1,805 research outputs found

    State of Alaska Election Security Project Phase 2 Report

    Get PDF
    A laska’s election system is among the most secure in the country, and it has a number of safeguards other states are now adopting. But the technology Alaska uses to record and count votes could be improved— and the state’s huge size, limited road system, and scattered communities also create special challenges for insuring the integrity of the vote. In this second phase of an ongoing study of Alaska’s election security, we recommend ways of strengthening the system—not only the technology but also the election procedures. The lieutenant governor and the Division of Elections asked the University of Alaska Anchorage to do this evaluation, which began in September 2007.Lieutenant Governor Sean Parnell. State of Alaska Division of Elections.List of Appendices / Glossary / Study Team / Acknowledgments / Introduction / Summary of Recommendations / Part 1 Defense in Depth / Part 2 Fortification of Systems / Part 3 Confidence in Outcomes / Conclusions / Proposed Statement of Work for Phase 3: Implementation / Reference

    An overview of research programmes and prospective technology in the development of more secure supply chains: The Case of Shipping Containers

    Get PDF
    The development of new, more secure, container systems should consider the main techno-economic items and devise a solution that, not only provides increased tamper-resistance, but also contains economically beneficial buy-in features that will motivate the adoption of new container models by the shipping trade. This report provides an overview of these aspects within the context of EU policy and R&D programmes in this area.JRC.G.5-European laboratory for structural assessmen

    Electronic Seals and their Influence on the Dynamics of Container Logistics

    Get PDF
    After events 9/11 the unpredictable changes have affected the global container flows in international affairs. In order to define and explore the trade-off between international security requirements and reasonably practicable measures for business, the analysis of one of the application of e-seal technology, promising to improve container transportation processes, have been evaluated in this doctoral research. The intent of this research is to investigate the impact of container detection intrusion technology on dynamics of container logistics processes at container terminals and on the complete network. In this study a model for container transhipment between two continents through several see ports consisting of several maritime terminals and customs gates is developed. In this scenario we compare transhipment processes for three different types of container seals. One type is when containers are equipped with conventional mechanical seals, the next one is an e-seal without decision making, and the last one is an e-seal with a possibility to make routing decisions. These three cases are compared and the difference in dynamics of the transport processes is investigated. First we apply the methods of queuing theory as a most suitable mathematical tool for the analysis of the dynamics. We show that this theory works effectively in case of small number of nodes. However it turns out that we arrive at its limitations when the number of nodes becomes large. For this reason we continue our investigations with help of simulation technique by means of MATLAB that has been applied to a generic container logistic network. Further we also have estimated the economical effectiveness of investments in new container secure devices. It is evaluated whether the electronic seals bring more security for container flows. As well we have investigated their influence on the business efficiency for private sector. The evaluation and analysis of modifications in dynamics of physical container flows have been accomplished through the global container supply network in the first part of the thesis. In the second main part of the doctoral research the cost-benefit analysis shows the possible costs and benefits through the implementation and use of secure container electronic seals in global container network. In this work we have determined the most feasible advantages of application of e-seals technology and the framework of its application. The influence of different types of e-seals on the dynamics of container logistics flows has been investigated, simulated and modelled analytically in the global network; various scenarios have been developed and considered to include the most happened situations in the practical cases. An evaluation model based on the cost-benefit analysis has been proposed and approved by different business cases for adoption of different types of e-seals in container system. The returns on investment index have been calculated to compare the investments in security electronic devices under different initial conditions

    Container Port Security: A Layered Defense Strategy to Protect the Homeland and the International Supply Chain

    Get PDF
    This article describes the currently perceived threats of terrorist attacks on port facilities, focuses on several container-specific legal developments aimed at protecting United States ports from terrorist threats, and briefly contemplates the role of technology and the government\u27s current layered approach to port security and protection of the international supply chain involving container shipments. Consideration is given to the ultimate goal-protecting port facilities and communities from violent terrorist attacks without creating economically dangerous inefficiency or unnecessary costs

    Container Port Security: A Layered Defense Strategy to Protect the Homeland and the International Supply Chain

    Get PDF
    This article describes the currently perceived threats of terrorist attacks on port facilities, focuses on several container-specific legal developments aimed at protecting United States ports from terrorist threats, and briefly contemplates the role of technology and the government\u27s current layered approach to port security and protection of the international supply chain involving container shipments. Consideration is given to the ultimate goal-protecting port facilities and communities from violent terrorist attacks without creating economically dangerous inefficiency or unnecessary costs

