C-TPAT Best Practices Catalog Addendum, 2009 (CORE1031)

Summary: This addendum document lists cargo security best practices with focus on prevention of weapons of mass effect, terrorists, and/or contraband from infiltrating into the international supply chain. Each best practice is linked to a specific business entity, such as a Manufacturing Company, a Highway Carrier, an Importer or a Foreign Consolidator but these may apply to other business types as well. The document is available at: https://www.cbp.gov/sites/default/files/documents/ctpat_bpa_2009_0.pdf (link tested on 3 March 2016)

[s2If is_user_logged_in()]

Full review: The best practices are outlined as follows:

Risk assessment: Programs are in place to enable the identification of the most vulnerable supply chain areas, to grade suppliers supply chain security criteria. Specific processes have been developed to manage the supplier’s products, software and services and internal monitoring systems to enhance the safety and security procedures.

Business partner requirements: Several security measures have been taken by entities. These include conducting supply chain security audits to ensure compliance of non-C-TPAT business partners; carrying out security audits of a foreign manufacturer; making security self-assessments, conducting onsite inspections to ensure freight security; shipping cargo only through accredited ports and steamship lines; monitoring compliance of manufacturing facilities; screening procurements to identify ineligible status of suppliers, and performing audits of business partners.

Conveyance/Container/Trailer Security: Examples of such security practices are: integrating special security features in the GPS (global positioning system); using laser beams to protect trailers; using colour codes for matching consignments; installing infrared sensors in docks to prevent unauthorized access; using special codes to identify correct shipments; documenting all seal changes for shipments in transit; ensuring delivery by authorized Company drivers; sealing containers; operating through C-TPAT carriers; using only “seaworthy” containers; installing in-transit temperature data sensors to ensure product quality; enclosing container storage area; conducting non-intrusive inspection prior to loading a vessel; establishing specific inspection points; using multiple security devices on each container; using automated container yards; instructing foreign suppliers to provide inspection checklists; using dock locking arms for container storage; installing motion sensors in a trailer; operating through contracted highway carriers and security services; documenting a seal destruction policy, and so forth.

Physical Access Controls: Some practices by Importers include establishing multiple security stations within the building; using metal detectors for employees; installing an electronic swipe card/ lock box systems for access control for sensitive documents; conducting electronic scanning of visitors’ drivers licenses; utilizing a third-party software system to manage key inventory; and providing panic buttons for company employees.

Physical Security: Several innovative solutions have been designed to ensure physical security, such as electronically closing gates and activating tire puncturing devices to prevent vehicle exits; using an electronic security information reporting system, installing invisible electronic fences; installing laser sensors; setting up optical light beams to detect intruders; fitting double locks on doors; Installing infrared sensors on fences; using body alarm functions for emergencies; appointing patrolling guards, using multiple glass meeting rooms; using multiple interior infrared security alarm beams to detect unauthorized access; and installing security guard view towers.

Personnel Security: An Importer requires business partners to provide a monthly master list of employees and immediately notify when their employees are hired or terminated, in order to ensure that only authorized business partner’s employees enter the manufacturing facilities.

Security Training/Threat Awareness/Outreach: Business entities have invested in a wide range of training programs. One such initiative is the four-tier C-TPAT training targeted for management and supervisors, shipping and receiving personnel, internal personnel dealing with contractors and hourly staff. Other businesses use different approaches, like establishing an online training portal;; offering general security training and of site-specific training for security guards; issuing security advisories; making regular security awareness assessments; establishing a situation matrix chart to address possible incidents; establishing a direct communication channel between the president of the company and employees; putting in place a toll free hotline for company personnel; conducting security drills and exercises; establishing a web-based security awareness training; documenting security incidents in a central database; and establishing a global communication system to contact all employees and contractors remotely.

Procedural Security: Instances of this type of security measures include a bio-thermal intrusion alarm system; a global SAP network to generate all written orders for import and export; automatic screening procedures of purchase orders for restricted parties; lock boxes for sensitive documentation; an automated loading module called the Automatic Truck Loading System (ATLS); a container seal number as the shipment tracking (invoice/bill of lading) number, and so forth.

Information Technology (IT) Security: Such security practices include a biometric fingerprint door lock; a remote data backup center; a retina scanning system for access to the computer system; requiring supervisory approval to copy data; use of electronic password protected purchase orders; establishing a daily “e-test” for employees to access computers, and so forth.

