Establishing a Virtual Sea Border by performing a real-time, satellite-accessible Internet-based bio-metric supported threat
assessment of arriving foreign-flagged cargo ships, their management and ownership, their arrival terminal operator and
owner, and rewarding proven legitimate operators with an economic incentive for their transparency will simultaneously
improve port security and maritime transportation efficiencies.
KEYWORDS: Data communications, Weapons of mass destruction, Computer security, Telecommunications, Homeland security, Information security, Safety, Satellites, Standards development, Sensors
While there has been important research and development in the area of smart container technologies, no system design
methodologies have yet emerged for integrating this technology into the existing shipping and law enforcement
infrastructure. A successful deployment of smart containers requires a precise understanding of how to integrate this
new technology into the existing shipping and law enforcement infrastructure, how to establish communication
interoperability, and how to establish procedures and protocols related to the operation of smart containers. In addition,
this integration needs to be seamless, unobtrusive to commerce, and cost-effective.
In order to address these issues, we need to answer the following series of questions: 1) Who will own and operate the
smart container technology; 2) Who will be responsible for monitoring the smart container data and notifying first
responders; 3) What communication technologies currently used by first responders might be adopted for smart
container data transmission; and 4) How will existing cargo manifest data be integrated into smart container data. In
short, we need to identify the best practices for smart container ownership and operation.
In order to help provide answers to these questions, we have surveyed a sample group of representatives from law
enforcement, first responder, regulatory, and private sector organizations. This paper presents smart container
infrastructure best practices recommendations obtained from the results of the survey.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.