Analytical method to identify the number of containers to inspect at U.S. ports to deter terrorist attacks (CORE1204)

Summary: The requirement for 100% container scanning has been a burning topic, since U.S. Department of Homeland Security issued the initiative in order to prevent terrorists from smuggling weapons of mass destructions into the U.S. The paper explores how much it is reasonable to come down from the 100% inspection rate, if deterrence and cost of retaliation are considered in the model. Deterrence means the power to dissuade an attacker from attempting to smuggle weapons as opposite to use coerce or compel.  Retaliation cost describes the cost incurred by an attacker e.g. due to dismantling the attacker’s network. It is assumed the defender discloses in advance how many containers are inspected. The paper can be viewed here: https://www.researchgate.net.

[s2If is_user_logged_in()]

Full review: The study provides an economical model based on the game theory to estimate the optimal inspection rates in order to deter perpetrators from smuggling weapons into the U.S. The model assumes the customs or Border agency aims at minimizing the expected damages and cost of inspections while perpetrators are simultaneously trying to maximize their rewards. The used parameters are number of attackers, estimated damages, the cost of inspecting a container, the cost of a smuggling attempt, the cost of retaliation and the probability of detecting weapons. Retaliation cost describes the cost incurred e.g. due to dismantling the attacker’s network.  Cost of a smuggling attempt are the costs of acquiring, developing or manufacturing the weapons, and any logistical costs required to smuggle them into the U.S.  It is assumed the government agency announces publicly the inspection level and set of retaliation policies. Retaliation policy must pose a credible threat that means the governmental agency would retaliate even if that were not economically justified.

The study has four main limitations. First, the paper does not describe under what conditions the model works well or poorly. The quality of strategic and tactical intelligence, the efficiency of criminal investigation and prosecution processes, the extent of inter-agency cooperation and information sharing, the degree of private sector involvement and successfulness of awareness campaigns on retaliation policies are probably factors that influence on the model and its parameters. Second, the study does not provide numerical estimates to the parameters such as detection rates and cost of retaliation. Third, it is very unlikely that weapons of mass destructions are transported in containers into the U.S., what makes it difficult to assess the usefulness of the model in real life cases. Forth, costs of retaliation are not calculated and published by law enforcement agencies, thus criminals cannot make decision based on financial risks.

Despite of these limitations the CORE project can adapt the game theory and benefit from the paper. Traditionally law enforcement agencies highlight the number of seizures, arrests and successful prosecutions to measure operations and their impacts. The presented model brings two interesting components, a cost of crime attempt and a cost of retaliation. If criminal activities are financed and managed based on the same principles like legal ones, expected losses due to seizures of illicit goods or drugs are very likely calculated in the criminal business models. Consequently, making criminal business unprofitable is key to stop criminal activities. The approach enables to model the dynamic between costs and rewards from viewpoints of both law enforcement and criminal actors. In the other words, the model makes possible to study two dimensions in the Innovation Agenda, societal costs and friction costs caused by implemented security measures.

Reference: Bier, Vicki M. & Haphuriwat, N. (2011). Analytical method to identify the number of containers to inspect at U.S. ports to deter terrorist attacks. Annals of Operations Research, 187(1), 137–158.

 

CORE1204

[/s2If]

Supply chain security culture: measure development and validation, 2009 (CORE1200)

Summary: Supply chain security culture (SCSC) is as an overall organizational philosophy embracing norms and values that keep employees vigilant when performing supply chain security practices. The article presents a scale that makes possible to gauge supply chain security culture and its correlation to organization’s ability to respond to unexpected disruptions. Employees are asked to assess two topics: security strategy of the company and impacts of significant supply chain breech to business operations. According the study improved supply chain security culture makes company more resilient against major disruptions. This research helps executives to justify their expenditures on security efforts. The reviewed document can be purchased here: http://dx.doi.org.

[s2If is_user_logged_in()]

Full review: Researchers have stressed the importance of having an organizational culture that highlights proactivity and vigilance toward supply chain security breaches. In security-focused supply chain management environment workers are empowered to detected and handle supply chain security threats without seeking formal permission from supervisors and managers. Company security strategy gives specific attention how SCS concepts are embedded into firm processes and procedures. Alignment with organizational culture and business or corporate-level strategies is believed to result in enhanced organizational performance. In addition, organization culture encompasses supply chain continuity management. The paper presents a scale for measuring supply chain security culture defined as the overall organizational philosophy that creates supply chain security as a priority among its employees through embracing and projecting norms and values to support secure activities and to be vigilant with security efforts.

The study makes possible to assess how implemented FP7-CORE security technologies, tools and practices influence on supply chain resilience based on the perception of company managers and employees. The article gives also guidelines how to develop survey forms and protocols in order to assess the influence of implemented security measures on other KPIs such as supply chain visibility and reliability. The survey tools based on perceived operational and organizational changes complete toolbox to measure impacts of introduced security interventions.