    The NASA Aerospace Battery Safety Handbook

    Get PDF
    This handbook has been written for the purpose of acquainting those involved with batteries with the information necessary for the safe handling, storage, and disposal of these energy storage devices. Included in the document is a discussion of the cell and battery design considerations and the role of the components within a cell. The cell and battery hazards are related to user- and/or manufacturer-induced causes. The Johnson Space Center (JSC) Payload Safety Guidelines for battery use in Shuttle applications are also provided. The electrochemical systems are divided into zinc anode and lithium anode primaries, secondary cells, and fuel cells. Each system is briefly described, typical applications are given, advantages and disadvantages are tabulated, and most importantly, safety hazards associated with its use are given

    Mitigating container security risk using real-time monitoring with active Radio Frequency Identification and sensors

    Get PDF
    Thesis (M. Eng. in Logistics)--Massachusetts Institute of Technology, Engineering Systems Division, 2005.Includes bibliographical references (leaves 57-60).The global village in which we live enables increased trade and commerce across regions but also brings a complicated new set of challenges such as terrorist activity, human and drug smuggling and theft in foreign or domestic locations. Containers travel the globe, across all seven continents. In the wake of intensified security concerns since the September 11, 2001 attacks, tracking containers and their contents presents an increasing concern for those institutions and personnel charged with ensuring their security. This thesis analyzes the risks associated with global container transport. The concept of an e-container is set forth as a risk mitigation technology that uses real-time monitoring of a container's physical status acquired from an array of embedded RFID-enabled sensors. A framework is suggested that relates sensor-identified signatures and phenomena to behaviors representing breaches in container security. A theoretical model suggests which sensors are required to identify the individual breaches in order to mitigate container security risk.y Adam Ian Schlesinger.M.Eng.in Logistic

    Analysis of ICT solutions integration for tracking purposes in container terminal management and operation

    Get PDF
    El tráfico marítimo de mercancías está experimentando un crecimiento acelerado principalmente debido a la globalización de la economía y la liberalización del comercio internacional. El principal propósito de este proyecto es: en primer lugar, analizar los efectos de introducir sistemas TIC (Tecnologías de la Información y Comunicación) de seguimiento en la operación de la terminal; y en segundo lugar, proponer un método para normalizar el funcionamiento de los procesos que tienen lugar en una terminal de contenedores, permitiendo una buena organización operativa de futuras implementaciones de terminales automatizadas

