Parcel and Postal Technology International
  • News
    • A-E
      • Automation
      • Business Diversification
      • Construction / Development
      • Cross-border
      • Delivery
      • E-commerce
      • Expo
    • F-O
      • Freight
      • IT & Systems
      • Last Mile
      • Lockers / PUDO
      • Logistics
      • Mail
      • Operations
    • P-R
      • Packets
      • Parcels
      • Peak
      • Retail
      • Returns
    • S-Z
      • Sorting Systems
      • Staff / Personnel
      • Sustainability
      • Technology
      • Vehicles / Fleet
  • Features
  • Online Magazines
    • March 2025
    • September 2023
    • June 2023
    • March 2023
    • December 2022
    • SHOWCASE 2019
    • Archive Issues
    • Subscribe Free!
  • Opinion
  • Videos
  • Analysis
  • Awards
    • 2025 Awards
    • Previous Winners
  • Supplier Spotlight
  • Parcel + Post Expo
LinkedIn YouTube Twitter
  • Sign-up for Breaking News Emails
  • Meet the Editors
  • Contact Us
  • Media Pack
Subscribe
LinkedIn Facebook
Parcel and Postal Technology International
  • News
      • Automation
      • Business Diversification
      • Construction / Development
      • Cross-border
      • Delivery
      • E-commerce
      • Expo
      • Freight
      • IT & Systems
      • Last Mile
      • Lockers / PUDO
      • Logistics
      • Mail
      • Operations
      • Packets
      • Parcels
      • Peak
      • Retail
      • Returns
      • Sorting Systems
      • Staff / Personnel
      • Sustainability
      • Technology
      • Vehicles / Fleet
  • Features
  • Online Magazines
    1. December 2024
    2. September 2024
    3. June 2024
    4. March 2024
    5. SHOWCASE 2019
    6. Subscribe Free!
    Featured
    April 2, 2025

    In this Issue – March 2025

    Online Magazines By Web Team
    Recent

    In this Issue – March 2025

    April 2, 2025

    In this Issue – December 2024

    December 5, 2024

    In this Issue – September 2024

    September 19, 2024
  • Opinion
  • Videos
  • Analysis
  • Awards
    • 2025 Awards
    • 2024 Award Winners
    • 2023 Award Winners
    • 2022 Award Winners
    • 2021 Award Winners
    • 2020 Award Winners
    • 2019 Award Winners
    • Previous Winners
  • Supplier Spotlight
  • Parcel + Post Expo
LinkedIn Facebook
Subscribe
Parcel and Postal Technology International
Features

Securing the postal network through smart access management

mmBy Helen NormanDecember 16, 20165 Mins Read
Share LinkedIn Twitter Facebook Email

Fleur Baars, senior consultant at Prime Competence, discusses the issues surrounding modern mailbox security and what can be done to protect the postal network

It started with a simple question from a leading postal operator: “Do you have any strategies that can discourage invoice fraud in our mail network?” Today, following a proof-of-concept project in postal smart access management headed by Prime Competence and a major European post, the answer to this question is ready to be shared with other operators who can employ the same methods – and share the same benefits.

The interception of mail for criminal purposes is unfortunately on the rise. In the case of invoice fraud, the trend is global in nature, with the majority of research indicating staggering losses for SMEs. What’s more, according to a 2016 study by 3GEM and Tungsten Network, over half of UK businesses (54%) view it as their single biggest threat, while 47% have actually received a fraudulent or suspicious invoice.

Invoice fraud relies on criminals intercepting the mail, typically direct from the mailbox in locations that receive a lot of commercial post. Invoices are identified and key details modified, such as the billing address and bank account numbers for receiving payments. These invoices re-enter the mail-stream via the mailbox network and are delivered as originally intended. In many cases, the initial modified invoice leads to many fake future invoices, multiplying the impact of this type of fraud.

Mailbox security

The new proof-of-concept focused on the challenges of current mailbox security, identifying weaknesses and highlighting areas for improvement. Utilizing the latest developments in technology, it not only demonstrated enhanced security, but advantages from monitoring access, proving your compliance and providing a data platform for future innovations.

Mailboxes the world over tend to rely on simple mechanical locks, or even special keys. So, how can postal services control access in this environment? Who has access, and when? It is a complex issue and an administration problem as much as a security one. However, postal services can play a key part in prevention by securing all steps during distribution in a smart way and eliminating the possibility of criminals intercepting the mail, impacting the problem at source.

Some suggest that a solution already exists in electronic billing. However, fraud involving e-billing is accelerating faster than ever, so it’s certainly no silver bullet to fix the invoice fraud issue, especially in the SME sector. A 2015 report from Financial Fraud Action UK exposed the growing trend, ranging from emails with fake invoices to invoices that contain malicious software which can log financial information and be used to steal funds. Several experts in the field are even suggesting a return to paper billing as a solution to e-billing fraud.

Protecting integrity and security

Ultimately, trust is at the heart of this issue, and more than ever postal services need to act to protect the integrity and security of their distribution networks.

The aforementioned proof-of-concept comprises a secure AES-256 (advanced encryption standard) electronic lock combined with a cloud-based management platform that activates and deactivates access for mailmen, connecting their existing smart devices to overall workforce planning.

The smart lock within the mailbox includes a control board and battery power supply that enables additional functionality such as mailbox fill-level detection, air quality and noise measurements, while LAN and WAN networking with other assets/devices creates a postal data network. A mailbox network with a dense coverage is able to connect with other devices, thus enabling the collection and exchange of information; information that is valuable to third-parties interested in security, healthcare and public services, for example.

Pre-requisites for the development were low cost, size and ability to be retrofitted to existing mailboxes, PO boxes, parcel lockers and unmanned locations – and even existing handheld devices used in today’s process.