Reference: Zachary Williams, Nicole Ponder, Chad W. Autry, “Supply chain security culture: measure development and validation”, The International Journal of Logistics Management, Vol. 20 Iss: 2, pp.243 – 260

 

CORE1200

[/s2If]

Hold on, before blaming it on the OGAs!

It is common since many years already that the global customs community is pointing their “blaming finger” to other government agencies – OGAs – when it comes to identifying root causes behind too long cargo release times at sea ports and other border crossing points, high costs for importers and exporters to conduct international trade, and so forth. Now, without denying this as a plausible scenario, the CBRA research team proposes to take one step backwards, by first building a solid framework for analyzing and deeply understanding what is actually happening at the borders with Customs and all the other agencies, before rushing to conclusions on “who is to be blamed for poor / expensive cross-border performance…”. Therefore – for both educational purposes (FP7-CORE, work package 19.1) and for analytical purposes (Border Agency Cooperation study with the Organization of Islamic Cooperation, OIC), we have produced the following “universal border control task list” – naturally understanding that a perfect single universal list cannot exist. The list is first exploited during April-May 2016 in the OIC Embassy survey (here in Switzerland), to explore who is responsible for specific cross-border controls in various OIC member countries, and to what extent customs is performing tasks on behalf of other (border) agencies. Later, we plan to use the this as a “de-facto border agency control check-list” in our future studies, across the globe.

Again, the first step before analyzing which agencies to blame, is all about understanding what are the typical cross-border control tasks all about, considering all three task categories:

  • Border control tasks which typically cover all commodities;
  • Border control tasks which typically focus on specific commodities; and
  • Other border agency control areas.

 

Now, lets go through all three of them, starting with the first one, and followed by the other two:

Border control tasks which typically cover all commodities:

  • Calculation and collection of indirect border taxes:
    • customs duties
    • sales / value added taxes
    • excise taxes
  • Calculation and collection of other import/ transit/ export fees and taxes (e.g. environmental fee at export)
  • Compilation of trade statistics

Border control tasks which typically focus on specific commodities:

  • Control of import quota restricted products
  • Calculation and granting of export subsidies
  • Control of product safety / conformity of goods / trading standards (please separate agencies per product category, if necessary)
  • Control of food, drinks, cigarettes, pharmaceuticals (including for general health and safety purposes)
  • Control of energy related materials / products (e.g. oil and coal, could be for export taxation purposes etc.)
  • Enforcement of intellectual property rights / fight against copyright infringements / anti-counterfeit
  • Control of plant diseases, pests and extraneous species (i.e., phytosanitary controls)
  • Animal quarantine and controls (i.e. veterinary controls, including pet controls)
  • Control of any biohazards (including deliberate ones)
  • Control of CITES protected species (i.e. endangered fauna and flora)
  • Control of natural resources under license requirements, harvesting quotas etc. (including specific fish, wood, minerals, diamonds etc.)
  • Control of cultural artifacts (stolen / looted, and/or illicitly traded)
  • Control of any stolen goods (including vehicles, machinery, cargo etc.)
  • Fight against drugs / illicit narcotics trafficking (including pre-cursors)
  • Control of waste flows (including those in the Basel Convention on transboundary movements)
  • Control of dual use / strategic goods
  • Control of dangerous goods / hazardous materials
  • Control of explosives and weapons:
    • explosives (including pre-cursors)
    • small arms and light weapons
    • defense / war materials
  • Control of nuclear and radioactive materials

Other border agency control areas:

  • Conveyance / cargo transport security and safety controls:
    • for maritime, including sea ports
    • for aviation, including airports
    • other modes: road, rail, inland waterways etc.
  • Traveler, crew and immigration controls:
    • visa and passport controls
    • trafficking of human beings and people smuggling
    • asylum seekers
    • passenger cars and vehicles in terms of temporary admission
  • Control of weight of cargo (including for road safety purposes)
  • Cash controls (cash smuggling and counterfeit currency)
  • Cyber security (customs and supply chain IT systems, critical infrastructure IT etc.)

 blog-270416-2

 

Dear CBRA Blog and CBRA Monthly readers: we kindly invite your inputs to make the list more comprehensive / better in the future, so please send us an email with your ideas, to cbra@cross-border.org . And thanks already now to the multiple experts from national Customs administrations and international organizations for your valuable help so far– it has been great working with you on all these studies, keeping them as pragmatic as possible… (detailed acknowledgements will be published later). And it goes without saying that soon we will start looking on the next-step aspects on customs versus other government agencies, in the context cross-border supply chain costs and delays – please stay tuned for more!

