Hong Kong Customs Moves Forward With E-Lock Plans

The Hong Kong Customs and Excise Department (C&ED) reports that RFID-based container locks can effectively improve the security, convenience and visibility of the customs process for cargo entering the airport. In November 2011, C&ED began testing three types of electronic locks (e-locks) in order to speed up the process of performing customs checks on containers filled with cargo. The solution, known as the Intermodal Transhipment Facilitation Scheme (ITFS), was implemented as a way to streamline the clearance of cargo passing through customs at Hong Kong International Airport for cargo destined for areas both domestic and outside of Hong Kong. The installation and consulting services were provided by the Hong Kong R&D Center for Logistics and Supply Chain Management Enabling Technologies (LSCM), according to Frank Tong, LSCM’s director of research and technology development.

An electronic lock with an active RFID tag is being used to secure freight passing through
customs and Hong Kong International Airport, ensuring that the cargo remains tamper-free,
while also expediting the clearance process.

The Hong Kong C&ED estimates that the system reduces the amount of time required for clearing each container through customs, from two to three hours down to five minutes, since customs officials can now be assured that the containers have not been opened between their inspection at the border control point and their arrival at the airport. What’s more, the agency can now collect a digital record of where each container has been, along with when it was inspected.

Cargo is loaded into freight containers or directly onto trucks—such as those operated by United Parcel Service (UPS)—in Mainland China, and is then transported to a customs control point located at the border with Hong Kong, where C&ED officials inspect the cargo and clear it for entry into Hong Kong. Following that clearance, the shipment continues on to Hong Kong International Airport’s cargo terminal, where the goods are unloaded from the container or vehicle, and are placed into an air cargo container. Once this has occurred, the cargo is moved through another customs control point at the airport, where C&ED again inspects and approves or rejects its passage.

To speed up this process, the R&D Center implemented the use of an e-lock for the customs agency, consisting of a physical lock activated by a built-in active RFID tag, designed to receive a transmission from an RFID reader that allows the lock to be opened or closed. Three types of e-locks are currently being used, provided by three different vendors: Long Sun Logistics Development Ltd, CIMC Intelligent Technology Co. and CelluWare Research Laboratory. Each of the three products employs a different frequency—433 MHz, 315 MHz and 2.4 GHz—but all comply with the ISO 17712 standard for mechanical seals designed for freight containers.

LSCM has installed fixed RFID readers (provided by the three e-lock vendors) at two border control points—Lok Ma Chau and Shenzhen Bay—as well as at Hong Kong International Airport. When a shipment first arrives at either border control point, C&ED’s staff attaches an e-lock, reads the ID number encoded on its built-in RFID tag via a handheld reader, and links that ID with the vehicle registration number of the truck transporting the container. The transporting company must pre-register each vehicle with the Hong Kong C&ED prior to its arrival; the truck’s ID number is listed in the agency’s database, and the customs official can confirm that the vehicle is, in fact, the one expected.

That data, along with the specific cargo being transported, is then stored on the Hong Kong C&ED’s integrated tracking software platform, developed by LSCM, which collects and processes the data and then displays it for customs officials when necessary. The system stores the e-lock ID number linked to the vehicle ID, and transmits instructions to the e-lock, along with a password, thereby causing it to lock. The device also requires a physical key, which remains in the driver’s possession. In this way, two actions must be completed before the container or vehicle can be unlocked: The e-lock must be electronically unlocked via a password from a customs official, and the driver must use a key to physically open the padlock.

The shipment is then transported approximately 42 kilometers (26 miles) to the airport. The e-lock comes with a built-in GPS device that tracks the vehicle’s location as it moves. In that way, the e-lock stores a record of where the vehicle has been. When the lock is later read at the airport, the back-end software compares the actual GPS data against the container’s expected route. The system can issue alerts in circumstances in which an e-lock is found to have lost a GPS signal, or, based on GPS data, the truck appears to have deviated from the intended route.

