AVIATION SECURITY – Federal Efforts to Secure U.S.-Bound Air Cargo Are in the Early Stages and Could Be Strengthened, GAO, April 2007 (CORE1008)

Summary: This GAO reports reviews the current state and future challenges of the Transportation Security Administration’s (TSA) and the Customs and Border Protection’s (CBP) efforts for enhanced security of foreign origin US-bound air cargo. The report also discusses how the Department of Homeland Security (DHS) has reached out to the air cargo industry and foreign authorities in order to strengthen the international air cargo security. The GAO report recommends that the DHS would establish a risk-based air cargo security strategy, improve interagency communication nationally, to step up compliance monitoring for the air cargo industry’s stakeholders and to assess the foreign authorities’ intent and capabilities to meet US expectations on the air cargo security that is the foundation for mutual recognition and international harmonization of regulatory frameworks on the air cargo security. This GAO report is going to be useful for the CORE risk and education cluster as well as for all the demonstrations that involve shipping of air cargo by air. The report is available at http://www.gao.gov/assets/600/590789.pdf.

[s2If is_user_logged_in()]

Full review: This GAO report provides a comprehensive picture of the air cargo security in the US, in a country that is no doubt the leading force in supply chain security in general, and in air cargo security in particular. All CORE work that is related to air transport might benefit from the insights and information this GAO report offers. The DHL demonstration, that involves transport of parts for military aircraft from the US to Spain, is the most obvious work detail in CORE that can directly benefit from this GAO report. In addition, the CORE’s risk cluster can use the description of the US approach to risk-based air cargo security as a starting point when designing the CORE-specific risk-based strategies. Given that the report is very detailed and informative, the CORE’s education cluster can benefit from the report’s analysis and learn from its conclusions.

Cross-references:

  • GAO, Aviation Security: Federal Coordination for Responding to In-flight Security Threats Has Matured, but Procedures Can Be Strengthened, (Washington, D.C.: July 31, 2007).
  • GAO, Aviation Security: Transportation Security Administration May Face Resource and other Challenges in Developing a System to Screen All Cargo Transported on Passenger Aircraft
  • GAO, Aviation Security: Federal Efforts to Secure U.S.-Bound Air Cargo Are in the Early Stages and Could Be Strengthened, GAO-07-660 (Washington, D.C.: April 2007).
  • GAO, Aviation Security: Progress Made in Systematic Planning to Guide Key Investment Decisions, but More Work Remains, GAO-07-448T (Washington, D.C.: February 13, 2007).

Additional keywords: Air cargo security, mutual recognition, regulatory harmonization, screening, advance cargo information, and counterterrorism

CORE1008

[/s2If]

Border Agency Cooperation, Part 3 of 3

The last blog in our three-part series on Border Agency Cooperation introduces a conceptual framework capturing the essential dimensions of Border Agency Coordination: three levels of collaboration, four areas of integration and four objects for sharing. We hope that the framework helps the customs and other border agency communities to see all levels of Border Agency Cooperation (BAC) so that they can move from isolated coexistence towards more active cooperation at the borders. Higher levels of cooperation are likely to translate into higher levels of trade facilitation, control over cross-border cargo flows and resource efficiency, simultaneously. Compared with the previous BAC Blog Part 2, this BAC Blog Part 3 intends to present a comprehensive framework surrounding BAC ambitions, plans, implementations and monitoring activities – while the previous BAC Bloc 2 focused purely on a set of 15 key BAC actions, grouped according to the main beneficiary groups. This final BAC Blog has been written by Dr. Toni Männistö of CBRA.

Let’s start by first presenting the BAC diagram: Conceptual framework on Border Agency Cooperation (source: Männistö, T., and Hintsa J., 2015; inspired by Polner, 2011 and by Institute of Policy Studies, 2008)

blog-200516-1

Levels of cooperation

Intra-agency cooperation is about aligning goals and work within one organization, either horizontally between departments or vertically between headquarters and local branches, in particular border-crossing offices / stations. Ways to foster horizontal intra-agency cooperation include development of intranet networks, cross-training, inter-departmental rotation of staff, and establishment of joint task forces that tackle multifaceted challenges like transnational terrorism. Ideally, the vertical cooperation would be bi-directional: headquarters would define priorities and objectives and then communicate them to local branches. The branches would, reciprocally, send back status reports and suggest improvements to the general policies. Solving intra-agency cooperation lays a basis for broader cooperation: it’s hard for any organization to cooperate efficiently with external stakeholders if it struggles with internal problems. The logical first step in coordinated border management is therefore breaking departmental silos and building a culture of cooperation within boundaries of one organization.

Inter-agency cooperation, at the operational level, concerns relationships among a broad range of border agencies that play a role in controlling cross-border trade and travel. In many countries, primary agencies present at the borders include customs, border guards, immigration authorities and transport security agencies. However, also police organizations, health authorities, and phytosanitary and veterinary controllers, among others, take part in border management. According to a recent study, typical areas of customs- border guard inter-agency cooperation can include strategic planning, communication and information exchange, coordination of workflow of border crossing points, risk analysis, criminal investigations, joint operations, control outside border control points, mobile units, contingency/emergency, infrastructure and equipment sharing, and training and human resource management (CSD, 2011). Governmental inter-agency cooperation occurs between border control agencies and ministries and policy making bodies that are responsible for oversight and financing of border management activities.

