Those prioritizing safety and security now have a cost-effective latching option. Southco’s E3 VISE ACTION Compression Latch with Visual Indicator is now available in zinc. The latch features red, reflective indicator wings that can be easily viewed when open, so users can tell if the latch is secure with a quick glance. This offering further expands the line of MAKE SAFETY VISIBLE BY SOUTHCO products, which provide visual indication for increased safety and monitoring in a wide range of applications.
When Southco’s E3 VISE ACTION Compression Latch with Visual Indicator is open, it displays reflective wings that can be seen from a minimum of five meters away, making it an ideal choice for rail, semiconductor, and industrial machinery enclosures where an unsecured door or panel could impact safety during operation. By allowing operators to easily see when a latch is open, the E3 VISE ACTION Compression Latch with Visual Indicator improves efficiency, enhances safety, and reduces maintenance errors.
Jonathan Coulter, commercial product manager, adds, “The E3 VISE ACTION Compression Latch with Visual Indicator provides visual feedback of whether a panel is fully closed, semi-closed or not secured at all. Like Southco’s standard E3 line, the indicator version delivers vibration-resistant fastening and is available in a variety of grip lengths, providing a simple upgrade for enhancing enclosure safety and security.”
Tesla’s new “Mad Max” mode for its Full Self-Driving (FSD) system, which allows for more aggressive driving and higher speeds, is facing federal scrutiny from the National Highway Traffic Safety Administration (NHTSA).
The NHTSA is investigating the mode due to safety concerns, especially after reports of it violating speed limits and its launch amid existing investigations and a wrongful death lawsuit related to Tesla’s FSD system. The mode prioritizes speed and frequent lane changes, and aggressive acceleration, compared to other FSD profiles which include the new “Sloth” mode. It is intended to make driving feel more human-like, but critics argue it promotes risky behavior.
The mode has been linked to reports of vehicles exceeding speed limits and making risky maneuvers, leading to the federal investigation. NHTSA has stressed that the human driver remains legally responsible at all times.
New drugs, routes and tricks spur operators and vendors toward smarter, faster, safer devices.
Air, ground, maritime and rail operators as well as enforcement officials face rapid changes in drug smugglers’ tactics, while detection vendors that support them are refining technology — including artificial intelligence (AI) — for products to help foil the crooks.
Tougher enforcement efforts around the world, greater supplies and higher prices have spurred smugglers to decentralize their organizations, outsource methods and diversify routes for moving narcotics, such as “designing” more potent drugs that can be shipped in smaller, less detectable parcels.
“The traditional smuggling routes and methods have not changed significantly,” said Jeff Sweetin, a retired U.S. Drug Enforcement Administration (DEA) special agent and counter-narcotics consultant for Thermo Fisher Scientific. However, he and his colleagues have seen “several methods of countering added border enforcement. While these trends have not yet amounted to a complete shift in cartel tactics, enforcement personnel are reporting them more frequently.”
In May, Thermo Fisher introduced TruNarc Delta and Tau upgrades of its handheld narcotics analyzer, shown here. Thermo Fisher image.
Thermo Fisher in May unveiled the TruNarc Delta and Tau upgrades of its handheld narcotics analyzer, which uses Raman spectroscopy for rapid, non-contact identification of more than 1,200 substances. The Delta is aimed at U.S. customers, the Tau for others worldwide.
Vendors look to build on their portfolios of proven spectroscopic- and radiation-based detectors by increasing the speed, range and adaptability of results for field investigators, in part with AI-based tools. For instance, they are linking detector results with cloud-computing libraries of spectroscopic signatures that can detect specific drug ingredients from tens of thousands of possibilities within seconds and can learn new signatures without the need to add them manually.
Smugglers’ New Tactics Vary
Many have foregone top-to-bottom supply chain control and outsourced shipping phases, processing stages and money-laundering. Police have seized single bulk shipments that contained drugs labelled for competing gangs and destined for a multitude of customers — an Amazon-like model for saving money and speeding delivery. Cryptocurrency is replacing cash to evade scrutiny as payments change hands.
More roundabout routes are adopted — say by ship from Latin America to West Africa on to Scandinavia and Russia, then by truck to inland points — to break patterns that make police suspicious. Some smugglers have moved upstream products like coca paste from Latin American cocaine labs to final processing closer to consumers in Europe and fentanyl powder to pill pressers in the U.S. Others are experimenting with liquifying drugs to hide them in fuel tanks, seat cushions and insulation, Sweetin said. Smugglers are hiding drugs in auto batteries and masking them with chemicals to throw off detectors.
Some are developing submersibles to sail tons of drugs between continents, even as far as Europe and Australia. There are reportedly smugglers hiring professional divers to attach drug shipments outside cargo ship hulls then fly to the destination to remove them.
“Illicit trafficking networks have evolved into increasingly industrialized criminal economies that exploit weaknesses in border security, customs controls and screening technologies,” Smiths Detection, aviation marketing manager for Smiths Detection, said. “This shift is creating distinct smuggling patterns across all major modes of transportation.”
He added, “While the methods differ across transport modes, they share a common thread: growing sophistication that poses significant new challenges for global border security.”
The Smiths SDX 10080 SCT is a modular hold-baggage and air cargo screening system. Smiths image.
Smiths in October released the SDX 10080 SCT, the latest product in the global EDS line. It is a modular hold-baggage and air cargo screening system that combines advanced dual-energy computed tomography (CT) with an optional high-resolution dual-view line scanner that Smiths said “offers exceptional modularity, reliability and efficiency.”
Among its other products is the HCVM XL mobile scanner, which provides high-energy X-ray imaging for non-intrusive inspection of cargo to enable customs officers to rapidly and accurately identify illicit goods without disrupting the flow of trade. At the turn of the year, Smiths installed four with Trinidad & Tobago’s customs agency at Port of Spain and the Port of Point Lisas.
Efforts to counter new drugs and tactics are bolstered by greater counter-drug funding, particularly in the U.S. and Europe.
Kevin J. Knopp, 908Devices
That increased funding “will institutionalize demand” in the narcotics-detection and related markets and support growth in them, said the CEO and co-founder of 908Devices, Kevin J. Knopp. “This is setting up not only in the United States, but globally.” One recent report forecasts the global market for narcotics detection equipment to grow from $3.76 billion last year to $5.05 billion by 2029, maintaining a compound annual growth rate of more than six percent.
Recently, the U.S. Coast Guard bought 23 of 908Devices’ MX908 handheld mass spectrometers for narcotics interdiction efforts. 908Devices image.
Additional funding in the U.S. includes this year’s budget reconciliation law and last year’s DETECT Fentanyl and Xylazine Act, which should boost research and development of means to detect those drugs.
In October, 908Devices said the U.S. Coast Guard bought 23 of its MX908 handheld mass spectrometers for narcotics interdiction efforts and hazardous threat detection. The service now fields more than 35 of the MX908, which combines thermal desorption, chemical ionization and high-pressure mass spectrometry to detect hundreds of chemical substances at trace levels, including fentanyl, explosives and other threats. The MX908 can identify over 2,000 fentanyl analogs, the company said.
In Europe, funding boosts stem from increased defense funding by NATO members and others. Customers are showing greater interest in detection capabilities elsewhere in the world, too. For instance, Bruker Corp. saw a 30 percent year-over-year increase in orders for its airport-deployed detectors, related consumables and services through October.
“There are significant improvements outside of the U.S.,” Bruker president and CEO Frank Laukien said, including in Europe, Japan, China, South Korea and the Middle East. He added that the company’s Applied Markets segment is “growing very nicely” with “a pretty broad international distribution.”
The Road Runner is a 7.5-pound, handheld device to detect narcotics and explosives vapors and particles made by Bruker. Bruker image.
Bruker’s products include the Road Runner, a 7.5-pound, handheld device to detect narcotics and explosives vapors and particles. It uses ion mobility spectrometry (IMS) with a compressed high-intensity radiated pulse (CHIRP) algorithm and guides its user step by step via a touchscreen display. Another product is the Mobile-IR II, a portable, battery-powered Fourier Transform Infrared (FT-IR) spectrometer that the company said delivers laboratory-level spectral performance with an intuitive workflow set-up for IDing illegal substances.
The greater funding also stems from Europe’s efforts to combat a spike in cocaine use there (which now may exceed that in the U.S.). “Belgium, the Netherlands and Spain have reported the highest volumes of seizures, reflecting their importance as entry points for cocaine trafficked to Europe,” said a March report by the U.S. State Department’s Bureau for International Narcotics and Law Enforcement. That has increased cross-border criminal activity, “with European organized crime groups expanding their footprint in Mexico and South America and vice versa.”
Facing such crime, geopolitical conflicts and terrorism, “governments worldwide are investing heavily in advanced systems to enhance detection, deterrence, and response capabilities,” said Ajay Mehra, president, CEO and director of OSI Systems. He added customers are addressing the growing threats by increasing their focus on technology innovation and shifting policy priorities, supported by targeted funding.
OSI Systems designs and manufactures specialized electronic systems and components for critical applications, serving customers in 170 countries. Its Rapiscan Systems unit offers a wide range of scanners and inspection systems for aviation security, cargo, and vehicles.
These include the MobileTrace simultaneous dual-mode narcotics/explosives detector, which uses the company’s patented Ion Trap Mobility Spectrometry. It has been deployed at airports, border crossings, military bases and other critical global checkpoints.
In September, Rapiscan launched its Orion Road 930DX-V mobile X-ray system. With a van-size footprint, the system is designed to detect narcotics, concealed weapons, explosives and other contraband for customs and border protection, critical infrastructure fortification, law enforcement and other missions.
The Threat of Drugs is Broad and Changing
Fentanyl — the synthetic drug and most potent narcotic used by doctors (50-100 times more potent than morphine) — is highly addictive. Fentanyl analogs are synthetic opioids generally engineered to be more potent; carfentanil is 100 times more so. More potent ones can be small enough for hundreds of lethal doses in envelopes to be mailed — still a major smuggling method — or hidden on the body.
Heather Colby, Apstec Systems
“Detecting narcotics concealed on the body under clothing is incredibly challenging,” said Heather Colby, who manages sales channels and alliances for Apstec Systems. “Technology has struggled to deliver effective solutions, and large-scale manual operations are intrusive, costly and generally impractical.”
