Implanting Large Security Systems in Seaports The Role of the Security Consultant Presented by Yuval Alon Senior Maritime Security Expert 1
Company s History 37 YEARS International Activity in Homeland and Maritime Security 2
Company Structure QC Department Marketing Operational Division Engineering Division Unique in-house combination of operational and technological expertise 3
Company Services Risk Analysis Development Of Security Concepts Project Management & Supervision Detailed Design of Security Solutions Specifying Security Technologies Preparation & Evaluation of Tenders 4
Range of Services Consulting Risk Assessments Conceptual Design Operational Studies Security Master Plans Detailed Design Software Customization Tender Preparation Integration of Subsystems On-Site Supervision Evaluation of Equipment Acceptance Tests Training Project Management 5
6 International Activity
Mombasa Seaport Gordon Consulting Engineers Ltd. won an international tender issued by the Kenya Port Authority (funded and supervised by the World Bank) to design for the Mombasa Port an advanced and modern Integrated Security System which will protect this main port of Kenya against the growing threats to seaports and maritime. Gordon s security experts performed a Site Survey, designed the security solutions, prepared the tender documents and determined the technical specifications for the required new security system. Gordon also supervised the implementation of the ISS 7
PFSA & PFSP for Seaport in Africa J.Gordon security experts have performed more then 40 PFSA s and PFSP s in various African ports. Among them: Liberia - Freeport Monrovia Ivory coast Abidjan & san Pedro Nigeria APAPA terminal E, Warri, Calabr 8
Security of 2 new seaports in Israel The Israel Ports Development & Assets Company Ltd. (IPC) is implementing one of the biggest and most important infrastructure projects in Israel aimed to construct the future ports in the country. IPC already launched a multibillion operation to construct two most modern and sophisticated container terminals in the Haifa and Ashdod ports. J. Gordon Consulting Engineers Ltd. was chosen by IPC to be their exclusive Security Consultant for the existing ports, to establish new security concepts, to upgrade the existing security measures and to perform the detailed design for the security of the new containers terminals that are currently at their construction phase. 9
10
11
12
13 Haifa and Ashdod seaports in Israel
Threats Against Seaports Public Order Information Security Criminal Activity Terrorism 14
Threats Faced by the Industry Potential casualties and damage CBRN (Chemical, Biological, Radiological, Nuclear) HAZMAT (Hazardous Materials) Cyber attack Conventional Attacks Accidents Natural disasters (earthquake, fires) Criminal activity Public order disturbance 15 Probability of occurrence
Security Goals To ensure the security of personnel & port users To protect critical assets To ensure the port s continuous commercial activity To preserve service standards and reputation 16
Security Framework Security Plans Access control policy Alert level system Training & exercises Man power Audits Coordination plans Security awareness programs SOP s Emergency Response Plans Communication & reporting plans EOC & unified command Emergency equipment Emergency teams Business continuity plan EOP s Media communication plans 17
Assets to be Protected Port employees and port users Accesses, entrances, approaches, and anchorages, maneuvering and berthing areas Cargo facilities, terminals, storage areas, and cargo handling equipment Electrical distribution systems, radio and telecommunication Systems and computer systems and networks 18
Assets to be Protected Port vessel traffic management systems and aids to navigation Power plants, cargo transfer piping, and water supplies Bridges, railways, roads Port service vessels, including pilot boats, tugs, lighters, etc. Security and surveillance equipment and systems The waters adjacent to the port facility 19
Projects Methodology Threats identification Implementation Definition of goals Design of system Gap analysis 20
The Consultant s Role Manufacturers The Client The Consultant Integrators 21
22
Working Process (1) Security Policy Threat Definition Constraints Regulations Environment Project Survey Definition of Security Philosophy No Approval Conceptual Design Alternatives System Description Budget Implementation No Optimal Solution 23
Working Process (2) Detail Design Supervision System Commissioning Training Documentation No Approval Assistance to the client 24
Critical Successes Performance The proposed solutions should: Integrated with port s activities Robust and reliable Based on proven cutting edge technologies Easy to maintain Low FAR (False Alarms Rate) and high POD (Probability of Detection) Simple to operate Based on a comprehensive security concept 25
Design Parameters Operational Needs Infrastructure Location Weather The Threat Human Engineering Budget Laws & Regulations 26
Security Components Command & Control System Detection and Verification Deterrent Measures Hardening Measures Technology and Operational Integration Continuous Training Risk Assessments Concepts Prevention Philosophy Precise Procedures 27
28
Integration between Security and Operation Security Operation Security Command & Control Port Center Operation Programs (TOS, SAP, CATOS, etc.) Security Data Storage IT Department Security Data Communication Port Data Communication 29
30 Main Concepts
31 Port s Gates Protection
Gate Management Objectives To secure the port To minimize the queue time To avoid traffic jams at the streets leading to the port To improve the quality of service given to the customers To integrate the security process with operation needs (check in and check out documents, scaling the weight of the trucks, etc.) 32
Security Elements at The Gates Pedestrians Screening CCTV and Barriers Gate Control Room Anti Ram Measures 33
Gate Security Elements Proximity Access Control Card Readers (HID) for trucks & pedestrians Face Recognition System Cargo and Container Screening Systems License Plate Recognition System (LPR) Optical Character Recognition System (OCR) CCTV Cameras Digital Video Recording Traffic Barriers Anti Terror Barriers Pedestrian Turnstiles Emergency Buttons Intercom System Traffic lights and Electronic Signs Gate Control Room Communication with Port Security Center and others 34
Gate integration between Security and Operation Security Operation Manpower Database Access Control at the Gates Document Management Time Attendance System 35
36 Port s Perimeter Protection
Perimeter Security Elements Perimeter Walls Electronic Fences (on the walls or stand alone) CCTV Cameras Video Analytics Systems Digital Video Recording Outdoor Detectors Pedestrian gates Communication with Port Security Center And others 37
Seaside Security Elements Long and short range radars Long and short range thermal cameras Under water intrusion detection Underwater obstacles Electronic fences CCTV cameras Video Analytics systems Digital Video Recording Outdoor Detectors Communication with Port Security Center And others 38
Increased Situational Awareness Policy-based, event driven 39
Command & Control Software An advanced and efficient, open architecture, Security Management Software (SMS) application which will allow the following integration needs: Integration between various security sub-systems at the local level Multi-site Integration Integration with external data bases used by other departments at the seaport Integration between the various response forces 40
Conclusions The threat is dynamic and ever changing. Security solutions should be based on threat and risk assessments Optimized solutions are driven from an integration of security systems and security operational know-how Prevention based solutions for terror threats are effective for crime threats as well 41
Our Company s Strengths Over three decades of expertise in Israel and abroad of Maritime and Homeland Security projects Proven security solutions developed for the protection of national infrastructure, industry and public sector Specializing in solutions for high-risk environments Developers of comprehensive, tailored solutions integrated with customer operational requirements In-house vast know-how of operational and technological aspects of security 42
43