International cooperation may take place locally at both sides of a border. One Stop Border Posts, OSBPs – border crossings managed jointly by two neighboring countries – are prime examples of such cooperation. One Stop Border Posts can involve various forms of collaboration: harmonization of documentation, shared maintenance of the infrastructure, joint or mutually recognized controls, exchange of data and information and common investments in infrastructure and so forth. Operational arrangements between the Norwegian, Finnish and Swedish customs illustrate advanced international cross-border cooperation that save time and money of border control authorities and trading companies. The cooperation builds on division of labor, where the national border authorities of each country are allowed to provide services and exercise legal powers of their home country and neighboring countries. For instance, when goods are exported from Norway, all paperwork related to both exports and imports may be attended by either Swedish, Finnish or Norwegian customs office (Norwegian Customs, 2011). At the political level, this requires international cooperation between authorities and policy makers in two or more countries. Operational cooperation (e.g., mutual recognition of controls or regional Single Window), often bringing tangible trade facilitation benefits, usually follows from political, supranational decisions (e.g., the WCO’s Revised Kyoto Convention and SAFE Framework of Standards).

Areas of integration

Technical integration often entails improving connectivity and interoperability of information and communication technology systems within and across organizations. Single Window solutions are typical outcomes of technical cooperation as they enable automatic exchange of electronic trade information among border control agencies. The UN Centre for Trade Facilitation and Electronic Business, UN/CEFACT, is an important international organization helping to build connectivity across countries and between business and governmental stakeholders. UN/CEFACT, for instance, develops and maintains globally recognized standards for EDI messages.

Operational integration is largely about coordination of inspection and auditing activities among border control agencies. Benefits of synchronized activities are evident: organizing necessary controls at one place and at the same time reduces delays and administrative burden that trading companies and travelers face at borders. A simple and powerful example of operational integration is coordination of opening hours and days of customs offices at the both sides of a border. Operational integration also covers provision of mutual administrative assistance, joint criminal investigations and prosecution, and sharing of customs intelligence and other information.

Legislative integration seeks to remove legal barriers and ambiguities that prevent border control agencies from exchanging information, sharing responsibilities or otherwise deepening their cooperation. Essentially, most forms of Border Agency Coordination require some degree of legislative harmonization and political commitment. For example, Article 8 of the WTO/TFA to the WTO Members requires that national authorities and agencies responsible for border controls and dealing with the importation, exportation and transit of goods must cooperate with one another and coordinate their activities in order to facilitate trade.

Institutional integration is about restructuring roles and responsibilities of border controls agencies. An example of a major restructuring is the annexing of US border control agencies – including the US Customs and Border Protection, Transportation Security Administration and Coast Guard – into the Department of Homeland Security, DHS, a body that took over the key governmental functions involved in the US non-military counter-terrorism efforts in the aftermaths of the September 11th, 2001, terrorist attacks.

Objects of sharing

Sharing of information – data, knowledge and intelligence – reduce duplicate work (e.g., sharing of audit findings), enable operational coordination (e.g., synchronized border controls) and facilitate development of common agenda for future border agency coordination. At the global level, the WCO’s Customs Enforcement Network CEN is an example of a trusted communication system for exchanging information and intelligence, especially seizure records, between customs officials worldwide. Another WCO initiative, the Globally Networked Customs, analyzes potential to further “rationalize, harmonize and standardize the secure and efficient exchange of information between WCO Members” (WCO 2015).

Resource sharing involves multi-agency joint investments in equipment, facilities, IT systems, databases, expertise and other common resources. The joint investment activities are likely to result in higher resource utilization and bulk purchasing discounts. For example, national and regional Single Window solutions are often outcomes of joint development and investment activities of various government agencies.

Sharing of work is mostly about rationalization of overlapping border control activities, controls and formalities. If two border control agencies, for instance, agree to recognize each other’s controls, there is no need to control the same goods more than once. Combining forces to investigate and prosecute crime also often help border control agencies to use their limited resources more efficiently.

Sharing of responsibilities is about coordinating and streamlining administrative and control tasks among border control agencies. Norway, again, sets a good example of sharing the responsibilities. The Norwegian customs represents all other border control agencies – except the veterinary office – at the frontier. Customs officers are responsible for routine border formalities, and they summon representatives of other border control agencies as and when the officers need assistance. Internationally, the Norwegian customs cooperates closely with Swedish and Finnish border control authorities at the Northern Scandinavian border posts. Bilateral agreements between its neighbors allow Norwegian customs officers authority to perform most customs checks and formalities for and on behalf of their Swedish and Finnish colleagues. The coordination decreases border-crossing times and lowers administrative costs for trading companies and the border control agencies in the three countries.

This concludes now our three-part series on Border Agency Cooperation. In Part 1, we shared an illustrative worst case example on how complex, slow and expensive a cross-border supply chain execution comes when no cooperation takes place between relevant government agencies, neither nationally nor internationally. In Part 2, we presented a conceptual BAC model with 15 key actions to improve the degree of cooperation in a given country or region – for the direct benefit of supply chain companies, or government agencies, or both. And in this Part 3, we finally presented our comprehensive BAC framework, which hopefully helps government policy makers and border agencies to design, implement and monitor their future BAC programs and initiatives in an effective and transparent manner. Toni Männistö and Juha Hintsa.

