A control center continuously monitors a security state of a container
through an extended network spanning from a shipper to a consignee. The
control center changes the security state responsive to explicit
information received from a trusted agent, or implicit information
deducted from business logic. A trusted shipper agent sends manifest
information from a shipper checkpoint to the data center that includes,
for example, container information, shipping route information, and other
security information. Trusted monitor agents continuously track the
security state from the shipper checkpoint to the origin checkpoint, from
the origin checkpoint to a destination checkpoint, and from the
destination checkpoint to a consignee checkpoint. A trusted consignee
agent sends termination information from the consignee checkpoint to the
data center. The checkpoints further comprise site managers to
communicate information, gathered by RFID (Radio Frequency
IDentification) readers from RFID tags on containers, to the control
center.