Detecting narcotics hidden on the body has long been a complex challenge for customs authorities, with traditional methods proving costly, intrusive and inefficient. Apstec says its HSS Falcon Select changes this by offering fast, non-intrusive, real-time screening for large numbers of passengers and their belongings. The solution identifies drugs concealed on the body while respecting privacy and ensuring a smooth border crossing experience. Apstec image.
Apstec develops high-throughput screening technology to detect narcotics, explosives and weapons. It said its products can screen large numbers of people and identify diverse threats while ensuring seamless, non-intrusive processing. It described its flagship product, HSS Falcon, as a powerful, AI-driven solution that provides comprehensive detection on people and in body-worn/hand-carried bags.
Dr. JihFen Lei, Teledyne FLIR Defense
The first fentanyl analogs emerged in 2019. Last year, there were 688 reported variants, according to the United Nations. Today there are nearly 1,400.
Teledyne FLIR Defense says its Griffin G510x portable chemical detector is specifically designed to analyze and identify explosives and narcotics (such as fentanyl and its analogs) within five minutes. Teledyne FLIR Defense image.
“Drugs like fentanyl remain a deadly threat and drain on our country, consuming lives and resources across America,” said Dr. JihFen Lei, president of Teledyne FLIR Defense. In October, that company got an order from U.S. Customs and Border Protection (CBP) for 15 of its Griffin G510x portable chemical detectors, which are specifically designed to analyze and identify explosives and narcotics (such as fentanyl and its analogs) within five minutes. The instruments are to be fielded across the U.S. to help CBP identify the most challenging drug samples, such as those containing fentanyl in extremely low concentrations mixed with other compounds.
Those analogs are among a diverse group of lab-made compounds called novel psychoactive substances (NPSs). Most are created to mimic prescription or illicit drugs’ effects and to evade controlled-substances laws by slightly modifying an existing drug. With unfamiliar chemical signatures, these drugs can evade detectors until those signatures are added to devices’ libraries. Thermo Fisher’s Sweetin recalled that when traffickers began mixing fentanyl with xylazine, a pet sedative, detectors didn’t recognize it because its signature wasn’t in their libraries. Once it was added, investigators looked back and found it had been used widely.
“No matter how good the devices are,” he said, “if we don’t know to add an emerging drug to a device library, our customers can’t identify them.”
The N2300 Fentanyl Trace Detector can be added to any Autoclear X-ray baggage scanner, the company says. Autoclear image.
That need is one reason vendors are adding AI. In February Leidos said it was partnering the AI software company SeeTrue to improve the efficiency of airport security and customs screenings through AI-enabled algorithms for detecting prohibited items. Smiths has partnered with BigBear.ai, Deepnoid and other AI experts to hone its systems threat-detection capabilities.
The threat-detection company Autoclear offers proprietary AI Threat Assist software with its X-ray security screening systems. Its N2300 Fentanyl Trace Detector can be added to any Autoclear X-ray baggage scanner.
TactiScan’s pocket-sized narcotics scanners use cloud AI that taps advanced deep learning algorithms together with commonly used reference standards to analyze readings, identify substances and update its signature library. This reduces the risk that TactiScan will be confused by cutting agents and adulteration.
“AI and advanced analytics are transforming the detection landscape,” Smiths’ Kaufmann said. “These tools will be critical in busy logistics hubs, where authorities must assess large volumes with limited resources.
Old drugs still prevail. Around the world, the stimulants methamphetamine and amphetamine dominate the use of and trafficking in synthetic drugs, according to the U.N., and cocaine production and use is setting records year after year. The U.N. estimated worldwide illegal cocaine production in 2023 at 3,708 tons, 34.5 percent more than 2022 and 327 percent more than 2014. (Heroin production is dropping.)
Smugglers have long used aircraft, trucks and ships. They also are expanding their use of trains, which have been used mostly to traffic people. In one example, officials in India’s Kerala state said trains are now a prime narcotics smuggling method. In 2024, they said 1,232 pounds were seized on trains in the state. By this March, police had seized 928 pounds. Those totals were for only one of India’s 68 rail divisions.
Tactiscan enables officers to identify unknown substances through plastic bags without contamination and ensures the occupational safety of officers when identifying drugs. The entire identification process is digitally documented.
That development is just one indication that drug smugglers are always seeking new markets and new ways of getting their products to them.
“Looking ahead, traffickers will remain exceptionally agile, exploiting distinct vulnerabilities across various sectors of international trade and travel,” Smiths’ Kaufmann said. “Global drug trafficking today is not constrained by geography, mode of transport, or concealment method. Countering this evolution will require next-generation detection capabilities.”
Insider threats are one of the most insidious dangers to face the transportation industry. This is because of the element of betrayal and surprise associated with them. The reason: “Insider threats are risks that originate from trusted individuals, namely employees, contractors, or third parties who have legitimate access to an organization’s systems, data, and infrastructure,” said Ryan LaSalle, CEO of Nisos (nisos.com, which helps organizations detect, prevent, and respond to insider threats before they escalate). “Historically, the term referred mostly to negligent mistakes, such as misconfigurations or mishandling sensitive information. Today, the definition is far broader. Insider threats now encompass deliberate acts of sabotage, theft, fraud, and policy violations, as well as negligent or accidental behaviors that expose the organization to risk. In transportation companies, this can result in financial leakage, smuggling or industrial espionage.”
Ryan LaSalle, Nisos
“While some organizations may have a robust security posture, all that it takes is just one employee to conduct their own security controls assessment to identify weaknesses in an attempt to evade detection,” added Jim Henderson. He is CEO of the Insider Threat Defense Group (ITDG, www.insiderthreatdefensegroup.com). It has assisted more than 700 organizations in developing, implementing, managing and optimizing their insider risk management programs. “The damages inflicted by these insiders have caused billions of dollars of damage. Some affected companies have suffered large layoffs or gone out of business as a result.”
Three Types of Insider Threats
Although there are many kinds of insider threats, the experts interviewed for this article generally agreed that they can be classified into three main categories:
• The Malicious Insider: This is an employee who intentionally damages systems, steals data, or sabotages operations.
• The Negligent Insider: This is an employee who unintentionally causes harm through mistakes like clicking phishing links, mishandling credentials, or ignoring procedures.
• Third-Party Insider: These are an organization’s vendors or partners who have access to the organization’s systems and misuse this privilege, sometimes for profit, other times through carelessness.
Dealing with negligent insiders is a matter of detection, education, and — if they then refuse to improve — possible termination. It is the malicious and third-party insiders that constitute the real risks.
So why do they do it? Their motivations vary as widely as the crimes they commit. But there are some common threads. “Malicious insiders are often driven by motivations such as personal gain, revenge, ideology, or coercion, but these motives rarely appear in isolation,” said Ashleigh Diserio, president of Diserio Consulting (https://www.diserioconsulting.com), which specializes in behavioral consulting, insider risk detection, and risk management. “They can be influenced by factors in a person’s professional or personal life, such as job dissatisfaction, financial hardship, burnout, feeling undervalued, or unresolved conflicts with management or coworkers. For example, a frustrated employee who feels overlooked for promotion or mistreated by leadership might rationalize leaking sensitive data to a competitor or sabotaging logistics systems as a form of payback or self-justified justice.”
Third-party insiders, such as contractors, vendors, or technology partners, can be motivated by similar pressures. “Financial strain, loyalty to another organization, or even social manipulation can lead them to share or misuse access,” Diserio told TSI. “In some cases, their weak security habits or personal vulnerabilities make them easy targets for coercion or exploitation by external actors.
Detecting Insider Threats
Detecting insider threats is a daunting task, especially for transportation companies that cover great distances and often have multiple locations to monitor. But it is a task that can be done — and must be.
“Transportation companies operate with large, distributed workforces and high access environments, from logistics centers to maintenance shops and drivers in the field,” said Col (Ret) Brian “Patton” Searcy, president and founder of The Paratus Group (www.paratus.group), which trains people to recognize and respond to threats. “This makes insider threat awareness essential.”
So how can an organization generate insider threat awareness internally? “Train employees to look for changes in behavior, unusual stress, sudden wealth, rule-bending, isolation, and who to report it to,” Searcy replied.
“Detection begins with visibility,” added Diserio. “Transportation companies must understand who is accessing what, when, and why. Given the scale and complexity of logistics operations, insider risk detection cannot rely on guesswork. It requires structured policies, layered monitoring, and a clear framework for accountability.”
Being aware of what is happening in the organization at all times is paramount. “The key is to monitor all three potential dimensions of insider threat: behavioral, technical, and organizational,” LaSalle noted. “Behavioral signals might include sudden changes in work hours, unexplained conflicts with colleagues, or controversial activity on social media. Technical signals could be large, unauthorized data transfers, use of personal devices on the network, or attempts to disable security controls. Organizational signals include declining performance reviews, disciplinary actions, or notice of resignation.”
“Detecting insider threats involves more than just monitoring the network,” said Henderson. “Comprehensive insider risk management involves many key stakeholders: the Insider Threat Program manager, the Insider Threat investigator-analyst, the FSO, CSO, CISO, human resources, CIO – IT, network security, counterintelligence investigators, mental health/behavioral science professionals, and the legal department. These stakeholders must work together sharing employee risk and threat information, as no one individual within an organization is positioned to see every single employee risk factor or behavioral indicator. Collaboration among key stakeholders is a critical element for detecting and mitigating insider threats.”
To maximize the value of these actions, transportation companies should have monitoring policies that integrate their internal detection results with external intelligence. “For example, detecting unusual financial behavior, side employment, or suspicious online affiliations outside the company can provide early warning before an insider escalates to harmful actions,” LaSalle said. “Once risks have been identified, companies need clear escalation paths — often through a collaboration between HR, security, and legal teams — to investigate quickly, attribute activity accurately, and take proportionate action.”
How the Experts Do It
Transportation companies exist to move people and goods. Dealing with insider threats is not their core business, which is why hiring an outside expert to do this for them can often make sense. We asked the experts we interviewed how their companies do this.
“At Diserio Consulting, we take a full-lifecycle approach to insider threat management, from prevention and early detection to investigation, response, and long-term resilience,” said Ashleigh Diserio. “We understand that insider risks are not just a technology problem but a human one. That’s why our services combine behavioral science, analytics, and organizational strategy to address risk from every angle.”
This is how Diserio Consulting helps transportation and logistics companies protect their people, assets, and operations from insider threats.