Bibliography:

Center for the Study of Democracy (CSD), 2011. “Better Management of EU Borders through Cooperation”, Study to Identify Best Practices on the Cooperation Between Border Guards and Customs Administrations Working at the External Borders of the EU.

Institute of Policy Studies 2008, Better connected services for Kiwis: a discussion document for managers and front-line staff on better joining up the horizontal and vertical, Institute of Policy Studies, Wellington, NZ.

Männistö, T., and Hintsa J., “Theory of Border Agency Cooperation”, CBRA working paper 2015, Lausanne, Switzerland.

Norwegian Customs, 2011. Case Study on Border Agency Cooperation Submitted by Norway for the November Symposium.

Polner, M. (2011). Coordinated border management: from theory to practice. World Customs Journal, 5(2), 49-61.

United Nations Conference on Trade and Development (UNCTAD), 2011 Border Agency Coordination”, UNCTAD Trust Fund for Trade Facilitation Negotiations Technical Note No. 14.

TRANSPORTATION SECURITY – Action Needed to Strengthen TSA’s Security Threat Assessment Process, GAO, 2013 (CORE1015)

Summary: The GAO report is about measuring the performance of the Adjudication Centre that is a department within the Transportation Security Administration (TSA) responsible for administering background checks for people who need access to secure facilities unescorted. The centre issues the access credentials based on a through vetting of the applicant’s criminal history, immigration status, and connections to terrorist groups, among other checks. The report argues that the Adjunction Centre could improve the efficiency of the background checks – the individual security threat assessment – by improving its performance measurement system through better data and indicators. Although this GAO report focuses on a rather narrow topic, management of the background checking process, the report’s insights could benefit the CORE’s risk management cluster and those demonstrations that deal with access control matters. The report is available at: http://gao.gov/assets/660/656051.pdf

[s2If is_user_logged_in()]

Full review: This GAO document is closely related to the work the CORE’s risk cluster. The report describes problems the TSA’s Adjudication Centre faces when it manages the background checking process of the US-based transportation worker identification credentials (TWIC), hazardous materials endorsements (HME) and Aviation Worker (AV) authorization programs. Moreover, since access control is a central security solution in nearly all CORE demonstrators, the demonstrations might benefit from tips and guidance this report offers. At the final stages of the project, this GAO report might prove a useful document when the project consortium produces training materials on how to manage access control systems and how to administer background checks.

Cross-references:

  • Port Risk Management: Additional Federal Guidance Would Aid Ports in Disaster Planning and Recovery. GAO-07-412. Washington, D.C.: March 28, 2007.
  • Critical Infrastructure Protection: An Implementation Strategy Could Advance DHS’s Coordination of Resilience Efforts across Ports and Other Infrastructure. GAO-13-11. Washington, D.C.: October 25, 2012.

CORE1015

Additional keywords: Terrorism, background checks

[/s2If]

Border Posts, Checkpoints, and Intra-African Trade: Challenges and Solutions. Barka, H., B., 2012 (CORE2009)

Summary

Pan-African economic integration has progressed over past years, producing a broad range of regional trade agreements and economic communities that seek to harmonise policies, develop common infrastructure and remove barriers to intra-African trade. Against expectations, however, this increased integration has not translated into strong economic growth in Africa. This article discusses how sub-Saharan countries can overcome trade barriers that undermine the African economic integration. The article’s focus is on border posts and customs procedures that play a key role in facilitating cross-border traffic.

According to the article, the problems of international trade in Africa are largely explained by inadequate infrastructure that creates congestion and limits connectivity, delays that stem from complex and manual customs procedures, corruption and by illicit trade. One-stop-border-posts are a promising approach to streamline customs procedures and curb corruption. The joint border post may bring trade facilitation benefits as significant as costly investments on roads, ports, bridges and other transport infrastructure. The articles highlights the Chirundu One-Stop Border Post between Zambia and Zimbabwe as a successful case of border agency cooperation. Previous Observatory review (CORE2008, 20 January 2016) describes the Chirundu border crossing in more detail.

The paper concludes by suggesting One-Stop-Border-Post as a promising way towards higher trade facilitation and African integration. To organise one-stop-border-post, the first thing to do is to analyse roles and procedures of different border control agencies. The task of high-level governance is to define how responsibilities across the various border control agencies are harmonised, coordinated and delegated. Metrics and statistics should underpin the design, as numerical data into traffic flows and clearance times are likely to reveal the major bottlenecks in the cross-border traffic. Finally, the article proposes extended exchange of information and data across government agencies, domestically and internationally. The article is available at http://www.afdb.org/fileadmin/uploads/afdb/Documents/Publications/INTRA%20AFRICAN%20TRADE_INTRA%20AFRICAN%20TRADE.pdf

Review by Toni Männistö (CBRA)

[s2If is_user_logged_in()]

Full review

The discussion on one-stop-border-posts in the African context is closely related to the CORE project and its many work packages. Especially the WP12, the demonstrator Schipol, that deals with imports of fresh cut flowers from Kenya to the Netherlands, benefits from the insights into African bureaucratic practices at many African borders. The demonstrator should consider the set of recommendations for higher border agency cooperation that the article proposes. Besides the demonstrators, the article provides a concise and informative outlook on international in Africa. At least CORE’s WP19, should consider the African perspective on cross-border trade when developing training material.