Draft SADC guidelines for Coordinated Border Management: A Practical Guide on Best Practices and Tools for Implementation, 2011 (CORE1115)

Summary: The 15 member states of the Southern African Development Community (SADC) are looking ways to ease the transition of their regional Free Trade Area towards a more integrated Customs Union where people and cargo would cross borders without excessive delays and administrative burden. The countries expect that the smoother cross-border traffic would contribute to the economic growth in the region. Central to the integration effort is coordinated border management, i.e., closer collaboration among various border control agencies, both nationally and internationally. The SADC guidelines provides a comprehensive catalogue and description of best practices of border agency cooperation and guidance how to implement them in the Southern-African context. Besides the guidelines, the document also features a comprehensive glossary of coordinated border management vocabulary. You can download the guidelines here: http://www.sadc.int. Review by Toni Männistö (CBRA)

[s2If is_user_logged_in()]

Full review: The guideline document suggests that coordinated border management depends on three levels of coordination: 1) intra-agency coordination within boundaries of one organization, 2) inter-agency cooperation between separate border control agencies or between the agencies and associated ministries and other policy-making bodies, and 3) international cooperation among border control agencies at both sides of a border or among governments at various supranational political forums.

The guideline document discusses in detail six key areas of coordinated border management. The most fundamental of the management areas is the legal and regulatory framework that defines a necessary legal basis for inter-agency and international cooperation and exchange of information. The second key management area is the institutional framework that is about governance and organizational structures underlying border control operations and high-level decision-making. The third management area concerns the procedures for cooperation at the borders. The fourth management area focuses on human resources and training, and the fifth on exchange of data, information, and intelligence. The sixth and the last management area is about providing infrastructure and equipment that supports other areas of coordinated border management.

Reference: Southern-African Development Community, 2011. “Draft SADC guidelines for Coordinated Border Management: A Practical Guide on Best Practices and Tools for Implementation”

 

CORE1115

[/s2If]

Governmental actors in supply chains & Governmental procedures, compliance and risk management – CASSANDRA Compendium Chapters 4 & 7, 2012 (CORE2007c)

Summary: The fourth and seventh chapters of the CASSANDRA compendium elaborate on the roles of government agencies in international logistics and supply chain security (SCS). A broad range of government actors – customs, police agencies, border guards and many others – play a crucial role in enforcing and facilitating cross-border traffic through the global supply chains. These government agencies are critical stakeholders to be involved in the development, design and implementation of the two central CASSANRA concepts: the end-to-end data pipeline and the risk-based approach to cargo inspections and company audits. The CASSANDRA compendium highlights that there are important differences in the national laws and regulations, even within the European Union, that complicate international government collaboration. The differences in the legal framework and organisational cultures must be taken into account when designing new SCS solutions in the CASSANDRA and other projects. The CASSANDRA compendium is available for download: www.cassandra-project.eu. Review by Toni Männistö (CBRA)

[s2If is_user_logged_in()]

Full review: The CASSANDRA compendium describes how the role of government agencies in the cross-border supply chain operations is changing. The trading community and high-level policy-makers are strongly advocating trade facilitation, to make international commerce faster, more cost-efficient and less cumbersome. To address the demand for trade facilitation, many border control agencies are adopting risk-based approaches for controlling cross-border trade and travel. They exploit information increasingly to identify and target high-risk cross-border movements while facilitating low-risk traffic. To further lowering administrative hurdles to the cross-border trade, many government agencies are eliminating duplicative and redundant reporting requirements and building modern ICT systems to enable fast and reliable digital exchange of data and information.

Many law enforcement agencies are also facing budget cuts and increasing work loads, which forces them to look for new ways to increase productivity. Increased collaboration among border control agencies has been proposed as a solution for boosting productivity. The efforts towards further coordinated border management (CBM) are clearly manifested as joint-border control posts, regional single window systems (an online interface enabling trading companies, customs and other border control agencies to exchange trade-related information) and mutual recognition agreements (MRA) that harmonize customs and security related regulatory requirements across jurisdictions.

Reference: Hintsa, J. and Uronen, K. (Eds.) (2012), “Common assessment and analysis of risk in global supply chains “, Compendium of FP7-project CASSANDRA, Chapters 4 & 7

 

CORE2007

[/s2If]

Three calls for journal and conference papers

This CBRA Blog advertises three important calls for papers in 2016: Special Issue for Journal of Transportation Security (to be published in 2017); the 11th WCO Customs-Academia PICARD Conference (Sep.2016); and the 7th European Intelligence and Security Informatics Conference (Aug.2016).