The process begins by compiling insider threat risk assessments at the client company. To do this, “we conduct comprehensive assessments that evaluate vulnerabilities across an organization’s systems, workforce, and vendor ecosystem,” Diserio told TSI. “Our process involves structured interviews, behavioral risk mapping, and analysis of access controls and workflows. For transportation companies, this often includes reviewing logistics management systems, driver access points, cargo tracking data, badging data, and maintenance records to uncover where insider risks are most likely to emerge.”
Having done this, Diserio Consulting starts monitoring and assessing employee activities on an ongoing basis. “Our behavioral analytics platforms go beyond standard cybersecurity monitoring,” said Diserio. “By establishing individual and team baselines for everyday activity, we can identify deviations that indicate emerging risks, such as increased data downloads, sudden changes in work patterns, or behavioral red flags like frustration or disengagement. Our team integrates these tools with existing IT and HR systems, ensuring seamless insight across both digital and human data points.”
Of course, the transportation sector depends heavily on vendors, contractors, and logistics partners, all of whom can introduce third-party insider risks into a client’s business environment. To mitigate these risks, Diserio Consulting assists organizations in establishing a structured third-party risk management framework. “We conduct vendor security assessments, review access controls, and develop standardized onboarding and offboarding protocols to minimize exposure to external partners and ensure a secure environment,” Diserio explained.
Whenever an insider incident does occur, Diserio Consulting’s response team is ready to investigate and contain it. “We use digital forensics and behavioral analysis to identify root causes, preserve evidence, and recommend remediation steps,” said Diserio. “For transportation clients, this may involve tracing unauthorized access to routing systems, shipment databases, or employee credentials, while maintaining operational continuity.”
Beyond the above, Diserio Consulting develops tailored training programs that educate employees, supervisors, and contractors on how to identify and report potential insider risks. They also conduct behavioral workshops that teach leadership teams how to spot early warning signs of stress, burnout, or dissatisfaction, factors that can precede malicious or negligent actions. “In addition to training, we help companies build supportive, transparent workplace cultures that reduce the motivations behind insider threats,” Diserio said. “Our consultants work with HR and management to develop employee engagement strategies, confidential reporting channels, and intervention processes that address personal or professional issues before they escalate into security incidents. By combining behavioral insights with advanced analytics, we help transportation organizations shift from a reactive stance to a proactive one, predicting and preventing insider risks before they impact operations.”
The Insider Threat Defense Group (ITDG) offers similar services to its clients. “A first step for any organization, to include transportation companies, is to have a baseline and much deeper understanding of what insider threats are, and what is involved in insider risk management (IRM) — including extensive training,” said Henderson. “Key stakeholders must have a comprehensive understanding of the collaboration components and responsibilities required by them, and the many underlying and interconnected components that are essential for a comprehensive IRM program. Key stakeholders must be universally aligned from an enterprise/holistic perspective to detect and mitigate employee risks/threats. As well, an IRM program must be built on a solid framework of non-technical and technical security controls for the program to be comprehensive and effective.”
Worth noting: In addition to its IRM services, ITDG publishes a fascinating free monthly newsletter that details the latest happenings in insider-related crime. Available at www.insiderthreatdefense.us/insider-threat-incidents-reports-news, this newsletter provides insights into insider threat activities (much of it sourced from U.S. Department of Justice news releases), including the following: “Operations Manager Charged For Role In Embezzling $500,000 From Trucking Company.” In this report, ITDG explained how an operations manager at a large trucking business filed fraudulent truck driver reimbursement requests. This insider activity happened for over three years before the fraud was detected and stopped.
As for Nisos? “Our Insider Threat solutions combine technology with white-glove analyst services to provide holistic coverage,” said LaSalle. “By integrating external intelligence, continuous monitoring, and AI-driven attribution, Nisos helps organizations detect, investigate, and prevent insider threats before they manifest internally.”
Nisos’ Insider Threat services include:
• Early Risk Identification: Detecting potential indicators of insider threat – from concerning financial behavior, to social media, to undisclosed side employment — before they can escalate.
• Accurate Attribution: Connecting digital accounts and external signals to real-world individuals with AI-powered attribution and confidence scoring, to reduce false positives.
• Actionable Investigation Insights: Transforming risk signals into investigation-ready insights, to enable informed decision-making and speed up threat responses
• Continuous Monitoring: Maintaining real-time awareness of emerging insider threats with dynamic, always-on coverage that complements internal telemetry and reduces blind spots.
Finally, the Paratus Group provides a full range of threat detection services, staff training programs, and surveillance technology solutions to help their clients detect and defeat insider threats. Brian Searcy contextualizes these offerings in terms of the practical steps that transportation organizations can take to protect themselves:
• Behavioral Observation and Communication: Train employees to look for changes in behavior, unusual stress, sudden wealth, rule-bending, isolation, and know who to report it to.
• Micro-Learning and Scenario Training: Short, consistent awareness sessions are far more effective than one-time lectures. The Paratus Group uses five-minute daily and weekly drills that fit seamlessly into operations.
• Integrated Monitoring: Combine human awareness with technical monitoring. Systems can detect unusual logins; people can recognize unusual attitudes or motives.
• End-of-Shift “Hot Wash” Reviews: Encourage teams to share observations before they forget, because small concerns often connect to larger patterns.
• Faith and Purpose Mindset: When employees understand the higher purpose of their work, that they’re protecting people, not just property, it strengthens both ethics and performance. This approach transforms employees from passive observers into active protectors of the mission.
• An important point: “All of this requires buy-in at the highest levels,” said Searcy. “If they continue to conduct ‘check the box information events’, then nothing will change.”
Nisos says their Insider Threat solutions combine technology with white-glove analyst services to provide holistic coverage. The group says by integrating external intelligence, continuous monitoring, and AI-driven attribution, they can help organizations detect, investigate and prevent insider threats before they manifest internally. Nisos image.
Success Stories
Deploying a comprehensive insider threat defense program takes time, effort, and money. So, is it worth it? To answer this question, Ashleigh Diserio offered the following two success stories.
Case 1: Airline Industry
An airline approached Diserio Consulting after noticing inconsistencies in maintenance scheduling and access logs. “Our behavioral analytics platform flagged an employee who was repeatedly accessing sensitive aircraft maintenance data outside regular working hours and from an unusual geographic location outside the United States,” Diserio said. “This employee was not authorized to take their work computer outside the United States.”
After some digging, Diserio Consulting detected a pattern suggesting both insider knowledge and external coordination. “Our investigation revealed that the employee had been approached by a third party offering financial incentives to share internal system access credentials,” said Diserio. “By combining data analytics with behavioral profiling, which identified sudden changes in the employee’s work habits, communication tone, and stress indicators, we were able to alert the airline’s security and HR teams before any data was leaked. The individual was removed from their role, and the incident was contained without operational disruption or public exposure. The airline was later able to utilize our findings to enhance employee wellness programs and improve communication between maintenance and management teams, thereby addressing the root causes of insider risk.
Case 2: Bus Transportation
A bus transportation company faced a potential insider threat when Diserio Consulting’s continuous monitoring system detected irregular data activity from an operations supervisor’s account. The account had begun accessing passenger manifests and route scheduling data at irregular intervals, an activity that didn’t align with the employee’s role or prior work behavior.
“Our response team immediately launched a forensic review, uncovering that the employee’s access credentials were being used to gather and sell data related to competitor routes and operational schedules,” Diserio told TSI. “Motivated by personal financial stress, the insider had been approached through social media by an external buyer. Due to early behavioral flagging, which included signs of disengagement, attendance issues, and changes in communication tone, our system alerted leadership before any significant data was shared.”
Working closely with HR and law enforcement, the company managed to contain the incident. “Notably, our consultants helped management implement new employee support channels and financial wellness initiatives to mitigate similar motivational risks across the workforce,” she said.
The Paratus Group has its own success story to offer. “In one transportation maintenance operation, a team we had trained noticed a pattern that didn’t sit right: an employee was repeatedly accessing restricted maintenance records and working after hours without authorization,” said Brian Searcy. “Instead of ignoring it or assuming it was harmless, they used the Paratus Process: Identify, Assess, Predict, Decide, Act. They verified the pattern, documented what they saw, and escalated appropriately. The investigation revealed a contractor attempting to exfiltrate operational data. The issue was stopped before any damage was done. That’s what true awareness looks like; not paranoia, but informed observation and confident action.”
Actionable Expert Advice
Based on the experts’ insights, it is possible for transportation companies to successfully detect and defend against a wide variety of insider threats. To conclude this story, TSI magazine asked the experts for actionable advice that transportation companies could implement on their own. Here is what they told us.
“The best defense against insider threats starts with building a trusted workforce,” LaSalle said. “That means looking beyond traditional background checks to adopt proactive vetting strategies — verifying identities, validating credentials, and using modern tools to uncover hidden risks or fraudulent employment attempts. Equally important is adopting a lifecycle approach, monitoring for risk ethically and proportionally from pre-hire to exit. Transportation companies should also expand their visibility beyond the firewall. Internal telemetry alone won’t reveal hidden affiliations, online behavior, or financial stressors that often precede insider threat activity. By combining inside-the-network monitoring with external intelligence, organizations can connect the dots earlier, investigate with greater clarity, and take swift action.”
“You need to start with education for all key stakeholders involved in managing and supporting the Insider Threat Program,” said Henderson. “The success of a program is largely dependent on key stakeholders collaborating with the Insider Risk Program manager, and sharing employee risk and threat information of concern. This proactive approach is critical to ensure that everyone is universally aligned from an enterprise/holistic perspective for identifying, responding to, preventing and mitigating insider risks and threats.”
TSA agents, Jose Gonzalez and Labarius Williams, were caught on camera stealing from passengers’ luggage at a security checkpoint at the Miami International Airport. Both agents were charged with grand theft in the third degree.
“Start with a clear framework: define what ‘insider risk’ means for your organization, including the scope of employees, contractors, and vendors,” Diserio said. “Insider threats often intersect with behavioral or workplace issues. So, HR, legal, finance, civil liberties, and security teams must work hand in hand. Leverage automation but keep the human element. Technology should assist, not replace judgment, so combine AI-based monitoring with human oversight. You should also create a culture of security awareness because employees are your first line of defense while regular training builds vigilance and trust. Finally, insider risk programs should grow with the company and adapt to new technologies, regulations, and threat landscapes.”
