, and other selected products are a few examples. In these settings, the RF frequencies are the same and are used in the same way a very good profitable application of RFID.

2. RFID Weaknesses

While its benefits in controlled environments are obvious, its weaknesses in container security within a global supply chain are just as obvious. The very nature of a global supply chain brings lack of control, the antithetical condition of effective and efficient usage. Its application to international transportation across the U.S. land border with Canada and Mexico was tested by the government in the mid 1990s with the involvement the U.S. Department of Transportation (USDOT) and U.S. Customs (now Customs and Border Protection, an agency of the Department of Homeland Security). The test was called the North American Trade Automation Prototype (NATAP) and it took place at six of our U.S. land ports. As a participant in the NATAP test along the southern border, this writer can state unequivocally that the test failed, both because of institutional and RFID-technology reasons.

a) Infrastructure Access, Maintenance, and Costs

With containers, there is a fundamental requirement: antennas at fixed locations. There is a need for physical infrastructure and equipment on the ground, either fixed, or handheld. Handheld transceivers bring in the human element with the resulting higher costs, damage, maintenance, or loss. Regardless, they are needed so when changes in the container status are, they can be transmitted by RF signals when, and only when, the container is interrogated by a transceiver physically positioned or used in the case of handhelds. somewhere along the global supply chain. The fixed transceiver, through an antenna, sends the triggering frequency, which carries a request for a return transmission of any change of status of the container since the last time it passed an antenna and transceiver. The message could be that the container was breached somewhere in-route.

Since the transmission of these data is by radio frequency, the successful transmission is subject to not only the use of government-approved frequencies or waves, but also the absence of distortion like noise or same-frequency emissions from competing antennas whose direction (footprint) unintentionally or intentionally obstructs or interferes with the intended RFID transmissions of the intended transponder. Thus, so far there are some very clear weaknesses: first, the need to own or lease property to place an antenna; second the absence of interfering RF signals which cannot be guaranteed; and third the historical nature of what information is transmitted, a very critical weakness. For instance, the last place one wants to learn that the container was surreptitiously accessed and an explosive device placed in it destined for the United States is at the foreign port of departure or at the U.S. port of arrival since these ports are where most of the transmissions take place. Finally, all these multiple antennas and transponders at fixed sites must first be permitted to be installed and then must be maintained and functional.

b) Frequencies and Protocols

There are no global standards for frequencies or protocols. Protocols are basically the instructions on how the messages are transmitted over a certain frequency or carrier of the message. Imagine the lack of standardized instructions for a container and its transponder on a global voyage, i.e. China to South Africa to Europe and then to the U.S. Different regions will have different standards. There are national standards like ANSI (American National Standards Institute), international standards like ISO (International Organization for Standardization), and industrial standards like EPC (EPCglobal, Inc. which alone is in about 100 countries).

For instance, RFID frequencies on which the data ride in the United States will not work in another part of the world. The foreign transceiver cannot trigger the data transmission because the U.S. may use a different frequency or protocol. Therefore, RFID for container security is applicable only to those areas of the world which have agreed on the same frequency. This weakness is in addition to the corresponding need for a land-based infrastructure of antennas and readers. Unlike RFID tags used in products and pallets that are read in controlled distribution systems, active RFID devices in containers that move around the world through uncontrolled environments, require the construction of antennas at global chokepoints where containers are interrogated. Who determines the number and location of these points?

Constructing a controlled distribution path globally is really impossible. Typically, chokepoints are locations where readers could be positioned that cannot be avoided by the carrier of the container. They include the spot where a truck is loaded or unloaded, on a crane that transfers containers, a weigh station, the port of loading, or at the port of discharge. Only for these obvious chokepoints at origin and destination, is a land-based system a reasonable option. In areas along the route of the container's movement, a land-based system is virtually impossible to establish.

c) The IED Connection

Recently, concerns about RFID usage as a vulnerability at seaports and land ports have surfaced, suggesting that the use of RFID can constitute an Improvised Explosive Device (IED). In fact, it is true that RFID emissions can serve as the trigger-mechanism for detonating an explosive device within the container. Because an explosive device can be easily wired to detonate with the proper RFID frequency signal at any of our nation's seaports and land ports, all out nation's ports that employ the approved RFID frequency for shipping containers become more vulnerable to terrorist attack.

To verify this vulnerability, in November 2007 a Southern city's police department's bomb squad, and three business firms connected to RFID usage demonstrated how RFID can be employed for that purpose. The demonstration was 100% successful, and it showed empirically the vulnerability of RFID transmissions as approved for use with containers passing through our international ports-of-entry. Present at that demonstration were representatives of the Department of Defense. In DOD's own words, the U.S. Army representatives examined the device and wiring and confirm that a commercial RFID interrogator was use to 'wake up' a commercial RFID tag. When the RFID tag responded on the 433 MHz frequency, the relay closed and the blasting cap set off the explosive charge.

Months later DHS responded to the demo:DHS recognizes and benefits from the use of RFID technology to ensure the smooth and secure movement of both people and cargo into the United States. It is accurate that RFID systems are in use at U.S. ports of entry (air, sea and land) and have been adopted by a number of private-sector companies for supply chain management, asset and shipment tracking and inventory purposes. While RFID system used in maritime ports rely upon a variety of transmission frequencies for port and terminals operations, there is currently no one common RFID frequency in use throughout the global supply chain.

While it is technically feasible that the detection of RFID emissions could be used to trigger an explosive device within a container, DHS does not agree with the report's assessment that ports that employ RFID technology become more vulnerable to terrorist attack.

DHS admits in writing that using the FCC-approved frequency for shipping containers as a trigger mechanism for detonating an explosive device is technically feasible (capable of being carried out). In summary, the weaknesses of RFID use in container security are linked to significant problems:

1. The acquisition of or access to real property;

2. The cost of installing fixed antennas and transceivers;

3. The maintenance of these fixed sites;

4. The absence of a common global frequency;

5. The existence of diverse RF protocols;

6. The age of data transmitted ( distance between choke points); and

7. Its use as and IED.

Satellite and Tracking Communications

In general, there are two broad categories of satellite systems. The first and most widely known is geostationary or high-orbit satellites in equatorial orbit that appear to be stationary. Geostationary or geosynchronous satellites are approximately 36,000 kilometers or 23,320 miles above the Earth and rotate along with the earth. The second category is a low-earth-orbit (LEO) system which consists of satellites approximately 800 kilometers or 496 miles above the earth; these do not rotate with the earth. Both LEO and geosynchronous systems offer tracking and communications throughout a supply chain.

1. Satellite Benefits

Smart containers and their CSDs using satellite tracking and communications can provide a virtual chain of custody from foreign origin to U.S. destination. The container can send information and data in real time or close to real time 24 hours per day, 7 days a week. Messages from to and from the container can be simultaneously sent to multiple links in that chain, importer, exporter, carrier, or government agency. Unauthorized access into the container can be detected and reported as it happens. Diversions of the container can be detected, to include the container's reporting of its own hijacking. Identification of the person supervising its stuffing, verifying contents and arming the container's satellite security system at origin will be recorded. The identity of the person authorized to open the container at destination will also be recorded and included in all the electronic records of the container's movement. Satellite equipped containers not only can utilize these sensors and transmit immediately what was detected, but also send signals to make changes like temperature adjustments in the container as the need arises. Satellite applications even allow for remote unlocking of the doors.

1 2 Page 1
Page 1 of 2
The 10 most powerful cybersecurity companies