Reference

Barka, H., B., 2012. Border Posts, Checkpoints, and Intra-African Trade: Challenges and Solutions. African Development Bank

CORE2009

[/s2If]

Updates on Customs brokers, by Ms. Carol West

int-300116-1Hi Carol, and thanks for joining a CBRA Interview – can you first tell a bit who are you and what you do?

I am the President of the Canadian Society of Customs Brokers and the Secretary of the International Federation of Customs Brokers Associations, IFCBA. My office is in Ottawa, Canada. I have spent my professional life in the world of Customs, border management and trade facilitation. I am an advocate for the value and importance of customs brokers and I am passionate about the possibilities of Customs-business partnership, in Canada and worldwide. I believe strongly that building knowledge, investing in technology and managing relationships are critical to effective border management.

IFCBA and CBRA produced jointly the first survey study on future roles of customs brokers around 2004-2005. Looking now, in 2016, at the study outcomes: do you see that anything has changed or evolved in the “world of customs brokers” the way we anticipated a decade ago?

It is difficult to generalize as the role of a customs broker still differs so much between countries. The regulatory framework for licensing customs brokers and their scope of practice may be different, and the level of automation of a country’s Customs administration may influence the role of customs brokers in effective border management. Having said that, I believe that in the last decade the role of a customs broker as a trade facilitator has been even more effective than we had anticipated. Both importers and Customs recognize that knowledgeable, regulated customs brokers not only provide expedited navigation through and compliance with complex Customs requirements, they are widely used by businesses looking to reach new markets, with a minimum of cost and delay.

With Customs administrations automating their systems for risk management and implementing coordinated border management processes, there is also more focus on gathering information on the goods being imported prior to arrival, for admissibility and security purposes. In this context, the automation of carrier and cargo information is more important than it was ten years ago. With that in mind, the role of a customs broker is even more crucial today as the broker acts as a hub for all the data relating to a client’s transaction, ensuring its accuracy and compliance with Customs requirements.

Ten years ago, we thought that, by now, we would have made more progress with consistency of data requirements globally. There has been great work done by the World Customs Organization with its data model, but we still find that data requirements are not as harmonized or standardized as they could or should be.

From a business process standpoint, where licensed customs brokers exist they are used by the majority of importers – large multinational companies as well as small to medium enterprises. In a competitive marketplace, customs brokers are seeing more emphasis on performance measurement and key performance indications during the procurement process as well as in standard operations. Today, there is greater uncertainty in the business environment and increased complexity of the global supply chain. We think this also reflects the maturation of the brokerage industry where business managers focus on continuing improvements to their processes to reach maximum efficiencies in delivering value to clients.

By the way, are you aware of any recent research focusing on customs brokers, either on global or on national level?

The World Customs Organization, WCO conducted a survey of its members in 2015 on the subject of customs broker regulation and had an outstanding response rate. With many models of customs broker regulatory regimes among the WCO members, from no regulation to the mandatory use of a licensed customs broker, the results of the survey point to some opportunities for cooperation between Customs administrations and customs brokers, and, based on existing best practices, suggests considerations for a model for establishing a broker licensing system, particularly valuable where none exists today. It also offers ideas on engagement with customs brokers and other private sector players to enhance compliance and trade facilitation. We see this as a positive indicator of interest in issues that are of critical importance to the international customs broker community, and a sign that there is value in doing some additional work in this area.

From a customs broker’s perspective, which areas of global trade facilitation and supply chain security do you see as most important in 2016? What about the most difficult or challenging ones?

A very important development that might impact global trade is the Trans-Pacific Partnership, TTP. I say might because coming into force depends on the US Congress ratification of the agreement, and currently the rhetoric coming from Washington shows little support for it. I guess we’ll have to wait and see what happens. But assuming the TPP is ratified by the 12 signatories, even though it means elimination of tariffs and tariff barriers, it also means a more complex environment to navigate the multiple free trade agreements for the multi-national importers. Customs brokers as experts in rules of origin and compliance, in general will continue playing a very important role in the trade chain.

Looking a bit further out, one of the most challenging issues of the next 5 years will be the immense growth in e-commerce globally, and the pressure put on governments world-wide by online retailers to increase the de-minimis thresholds. It is projected that the online sales will reach US $3.5 trillion by 2020. That represents a lot of import duties that may not be collected and remitted if the de-minimis thresholds are increased or standardized. We expect that the impact of this will be seen differently depending on positions taken by national administrations given their own economic situations and pressures for competitiveness. Customs brokers will no doubt integrate any such changes into their compliance models and service offerings, keeping their clients’ interests and obligations foremost.

We can’t speak of challenges without mentioning the global trade slowdown we’ve experienced since the 2008 global financial crisis. Many factors seem to be contributing to the continued sluggishness which some consider cyclical others structural in nature. Regardless, governments have to remember that trade can be a powerful tool in their policy toolkit and customs brokers are natural allies in promoting its growth.

Any other greetings you would like to send to the CBRA Interview and Blog readers?