The question of whether the June 12, 2025, Air India Flight 171 crash was an example of an insider threat (an intentional act) is a central focus of the ongoing investigation and has not been definitively confirmed or ruled out. The cause of the crash remains under investigation by India’s Aircraft Accident Investigation Bureau (AAIB).
Brian Searcy delivered his advice in the following list:
• Start with Culture, Not Technology. Technology is an enabler, but awareness is the foundation.
• Empower Every Employee. Make security everyone’s responsibility, not just IT’s.
• Train Continuously. Replace long, once-a-year training with short, real-world refreshers that build muscle memory.
• Lead with Values. Whether that’s faith-based or organizational values, grounding people in purpose creates accountability.
• Review and Adapt Regularly. After incidents or near misses, conduct “hot washes” to capture lessons learned and reinforce awareness.
“At the end of the day, insider threat prevention isn’t about surveillance, it’s about stewardship,” said Searcy. “It’s about empowering your people to protect what matters most.” That’s a thought worth remembering for anyone tasked with protecting their organization against insider threats.
Improving security across borders but privacy concerns persist.
Biometric technologies are changing the way people move across borders, redefining both passenger convenience and security assurance. Facial recognition and multimodal biometric systems are integral to airport operations worldwide. From automated eGates to digital identity credentials, these systems are accelerating passenger throughput while reinforcing border integrity. Yet, their growing adoption raises complex questions around privacy, compliance and data protection. As innovation advances, regulators, technology providers and airport authorities must strike a careful balance between operational efficiency and the responsible use of personal data.
Measurable Improvements
Facial recognition is part of a broader spectrum of video image processing techniques, according to resources available from the European Data Protection Board (EDPB). “Some cameras can capture images of people within a defined area, particularly their faces, but they cannot be used as such to automatically recognize individuals. The same goes for simple photography; a camera is not a facial recognition system because photographs of people must be processed in a specific way to extract biometric data,” the team says.
Françoise Bergasse, border marketing manager at Thales, points out that implementation of biometric authentication at airports and border checkpoints shows an average time saving of 30% to 40% for travelers. “Biometric authentication achieves what was once thought impossible — increased security with faster processing. Real-time facial recognition at automated eGates combines the best of both worlds: speed and certainty. Travelers enjoy a smoother journey, while operators benefit from a highly reliable and tamper-proof identification process,” she says.
Data from various sources show that biometric systems have improved processing efficiency at border checkpoints while maintaining high security standards, affirms Rob Sutton, director of solution enablement for aviation at HID. “For example, automated eGates in Europe can verify a traveler’s identity in less than 20 seconds, compared to several minutes for manual checks. In the United States, programs such as Global Entry and the Biometric Entry-Exit Program have reduced wait times by up to 70%, thanks to facial recognition enabling rapid, document-free verification,” he says. “Multimodal systems, which combine face, fingerprint, iris, and voice recognition, add redundancy, ensuring reliability even if a biometric trait is compromised. Furthermore, decentralized identity frameworks and real-time data sharing between agencies help maintain productivity without compromising privacy or compliance. However, processing speed and productivity represent only one dimension of the benefits.”
Biometric systems have improved processing efficiency at border checkpoints while maintaining high security standards, according to Rob Sutton, director of solution enablement for aviation at HID. HID image.
IDEMIA Public Security’s biometric deployments at major airports in the Middle East and Asia have demonstrated the ability to process millions of traveler’s annually with minimal manual intervention, affirms Marwan Elnakat, technology and marketing strategy manager at IDEMIA Public Security. “Today, over 15,000 passengers are processed per hour at UAE airports using automated multi-biometric eGates for border control. The system ensures border security with a comprehensive traveler database, enabling the secure storage of facial, iris, and fingerprint biometric data,” he says. “To balance security requirements and traveler demands, we collaborate with individual clients and regulatory agencies to identify the best solution. Most of our solutions enable contactless identity verification and can be seamlessly integrated into existing systems. The balance between security and productivity is achieved through intelligent system design.”
Risk-based orchestration ensures that pre-registered, low-risk travelers quickly pass through automated checkpoints, while those who trigger alerts or have poor-quality matches are seamlessly redirected for secondary screening by human agents, according to Elnakat. “Adaptive quality and match thresholds, an approach supported by NIST research on biometric performance, allow systems to dynamically adapt based on context, maintaining low false alarm rates and rapid throughput. Pre-registration programs and mobile or digital identity verification also contribute to speed. By pre-verifying traveler’s identities via secure digital travel credentials (DTC) or mobile IDs, border systems offload part of the verification process, maintaining security and minimizing bottlenecks at physical checkpoints,” he says.
Deployment Strategies
Sutton observes that airports and border agencies are implementing advanced security measures to prevent breaches and misuse of biometric information, such as facial images and fingerprints. “These biometric data are protected through a multi-layered approach that includes data transformation, encryption, strict access control, and policy-based reporting. The most critical security measure is not storing the raw biometric image. Instead, the raw data is converted into a biometric template. This template cannot be reverse engineered back into the original image, making it unusable to fraudsters in the event of theft. Many systems also feature vitality detection and anti-spoofing capabilities to prevent fraud attempts such as the use of masks or synthetic supports,” he says. “A key innovation for protecting privacy is the biometric passport, which securely stores a traveler’s facial and fingerprint data on a chip embedded in the passport itself. This means that personal biometric identifiers are not stored in centralized databases, reducing the risk of mass data breaches and giving travelers greater control over their information.”
The European Data Protection Board cautions that facial recognition technology can lead to false negatives, bias and discrimination. The misuse of biometric data can also have serious consequences, such as identity theft or impersonation. Individuals should have maximum control over their biometric data, the group advocates.
Airport operators and airlines around the world are increasingly experimenting with systems that allow passengers to more easily pass through various security checkpoints, the EDPB resources illustrate. “It is important to be aware that biometric data is particularly sensitive and that its processing can pose significant risks to individuals. Facial recognition technology can lead to false negatives, bias and discrimination. The misuse of biometric data can also have serious consequences, such as identity theft or impersonation. Individuals should have maximum control over their biometric data. In the EU, there is no uniform legal obligation for airport operators and airlines to verify that the name on a passenger’s boarding pass matches the name on their ID, and this may be subject to national laws,” the EDPB says. “Therefore, where no verification of passengers’ identity with an official identity document is required, such verification should not be performed using biometric data, as this would result in excessive data processing. We assessed the compliance of the processing of passengers’ biometric data with four different types of storage solutions, ranging from those that store biometric data exclusively in the hands of the data subject to those that rely on a centralized storage architecture with different modalities. In all cases, only the biometric data of passengers who actively register and consent to participate should be processed.”
The only storage solutions compatible with the principles of integrity and confidentiality, data protection by design and by default, and security of processing are those in which biometric data are stored in the hands of the data subject or in a central database, but with the encryption key held exclusively by that person, according to the EDPB resources. “These storage solutions, if implemented with a list of recommended minimum safeguards, are the only methods that adequately counteract the intrusiveness of processing, offering data subjects maximum control. The solutions based on storage in a centralized database, either within the airport or in the cloud, without encryption keys held by the data subject, cannot be compatible with data protection requirements by design and by default,” the EDPB says. “Regarding storage limitation, data controllers must ensure they have sufficient justification for the intended retention period and limit it to what is necessary for the proposed purpose.”
International regulations, such as the European Union’s General Data Protection Regulation (GDPR), will continue to further shape implementation strategies and the evolution of privacy-protecting technologies, standards, and certifications, affirms Sutton. “For example, the GDPR classifies biometric data as ’special category’ information, requiring explicit consent, transparency, and strict purpose limitation. These regulations have led to privacy-by-design approaches, decentralized identity frameworks, and minimum data retention policies in global aviation systems,” he says. “Furthermore, biometric systems are rapidly adapting to digital identity credentials, such as IATA’s One ID and ICAO’s DTC. These initiatives aim to create seamless, paperless travel by connecting biometric verification with mobile-based digital identities.
Thales designs its solutions to be cyber-secure by design, meaning data protection is built into every layer, from capture to storage and transmission, Bergasse affirms. “Biometric data is end-to-end encrypted, stored in secure environments and accessed only with strict role-based controls. Advanced encryption and anonymization ensure that, even in the unlikely event of a breach, data remains unusable outside of our secure infrastructure,” she says. “Global standards like the GDPR and similar frameworks around the world have established a clear direction: citizens must maintain control of their data. We believe that cyber resilience is about anticipating, not reacting. It is not about knowing if a system will be attacked, but when, and ensuring that, when that happens, sensitive data remains protected and trust intact.”
IDEMIA’s Marwan Elnakat says their IDEMIA Public Security product applies multi-layered security measures, including end-to-end encryption, hashing and template transformation techniques, to ensure that biometric images are never stored in an accessible format.
IDEMIA Public Security applies multi-layered security measures, including end-to-end encryption, hashing and template transformation techniques, ensuring that biometric images are never stored in an accessible format, Elnakat explains. “Role-based access control, rigorous audit logging, and real-time monitoring strengthen data protection throughout the system’s lifecycle. Templates are typically retained only for the minimum time necessary to complete the verification process, in accordance with privacy-by-design principles. To further ensure data integrity, we maintain compliance with international standards, including regular audits and independent benchmarking to ensure the security and reliability of all its solutions,” he says. “Our research teams are strategically located across the EU, particularly in France and Germany, to ensure full compliance and a thorough understanding of the GDPR and the upcoming EU Artificial Intelligence Regulation. Algorithms are constantly being realigned to keep pace with evolving biometric regulations. Furthermore, international regulations such as the GDPR have significantly shaped the way biometric systems are implemented.”
HID’s cutting-edge facial recognition portfolio is transforming the airport experience, offering travelers a seamless and secure journey powered by innovation and design excellence. Deployed across major international airports, the system integrates Red Dot Design Award-winning Facepods and eGates to deliver a smooth, intuitive, and aesthetically refined user experience. Built on a modular architecture, HID’s solution ensures effortless integration into existing airport infrastructures. It combines ethically trained AI algorithms with advanced multispectral imaging to provide industry-leading facial recognition accuracy and robust security. This fusion of technology and design sets a new benchmark for biometric travel, redefining how passengers move through airport environments Biometric identifiers fall under the “special category data” category under the GDPR, which requires a legal basis and robust data minimization measures, affirms Elnakat. “European data protection authorities have pushed implementers to conduct formal Data Protection Impact Assessments (DPIA) and apply retention and deletion rules that define when and how biometric data can be used,” he says. “At the same time, emerging regulations such as the EU AI Act are introducing additional transparency and accountability requirements for biometric technologies. These regulatory frameworks have encouraged developers such as IDEMIA Public Security to strengthen documentation, auditing, and third-party testing, referencing NIST benchmarks to ensure responsible and compliant use of biometric AI in border environments.”