CORE1031

[/s2If]

CEN Supply Chain Security — Good Practice Guide for Small and Medium Sized Operators, 2012 (CORE1030)

Summary: This is a guidance document for small and medium sized enterprises, SMEs. on how to apply a supply chain security approach to their operations in order to mitigate the risk of criminal activities. It gives an overview of the main crime types occurring in the supply chain along with some countermeasures, as well as the supply chain security initiatives, and the compliance requirements thereof. The document is available for purchase e.g. at:   http://shop.bsigroup.com/ProductDetail/?pid=000000000030258778  (link tested on 3 March 2016)

[s2If is_user_logged_in()]

Full review: The recommended supply chain strategy rests on a six-step approach. The first step is to define a context for the supply chain, crime prevention and security management activities taking into consideration the security sensitiveness, the geography and transport modes, and the main stakeholders involved in the supply chain operation. The second step is to make a threat and vulnerability analysis with regard to terrorist and other criminal threats in the supply chain. The main criteria included are the gaps existing in enhanced security, the high-risk crime types, and the potential consequences of crime occurrences. The third step covers the regulatory framework, the major aspects being the regulations and programs required for successful business operations, expectations of customers and suppliers, requirements laid down by insurance providers, and relevant government authorities. The fourth step refers to an overall security plan, taking into account the physical security, data security, human resources security (including selection, training, and exit procedures), business partner security (including selection, and auditing), and process control and monitoring of deviations. The fifth step involves implementing into practice concrete security measures, investment in technologies, procurement of services, in-house solutions and so forth. The final step is to monitor and measure the security performance and take appropriate corrective actions.

Five supply chain crime types have been elucidated in this guide. These include:  Property theft (cargo theft, intellectual property breaches); targeted damage (terrorism, sabotage); cross-border duty and tax fraud; illegitimate transporting, exporting and/or importing (smuggling of prohibited and restricted goods, people smuggling); and crime facilitation (document forgery, bogus companies, cybercrime). For each crime type, the main focus should be on the issue (main features and typical sectors/products involved), scope of the problem and actions to mitigate risks.

This guidebook has chosen eight security initiatives for illustration purposes. It explains the context of each initiative, whom it is meant for, and some basic requirements and the implications. These are as follows:

  • Import Control System (ICS) in the EU (a systems tool meant for the lodging and processing of Entry Summary Declarations, and for the exchange of messages across national customs agencies, economic operators and the European Commission).
  • Export Control System (ECS) in the EU (introduces EU procedures to computerize and control indirect exports and to implement the EU safety and security regulations);
  • Maritime Security Legislation, International Ship and Port Facility Security (ISPS) Code in the EU (International regulations to ensure the security of maritime transportation are being issued by the International Maritime Organization, IMO, in the International Ship and Port Facility Security Code);
  • Aviation Security Legislation, Air Cargo Supply Chains in the EU (three categories of aviation security legislation exist in the EU- Framework regulation, supplementing regulations, and implementing regulations-all targeted towards civil aviation security).
  • European Union Authorized Economic Operator, EU AEO (operators involved in international trade of goods certified as complying with WCO or equivalent supply chain security standards);
  • Regulated agent, Known consignor and Account consignor in the EU (Specific “trusted trader” status existing in the European air cargo supply chains);
  • ISO 28000 Series of Standards on Supply Chain Security Management Systems (address potential security issues at all stages of the supply process, e.g. terrorism, fraud and piracy);
  • Transported Asset Protection Association (TAPA) in Europe (fighting cargo crime using real-time intelligence and the latest preventative measures).

CORE1030

[/s2If]

Supply chain security education materials

Blog-29.02.16FP7-CORE is the European flagship research and development project in supply chain security and trade facilitation, running from May 2014 to April 2018. In today´s CBRA Blog we focus on education and training material development – Work package 19, Task 19.1 – in the CORE-project.

The CORE Task 19.1 – Education and training materials development – has an impressive set of partners: INTERPOL, World Customs Organization (WCO), European Shippers Council (ESC), European association for forwarding, transport, logistics and customs services (CLECAT), International Road Union (IRU), and Technical University of Delft (TU Delft) as the established big players; ourselves Cross-border Research Association (CBRA) as the Task leader (and an enthusiastic lecturing body in supply chain security and trade facilitation); as well as the BMT Group, as the Work package 19 leader. We first started interaction with the entire Task 19.1 team during summer 2014, when the CORE-project had just been kicked off, and everything was still in it´s infancy.

Today, at the end of February 2016 – near two years into the project – we are about to launch the full scale production of the CORE education and training materials. We vision content to be produced in three parallel categories: CORE Flagship Handbook (CFH); Partner-specific materials; and Other education content. Content which is considered to be near-final can be published on-the-fly for example at CBRA´s web-portal, www.cross-border.org , where a new section is planned for the “CORE Education” (like the “CORE Observatory” which has been live since last autumn). Having just over two years left with the CORE-project, we are right on schedule to start the full production of education and training materials!