IFCBA will be holding its next World Conference in Shanghai 17-21 May, 2016, and the theme is “Facilitating Trade Through the Customs-Business Connection”. Hundreds of delegates from all regions of the world will be in attendance representing national customs brokers associations, international customs organizations such as the WCO, freight forwarding firms, shipping companies, cross-border e-commerce associations, world logistics enterprises, and many more. Our conferences are held only every two years, and we are very excited about sharing ideas and strategies for success with business and government colleagues from around the world.

Thanks a lot Carol for this concluding note – we just added the IFCBA World Conference to CBRA´s Events calendar – and thanks for the whole interview; maybe we can explore bit later this year on joint research, training or other project opportunities…!

 

Web-resources:

http://ifcba.org/

http://www.wcoomd.org/en/topics/facilitation/resources/~/~/media/234D5143B2344B918496C93F24B48586.ashx

https://www.internetretailer.com/2015/07/29/global-e-commerce-set-grow-25-2015

http://bruegel.org/2015/08/the-global-trade-slowdown-puzzle/

https://www.wto.org/english/news_e/pres15_e/pr752_e.htm

https://globalconnections.hsbc.com/global/en/tools-data/trade-forecasts/global

https://www.imf.org/external/pubs/ft/weo/2016/update/01/pdf/0116.pdf 

Related CBRA studies:  

Gutierrez, X., Hintsa, J., Wieser, P. and Hameri, A.P. (2005), “New roles for customs brokers in international supply chain”, Proceedings of First International Conference on Transportation Logistics (T-LOG), July 27-29, 2005, Singapore.

Hintsa, J., Mohanty, S., Tsikolenko, V., Ivens, B., Leischnig, A., Kähäri, P., Hameri, A.P., and Cadot, O. (2014), The import VAT and duty de-minimis in the European Union – Where should they be and what will be the impact? Final Report, Brussels, Belgium.

COMMISSION IMPLEMENTING REGULATION (EU) No 889/2014 of 14 August 2014 amending Regulation (EEC) No 2454/93, as regards recognition of the common security requirements under the regulated agent and known consignor programme and the Authorised Economic Operator programme, 2014 (CORE1069)

Summary: Existing customs Regulation ((EEC) No 2913/92 establishing the Community Customs Code) and aviation legislation (Regulation (EC) No 300/2008) provides for certain recognition of the certifications under the respective programmes, in particular with regard to the security examinations done for each of them. Regulation (EU) No 889/2014 is necessary for the recognition of the known consignor status with its relevance for the AEO as well, frame the scope of recognition of the common requirements between the respective programmes and allow for the necessary exchange of information between customs and aviation authorities. The 889/2014 is available for download at: http://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32014R0889&from=EN.

[s2If is_user_logged_in()]

Full review: Commission Regulation (EEC) No 2454/93 now provides that if the applicant for Authorised Economic Operator (AEO) status is already a regulated agent or a known consignor, the criterion on ‘appropriate security and safety standards’ shall be deemed to be met in relation to the premises for which the economic operator obtained the status of regulated agent or known consignor. Points 6.3.1.2 and 6.4.1.2 of the Annex to Commission Regulation (EU) No 185/2010 (4) provide that the appropriate authority, or independent validator acting on its behalf, should take into account whether or not the applicant for regulated agent or known consignor is a holder of an AEO certificate.

The practical implementation of both the customs legislation governing the AEO status and the aviation legislation governing the regulated agent and known consignor has shown that the existing recognition between the programmes is not sufficient to ensure the highest possible synergies between the respective security programmes. The security requirements for both the aviation security regulated agent and known consignor programme and for the customs AEO programme are equivalent to such an extent that both programmes may be aligned further.

Further alignment of both programmes in terms of equal level of recognition, including required exchange of information is necessary in order to decrease the administrative burden for the economic sector concerned and government authorities (both customs and civil aviation) while strengthening further the current level of security.

Regulation (EU) No 889/2014 is necessary for the recognition of the known consignor status with its relevance for the AEO as well, frame the scope of recognition of the common requirements between the respective programmes and allow for the necessary exchange of information between customs and aviation authorities.

The issuing customs authority shall immediately make available to the appropriate national authority responsible for civil aviation security the following minimum information related to the status of authorised economic operator which it has at its disposal:

  • the AEO certificate – security and safety (AEOS) and AEO certificate – customs simplifications/security and safety (AEOF) including the name of the holder of the certificate and, where applicable, their amendment or revocation or the suspension of the status of authorised economic operator and the reasons therefore;
  • information about whether the specific site concerned has been visited by customs authorities, the date of the last visit and the purpose for the visit (authorisation process, reassessment, monitoring); and
  • any reassessments of AEOS and AEOF certificates and the results thereof.

Relevance for CORE: The CORE implementation objectives, which specify what will be done and how to reach the vision, are all subject to the Policies, Regulations, and Standards that exist within the Security Domain of the Global Supply Chain. The following Work Packages are directly impacted by the implementing regulation (EU) No 889/2014:

  • Research and Analysis: Undertake requirements analysis and impact assessment. The project will undertake requirements analysis from different perspectives. In WP1 we will consolidate reviews of SCS regulations policies and standards from Reference Projects and specify implementation support requirements.
  • The Demonstrators: The CORE demonstrators will validate the applicability and benefits of the CORE approach in representative operating scenarios characteristic of the global supply chain. They will specifically show the way towards a Global Secure Supply Chain. The overriding goal is to demonstrate substantial gains in security and facilitation covering every major facet of the supply chain security sector.