Implementation Initiatives
While there is no official ranking for the adoption of biometric border controls, several regions stand out in terms of both infrastructure and traveler flow, Sutton affirms. “The EU leads the way in terms of reach and implementation, with its entry/exit system (EES), implemented in the 29 Schengen countries. This system requires biometric registration; namely facial images and fingerprints, for non-EU travelers, replacing manual passport stamping with automated checks. With millions of travelers crossing EU borders each year, the EES will likely become the most comprehensive biometric border system in the world,” he says. “In terms of traveler volume, the United States leads the world. U.S. customs and border protection (CBP) has implemented facial recognition at over 50 airports and border crossings, processing hundreds of millions of travelers through programs such as Global Entry and the Biometric Entry-Exit Program. The United Arab Emirates are also piloting high-flow biometric corridors.”
Several regions are leading this new era of safe and seamless travel, according to Bergasse. “India, with its DigiYatra initiative, is a pioneer in offering biometric travel experiences at scale. Singapore and other major Asian hubs are setting global benchmarks for seamless AI-powered passenger processing. Thales’ biometric border control solutions have been recognized internationally, earning a Frost & Sullivan award for its eGate automated border control (ABC) technology and for its leadership in next-generation border management,” she says. “With deployments in Europe, the Middle East, Latin America, Africa and North America, we support governments in strengthening border integrity, ensuring interoperability and preparing their systems for the era of digital travel credentials and secure digital identity.”
Elnakat points out that several countries and regions are now recognized as leaders in the adoption of biometric border control. “Australia has implemented IDEMIA Public Security’s automated border control solutions at several airports, ensuring swift and secure processing for both incoming and outgoing travelers. Major U.S. airports are conducting real-time trials of biometric verification to streamline immigration and boarding. We have also collaborated with the rise of mobile identification on additional solutions to continue simplifying travel processes. In the U.S., we have partnered with the transportation security administration (TSA) to upgrade its credential authentication technology (CAT Solution), which now accepts state IDs and mobile driver’s licenses at security checkpoints,” he says.
India’s DigiYatra initiative is a pioneer in offering biometric travel experiences at scale, according to Thales expert Françoise Bergasse. With DigiYatra, travelers pass through various checkpoints at the airport through paperless and contactless processing. The project is being implemented by the DigiYatra Foundation — a joint-venture company whose shareholders are the Airports Authority of India and airports around the nation. Ministry of Civil Aviation Government of India image.
Pioneering implementations share key characteristics such as clear regulatory frameworks, significant investments in national entry/exit systems, and a willingness to experiment with technologies that integrate airlines, airports, and border agencies into a unified traveler verification ecosystem, according to Elnakat. “Biometrics are replacing the era of paper travel documentation and manual identity verification, evolving rapidly to support new forms of identity credentials. Biometric systems are being upgraded to verify DTCs and mobile IDs, in line with ICAO standards,” he says. “These digital documents are protected by cryptographic keys and linked to the issuing authorities, allowing travelers to authenticate their identities using their smartphones or digital wallets, offering a simple and secure extension of traditional electronic passports.”
An Evolution
The global rollout of biometric border control represents an evolution in transport security where speed, accuracy, and trust must coexist. The successes seen across Europe, the United States, the Middle East, and several Asian hubs highlight how intelligent system design and rigorous governance can deliver measurable benefits for both operators and travelers. However, sustainable progress depends on continued alignment with privacy frameworks such as the EU GDPR and emerging AI regulations. As biometrics become embedded in digital identity ecosystems, the challenge ahead lies not only in technological advancement, but in preserving public confidence through transparency, security, and respect for individual rights.
Today’s cargo security better protects valuable freight and is vital to the supply chain.
Cargo security is a critical element in the supply chain ensuring the safe and secure transportation of goods. Cargo theft increases costs to businesses and creates dissatisfied customers who don’t receive their products. Cargo must be maximally protected to safeguard contents and while cargo containers have a robust, high-strength construction, there still remains the threat of theft, hijacking, pilferage and break-ins.
In Q4 2024, the freight security network, CargoNet, reported a significant year-over-year increase in theft incidents. Q3 2024 saw a record 776 cargo theft events across the U.S. and Canada. This represents a 14% increase as compared to the prior year’s third quarter. The total value of stolen goods was well over $39 million in Q3 2024. In 2024, cargo theft was responsible for an estimated total loss of nearly $455 million.
Improved cargo security has never been more important than it is today; the demand for black-market goods has exponentially increased. Cargo theft is a very low-risk/highly profitable type of criminal activity with a minor criminal penalty; it can occur during several stages of the transit process. Also, today’s thieves are now highly tech-savvy and constantly developing modern ways and strategies to steal cargo from shippers.
Today’s Asset Protection
Shippers are taking proactive measures to protect their assets. With rising incidents fueled by economic pressures, organized crime, and technological vulnerabilities, they are strengthening their defenses to safeguard cargo.
Robust hardware like heavy-duty locks and tamper-evident seals create an initial barrier to entry and are the foundation of security for cargo. J.J. Keller & Associates image.
Today’s leading cargo-theft prevention strategies blend physical security technologies with digital tracking and layered operational controls. Carriers increasingly rely on GPS-based telematics, real-time geofencing alerts, and remote-immobilization tools to monitor trailer movements and quickly detect unauthorized deviations. “High-security locking hardware, such as hardened padlocks, king-pin locks, air-cuff locks and electronic cargo seals, prevent thieves from simply driving off or breaking into trailers,” says Josh Lovan, industry business advisor at J.J. Keller & Associates, Neenah, Wisc. “Smart locks and electronic seals add anotherlayer by providing tamper evidence and alerting fleets instantly when a breach occurs.”
Many companies also deploy cameras at yards, RFID tracking, and concealed asset-tracking devices placed inside cargo to locate stolen freight even if a trailer is abandoned. Also, “At the operational level, rigorous vetting of carriers and drivers, controlled dispatch procedures, ‘red-zone’ policies requiring drivers to move a certain distance before stopping after pickup, and secure parking protocols dramatically reduce opportunity-based theft,” Lovan says. “Combined, these physical devices, digital monitoring systems, and disciplined operational practices create a layered security approach that makes theft more difficult for criminals.”
Multi-Layered Security Ecosystem
Today’s cargo security can be described as a multi-layered ecosystem with its foundational layer being physical and procedural security. This includes robust hardware like heavy-duty locks and tamper-evident seals that create an initial barrier to entry. This is supported by essential operational protocols, such as comprehensive driver training and secure yard management, which are critical for mitigating opportunistic threats.
Geotab’s technology provides another layer of security with real-time visibility and sensor integration that moves security from being passive to active. Geotab GO Anywhere Asset Trackers enable companies to efficiently manage and track their critical assets using the same platform they use for their fleet vehicles. Geotab image.
Atlanta-based Geotab provides the next layer: real-time visibility and sensor integration. This is where advanced telematics moves security from being passive to active. “By integrating real-time GPS with a suite of sensors, like trailer door open/close sensors, unauthorized access alerts, and covert asset trackers for detached trailers, we provide a complete operational picture,” says Geotab global strategic account perspective Stephen White. “This technology enables critical, proactive tools like geofencing, which provides an immediate alert if an asset leaves a designated route or secure yard, and exception notifications for unauthorized stops.”
Finally, the most powerful layer is data intelligence and platform integration. White explains that collecting data is only the first step; the true value lies in making it actionable. “A sophisticated, open telematics platform consolidates all these data streams into a single dashboard. This allows security and fleet managers to analyze patterns, identify high-risk routes, and detect abnormal behavior before a theft is completed. This data-driven approach, which must be protected by strong cybersecurity protocols, allows a fleet to move from a reactive to a predictive and preventative security posture.”
Different Cargo, Different Security
A “one-size-fits-all” approach to cargo security is inefficient and ineffective. A security strategy must be tailored to the specific risk profile of the cargo. Different types of cargo require different layers and styles of security, largely based on value, theft trends and vulnerability during transit.
Mode of transport plays a role. “Trucking commonly uses physical locks, geofencing, and route controls; rail and maritime shipments rely heavily on container seals, yard security, and tracking; and air cargo leverages secure facilities and TSA-regulated chain-of-custody protocols,” Lovan says. “Regulatory compliance, especially for hazmat, pharmaceuticals and perishables imposes mandated security plans, background checks and documentation standards that deter theft.”
White says high-value shipments, like electronics, pharmaceuticals, or luxury goods, are prime targets for organized theft. “These require a multi-layered, active security posture. This goes beyond basic tracking to include real-time, second-by-second visibility, immediate alerts for unauthorized door openings, and strict geofencing that triggers an alarm on any route deviation or unscheduled stop.”
Sensitive or controlled commodities like food, medical supplies, alcohol or hazardous materials require additional safeguards like tamper-evident seals, environmental monitoring and vetted drivers to maintain product integrity and comply with federal rules. J. J. Keller & Associates image.
Lovan agrees explaining that, “High-value, fast-moving goods like electronics, pharmaceuticals, alcohol and expensive consumer goods typically demand more advanced measures like covert GPS trackers hidden within cartons, team-driver operations for long hauls and secure-lot parking for every stop. Higher-value freight like electronics or pharmaceuticals demands layered protection, from GPS tracking and secure-lot parking to covert asset sensors and strict chain-of-custody verification, because these items are quickly resold and highly targeted.”
Sensitive or controlled commodities like food, medical supplies, alcohol or hazardous materials require additional safeguards like tamper-evident seals, environmental monitoring and vetted drivers to maintain product integrity and comply with federal rules. Temperature-controlled food loads often use door sensors, ISO seals and GPS monitoring to detect tampering or unauthorized door opens, since these products are highly targeted and difficult to recover once stolen.
“Regulated or perishable cargo, such as food or pharmaceuticals, introduces another layer of risk: spoilage and compliance,” White says. “Here, security is about both theft prevention and chain of custody. Our platform addresses this by integrating reefer monitoring solutions to provide a verifiable, end-to-end log of temperature and humidity, ensuring the load is not just secure, but also viable.”