 

1. Journal of Transportation Security, Special Issue: Enhancing supply chain security through government-to-government and government-to-business partnerships and collaboration

Journal of Transportation Security (JTRS): The 9/11 terrorist attacks and the subsequent events have compelled stakeholders to understand transport security as more than a single element of the global networks that move people and goods. Once a routine component of modern transportation, security now represents a vital necessity and an urgent national priority. The Journal of Transportation Security probes the relevant aspects of many critical areas of study, including supply chain and logistics; information technology; public policy; international business; political science; engineering; transportation; economics; and counterterrorism, among others. This journal is the first to take a global, apolitical, and in-depth multidisciplinary look at the field. The mission of the journal is to disseminate new research, thought, and analysis for teachers, researchers, policy makers and practitioners around the world who view transportation security as a critical element in the post 9/11 world.

Partnerships and collaboration play a crucial role in the fight against crime in the global supply chains. Investments in traditional security areas such as physical security, personnel security, and IT security no longer suffice. Both government and business actors should extend their security efforts beyond their organizational boundaries, by fostering relationships with each other. Further government-to-government and government-to-business collaboration has a great potential to improve security of the supply chain and regulatory compliance of the trading community, while facilitating trade and logistics for the legitimate, security aware companies. The scope of collaboration covers a broad range of activities, including sharing of information and data; investing in common resource pools and sharing resources; and agreeing on optimum protocols for conducting inspections and audits in the supply chains. Enhancing the information exchange, for example, would help governments and companies to prevent and detect security breaches in supply chains and to recover faster once the breaches happen. In principle, both government and business actors share a common goal of mitigating crime in the global supply chains. Priorities and procedures, however, differ markedly between various business actors (e.g., shippers, carriers, freight forwarders) and government agencies (e.g., customs, police and transport security authorities).

Call for abstracts for the JTRS Special issue is open until 30 September 2016, please visit: www.springer.com …   

(CBRA / Dr. Juha Hintsa is the lead guest editor for this special issue; and abstract review panel consists of multiple experts in FP7-CORE project).

 

 

2. The 11th Annual WCO Picard Conference – Manila, Philippines – 27-29 September 2016

The World Customs Organization and the Philippine Bureau of Customs are pleased to announce the 11th annual WCO Picard Conference. You are invited to submit your research for presentation at the conference. Papers should focus on Customs or, more globally, the regulation, dynamics, and practices of international trade. Although not required, writers could consider submitting research on the following topics: Digital Customs; security; taxation and other revenue matters; and illicit trade.

blog2104162

 

 

Call for papers is open until 15 June 2016, please visit: www.wcoomd.org…

(CBRA / Dr. Juha Hintsa is part of the Scientific Board for the conference; and he also belongs to the PICARD Advisory Group).

 

 

 

3. The 7th European Intelligence and Security Informatics Conference (EISIC) – Uppsala, Sweden – 17-19 August 2016

Intelligence and Security Informatics (ISI) research is an interdisciplinary field of research that focuses on the development, use, and evaluation of advanced information technologies, including methodologies, models and algorithms, systems, and tools, for local, national and international security related applications. Over the past decade, the ISI research community has matured and delivered an impressive array of research results that are both technically innovative and practically relevant. The 2016 European ISI Conference is the seventh ISI conference to be organized by the European ISI community. The conference was first held in 2008 and has been organized annually since 2011.

blog2104163

 

Call for papers is open until 18 May 2016, please visit: http://www.eisic.eu/call.aspx

(CBRA / Dr. Toni Männistö delivers a keynote presentation on FP7-CORE, focusing on Supply chain security education and training (CORE WP19.1) ).

Mr. Chris Thibedeau and the Barbados ESW

CBRA Interview with Mr. Chris Thibedeau, on the Barbados Single Window

Hi Chris, and thanks for agreeing to join CBRA Interview. Can you first tell a bit about yourself, your background, where you work and so forth?

Sure thing.  For those that don’t know me, I’m an ex Customs official and a mediocre hockey player from Canada.  I worked at Canada Customs for about 17 years.  In 2006, I joined a firm called GreenLine Systems as a Vice President and went to work on contract as a resident subject matter expert for US Customs and Border Protection in their Office of Anti-Terrorism. In Canada I was awarded a Government of Canada Technology Award gold medal and the Canadian Public Service Award of Excellence for leading the design and development teams responsible for the TITAN automated risk assessment system.

I am a co-author – along with you, Juha, and other colleagues – of the World Customs Organization’s Customs Risk Management Study, the Inter-American Development Bank’s Knowledge and Capacity Product on Risk Management of Cargo and Passengers, and the WCO’s “Global Container Security and Identification of High Risk Indicators” that served as a core input to the General High Risk Indicator document.

GreenLine was acquired by A-TS in 2013 and then PAE in 2015. Over the last 10 years, I’ve been responsible for leading the development and providing guidance to internal and external clients and stakeholders for solutions that provide a customized risk management solution to support screening and facilitation of cargo, passengers, and conveyances. I also just completed my Master’s degree in International Customs Administration from the Charles Sturt University in Australia.

It’s great to be here Juha and nice to see you again!