At Hong Kong International Airport, a C&ED official either selects the container for inspection, or simply instructs the system to issue an unlocking command with the matching password; the container is then brought to a site where the cargo is removed and then loaded onto an aircraft, says Steve Wai-chiu Chan, a C&ED special duties officer. If the container is selected for inspection, the e-lock remains locked. In this scenario, a truck driver would be instructed to await a C&ED officer, and would be unable to unlock the container without providing the proper password. The C&ED officer, upon arrival, would then use a handheld device to read the e-lock, instructing it to unlock by providing the necessary password.

LSCM installed a total of 38 readers at the two land border control points, five logistic hubs at the airport and a marine control point known as the Kwai Chung Customhouse, for items arriving by sea (at the Marine Cargo Terminal located at the airport). Altogether, by February of this year, 109 containers had been equipped with the e-lock device. An average of 100,000 consignments pass through the border daily, and the ITFS e-lock system is utilized for about 17 percent of that cargo.

The solution has enabled a faster customs clearance process, as well as providing a digital record of what was unlocked, and thus inspected, and when this occurred. The system also improves security, since only officers who know the proper password can access the container. Ultimately, Chan says, “it enhances the Hong Kong logistic industry’s competency and reinforces Hong Kong’s position as a world-class logistics hub.” Source: RFID Journal and a word of thanks to Andy Brown (Tenacent) for bringing the article to my attention.

South Africa – Cyber thunder in the clouds

The following article is very pertinent to any organisation or group considering cloud computing. Soft-marketing tends to delude would-be users into believing they will have full control over their data, and as such, is fully secure. Even in the international Customs and Border Management space there is lots of talk on this subject, yet very little substance. Unfortunately, organisations and individuals are slaves to the technology they use which fashions not only their work ethic but attitudes as well. It is no longer true that technology is a ‘tool’. More time and money is spent these days on technology choice than on training and education. In fact technology is so important it influences law-making and business operations, rendering human discretion obsolete in many instances. Therefore it is imperative that organisations involve business and legal experts in their systems development. 

The recent spate of hackings and electronic security breaches serves to highlight the endemic threat and associated cost of cyber crime. Globally, organisations are forced to reconsider their cyber security measures as cyber criminals become more audacious and technologically innovative. Crimes can take place in both the physical and the electronic medium, with the possibility of technology infrastructure being used as both a “subject” and an “object” of a crime.

The criminal justice system faces a number of challenges in the successful prosecution of cyber crimes. While the Electronic Communications and Transactions Act of 2002 does create a framework for criminalising cyber crimes, including hacking, it does not provide any concrete preventative measures to combat cyber crime. The technical and often remote nature of cyber crimes, including multi-jurisdictional issues where cyber criminals are operating abroad, often prevents prosecutors from being able to present viable cases and bring cyber criminals to book.

Fortunately, the South African government has acknowledged that more proactive measures are required to address the scourge of cyber crime. Cabinet has recently approved a National Cyber Security Policy published by the Department of Communication. The policy creates, among other things, a platform for the creation of a number of structures that would be responsible for analysing and responding to the threat of cyber crime with the ultimate objective of mitigating the effects of cyber crime in South Africa. The State Security Agency has been tasked with responsibility and accountability for the implementation of cyber security measures. It is hoped that this policy and the measures it intends to implement results in the prevalence of cyber crime in South Africa being effectively addressed and countered. Organisations should, in addition to any measures being taken by government, continue to carefully assess their cyber security measures proactively, including by implementing robust systems, particularly in instances where personal data is processed (which includes the collection, recording, transferring or storing of such personal information). The Protection of Personal Information Bill requires the implementation of “appropriate” security safeguards where an individual’s personal information is processed. What will be considered appropriate will need to be determined on a case by case basis and with reference to steps taken in foreign jurisdictions, which may provide guidance in interpreting this requirement.

On account of the fact that there is no way to precisely document the far reaching effects of cyber crime, individuals, organisations and government must ensure that a more cautious and prudent approach is adopted to manage security in any electronic environment. Source: SAPA