With intermodal transport, one of the biggest vulnerabilities occurs during handoffs. For this, robust asset tracking on the trailer or container itself is needed so that visibility is maintained even when the asset is detached and sitting in a yard. White cautions even lower-value bulk cargo requires a baseline level of protection. “While it may not need a dozen sensors, foundational fleet security and telematics data are essential for protecting against opportunistic theft and ensuring the trailer asset itself is secure. Ultimately, the goal is to scale the technology and data insights to the specific value, sensitivity and operational risk of the asset you are protecting.”
Innovative Technology to Prevent Theft
Technology has fundamentally shifted cargo security from a passive, reactive function to a proactive, intelligent one. It’s no longer just about GPS dots on a map. The standard today is high-resolution asset tracking that integrates deeply with a whole suite of IoT sensors. This results in immediate alerts for unauthorized door openings, unauthorized coupling or critical changes in temperature for sensitive cargo.
“Cutting-edge cargo security involves identity checks, intelligent tracking, hardened hardware and rapid response,” Lovan says. “Digital pickup authentication (one-time PINs or QR codes, photo ID match) shuts down fictitious pickups and double-brokering. Multilayer tracking uses covert battery beacons with satellite/cellular jammer detection. Smart hardware, like encrypted smart locks and seals plus door and side-wall sensors, sends instant tamper alerts. Continuous monitoring using GPS devices and onboard telematics accelerates law-enforcement recovery.”
White contends that the real cutting-edge capability, however, is what we do with that data. By using intelligent analytics and geofencing, the platform can automatically detect anomalies — like a trailer leaving a secure yard after hours or stopping in a known high-risk zone — and trigger immediate, actionable alerts. This data-driven approach allows fleets to proactively manage risk rather than just respond to it.
Technology also enables active intervention. “Solutions like Geotab Keyless can be configured with starter-inhibit functionality, allowing a fleet manager to remotely secure an asset,” White adds. “Of course, this entire system must be protected. A major and critical innovation is the focus on end-to-end cybersecurity, using encryption and signed firmware to ensure the telematics data itself cannot be compromised. Perhaps the most significant innovation is the shift to an open platform ecosystem. This allows fleets to integrate data from virtually anythird-party security device, such as advanced electronic seals or specialized locks, into one unified dashboard, giving operators a single, complete view of their security posture.”
Smarter Criminals
Cargo theft security has been called an evolving cat-and-mouse game. Criminals are moving beyond simple physical attacks and are actively targeting the technology itself.
Criminals can beat cargo security via brute-force physical tampering, cutting through hardware and also by tricking people. Sophisticated criminals use signal jamming to block GPS and cellular communications, effectively making the asset “disappear.” They can find, disable or rip out obvious trackers, cut locks or hinges, slice sidewalls or simply hook up to a preloaded trailer and drive away. They will fake their way in using stolen identities, bogus carriers, counterfeit seals, or last-minute “pickup changes” to fool dispatch and warehouse staff. In a cyber-based attack, they can breach the platform itself, sometimes with insider help, to gain access or alter data.
With the issue of trailer tractors, Lovan says the answer is layered, simple and disciplined: use more than one tracker (one visible, others hidden inside the freight) with alerts if the signal goes dark; lock trailers with heavy-duty locks and hinge/hasp guards; add door-open or wall-cut sensors; and use numbered or photo-verified seals at every handoff.
Criminals can beat cargo security via brute-force physical tampering, cutting through hardware. J. J. Keller & Associates image.
White says stopping sophisticated criminals going after cargo requires a defense-in-depth approach, which is core to his company’s philosophy. “First, you must harden the hardware. This is why we advocate for covert, ruggedized asset trackers that are difficult to find and built to resist tampering. Second, you must secure the data and the device. This is where our focus on cybersecurity is critical. We use mechanisms like digitally signed firmware and end-to-end encryption. This prevents a criminal from loading malicious firmware onto a device or spoofing its signal. Finally, you must use data intelligence as a defense. A critical feature of our platform is the ability to create real-time alerts for anomalies. If a high-value asset suddenly loses its signal in a high-risk area, that event itself becomes an immediate, actionable alert. This, combined with strong platform-side controls like multi-factor authentication, creates a layered defense that can flag a compromise attempt as it’s happening, not after the asset is already gone.”
Cybersecurity and Cargo
Cargo security is no longer just about the truck; it’s about the data. Data-driven routing is critical. It’s not enough to just secure the asset; you must proactively secure its journey. Telematics data allows fleets to use analytics to identify and avoid high-risk areas and theft hotspots, moving from a reactive to a predictive model.
White explains that many still think of cargo security in terms of physical locks, but today, cybersecurity is cargo security. “A compromised telematics platform is a far greater threat than a bolt-cutter. If a criminal can spoof a location, disable an alert, or gain access to your data, your physical locks are irrelevant. This is why a foundational commitment to data security and securing the platform itself is the most important, and often most overlooked, layer of any modern cargo protection strategy. The total cost of a theft, including reputational damage and supply chain disruption, is far greater than the value of the goods, which makes investing in a secure, data-driven solution the most cost-effective decision a fleet can make.”
The automotive industry, long a symbol of global innovation and economic power, stands at the intersection of unprecedented transformation and daunting crisis. From the rise of electric and hydrogen-powered propulsion systems to the dawn of autonomous vehicles, manufacturers are forced to rethink not only the products they create but also the very nature of mobility, engineering, and value creation. This exploration delves deeply into the technological, operational, and economic trends shaping the sector’s future.
Electric vs. Hydrogen Propulsion
Electric vehicles (EVs) have rapidly become the flagship of automotive innovation. The shift to electrification is driven by environmental concerns, regulatory mandates, and consumer demand for cleaner alternatives. Battery technology, particularly lithium-ion and the emerging solid-state batteries, underpins the current wave of EVs. Major players like Tesla, Volkswagen, and General Motors have aggressively invested in EV platforms, boasting growing ranges and faster charging times.
Hydrogen and Fuel Cell Vehicles
Yet, electric propulsion is not the only path forward. Hydrogen fuel cell vehicles (FCVs) offer an alternative, especially appealing for heavy transport, buses, and long-range trucking. Fuel cells generate electricity through the chemical reaction of hydrogen and oxygen, emitting only water vapor. While hydrogen infrastructure is nascent, it promises rapid refueling and long operational ranges. Companies such as Toyota and Hyundai continue to pursue hydrogen, seeing its potential where batteries might falter — namely, in applications requiring high payload and fast turnaround.
Which will dominate? The answer is nuanced. Urban and passenger mobility will likely be dominated by battery electric vehicles due to the ongoing expansion of charging networks and the relative simplicity of electricity distribution. For commercial fleets and long-haul operations, hydrogen’s high energy density and fast refueling give it a credible edge, provided infrastructure investments materialize.
It is important to understand that fossil fuels have a very high energy density. This means that a relatively small amount of fuel can produce a large amount of energy, which is one of the key reasons they have been the dominant energy source in transportation for over a century.
Hydrogen is often proposed as an alternative, but there are significant challenges. For the same amount of energy, hydrogen requires approximately six times more volume than fossil fuels. Moreover, hydrogen must be stored at extremely low temperatures or under very high pressure, both of which complicate vehicle design and add technical and safety concerns.
A similar issue exists with battery-powered vehicles. Although they produce no emissions during operation, batteries have a much lower energy density compared to fossil fuels and are significantly heavier. Additionally, recharging batteries takes considerably more time than refueling a conventional vehicle with gasoline or diesel, which limits convenience and range for many users.
If fossil fuels did not pollute the atmosphere and contribute to climate change, they would indeed be the ideal energy source for the automotive industry. However, their environmental impact forces us to explore and invest in cleaner alternatives, despite the technical limitations we currently face.
The Rise of Autonomous Vehicles
Autonomous vehicles (AVs) represent both a technological marvel and a regulatory conundrum. Self-driving trucks promise transformative changes for logistics and freight. Companies like Waymo, Aurora, and Daimler are actively developing autonomous systems that can navigate highways with minimal human intervention.
Servicing and Dedicated Stations
With new propulsion and autonomy come new service paradigms. Dedicated stations will likely emerge to handle specialized needs — walk-around checks, high-capacity battery charging, hydrogen refueling, sensor calibration, and software updates. The traditional service model, focused on oil changes and mechanical repairs, will give way to data-driven diagnostics, modular component swaps, and advanced cybersecurity protocols.
The New Science of Testing
• Physical Proving Grounds
Despite the digital revolution, physical proving grounds remain essential. These controlled environments allow vehicles to undergo rigorous, repeatable tests — such as emergency maneuver, exposure to environmental extremes, crashworthiness evaluations, and complex urban driving scenarios. For autonomous vehicles (AVs) and new propulsion systems, these proving grounds are evolving to replicate real-world complexity, including mixed-traffic environments, pedestrian unpredictability, and dynamic obstacles.
• Virtual Testing and Digital Twins
To complement — and in many cases, partially replace — physical testing, manufacturers are increasingly relying on virtual environments. Digital twin technology creates a highly detailed virtual replica of a vehicle, allowing engineers to simulate thousands of scenarios, stress-test software algorithms, and evaluate system responses to edge cases — all without risking physical hardware.
Virtual testing dramatically accelerates development, reduces costs, and supports continuous improvement even after a vehicle is deployed. In fact, entire companies now specialize in creating sophisticated test scenarios. Attempting to execute all of these scenarios in the physical world is no longer practical. Testing every possible case with a fleet of just five prototype vehicles could take decades. For this reason, virtual testing and the development of digital twins are no longer optional — they are essential.
• Test Scenarios and Algorithm Validation
One of the most critical aspects of AV development is the creation of robust test scenarios that stress every component of the system. From driving in inclement weather to reacting to erratic human behavior, AVs must demonstrate resilience and adaptability. The “virtual driver” must master a wide range of tasks — perception, prediction, planning, and control — which all rely on sophisticated software algorithms. Rigorous testing — both in virtual environments and on physical proving grounds — is crucial to validate these algorithms, ensure passenger safety, and meet regulatory requirements. Do we need algorithms to test virtual drivers? Absolutely. Meta-testing frameworks, powered by artificial intelligence, can introduce controlled randomness, simulate rare traffic incidents, and expose the AV system to high-risk situations it might otherwise never encounter during real-world driving. These tools are vital in training and validating autonomous systems to handle even the most unlikely, yet dangerous, scenarios.