Thanks Chris for the comprehensive background notes, and great to see you too again, since quite some while! In 2015, the Barbados Government initiated an Electronic Single Window project sponsored and funded by the InterAmerican Development Bank. Can you provide an overview of this project?

The Barbados Government recently initiated a major project to modernize Barbados with an Electronic Single Window, or, ESW.  Sponsored and funded by the InterAmerican Development Bank, the ESW initiative intends to optimize the management of trade facilitation and border security through the use of new border management technologies to be developed by my firm, A-T Solutions and its partner, a Canadian-based commodity classification specialist, 3CE Technologies. The ESW intends to provide a Single interface for the exchange of trade-related documents between the trading community, customs, and other government agencies with a stake hold in border processing.  The ESW will also provide a public one stop user-friendly repository for comprehensive tariff and regulatory trade information, government advisories, and training materials.

Ultimately, the ESW project intends to reduce business costs involved in the movement of goods for export and import, international trade, particularly to maximize the efficiency of Customs and trading processes and improve integration with related agencies that involve legal and business partners in the trading community.

Our ESW seeks to establish an integrated solution for commercial trade processing that addresses both the needs of the Barbados Customs mandate and those of 30 other government agencies, OGAs.  It is believed that this initiative will expand the number of OGA programs that interact with Customs commercial processing and deliver a more advanced electronic approach to the collection, consolidation and dissemination of commercial trade data for both the trade community and regulating programs.

Which other government agencies, OGAs – next to Customs – will benefit from the ESW?

At this stage we are working directly with 30 OGAs, including, but not limited to, the following ones: Ministry of Agriculture – Animal Health, Food Safety, Plant Health; Barbados Defense Force; Barbados Drug Service; Barbados Licensing Authority; Barbados Investment and Development Corporation; Barbados Police Service; Barbados Port Incorporated; Barbados Postal Service; Barbados Revenue Authority; Department of Commerce And Consumer Affairs; Department of Corporate Affairs and Intellectual Property Office; Ministry of Finance; Data Processing Department; Department of Economic Affairs – Research and Planning Unit; Immigration Department; Ministry of Health; Port Authority; and, Statistical Service.

We ‘ve learned that some OGA mandates add an additional layer of operational complexity for risk based border management methodologies.  In one example, the Ministry of Health in Barbados, MoH, requires a 100% visual or physical inspection for all their regulated commodities. The MoH does not have access to the ASYCUDA – the system developed by the United Nations Conference on Trade and Development, or, UNCTAD, used to record declarations – and therefore the Ministry doesn’t have visibility for what will be arriving until they receive a notification from the consignee or importer, usually done by fax. They also lack access to a historical repository of enforcement data in order to analyze and develop recurring profiles that could be used as a risk management resource. In this sense, the ESW project can help the MoH by giving them access to earlier and updated information of the cargo data when initially reported to begin the decision making process under their protection mandate. interview 07.04.2016

In many cases, our ESW is providing visibility into border processing that the OGAs never had in the past.  The ESW does not intend to replicate information that is already collected by the ASYCUDA. However, ESW can monitor controlled goods that enter and leave the country for permit and control purposes.

The ESW can also give an OGA a regular count of “License, Permit, Certificate, Other document”, LPCOs, by commodity or goods within identified periods of time.  We essentially are providing the core OGA/LPCO management capability where ASYCUDA does not – in other words, we are closing this gap.  However, this is not a knock at ASYCUDA.  ASYCUDA is a great system for declaration processing and accounting, but it was never designed to do all things.  ESW functions are really not part of its true capability.  This project is a great example of how ASYCUDA can work hand in hand with a parallel and complimentary system. Here’s an analogy to consider:  I see ASYCUDA as an iPhone.  We are a vendor building apps for that iPhone where the app adds large value for developing and modernizing nations.  I believe this is a framework for modernization that should be fostered internationally and replicated.  I would like to see UNCTAD agree and endorse this type of approach and methodology.  It’s time for all of us to collaborate and offer larger value.

Interesting! What do you consider as the most important lessons learned from the Barbados ESW-case, so far?

Well, there are a few I might highlight that I personally think are important:

First, in principle, information visibility for Customs and OGAs is important in order to efficiently apply risk management techniques, reduce release times, and improve physical inspections. OGAs should have access to the declarations made through ASYCUDA in order to find specific threats and create Risk Assessment modules according to the protection mandate of an institution.

Second, there should be greater coherence between different IT systems. ASYCUDA, the ESW and other IT systems of Barbados should work together without any task redundancy.  This is where the time savings are found associated with the release of goods. I can’t underestimate how important change management and business transformation is on a project of this nature.  I still struggle with this in my own company trying to convince others how important this is.  We’ve made sure to include Change Management and Business Transformation Architects on our delivery team in this instance and it has paid off in dividends.  Our Barbadian clients praise this approach.

