Today port security is responsible for all defense, law and treaty enforcement and counter-terrorism activities that fall within the port and maritime domain. This includes the protection of the seaports themselves, the protection and inspection of the cargo moving through the ports, and maritime security.
Internationally, port security is governed by rules issued by the International Maritime Organization and its 2002 International Ship and Port Facility Security Code. Additionally, programs such as the Container Security Initiative and the Customs Trade Partnership against Terrorism have become de facto global port security programs.
Faced with these responsibilities and increasing governance port Command and Control (C2) centers constantly monitor their perimeter and critical assets using disparate systems such as radar, video surveillance, access control, fence protection systems, microwave sensors and video analytics to detect activity that requires an immediate response by their security teams. Add to this the numerous everyday false alarm triggers such as authorized personnel, maintenance contractors, security patrols and wildlife, the C2 center is continuously flooded with alarms and alerts. Responding to all of these events is unfeasible, so to verify each incident a method of quickly aggregating intelligence from all systems and sensors is required.