Cybersecurity: The New Frontier
As vehicles become rolling computers, cybersecurity moves to the center of engineering. A modern AV’s threat surface includes connectivity modules, over-the-air update channels, and even infotainment systems. Manufacturers must embed security into every layer — from hardware encryption to anomaly-detection algorithms — guarding against threats that could compromise safety or privacy.
Cybersecurity testing is now a standard phase in development. “Red team” simulations, penetration testing, and continuous monitoring are vital, with industry standards evolving to formalize best practices. In cybersecurity, a red team is a group of ethical hackers that simulate real-world attacks to identify vulnerabilities and weaknesses in an organization’s security posture. They act as the adversary, using the same tactics and techniques as malicious attackers to assess the effectiveness of security controls and incident response capabilities.
Where and How to Roll Out Next-Gen Vehicles
The initial deployment of next-generation vehicles, especially fully autonomous ones, will be strategic. Early rollouts are likely to occur in regions with supportive regulatory frameworks, robust digital infrastructure, and benign weather —California, Arizona, and certain Chinese cities have led the way. Highways, dedicated freight corridors, and controlled urban districts will serve as testbeds before large-scale, nationwide adoption.
Factors Influencing Rollout:
• Regulatory clarity and liability frameworks
• Infrastructure for charging and hydrogen refueling
• Public acceptance and willingness to adapt
• Data-sharing agreements and municipal partnerships
Margins Under Pressure
The promise of technological revolution is shadowed by a persistent industry crisis. Automakers are grappling with declining profitability, driven by soaring R&D spending, supply chain challenges, and changing consumer behaviors. One significant disruptor is the influx of affordable electric vehicles from China. Chinese automakers, such as BYD and NIO, leverage economies of scale, lower production costs, and a highly integrated supply chain to offer compelling products at prices Western manufacturers struggle to match. These vehicles are flooding global markets, putting additional downward pressure on margins for established brands.
Strategic Responses for Survival
To counteract industry crises, manufacturers are:
• Forming alliances and joint ventures to share R&D costs
• Investing in flexible, modular platforms that support multiple propulsion types
• Accelerating digitalization to improve manufacturing efficiency and reduce waste
• Lobbying for fair trade practices and local content requirements
• Targeting premium segments and value-added mobility services to offset margin erosion
Toward a Resilient Future
The automotive industry’s journey is one of complexity, competition, and continual change. The battle between electric and hydrogen propulsion is less about choosing a winner and more about matching technology to use case. Autonomous vehicles and self-driving trucks will fundamentally alter transportation, logistics, and infrastructure needs. Testing — both physical and virtual — remains the backbone of safety and progress, while cybersecurity moves to the forefront of design.
Amidst all this, industry players must navigate the threat posed by new entrants, especially the onslaught of inexpensive EVs from China. Adaptation and innovation are the watchwords. Those who thrive will be those who not only master new technologies but also reimagine the ecosystems and business models that make them viable in a volatile world.
In a world with rising man-made and natural threats to transportation systems, preparing for such events through emergency response plans (ERPs) is vital.
An ERP is a well-researched, documented strategy that outlines the procedures to be followed during an emergency. When disaster hits, having an ERP in place ensures that staff know what to do to protect lives, minimize damage, and move toward a swift recovery.
Why ERP Matters
Talk to the experts, and you’ll find they agree on one key point: emergency response planning is a critical business necessity.
Ron Mildiner, SureScan
Ron Mildiner is the director of customer success at SureScan Corporation, which manufactures security screening equipment (specifically computed tomography or CT). His experience offers a sobering perspective: Prior to May 31, 2025, Mildiner was the deputy federal security director at Ronald Reagan Washington National Airport (DCA) and was the senior TSA executive on duty following the January 29, 2025 crash between American Airlines 5342 and a U.S. Army UH-60, which resulted in 67 fatalities.
Given his personal experience, Mildiner knows how severe transportation disasters rattle transportation staff. “Following the initial crisis or accident, most employees fall into a quiet state of panic that renders them essentially frozen,” he told TSI magazine. “By having an established ERP, you can begin breaking through the shock and give them established direction, to include checklists, that allows them to concentrate on the task at hand while not being overwhelmed by the crisis.”
Brian Toolan, Everbridge
Brian Toolan is vice president of public safety at Everbridge, a company that digitally manages all phases of critical event management — from preparedness to response and recovery — for its clients. “Once an event happens, you have to know who’s going to be responsible to handle it,” Toolan said. “Having your plans prepared in advance also allows you to better understand what you might be facing. For instance, for an aircraft accident or issue, you want to better understand what type of aircraft it could be, how many people could be affected, what type of fuel or chemicals might be released, and what the impact to the community and environment might be. All these things shouldn’t be figured out at the time of an event. You need to plan in preparation for when they will happen.”
Jennifer Stansberry Miller, Empathia
Jennifer Stansberry Miller is the director of crisis solutions at Empathia. She helps organizations build resilience before a crisis, respond effectively during an event, and recover with compassion afterwards. “Preparing for a crisis and developing an effective emergency response plan is not only right for a brand, but it is also a regulatory expectation in sectors such as aviation and passenger rail,” said Stansberry Miller. “Having experienced the aftermath of a transportation crash, I have seen how the absence of a coordinated response creates secondary trauma for those directly impacted. For the company, it causes confusion, employee frustration, and reputational harm, all of which are avoidable today through emergency response planning.”
Benefits of ERPs
Companies and organizations who have ERPs in place receive many benefits when disasters actually occur.
Minimizing business damage is one key benefit. “A serious incident can result in millions of dollars in downtime, lawsuits, and fines,” Stansberry Miller said. “The organizational impact is lost trust, brand damage, and trauma to employees and the public. Research shows preparedness works. Even a minor runway excursion costs more than $30,000, but targeted training is far cheaper. Effective planning and training can cut incident costs by up to 50 percent.”
Another benefit is legal liability reduction. “If you’re not prepared when the investigation completes from the government side, fines can be in the millions,” said Toolan. “Having an ERP in place and then following it will be taken into account during such investigations, and can help to reduce your potential legal liability.”
A third benefit of ERPs is strengthened staff morale, which is vital to have during the after-event recovery process. After all, employees anchor recovery. Those whose leaders prepared a thorough ERP beforehand and then executed it well during an event will be better supported by staff afterwards than those leaders who were caught unprepared and tried to muddle through.
The takeaway: “Across all modes, the pattern is clear,” Stansberry Miller observed. “Airlines that invest in safety audits cut accident risk in half. Highway training programs reduce crashes and clearance times. Maritime safety systems lower costs, and pipeline safeguards prevent disasters. In every sector, robust emergency response planning is the most cost-effective insurance against failure.”
“For transportation companies, preparedness is essential for long-term success,” concluded Mildiner. “Emergency response planning, supported by training, coordinated communication, and customer protocols, protects lives, stabilizes operations, and sustains trust. Embedding these practices strengthens resilience and reputation. A culture of readiness enables organizations to respond to crises with confidence.”
How to Create an Effective ERP
Creating an effective emergency management plan is a structured process that blends strategy and practicality. “The first step is a comprehensive risk and gap assessment to identify and prioritize hazards by their likelihood and impact,” said Stansberry Miller. “This grounds the plan in reality, not assumptions.”
“You need to know what you are up against,” Toolan said. “You need to know what you’re trying to solve — two areas in which Everbridge’s software helps people to develop their ERPs.”
The human factor is a key consideration. “Formulating an effective ERP requires consideration of the roles of the actual responders and needs to involve them up front in the planning process,” said Mildiner. “When considering a given crisis, it’s generally straightforward to figure out who will need to be involved and what each responder will need to do.”
Clear leadership and decision-making authority is essential in a crisis and needs to be defined in the ERP. Every employee must understand their role and the chain of command. “The point of an effective ERP is to establish some order and lines of demarcation so that the right people and the right equipment arrive at the right place and at the right time,” Mildiner said. “An ERP also serves as a collection of all the appropriate POCs, telephone numbers, maps, and layouts so that when a crisis occurs, a coordinator can grab the plan and begin immediately.”
Clarity is also vital in all aspects of communication. “The ERP should detail internal and external communication protocols,” said Stansberry Miller. “Employees need clear channels, while customers, families, regulators, and the public require timely, accurate updates. Clear communication prevents chaos.” (We will dig more into communication later on in this article.)
Once an ERP has been created, the plan must be supported by resources and training. For the ERP to be effective, the training process must be detailed, properly supported and recurrent.
Detailed checklists are a key element of an effective ERP. Just as a shopping list ensures no items are missed, checklists help employees know what to do during a crisis, preventing critical omissions.
“Aside from ensuring that nothing significant is missed, a checklist helps break through the initial shock that impacts responders,” Mildiner told TSI. “A checklist gives them something to hold, read, concentrate on, and most important — to do. When a responder’s mind is racing under the burden of the crisis, a checklist gives him/her a template to follow to complete the necessary tasks.”
“Checklists help you to account for each person’s responsibility,” said Toolan. “Once you identify all the risks and hazards associated with what you’re trying to accomplish, you then need to know who’s going to be responsible for making sure all of that has been done and documented. Checklists help you to assign responsibility to individuals and then follow up to make sure those responsibilities have been completed. Once you can do that, you can have a better feeling that you’ve accomplished your mission.”
“In fact, checklists are at the core of an emergency response plan,” Stansberry Miller said. “They turn strategy into action and clarify responsibilities. But remember: Checklists must be kept current. They should be reviewed regularly, especially after operational changes or real incidents, so they remain useful in practice.”
Once an ERP has been created, the plan must be supported by resources and training. For the ERP to be effective, the training process must be detailed, properly supported, and recurrent.
“Invest in people, equipment, technology, and time for drills,” she recommended. “A notable example is U.S. Airways Flight 1549, also known as the Miracle on the Hudson. The successful evacuation and support for 155 people were possible because protocols were followed and communication was strong. When the crisis struck, the plan worked because it had been tried.”
Finally, an effective ERP is a living document. It follows a continuous improvement cycle comprising assessment, implementation, practice, and review. In this way, the ERP keeps up with the times as technologies change and threats evolve. It also ensures that the ERP undergoes constant executive oversight and adaptation, so that it remains useful.