The CORE demonstrators affected by the implementing regulation (EU) No 889/2014 are:

  • WP12: Demonstrator Schiphol – apply global data pipeline concept to air cargo supply chains, managing air freight specific trade compliance requirements, and offering supply chain visibility in dashboards. Trade lanes with e.g. Africa, involving multiple inspection authorities.
  • WP17: DHL Demonstrator – managing airfreight trade compliance requirements EU-US in the context of fast supplying of parts.

Also, WP19 is affected here: Stakeholder Engagement – Knowledge Diffusion and Sustainable Development. Specify and apply an inclusive Stakeholder Engagement Strategy emphasizing international co-operation to promote harmonization of regulations, and to support further development and implementation of international standards.

Cross-references and citations:

  • http://ec.europa.eu/transport/modes/air/security/
  • Regulation (EEC) No 2913/92. EU Regulation establishing the Community Customs Code.
  • Regulation (EC) No 300/2008. EU Regulation on common rules in the field of civil aviation security allows that entities complying with certain conditions and requirements may be certified to ensure and contribute to a secure supply chain.
  • Barosso, J. (2014), “COMMISSION IMPLEMENTING REGULATION (EU) No 889/2014 of 14 August 2014 amending Regulation (EEC) No 2454/93, as regards recognition of the common security requirements under the regulated agent and known consignor programme and the Authorised Economic Operator programme”, available at: http://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32014R0889&from=EN.

CORE1069
[/s2If]

AVIATION SECURITY – Transportation Security Administration Has Strengthened Planning to Guide Investments in Key Aviation Security Programs, but More Work Remains, GAO 2008 (CORE1067)

Summary: This GAO report discusses the impact of the 26 billion USD that the Transportation Security Administration (TSA) has spent on aviation security since 2004. The report focuses especially on the current status and the future challenges of passenger screening, air cargo security and passenger watch-list matching program known as Secure Flight. The air cargo security discussion is the report’s most relevant section from the CORE’s viewpoint. The information in the report, that has been published as early as July 2008, is anyhow largely outdated: it discusses challenges that TSA and the air cargo community need to overcome before starting the 100% screening of air cargo that flies on board passenger planes, a legal requirement that become into force in August 2010 and that was set by the Implementing Recommendation of the 9/11 Commission Act of 2007 (aka the 9/11 Act). The report also recommended strengthening the security of US-bound foreign air cargo (into the US from the rest of the world), to bring it on a par with outbound air cargo security (from the US to rest of the world). More recent regulations and initiatives have corrected this weakness in the US air cargo security: today, third country air carriers must screen cargo up to US standards (or national standards if the country of origin and the US recognize each other’s air cargo regimes) before loading cargo on US-bound planes. The source document is available at: http://www.gao.gov/products/GAO-08-1024T.

[s2If is_user_logged_in()]

Full review: This GAO report provides useful background information about the US air cargo security regime. This information is going to be useful for the CORE demonstration 17.1 that is about time-critical express shipping of military aircraft parts from the US to Spain. In the demonstration, the express operator DHL ships the parts by plane, and thus compliance with the US air cargo security requirements is one of the key themes of this demo. Also WP 1 might use this GAO report to describe evolution of the US air cargo regime over the years. But though this analysis would be interesting, it is not going to be the essential content in the deliverable of the WP1.

 Cross-references:

  • GAO, Aviation Security: Federal Coordination for Responding to In-flight Security Threats Has Matured, but Procedures Can Be Strengthened, (Washington, D.C.: July 31, 2007).
  • G_A_O_, Aviation Security: Transportation Security Administration May Face Resource and other Challenges in Developing a System to Screen All Cargo Transported on Passenger Aircraft
  • GAO, Aviation Security: Federal Efforts to Secure U.S.-Bound Air Cargo Are in the Early Stages and Could Be Strengthened, GAO-07-660 (Washington, D.C.: April 2007).
  • GAO, Aviation Security: Progress Made in Systematic Planning to Guide Key Investment Decisions, but More Work Remains, GAO-07-448T (Washington, D.C.: February 13, 2007).

Full citation:

U.S. Government Accountability Office (GAO), 2008. Aviation Security – Transportation Security Administration Has Strengthened Planning to Guide Investments in Key Aviation Security Programs.

CORE1067

Additional keywords: Air cargo security, Certified Cargo Screening Program (CCSP)

[/s2If]

SUPPLY CHAIN SECURITY: Feasibility and Cost-Benefit Analysis Would Assist DHS and Congress in Assessing and Implementing the Requirement to Scan 100 Percent of U.S.-Bound Containers, GAO (October 2009, CORE1066)