Third, I’d certainly recommend that OGAs use a common risk assessment decision support system.  This will guide OGAs through a data exploitation framework using risk-based principles tailored to their mandate and mission.  In Barbados, Customs actually has access to an Automated Risk Management System.  I seriously think they should consider sharing access with the OGAs.  By distributing access to the other OGAs, each agency would have full visibility into all declaration filings, and an ability to scan this information and seek out inspections that could be in violation of their controls or mandate.  If this access can be provided, I see this as the greatest single step forward to having OGAs endorse and adopt risk based decisions at the border.  This would help lead to interoperability with Customs.  Until that happens, we will continue to see conflicting mandates where one agency endorses risk management and the other endorses risk aversion.  That’s a real problem.

And fourth, I’d also recommend that when two or more inspections must be done, the inspections should be executed at the same time and location with both Customs and OGAs present. This will reduce redundancy and unnecessary cost for the trade community.

Thanks Chris for sharing these insights! Any final comment or greetings you would like to send to CBRA Interview readers?

Yes, one important thing to take away.  There have been many time release studies that have taken place over the years in this region and in Barbados.  Current release times sit at approximately eight days for import and export.  Now think about that: eight days to import your goods into the country!  I believe this timeline is unacceptable in any modern nation or a country that seeks to endorse trade facilitation. Our ESW solution will ideally eliminate many of the redundant tasks that exist today and improve on the time release of import and export shipments significantly and extensively.

Here is an example: Today, an importer or their broker has to file an electronic declaration in ASYCUDA.  If the goods are controlled, commonly done for example with meat products, then the importer or the broker has to travel across Bridgetown to the Department of Agriculture and Veterinary Services to apply and pay for a paper permit.  Once approved and obtained, they then have to travel back to Customs, and submit the paper permit along with a paper copy of their declaration as a release package.  Once duties and taxes are paid, the customs officer stamps up the release and re-releases the shipment in ASYCUDA.  A paper delivery authority is provided.  The importer makes arrangements to pull their container or shipment out of the terminal or sufferance warehouse and provides the delivery authority to the terminal operator or warehouse keeper.  Only then can the goods enter the economy.
interview 07.04.2016

If you can appreciate how long that might take – that is currently eight days on average – think about what happens when you have other controlled goods in your shipment, requiring additional visits to OGAS, and possible offload inspections at the port or inland.  It’s no wonder the release time sits at around eight days!  I have a strong belief this is where all the time savings are.  We are automating much of this process in the ESW and will reduce the redundancy of tasks and visits to Customs and OGAs.

The solution to an ESW is in the workflow and approval process.  It’s not about scanning paper permits to attach to a declaration.  The solution is about interoperability.  I’m excited about this.  Just think about reducing a release time from eight days to a number of hours.  That will be quite the story to tell!

Great! Let’s be soon in touch about writing a joint journal paper on this highly topical project. Thanks Chris for the interview, Juha.

We should!  It’s an important topic for the community of WCO and WTO members, donor agencies etc.  Talk soon.

 

Transit electronic platform in Central America, December 2010 (CORE2013a and 2013b)

Summary: The Inter-American Development Bank (IDB) reports that more than 95% of commercial goods in the Mesoamerican region are transported overland using the Pacific Corridor. This traffic represents approximately 6 billion USD worth of goods on a highway which runs from Puebla, Mexico to Panama and crosses six national borders. The problem with the Pacific Corridor is with unreliable, inefficient and substandard infrastructure. In 2008, to upgrade the inadequate infrastructure, the IDB launched a ambitious project called International Goods in Transit. According to the report, the results of the project were outstanding: average time to cross a border was reduced from 62 minutes to eight. The project also succeeded to reduce the number of documents that traders needed to submit to border control agencies.  The two reviewed files are available for download at: Interoperability at the Border: Coordinated Border Management Best Practices & Case Studies and Automating the Control of Goods in International Transit: Implementing the TIM in Central America.

[s2If is_user_logged_in()]

Full review: The solution, that the International Goods in Transit project produced, is basically an electronic system for managing and controlling the movement of goods in transit. The system builds on three main pillars that unlock better services at border crossing:

  1. Process reengineering: the system harmonizes multiple paper-based declarations into an electronic document. This digital file stores all data that customs, migration, and phytosanitary agencies need.
  2. Information technology: the project created a new intranet system that features state- of-the-art risk analysis and cargo control systems.
  3. Cooperation: the project promoted cooperation within the country and between the different agencies operating at border crossings in the Mesoamerican Region.

