Decades of experience with Military, law enforcement, private (forensic) investigations and specific education are the backbone of a developed concept which deals with internal and external threats that are potential harmful for continuing the regular operations of your company.  


Intellecture is specialized in important security and safety issues regarding the maritime environment ISPS-code (International Ship and Port Facility Code) and affiliated transport proceses.


We provide training courses and consultancy for company security officers and Port Facility Security Officers. Our knowledge and experience about (remote) sensing and data analysis can assist shipping industries to protect themselves against human and device intrusions like drones and ROV's. We represent Black Sage to help customers detect and deter Drones with state of the art "Drone Shield" solutions. 

PROMERC latest news

 PROMERC Counter Measure Manoeuvres

There are four counter measure manoeuvres identified in the PROMERC project against suspect vessels and pirates: Avoid being detected Step aside High speed escape Delay boarding The onboard Tactical more


Comparison between PROMERC / IPATCH Counter Piracy Measures

Accepting the directive of the European Commission, that encourages the collaboration between research projects funded in the same call, cooperation between PROMERC and IPATCH projects has been promoted. IPATCH (Intelligent... read more


Progress Workpackage ‘Development of Tools’

The objective of the PROMERC work package entitled ‘Development of tools’ is to create : a prototype software tool to provide dynamic situation sensitive advice and guidance to the bridge... read more


The first PROMERC newsletter

 The first PROMERC newsletter has been published. It appoints the following topics: Collaboration with IPATCH on joint database Layered defence Piracy and the monsoon season Incorporating PEESLE in decision making... read more


CNBC: Crime on the high seas

The world’s most pirated waters

SINGAPORE — The Ai Maru steamed alone under night skies on June 14 when a speedboat slipped in from the darkness and overtook the tanker about 30 miles off the... read more


The Telegraph: Repelling pirate attacks

The measures to protect a ship

The rise in piracy off the Somali coast last decade was a call to arms. Telegraph defence correspondent Ben Farmer outlines the security measures that came in its more


Dryad Maritime continues to report high levels of piracy in Southeast Asia

To read Dryad’s analysis of Q2 statistics collating maritime crime incidents from across the Gulf of Guinea, Horn of Africa and Gulf of Aden, please click the picture: Dryad Maritime... Read more


IMB Piracy & Armed Robbery Map

The Piracy & Armed Robbery Map below follows the definition of Piracy as laid down in Article 101 of the 1982 United Nations Convention on the Law of the Sea (UNCLOS) and Armed Robbery as laid down in Resolution A.1025 (26) adopted on 2 December 2009 at the 26th Assembly Session of the International Maritime Organisation (IMO).

This map shows all the piracy and armed robbery incidents reported to the IMB Piracy Reporting Centre. If exact coordinates are not provided, estimated positions are shown based on information provided. Zoom-in and click on the pointers to view more information of an individual attack. Pointers may be superimposed on each other.









Nuclear facilities Y-12 and operator error

Three anti-nuclear activists, led by an 82-year old nun, breached the perimeter security system of the supposedly highly secure Y-2 nuclear facility at Oak Ridge, Tennessee, where nuclear weapons components are manufactured (note that the Oak Ridge National Laboratory [ONRL] is not affiliated with the Y-12 National Security Complex); they then spent several hours in a secure area of the facility, leisurely spray-painting slogans on the facility’s walls – without the facility’s security staff, or the sophisticated $500 million security cameras and sensors, detecting them; to understand what happened at Y-2, we must accept that operator error is an essential problem in national security, and that the problem is pervasive and normal; the only way to deal with the operator error phenomenon is to build redundancies into the system Read more

Perimeter protection CAST Lighting’s LED Perimeter Light wins industry innovation award

The task of illuminating long perimeter fences has always been problematic; installing tall pole-mounted luminaires to flood fence regions with light is expensive in material and labor and wastes energy, since most of the illumination falls outside the perimeter region; typical metal halide pole-mounted lamps would require nearly 4,000 watts to light 500 feet of fence;CAST Lighting’s LED Perimeter Light uses just seven watts per luminaire, thus illuminating 500 feet of fence with less than 150 watts of power, saving 96 percent on energy costs; the new LED Perimeter Light captured the industry coveted innovation award at LightFair International 2012 Read more


NFC could "transform security operations with smarter working"

Sanjay Jhawar of Sonim Technologies says the same NFC technology that is about to revolutionise our personal lives, with m-wallets and mobile payments, is also set to transform the security and facilities management industry.

Developed several years ago, Near Field Communication (NFC)is by no means a new technology. But the way it is being used today is.

And that’s because NFC has suddenly become relevant in an increasingly mobile-centric world. Combined with a mobile device, NFC presents almost limitless opportunities for new applications – many of which can be exploited within the security sector.

IMS Research recently forecast NFC chip shipments to reach 785 million units in 2015, indicating that its use will soon pervade many businesses as well as consumer smart phones.