    Elements to evaluate the security of the containerized supply chain

    Get PDF
    This project seeks, through a comprehensive literature research, to identify the elements that allow to define and to assess the Security of the Containerized Supply Chain. The main points developed in the project are: · Introduction: The Security of the Containerized Supply Chain (C.S.C.) · Literature review of Elements related with the Security and the Performance of the C.S.C. · Proposed and Implemented measures to improve the Security of the C.S.C. · Analysis of the measures to improve the Security of the C.S.C. · Conclusions and Recommendations In the Introduction will be discussed the concept of containerized supply chain, which is its definition, the reasons for its existence, its extent and importance in today's society, what factors have led to the increasing importance of the C.S.C. in the international transport system, among other aspects. All this information is intended to help discern why the C.S.C. is an essential element in the global economy and why we should analyze and try to improve its security. Additionally, will be outlined how has been addressed the topic of the Security of the C.S.C. to date by the different actors involved, making a clear distinction in the way of acting before and after the attacks of September 11, 2001. Certainly, the way that it is treated the issue of the Security of the C.S.C. in the literature has changed radically from a literature that gave emphasis on managing the security to prevent the “smuggling and shrinkage (the loss of cargo shipments through theft and misrouting)” to a literature that emphasizes in “preventing terrorists from targeting the C.S.C. or transporting a weapon in a shipping container”. The Literature Review will begin with an extensive search of literature related to the Security of the C.S.C. and its evaluation. Then will be analyzed the literature identified, trying to collect those items that are considered useful to define and assess the Security of the C.S.C. In the process of analysis of the literature, have been directly identified 30 elements that allow to define and to assess the Security of the C.S.C. at different levels and from different points of view. The next step will be to analyze the collected items of literature, linking them conceptually. From this linking will be intended generate a series of basic elements that broadly define all aspects affecting the security and performance of the C.S.C. Therefore, from the analysis of the definitions given by the authors for each of these elements, it can be observed that although with sometimes quite different denominations and with definitions a little different, many of the elements proposed by the authors have big and obvious points in common. Thus, conceptually linking the identified elements, they have been grouped into 14 basic concepts that have been referred as Global Elements in this project and that define the security and performance of the C.S.C. From that moment, it will work with these "basic elements” generated, classifying conceptually and using them to analyze the measures proposed to improve the Security of the C.S.C. Thus, going deeper into the definition of the elements integrated into each of the global elements, it has been generated a conceptual definition for each Global Element. From the process of generation of conceptual definition of the Global Elements, can be concluded that exists a clear difference of nature between those Global Elements. So, can be identified 3 major subgroups in which can be classified the 14 Global Elements: · In this way, have been identified a group of Global Elements relating to all those basic elements, tools and procedures that define the Security of the C.S.C. This group of Global Elements, in this project, has been named as Tools. · Another group of Global elements relating to the possible problems that may affect in a negative way in the operation of the C.S.C. This group of Global Elements has been named as Vulnerabilities. · And finally, another group of Global Elements relating to all elements that define the performance of the C.S.C. This group of elements has been named as Performance. In the Proposed and Implemented Measures will have a broad collection of agreement and technological measures, implemented or under development to improve the security of the C.S.C. Thus, through the analysis of the specialized literature have been identified a large number of proposals to improve the security of the C.S.C. Moreover, have been detected two distinct levels in terms of these measures. So, there are those that have been referred to as Agreement Measures and those that have been referred to as Technological Measures. Within the Agreement Measures are included all efforts made regarding the creation of national and international agreements, policies, performance standards, rules and programs. Thus, the Agreement Measures identified in the literature and analyzed are the following: · Maritime Transportation Security Act of 2002 (MTSA) · Customs-Trade Partnership Against Terrorism (C-TPAT) · Container Security Initiative (CSI) · Operation Safe Commerce (OSC) · Proliferation Security Initiative (PSI) · Megaports Initiative · International Ship and Port Security (ISPS) Within the Technological Measures are included all those technologies used or in developing to improve and strengthen the security of the C.S.C. in the various levels of the supply chain and in different focal areas. Thus, the Technological Measures identified in the literature and analyzed are the following: · Antitamper Seals Technologies · Sensor Technologies · Radio-Frequency Identification Technologies · Non-Intrusive Inspections Technologies · WMD Remote Monitoring Technologies · Automated Targeting Technologies · Authentication Technologies In the section Analysis of the Measures will be analyzed the agreement and technological measures collected regarding the "global elements" generated in the Literature Review section. To do this, in a first phase has been analyzed for each measure identified, which basic elements of the Security of the C.S.C. are affected. These basic elements have been identified in this project and have been denominated as the global elements “Tools”. In a second phase, it has been analyzed for each measure identified how it affects at the different elements of the Performance of the C.S.C. These elements have been identified in this project and have been denominated as the global elements “Performance”. Finally, the study will be completed extracting the considered most relevant Conclusions emerged in the development of this project. So, are exposed the most relevant conclusions that can be extracted from the different basic phases of this project: · In the process of searching for the literature used as a basis of study and analysis in this project. · In the process of the analysis of the documents, collecting and linking the identified elements that allow to define and to assess the Security of the C.S.C. · In the process of collection and analysis of the proposed and implemented Measures to improve the security of the C.S.C. And additionally, in this section of the project will be intended to propose a set of Recommendations of action addressed to specialized authors and to the stakeholders directly involved in the topic of the Security of the C.S.C.Outgoin

    Technical skills for packaging sales

    Get PDF
    This study addresses technical skills for packaging sales. Based on the results of the study, a training manual and course of instruction have been developed to introduce an innovative approach to packaging sales. Technical Skills for Packaging Sales defines the packaging sales professional, or PSP, a new kind of professional combining the skills of the salesperson with expertise of an engineer. Firmly grounded in the customer-- comes-first philosophy, the PSP is a problem solver, able to evaluate any packaging application to satisfy the customer\u27s needs. Technical Skills for Packaging Sales explains an engineer\u27s approach to packaging, including analyzing details, writing specifications, reading drawings, evaluating materials, understanding manufacturing machinery, flow-charting applications, solving problems, and writing proposals. The addition of the engineering perspective to the sales person\u27s selling skills creates a versatile PSP- It also establishes a common ground between the two professionals and builds a long term working relationship with the common goal of solving the packaging problem
    corecore