Summary: The document provides a comprehensive outlook on the past and recent US initiatives on container security. The report focuses on the challenges that prevent global implementation of the 100% scanning of US-bound containers in foreign ports with both non-intrusive inspection (NII) technologies and radiation detection devices, as mandated by the SAFE Port Act and the 9/11 Acts. The 100% scanning is believed to deter and detect terrorist attempts of smuggling weapons of mass destruction (WMD) into the United States inside a cargo container. The reports dates back to late 2009, so the description of the current state of the US container security it provides is not necessarily no longer accurate. The report anticipates that the implementation of the 100% scanning requirement will be delayed due to various problems that were identified during the precursory Secure Freight Initiative (SFI) pilots. These problems are related mainly to port logistics (routing of containers through scanning sites), employee safety (radiation of screening equipment) and technical constraints (equipment failures and poor quality of scanning images). Today, we know that the US authorities have deferred the implementation already twice, first to 2014 and for the second time until 2016. Altogether, this GAO report describes in detail the challenges of the 100% scanning law and elaborates some ongoing alternative risk-based approaches to container security: (1) the strategic trade lane strategy that aims to establish 100% scanning only in high terrorist risk foreign sea ports and (2) the “10 + 2” data requirements that importers and ocean carriers must submit to the US Customs and Border Protection (CBP) prior to a container is loaded aboard a US-bound vessel so that the US authorities can calculate more precise risk for each shipping container. This report includes relevant information for all the CORE’s demonstrations that involve US-bound maritime transportation. The source document is available at: http://www.gao.gov/products/GAO-10-12.

[s2If is_user_logged_in()]

Full review: The GAO document provides interesting insights on the evolution of the US container security regulations over the years. This is useful supportive information for CORE demonstrations that involve maritime shipping of containers into the US. The GM demonstration of the WP9 for example covers exports of automobile parts from the EU into the US by transatlantic ocean transport. If the US Congress does not repeal or defer the 100% scanning requirement, the port of Felixstove that participates in the demonstration, need to start scanning also all GM’s US-bound containers. Likewise, the FALACUS demo (WP14), which is about shipping of ceramic tiles from Italy to the US, must take into consideration the possible effects of the 100% scanning requirement. This demonstration is particularly interesting from the 100% scanning requirement standpoint because some ceramic tiles are naturally radioactive, and thus they tend to trigger false alarms in the radiation controls. Also the P&G demonstrator in the WP17, that focuses on shipping of consumer goods into the US, the possible impact of the 100% scanning regulation.

Besides the demonstrations, the CORE’s risk cluster might benefit from the detailed analysis of the risk-based approaches to the US container security, such as the strategic trade lane strategy and the “10 + 2” data requirement. All demonstrations might benefit from lessons learnt how GAO has advises DHS and CBP to carry out cost-benefit analyses for the US container security programs (especially the Secure Freight Initiative).

Cross-references:

  • Combating Nuclear Smuggling: Efforts to Deploy Radiation Detection Equipment in the United States and in Other Countries. GAO-05-840T. Washington, D.C.: June 21, 2005.
  • Container Security: A Flexible Staffing Model and Minimum Equipment Requirements Would Improve Overseas Targeting and Inspection Efforts. GAO-05-557. Washington, D.C.: April 26, 2005.
  • Bakshi, N., Flynn, S. E., & Gans, N. (2011). Estimating the operational impact of container inspections at international ports. Management Science, 57(1), 1-.‐‑20.

Full citation:

U.S. Government Accountability Office (GAO), 2009. Supply Chain Security Feasibility and Cost-Benefit Analysis Would Assist DHS and Congress in Assessing and Implementing the Requirement to Scan 100 Percent of U.S.-Bound Containers.

CORE1066

Additional keywords: Ocean transportation, counter-terrorism, non-intrusive inspection

[/s2If]

Review on “MARITIME CRITICAL INFRASTRUCTURE PROTECTION – DHS Needs to Better Address Port Cybersecurity”, Report to the Chairman, Committee on Commerce, Science, and Transportation, U.S. Senate, United States Government Accountability Office, June 2014 (CORE1098)

CORE1098-Summary: Actions taken by the Department of Homeland Security (DHS) and two of its component agencies, the U.S. Coast Guard and Federal Emergency Management Agency (FEMA), as well as other federal agencies, to address cybersecurity in the maritime port environment have been limited. Report is available at: http://www.gao.gov/assets/670/663828.pdf

[s2If is_user_logged_in()]

Full review: While the Coast Guard initiated a number of activities and coordinating strategies to improve physical security in specific ports, it has not conducted a risk assessment that fully addresses cyber-related threats, vulnerabilities, and consequences. Coast Guard officials stated that they intend to conduct such an assessment in the future, but did not provide details to show how it would address cybersecurity. Until the Coast Guard completes a thorough assessment of cyber risks in the maritime environment, the ability of stakeholders to appropriately plan and allocate resources to protect ports and other maritime facilities will be limited.

Maritime security plans required by law and regulation generally did not identify or address potential cyber-related threats or vulnerabilities. This was because the guidance issued by Coast Guard for developing these plans did not require cyber elements to be addressed. Officials stated that guidance for the next set of updated plans, due for update in 2014, will include cybersecurity requirements. However, in the absence of a comprehensive risk assessment, the revised guidance may not adequately address cyber-related risks to the maritime environment.

The degree to which information-sharing mechanisms (e.g., councils) were active and shared cybersecurity-related information varied. Specifically, the Coast Guard established a government coordinating council to share information among government entities, but it is unclear to what extent this body has shared information related to cybersecurity. In addition, a sector coordinating council for sharing information among nonfederal stakeholders is no longer active, and the Coast Guard has not convinced stakeholders to reestablish it. Until the Coast Guard improves these mechanisms, maritime stakeholders in different locations are at greater risk of not being aware of, and thus not mitigating, cyber-based threats.