With mobile communications a prerequisite for security guards, the opportunity for exploiting NFC within mobile phones as a productivity and service quality tool has never been greater.


Why should security firms be excited by NFC?


Security is a tough and demanding environment. Mobile phones built for use here have to be rugged, durable and reliable.

However, it isn’t a case of being tough and dumb. Today’s communications devices have to be smart too.

Sonim believes that ‘intelligent working’ is strategically important to the security industry. Any technology that makes operations fitter, leaner and faster - by aiding productivity, reducing costs and making workers safer and more efficient - is definitely good for business.

This is why NFC is so exciting - it has the unique ability to turn the phone into a smart, multi-functional, productivity tool that is capable of ‘talking’ to other NFC enabled devices or tags.

Consequently, an NFC enabled phone provides security companies with a unique, easily deployed mobile ‘control, access and monitoring’ device that helps make their workers and operations much more effective.

On a practical note, this reduces the amount of hardware that the worker has to carry making life more convenient for them and more cost effective for the business.


How does NFC work and what does it do?


NFC is a system for two-way wireless connectivity that uses a very short-range radio frequency to enable a wireless mobile device to read or write small amounts of data from other devices or tags in the immediate area. Using similar ‘contactless’ technology found in the latest smartcards, keyfobs and wristbands for payments and ticketing, NFC devices are fully interactive.

On the other hand the tags usually referred to as RFID (radio frequency identification) are simpler, containing only an ID number to be read.

Another difference is that RFID tags have a range of several metres, and are suitable for tracking pallets and shipping containers, or vehicles passing through an open-road tolling system, whereas NFC tags, with their shorter range and lower power, are good for tracking tasks and objects that are more localized in nature.

When embedded in a mobile phone, an NFC chip allowsit to operate both as a transmitter - passing information to a device - or a reader - taking information from an NFC tag of device.

So, NFC phones can easily read tags embedded on items located anywhere in the workplace - such as wall mounted controls, access barriers, doors, windows, ID badges of workers, office doors and loading dock gates- to provide accurate service quality monitoring and assurance for security companies.

So how does that help your average security team? By scanning such tags with an NFC mobile device, data can be sent back over the mobile network to the control room.

This allows managers to greatly improve quality control and see immediately where security guards are located within a building.


Improved response times


Response times to incidents can be improved, and records may be kept on the detail of guard tours – useful to prove the client organization that the guard tours are being done well and to the agreed service level.

Tour times and routes can be optimized based on the historical data, and new employees can be trained or reminded about the next sequence in the guard tour using the phone screen for display.

This capability also allows workers to capture data and instantly report damaged equipment.

While barcode scanners have been used for similar purposes in the security guarding industry, NFC readers work in any light, do not require bulky laser scanning components, and can be placed in much smaller devices with longer battery life.

NFC tags can contain more information about the object scanned reducing the need for data exchange with the control room, further improving time efficiency for the guard.


What is NFC’s killer application for the security industry?


At Sonim, we believe that proof of attendance and activity will drive the biggest demand from our customers in the security and facilities management sectors.

With embedded NFC, lone worker devices can track onsite attendance, as well as key activities performed – making sure workers are where they should be and doing their jobs properly and thoroughly.

For the security or facilities worker the job remains the same - to monitor, protect and report. NFC simply lets them do this in a more efficient way; delivering real-time reporting with a simple swipe of the phone.

NFC also has huge implications for safety and the lone worker market. NFC can pinpoint a worker’s location within a building by tracking their position using NFC tags located at different points, even indoors where GPS often does not work.

If no progress is monitored in an outlined period of time, an alert can be automatically triggered so that immediate assistance can be sent to the most probable location.


Will NFC remain relevant for the future?


Communicating with embedded tags located within the workplace, rugged NFC phones make it possible for managers to collect business operations intelligence from front line workers, confirm tasks and ensure quality control.

These business needs will not change and will remain central to successful security practice.

Beyond guard tour verification and equipment maintenance logs, the next application area will be access control.

Consider the impact of enabling access to an area via NFC door locks for a specific time period without having to go to a central location to source keys and then return to that area once a task is complete.

Keys can be securely and electronically sent wirelessly to the guard’s mobile phone, which acts in a mode emulating a contactless tag.

In this mode, the NFC door lock contains the reader and checks the phone for access rights to areas the guard needs to service or investigate during their normal rounds, or in response to an incident - greatly improving efficiencies and productivity levels.

The costs and security risks of dealing with lost keys can be much reduced – NFC keys will work only for the people and time windows when they are needed and are then electronically revoked.

At the heart of NFC’s benefits is its simplicity of use – bringing two objects together is intuitive for everyone, whatever their age or occupation.

NFC builds on existing systems and human actions, so it has a very good chance to be valued and used by workers in the security industryfor many years to come.


HOME                                                                                                                     TOP PAGE