Important lessons learned from the project include the following:

  • Political support for harmonizing regulations and processes is critical. Real and full commitment from the highest authorities in every participating country contributes to a cooperative environment based on mutual trust. In the case of this project, the IDB supported the decision of governments to include the project as one of the priorities highlighted in the Joint Declaration of Chiefs of State at the Presidential Summit of Tuxtla in 2008. The choice of the project coordinator is also critical for the success of the project. The coordinator must have good relationships with top government officials and have the support of the participating countries, and naturally of the IDB.
  • The project involved large number of stakeholders that have their unique characteristics and interests and operate within their legal remits. The IDB project was designed in a way that changes in national laws and regulations were not necessary.
  • All relevant agencies should participate in the coordination and harmonization process.
  • Information technology should be flexible and open to modifications.

CORE2013a

CORE2013b

[/s2If]

Interview with Dr. Vittoria Luda di Cortemiglia

CBRA Interview with Dr. Vittoria Luda di Cortemiglia, Program Coordinator with the Emerging Crimes Unit at the United Nations Interregional Crime and Justice Research Institute, UNICRI, Torino, Italy.

Hi Vittoria, and thanks for joining a CBRA Interview – can you first tell a bit who are you and what you do?

I am the Programme Coordinator of the UNICRI Emerging Crimes Unit. Since joined the U.N. in 2001, I have been in charge of the coordination of a number of applied-research programmes in the field of illicit trafficking and emerging crimes, including environmental crimes, cybercrimes, counterfeiting, and organized crime in general.  I am UNICRI Focal Point for Strategic Approach to International Chemicals Management, SAICM, as well as UNICRI Focal Point within the UN Inter-Agency Coordination Group on Human Trafficking, ICAT.

Can you explain us bit more about UNICRI, including the governance model and the research areas?

UNICRI is a United Nations entity created by the Economic and Social Council of the United Nations, ECOSOC, in 1967 to assist Intergovernmental, Governmental and Non-Governmental Organizations in formulating and implementing improved policies in the field of criminal justice. The Institute is part of the United Nations Crime Prevention and Criminal Justice Program, which report annually through the UN Commission on Crime Prevention and Criminal Justice, CCPCJ, to the ECOSOC.

UNICRI is involved in research projects and capacity building activities in a broad number of areas, ranging from environmental crimes; human trafficking; trafficking in goods and products – including precious metals, pesticides, counterfeiting as well as chemicals, biological, radiological and nuclear risks; terrorism and foreign fighters; hate crimes and hate speech; cyber-security; urban security; violence against women; and, maritime piracy.

UNICRI, CBRA and other partners have just finished a 2-year FP7-project called CWIT, focusing on identifying and quantifying criminal and non-compliance problems and proposing solutions against illicit trade and logistics in electronic waste materials. What was the biggest thing you learned during the project, and which of our recommendations you find as most important when moving to the future?

The CWIT project has been a great experience from a personal as well as professional point of view, as gave me the possibility to work side by side with a number of wonderful professionals from the WEEE industry, enforcement agencies, international organisations, lawyers, academia and consultants specialised in supply chain security.

The objectives of the project were quite ambitious, as CWIT aimed at identifying the policy, regulatory, procedural and technical gaps as observed in today’s business environment, and at suggesting tangible improvements. The CWIT team produced set of recommendations to support the European Commission, law enforcement authorities and industry practitioners in countering the illegal trade of WEEE in and from Europe.

With regards to the recommendations which I consider particularly important are the ones related to the necessity of establishing robust and uniform legal framework and relevant implementation. As mentioned in the final CWIT report, without a clear and comprehensive legislative base, enforcers and prosecutors are powerless to address illegal WEEE flows. At the very minimum, a clear and global definition of what constitutes WEEE is the basis for improving detection, inspection, and enforcement and sentencing rates related to illegal WEEE trade.

In parallel, harmonisation and enhancement of penalty system is needed to increase the effectiveness of the existing legal framework.  In fact, penalties for the illegal trade in e-waste vary greatly in terms of monetary fines and prison durations. Today, the participation in WEEE illegal activities does not appear risky to offenders due to the low probability of being prosecuted and sentenced. Even when successfully prosecuted, penalties foreseen in legislation and penalties applied in court decisions are typically very low. For these reasons, it is important to also enhance prosecuting and sentencing, so that WEEE trade and environmental crimes in general are not considered a low- priority/low sentenced area.

UNICRI kindly invited CBRA to Torino last October to join a 2-day workshop on “Illicit Pesticides, Organized Crime and Supply Chain Integrity”. Can you elaborate on this emerging supply chain crime area, including about the estimated size and the negative socio-economic consequences of the problem?

Illicit pesticides cover a wide variety of products, including obsolete pesticides, unauthorized imports, counterfeit or fake pesticides; re- or up-labelled pesticides and refilled containers. Estimates of the illicit pesticides penetration of the legal market range from 10 to 25% – both in the EU and at international level-, representing several billion annually (USD 6-10 billion at global level and USD 1.1 billion at European level).

