Archive for the ‘Technology’ Category

If your company’s business is mainly exports, then there is a high possibility that you will have to regularly ship consignments overseas. In such cases, it becomes mandatory to seal such cargo shipments with security seals to prevent any damage. Such seals are used in an array of applications like counter intelligence, election integrity, shipment containers, employee drug testing and nuclear safeguards. Tamper evident seals have been in use for more than 7000 years now. They are considered as an economical way of preventing any form of intrusion into confidential areas. These seals are widely used because they help to detect any deliberate or unintentional unauthorized access. In fact, more than 5,000 varieties of tamper-evident seals are available in the market. Some utilize electronic techniques to detect any interference with the seal, while others are adhesive-based. Occasionally, ‘barrier seals’ and ‘high security seals’ are used interchangeably, though they are two distinct terminologies. In this relation, it is important to know the definition of two other critical terms.

  • Defeating or otherwise known as spoofing a seal refers to performing any act of encroachment by removing the seal and then resealing the container but without being identified or detected by any investigation.
  • Attacking a seal means engaging in such ‘defeating’ actions.

ISO 17712

When discussing security seals, one must ensure that they are ISO 17712 certified. It determines uniform procedures for the acceptance and categorization of freight container seals. This standard has added new test requirements and compulsions for tamper proofing which are applicable to all seals, irrespective of types. Security seals manufacturers have to comply with the following few conditions before selling mechanical security seals.

  • Assessment of physical strength.
  • Evaluation of a seal’s capability to indicate traces of tampering.
  • Auditing the manufacturer’s business practices.

Why Exercising Caution is Imperative

An estimated 105 methods of defeating a seal are known which include replication of seal, counterfeiting, drilling the seal for manipulation and then fixing it, installation of faulty seals, meddle with seal code numbers database and cutting of seal. Consequently, choosing a seal is hinged on factors like personnel, budget constraints, the nature and type of containers, physical facilities and security goals. To counteract such malpractices, it is absolutely essential to allot unique serial numbers to high security seal that are challenging to erase or tamper with. Security seals manufacturers and vendors should not sell any duplicate serial numbers. Seals when used effectively will showcase authentic tamper detection.