Under a program to provide security-related grants to ports, FEMA identified enhancing cybersecurity capabilities as a funding priority for the first time in fiscal year 2013 and has provided guidance for cybersecurity-related proposals. However, the agency has not consulted cybersecurity-related subject matter experts to inform the multi-level review of cyber-related proposals—partly because FEMA has downsized the expert panel that reviews grants. Also, because the Coast Guard has not assessed cyber-related risks in the maritime risk assessment, grant applicants and FEMA have not been able to use this information to inform funding proposals and decisions. As a result, FEMA is limited in its ability to ensure that the program is effectively addressing cyber-related risks in the maritime environment.

Why GAO Did This Study? U.S. maritime ports handle more than $1.3 trillion in cargo annually. The operations of these ports are supported by information and communication systems, which are susceptible to cyber-related threats. Failures in these systems could degrade or interrupt operations at ports, including the flow of commerce. Federal agencies—in particular DHS—and industry stakeholders have specific roles in protecting maritime facilities and ports from physical and cyber threats. GAO’s objective was to identify the extent to which DHS and other stakeholders have taken steps to address cybersecurity in the maritime port environment. GAO examined relevant laws and regulations; analyzed federal cybersecurity-related policies and plans; observed operations at three U.S. ports selected based on being a high-risk port and a leader in calls by vessel type, e.g. container; and interviewed federal and nonfederal officials.

What GAO Recommends? GAO recommends that DHS direct the Coast Guard to (1) assess cyber-related risks, (2) use this assessment to inform maritime security guidance, and (3) determine whether the sector coordinating council should be reestablished. DHS should also direct FEMA to (1) develop procedures to consult DHS cybersecurity experts for assistance in reviewing grant proposals and (2) use the results of the cyber-risk assessment to inform its grant guidance. DHS concurred with GAO’s recommendations.

Full citation:  “MARITIME CRITICAL INFRASTRUCTURE PROTECTION – DHS Needs to Better Address Port Cybersecurity”, Report to the Chairman, Committee on Commerce, Science, and Transportation, U.S. Senate, United States Government Accountability Office, June 2014.

CORE1098

Keywords: Maritime Security, Port Security, Cyber – Security, CBP U.S. – Customs and Border Protection, Coast Guard U.S., DHS-Department of Homeland Security, FEMA-Federal Emergency Management Agency, ISAC-information sharing and analysis center, IT-information technology, MTSA-Maritime Transportation Security Act of 2002, NIPP-National Infrastructure Protection Plan, AFE Port Act-Security and Accountability for Every Port Act of 2006, TSA-Transportation Security Administration

[/s2If]

Review on Consideration and Adoption of Amendments to the International Convention for the Safety of Life at Sea, 1974, International Maritime Organization (CORE1097)

Summary: The International Ship and Port Facility Security (ISPS) Code sets new standards for security for ships at sea as well as port facilities around the world. It aims to make shipping activities more secure against threats of terrorism, piracy and smuggling. Security at sea has been a concern to governments, shipping lines, port authorities and importers and exporters for years. The terrorist attacks of September 11, 2001, however, provided the catalyst for formalizing tough new security measures. In December of 2002, the International Maritime Organization (IMO) a specialized agency of the United Nations (UN) organized a conference to discuss issues related to security at sea. At this conference, representatives from 150 nations (the Contracting Governments) participated in drafting amendments to the Safety of Life at Sea (SOLAS) Convention, and the ISPS Code was adopted. Changes to the SOLAS Convention include amendments to Chapters V and XI, and Chapter XI was divided into Chapters XI-1 and XI-2. The new Chapter XI-2 provides the umbrella ISPS regulations. The Code itself is divided into two parts. Part A presents mandatory requirements, Part B contains guidance regarding the provisions of Chapter XI-2 of the Convention and part A of the Code. Source document is available at: http://www.un.org/en/sc/ctc/docs/bestpractices/32.pdf

[s2If is_user_logged_in()]

Full review: The Code aims, among other things, to establish an international framework for co-operation between Contracting Governments, government agencies, local administrations and the shipping and port industries to detect security threats and take preventive measures against security incidents affecting ships or port facilities used in international trade and to establish relevant roles and responsibilities at the national and international level. ISPS provisions relating to port facilities relate solely to the ship/port interface. Also, ISPS provisions do not extend to the actual response to attacks or to any necessary clear-up activities after such an attack. In addition, for each ship and port authority affected, the ISPS Code requires:

  • The implementation of a Ship Security Plan (SSP),
  • The implementation of a Port Facility Security Plan (PFSP),
  • The appointment of a Ship Security Officer (SSO),
  • The appointment of a Company Security Officer (CSO),
  • The appointment of a Port Facility Security Officer (PFSO),
  • The installation of ship alarms, and
  • The installation of shipboard Automatic Identification Systems (AIS).

Enforcement Date: The ISPS Code went into effect on July 1, 2004.

Full citation:   Consideration and Adoption of Amendments to the International Convention for the Safety of Life at Sea, 1974, International Maritime Organization. SOLAS/CONF.5/32. 12 December 2002

CORE1097

Keywords: Maritime Security, Port Security, Ship Security Plan (SSP), Port Facility Security Plan (PFSP), Ship Security Officer (SSO), Port Facility Security Officer (PFSO), International Maritime Organization (IMO), Safety of Life at Sea (SOLAS).

[/s2If]