Besides the evident risks for human safety and health and environmental risks, illicit pesticides also pose serious threats to the economies and security. The agricultural market is extremely important for a large number of countries and companies and might be jeopardize by the introduction of illicit pesticides which can deeply affect the local and national economies. The economic losses have multiple sources and victims and long-term consequences, in particular possible loss of harvest/crop, soil and water contamination affecting the cultivable lands, decrease in innovation, reputation challenges with a decrease of exports, etc. The penetration of the pesticides market by criminal actors, including organised crime groups attracted by high profits and low risk of detection, prosecution and sentencing is another worrying trend.

Do you foresee opportunities for future research projects in the field of illicit pesticides?

Many national and international actors are becoming more and more aware of the threats posed by illicit pesticides to the legal supply chain. The attention and awareness of the problem is increasing at international level. In particular, the World Customs Organisation and the Organisation for Economic Co-operation and Development are becoming increasingly active in the field and it would be interesting to establish joint actions so as to raise awareness, capacities and response to secure the legal supply chain of such products. Indeed, through this research, we realised that the issue of illicit pesticide is neither well acknowledged nor well-documented. Our study is one of the first detailing the mechanisms and trends in the trafficking of illicit pesticides, the involvement of criminal actors, networks and organised crime groups and related criminal activities, as well as identifying the risks for the supply chain and pesticide markets.

UNICRI is very interested in continue working with partners, including CBRA, on this issue. The report details a number of initiatives which UNICRI stands ready to launch supporting countries in addressing the challenges of illicit pesticides, in particular research, raising stakeholders’ awareness, training and technical assistance programmes, supporting in capacity building activities and reinforcing national and international cooperation.

Thanks Vittoria for this interview – and we are of course more than willing to join a project-team on this highly important illicit pesticides trade and supply chains -topic

FP7-CORE Education – Two new diagrams

Today’s CBRA Blog presents two new diagrams which have been recently designed and developed in the context of FP7-CORE Education and training work (Work package 19.1). The information visualized in the diagram is based on CBRA’s supply chain security research work since year 2001, particularly from the past 5-6 years.

Some background information on the first diagram of crime types in global supply chains has been presented before for example in CBRA’s Blog of 13 October 2014 – Crime taxonomies from Athens. In the center of this diagram we list the crime types – including document fraud and cybercrime – which in the supply chain criminal context are performed in order to succeed with the actual economic or ideological crime, e.g. cargo theft or terrorism.

The left area of the circle lists four examples of crime types, which typically are of primary concern for supply chain companies: cargo theft, sabotage, parallel trade and product specification fraud. With such crime types it is commonly up to the companies to prevent, to detect and to react – of course, law enforcement agencies can be called for any time there is reasonable suspicion of such activities (and naturally in certain cases the government agencies may even be the first ones to detect and react, e.g. in case of armed robberies and truck hijackings).

The right area of the circle deals with supply chain incidents where the authorities typically focus on prevention, detection and reaction: fraud in indirect border taxes; trafficking / violations in cross-border restrictions and prohibitions; human trafficking; and exploitation of illicit labor. From supply chain perspective one can characterize them as “a priori non-disruptive illegal activities – only if / after authorities detect the violations, the supply chain is disrupted and the involved supply chain companies can get in trouble”.

Lastly, on the bottom area of the circle, we list four supply chain crime areas where the prevention typically is in strong interest of both supply chain companies and governmental agencies – and, the detection and (instant) reaction varies on case-by-case basis: counterfeiting, sales channel violations, sea piracy and terrorism. Counterfeiting hits revenues on both sides of the equation, and, with many products can also be health damaging or even lethal. Not having proper sales licenses, and/or selling to unauthorized buyers – for example cigarettes and alcohol, dual use and strategic goods etc. – can again harm both the involved companies and the society as a whole. And of course, sea pirates hijacking cargo ships; bombs exploding and bringing planes down; and terrorists attacking critical supply chain infrastructures, all are in the best interest of both companies and government agencies to prevent, to detect, and to react – in the fastest and most effective possible manner.

blog10.03.161

The second new educational diagram below depicts the negative socio-economic impact areas – six in total – caused by twelve typical smuggling and trafficking activities. The data behind it has been presented before e.g. in CBRA’s Blog of 14 January 2015 – Socio-economic damages. Inside the square we present the six societal impact areas – the larger the area, the more links there are between the trafficking activities and the negative impacts. As an example of a “big area”, seven different types of trafficking typically lead into increasing market place distortions and/or unfair competition. In the other extreme, only trafficking in stolen cultural products leads to losses in cultural heritage.

blog10.03.162

That’s all for the CBRA Blog today – please let us know if you see this type of visualization as beneficial when teaching and learning about the big picture of supply chain security!  Thanks, Juha Hintsa ( email: cbra@cross-border.org )