To this end, “review the plan regularly, at least annually, and following every incident, to ensure it remains relevant to the organization’s current operating conditions,” said Stansberry Miller. “Updates should address new threats and refine protocols using lessons learned from exercises and real-world events. Key takeaway: Successful organizations view emergency planning as a continuous cycle of assessment, implementation, practice, and improvement.”
The Many Roles of Communication
We previously noted the importance of communication in an effective ERP. Its critical role warrants a more detailed discussion.
Communication plays many roles in the successful execution of an ERP. A case in point: “Communication and coordination with external entities will either make or break a response to a crisis,” Mildiner said. “A couple of ERP-based communications decisions served me very well in the immediate aftermath of the crash of AA 5342 in January 2025. First, every organization should have a communication or coordination center that is tasked with collecting and disseminating information. With that said, as a leader during a crisis, you need to remain available to receive information and make decisions. Hence, you must delegate the responsibility of communicating with a coordination center to a subordinate you keep next to you throughout the crisis. Second, establish two text groups: one for your direct reports, and one for your boss (bosses). Text messaging, while impersonal, is fast and can reach a group of people instantaneously. It can keep your chain of command informed, pass on directions to subordinates, and keep you available for truly important calls.”
Next, the communication of factual, timely information is vital during man-made and natural disasters. “It was identified as the top need when the NTSB established its Transportation Disaster Assistance division following the passage of the Aviation Disaster Family Assistance Act,” said Stansberry Miller. “Survivors and impacted families consistently seek factual, timely information above anything else. Without it, they are left vulnerable to misinformation, confusion, or even receiving inaccurate death notifications — failures that deepen trauma and erode trust. This is why an effective emergency response plan clearly outlines who is authorized to coordinate and release information to law enforcement, regulators, the media, survivors, and affected families. A strong plan also incorporates a dedicated family assistance component, addressing the fundamental concerns of those impacted.”
The release of factual, timely information is also vital for managing the media successfully. Despite the tropes that play out in movies and on TV, most journalists want to be helpful during emergencies. But they still have to feed the beast that is the 24-hour news cycle. If your organization doesn’t provide them with that meat, someone else will.
“This is why it is important to keep the media on a scheduled briefing rotation to control the narrative and provide the information they need, preventing them from seeking out other, potentially less accurate, sources,” Toolan advised. “If you’re scheduling regular briefings and you’re holding to those briefing timelines, you’re giving them the information they need.
The Importance of Training and Reviews
Another area that deserves more emphasis is the importance of ERP training (including exercises) and reviews. “Training exposes weaknesses and ensures all components such as communication systems and accountability processes are functioning and external partners are aligned,” said Stansberry Miller. “Ultimately, you will perform the way you train — there are no shortcuts.”
Reviews keep ERPs up to date and relevant. “A plan must be revisited at least annually and after every incident/drill to integrate lessons learned and evolve with the organization,” she said.
In particular, “you can’t learn unless you do an after action review (AAR),” said Toolan. “No plan is foolproof. Everything’s going to have some sort of need to improve. It could be small, it could be large, but you won’t be able to do that improvement unless you do an AAR first.”
Whatever the reason for the review, it needs to be conducted in a blame-free environment with the sole goal of improving the plan. If the “blame game” is played, employees will not be forthcoming, the ERP will not be improved, and the consequences may then be played out during the next incident with disastrous results.
The Bottom Line: ERPs are a Must
All of the information that the experts above have detailed about ERPs leads to one inescapable conclusion: In today’s high-pressure, high-stakes transportation industry, having an ERP is an absolute must.
“The absence of a solid and practiced ERP will lead to confusion and delayed response,” Mildiner warned. “In the age of social media, your response (or lack thereof) will be viewed by the public almost in real time, and a clearly inadequate ERP will be judged and potentially exploited by members of the public.”
“Brand reputation is probably one of the biggest casualties for companies who fail to have adequate ERPs, are hit with disasters, and then have to weather the public consequences,” said Toolan. “If I don’t feel comfortable that a specific airline will mitigate harm to that aircraft prior to me getting on it, I’m going to reevaluate whether I want to take that airline. The same thing is true with other transportation and logistics agencies.”
Clear leadership and decision-making authority is essential in a crisis and needs to be defined in the ERP. Every employee must understand their role and the chain of command.
“In today’s environment, there are no excuses for not having an emergency response plan in place,” Stansberry Miller said. “The consequences of neglect are both immediate and lasting. As someone with lived experience, I know what it feels like when a response fails. The bravado, politics, and lack of coordination all contributed to hindering the healing process for survivors, families, and the affected community. The scars of that failure endure.”
Fortunately, the preventative solution to this abysmal outcome is straightforward and accessible, she noted: “Invest in an emergency response plan, its process, and your people. Build a comprehensive ERP, assign the right individuals to the right roles, and continually review and refine the plan. Practice builds readiness, and readiness protects both individuals and their reputations.”
The Security Industry Association (SIA) has named Jonathan Aguila as the 2025 recipient of the SIA Insightful Practitioner Award, an honor recognizing excellence in promoting the implementation of innovative security solutions. Aguila will be recognized Nov. 19 during the 2025 SIA Celebrates & Honors event.
Aguila is the global services director, systems and technology at Meta. He entered the security industry as a technician about 30 years ago and progressed through the industry, serving in roles in project management, global program management, national accounts and global accounts and then transitioning to the end-user space at Meta. Aguila previously served on the SIA Board of Directors’ Executive and has advised the SIA Executive Committee on topics that were important to end users or could create additional value for them and has shared his insights as a speaker at SIA and other industry events. He has also provided leadership and expertise in the formation of SIA’s Security Systems Technician Apprenticeship Program for security technicians and installers.
During Aguila’s board tenure, he was a constant advocate for SIA within the practitioner community and strongly contributed to the vision for creating the Security Practitioners Advancing Real Conversations (SPARC) community, a forum for technical end users within SIA. SPARC is a community of security professionals dedicated to advancing state-of-the-art security technology that provides access to cutting-edge research, training and networking opportunities for its members and works to influence the direction of security technology standards and compliance. The community has produced intelligence reports on mobile credential development trends and guidance for evaluating artificial intelligence vendors and service providers, and further resources and publications are underway.
“I have always gravitated toward problem solving and helping people, so I transitioned to the end-user space to focus on wide-impact challenges and long-term implications within a single company, and growing a team that understands how to work across all aspects of the community has been a passion ever since,” said Aguila. “Giving back to the security industry and helping to improve collaboratively was the driver in working with SIA to form SPARC and the Apprenticeship Program. I am grateful for this award, but I am most grateful to be welcomed by the industry and to have the opportunity to help others feel welcomed and supported as well.”
“Jonathan Aguila is an innovative leader in our industry whose vision and initiative have propelled SIA’s efforts to engage with security practitioners and end users,” said SIA CEO Don Erickson. “He has been a tremendous advocate for SIA and SPARC as a community platform for end users, and his insights have been crucial in identifying end users’ top concerns and trends within the practitioner community. We applaud Jonathan for his many impressive contributions with SIA, Meta and the industry overall and thank him for his support of SIA and commitment to driving our industry forward, and we look forward to recognizing him at SIA Celebrates & Honors.”
SIA’s Insightful Practitioner Award was created to honor security practitioners who demonstrate leadership and excellence in promoting the implementation of innovative security solutions through education, advocacy and teamwork with the security industry and other stakeholders.
SIA Celebrates & Honors is an event dedicated to leaders, legends and the next generation of security, held concurrently with ISC East—the Northeast’s leading security and public safety event, hosted in collaboration with premier sponsor SIA. On Wednesday, Nov. 19, security industry professionals of all ages will gather at City Winery in New York City for an unforgettable night of celebration, connection and entertainment—including upscale networking, gourmet dining, live music and a heartfelt awards program recognizing standout leaders who are shaping the future of our industry. Additionally, the event will support the work of the Foundation for Advancing Security Talent (FAST) to grow the security industry’s workforce. In addition to presenting the Insightful Practitioner Award, SIA will also present the 2025 George R. Lippert Memorial Award and Progress Award.
TOPPAN Security, a global leader in secure identity and payment solutions, unveiled CHROMA at the ICAO TRIP Symposium, the world’s first laser technology to deliver full-color, photo-realistic, personalization for polycarbonate identity documents.
For three decades, governments issuing identity documents have faced with a dilemma: they either had to prioritize the integrity of the picture or focus on the high resolution and quality of the portraits. Having both was impossible. CHROMA redefines how identity is protected and portrayed on official identity documents, achieving exceptional document security with high-precision visual quality.
“CHROMA brings identity to life with unmatched realism and precision, delivering lifelike imagery on secure polycarbonate documents that exceed today’s security benchmarks,” said Jean-Pierre Ting,
Why CHROMA Sets the New Global Standard
Black and white laser engraving has been long the gold standard for secure document personalization. Unlike surface printing methods that merely apply ink or dye to the exterior, laser engraving permanently embeds personal data and portraits deep within the polycarbonate structure of the document. This fusion creates exceptional durability and resistance to tampering, alteration, or environmental wear.
While color personalization technologies have emerged in recent years, the existing technologies all come with significant drawbacks that have delayed adoptions. As a result, only around 20 countries worldwide have opted for color portraits to date on polycarbonate.
CHROMA changes that. It redefines what’s possible in color personalization, combining the trusted security of laser engraving with vibrant, lifelike precision that enhances recognition, not distracts from it.
The CHROMA technology fuses photosensitive cyan, magenta, and yellow dyes with a single precision laser beam, achieving true polychromatic engraving directly within the polycarbonate structure. The result is a tamper-proof color image that captures the tones, textures, and subtleties that make every face unique.
Why Color Matters for Modern Identity Verification
Color is not just for aesthetics; it is fundamental to human recognition and identity verification. We distinguish faces through skin tones, eye color, and subtle features that define individual identity.
At border control, officers see travelers in color, while the person’s image, stored on the chip of a travel document, also appears in full color on the officer’s screen. For optimal verification, the personalized portrait on the document must reflect the same color realism as both the person and the chip image.
CHROMA ensures alignment across all three verification points producing a personalized image that mirrors both the chip data and the individual standing before the officer. This enhances recognition confidence and streamlines verification processes.
“Identity documents must do more than fraud prevention, they should preserve the truth of who we are,” said Frederic Jacquot, director & head of product ID documents. “CHROMA provides the authenticity and assurance that governments and citizens require.”