The cloud-based management platform provides a scalable back-end for running the solution, connecting to the smart device of the mailman and ensuring that only an authorized individual may open specific mailboxes. At device level, the application can be easily integrated in your existing application.

From a traceability perspective, the solution not only records who accessed a mailbox and when, but whether it was emptied or not closed correctly, for example. Every transaction is registered in the system log, and in cases where action needs immediate attention, an alert is created automatically.

A connected future

The latest Gartner study forecasts there will be 20.8 billion “connected things” in use by the year 2020. This mega-trend in IT is highly relevant for the dense networks operated by postal services. Today, connected things may be cars, refrigerators or light bulbs, but tomorrow why not mailboxes, delivery trucks, mailmen devices, cages and bags?

Administering access to infrastructure such as mailboxes can be a headache, especially in an environment where the workforce is increasingly flexible or utilizing agency staff rather than long-term employees. Furthermore, the management of keys and ensuring the right person can access the mailbox locations at the right time can be a considerable administration overhead. Today, these issues can be alleviated via a system where users are authorized remotely from a central IT system, based on specific working days, times of day and location. Equally, access can be revoked at any time, live.

Prime Competence and its partner would like to share their findings of this proof-of-concept with other postal operators, such that security across the industry may be enhanced. After all, every postal service has a responsibility to take all necessary steps to prevent security breaches in its distribution network.

December 16, 2016

Share. Twitter LinkedIn Facebook Email
Previous ArticleSmart first-mile communications
Next Article In this Issue – January 2017

Related Posts

Features

FEATURE: Overcoming cross-border e-commerce customs challenges

May 14, 202514 Mins Read
Features

EXCLUSIVE INTERVIEW: Egypt Post

May 1, 202511 Mins Read
Features

FEATURE: Improving reverse logistics with better data and collaboration

April 15, 202514 Mins Read

Receive breaking stories and features in your inbox each week, for free


Enter your email address:


Latest News

Yeep! rolls out 1,000th locker in the UK

June 13, 2025

Sameday acquires private courier Cargus

June 13, 2025

THG Fulfil to increase sorting capacity with 430 Libiao robots

June 12, 2025
Getting in Touch
  • Contact Us / Advertiser
  • Meet the Editors
  • Download Media Pack
  • Breaking News Emails
Our Social Channels
  • Facebook
  • LinkedIn
Supplier Spotlights
  • Prime Vision B.V.
  • Cookie Policy
  • Privacy Policy
  • Terms & Conditions
  • Notice & Takedown Policy
  • Site FAQs
© 2025 UKi Media & Events a division of UKIP Media & Events Ltd

Type above and press Enter to search. Press Esc to cancel.

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.

CookieDurationDescription
cookielawinfo-checkbox-advertisement1 yearSet by the GDPR Cookie Consent plugin, this cookie records the user consent for the cookies in the "Advertisement" category.
cookielawinfo-checkbox-analytics1 yearSet by the GDPR Cookie Consent plugin, this cookie records the user consent for the cookies in the "Analytics" category.
cookielawinfo-checkbox-functional1 yearThe GDPR Cookie Consent plugin sets the cookie to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary1 yearSet by the GDPR Cookie Consent plugin, this cookie records the user consent for the cookies in the "Necessary" category.
cookielawinfo-checkbox-others1 yearSet by the GDPR Cookie Consent plugin, this cookie stores user consent for cookies in the category "Others".
cookielawinfo-checkbox-performance1 yearSet by the GDPR Cookie Consent plugin, this cookie stores the user consent for cookies in the category "Performance".
elementorneverThe website's WordPress theme uses this cookie. It allows the website owner to implement or change the website's content in real-time.
JSESSIONIDsessionNew Relic uses this cookie to store a session identifier so that New Relic can monitor session counts for an application.

Functional

Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.

CookieDurationDescription
__cf_bm30 minutesCloudflare set the cookie to support Cloudflare Bot Management.

Analytics

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.

CookieDurationDescription
CONSENT2 yearsYouTube sets this cookie via embedded YouTube videos and registers anonymous statistical data.
uidsessionThis is a Google UserID cookie that tracks users across various website segments.
vuid1 year 1 month 4 daysVimeo installs this cookie to collect tracking information by setting a unique ID to embed videos on the website.
_ga1 year 1 month 4 daysGoogle Analytics sets this cookie to calculate visitor, session and campaign data and track site usage for the site's analytics report. The cookie stores information anonymously and assigns a randomly generated number to recognise unique visitors.
_ga_*1 year 1 month 4 daysGoogle Analytics sets this cookie to store and count page views.

Advertisement

Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.

CookieDurationDescription
OAGEOsessionOpenX sets this cookie to avoid the repeated display of the same ad.
OAID1 yearCookie set to record whether the user has opted out of the collection of information by the AdsWizz Service Cookies.
VISITOR_INFO1_LIVE5 months 27 daysYouTube sets this cookie to measure bandwidth, determining whether the user gets the new or old player interface.
YSCsessionYoutube sets this cookie to track the views of embedded videos on Youtube pages.
yt-remote-connected-devicesneverYouTube sets this cookie to store the user's video preferences using embedded YouTube videos.
yt-remote-device-idneverYouTube sets this cookie to store the user's video preferences using embedded YouTube videos.
yt.innertube::nextIdneverYouTube sets this cookie to register a unique ID to store data on what videos from YouTube the user has seen.
yt.innertube::requestsneverYouTube sets this cookie to register a unique ID to store data on what videos from YouTube the user has seen.

Others

Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.

CookieDurationDescription
VISITOR_PRIVACY_METADATA5 months 27 daysDescription is currently not available.

SAVE & ACCEPT
Powered by