CORE Flagship Handbook (CFH) will be the main joint outcome of Task 19.1, thus we welcome INTERPOL, WCO, ESC, CLECAT, IRU, TU Delft and BMT to work closely with us in the production, review and piloting of the Handbook. In our current plans the Flagship Handbook has the following four sections, each section having multiple chapters (typically between two and six chapters per section):

  1. Introduction to CORE innovation agenda; including explaining key CORE themes and concepts; and frameworks and models.
  2. CORE outcomes, findings and results – written primarily in the context of the 16 CORE-Demonstrations.
  3. Interpretation of CORE results per key stakeholder group: customs, police, cargo owners, logistics sector, security sector and academics
  4. Future research and development roadmap – focusing on gaps and shortcomings; critical assessment on what works and what doesn’t by the end of CORE-project.

Partner specific materials typically fall into two sub-categories. First one is generic, introductory materials which would be of relevance to 1-2 stakeholder groups – for example Supply chain management 101 for police officers. Such materials can quite easily be developed within Task 19.1, using CORE supply chains and trade lanes as examples. At the same time, such basic education material would not be of relevance for supply chain companies, thus it should not be published in the CORE Flagship Handbook, CFH. Second sub-category is on detailed technical content, which again would be relevant to 1-2 stakeholder groups. An example could be technical review on risk management tools for the logistics sector.

Other education material may consist of the following content buckets, listed in a rough “simple to more complex” -order: Factsheets; Quizzes; Basic case studies; Comprehensive case studies; Videos and animations; Serious games, and so forth. It is still early days to decide what makes sense to develop – and for what we have adequate resources, skills and budgets. Maybe we will start with some simple factsheets, quizzes and basic case studies – this is still to be discussed among Task 19.1 partners.

Finally, the plans regarding the CORE Education web-portal are still in a preliminary stage. We could have a simple dropdown menu at www.cross-border.org , for example with the following selection options: Introductory materials; Technical sections; and Factsheets & quizzes. In the last category we could share first outcomes of Task 19.1 work. Here, just like in all other aspects of CORE Task 19.1, we welcome ideas and feedback from the Task 19.1 team, and from the whole CORE Consortium – and even beyond, from any interested stakeholders and potential future users of CORE Education materials!

In Lausanne on 29.2.2016 – CBRA Blog by Juha Hintsa

SUPPLY CHAIN SECURITY – U.S. Customs and Border Protection Has Enhanced Its Partnership with Import Trade Sectors, but Challenges Remain in Verifying Security Practices, GAO, April 2008 (CORE1011)

Summary: The GAO report discusses the progress the Customs and Border Protection (CPB), a component agency of the US Department of Homeland Security (DHS), has made since 2015 with its flagship business-private supply chain security program Customs-Trade Partnership Against Terrorism (C-TPAT). The report focuses on three main areas of the C-TPAT’s management and governance: (1) awarding benefits for the C-TPAT compliant companies, (2) validating the member companies’ security compliance and (3) addressing CBP’s staffing challenges that the increasing popularity of the C-TPAT program brings. The report recommends CPB to improve its C-TPAT validation processes and instruments and to establish performance criteria for assessing the program’s impact on supply chain security and trade facilitation. The C-TPAT program and this GAO report contain useful information for the CORE’s demonstrations that import goods into the US. Also the CORE’s risk cluster can learn about opportunities and challenges a voluntary, risk-based supply chain security entails. The report is available at http://www.gao.gov/assets/280/274773.pdf.

[s2If is_user_logged_in()]

Full review: This report contains information that is particularly useful for two CORE demonstrators that cover US imports. The first WP9 demonstration is about shipping automobile parts from the EU to the US via the port of Bremerhaven. In this demo, the General Motors (GM) is the importer. Because GM holds a C-TPAT certificate, most of the information this report offers about the status and challenges of the C-TPAT program must be of interest for the company and for its CORE demonstration. The same applies to the WP14 demonstration “FALACUS” that is about importing ceramic tiles from Italy to the US via the Port of La Spezia. The demonstration has to deal with the C-TPAT program, and therefore the demo partners’ might benefit from studying this GAO report. In addition to the demonstrations, this report might support the work of the CORE’s risk cluster because the document discusses in detail challenges and possibilities of a voluntary, risk-based supply chain security program, which builds on business-government collaboration.

Cross-references:

Supply Chain Security: Examinations of High-Risk Cargo at Foreign Seaports Have Increased, but Improved Data Collection and Performance Measures Are Needed. GAO-08-187. Washington, D.C.: January 25, 2008.

Maritime Security: The SAFE Port Act and Efforts to Secure Our Nation’s Seaports. GAO-08-86T. Washington, D.C.: October 4, 2007.

Maritime Security: Observations on Selected Aspects of the SAFE Port Act. GAO-07-754T. Washington, D.C.: April 26, 2007.

Combating Nuclear Smuggling: Additional Actions Needed to Ensure Adequate Testing of Next Generation Radiation Detection Equipment. GAO-07-1247T. Washington, D.C.: September 18, 2007.

Cargo Container Inspections: Preliminary Observations on the Status of Efforts to Improve the Automated Targeting System. GAO-06-591T. Washington, D.C.: March 30, 2006.

Additional keywords: Border security, customs-trade partnership against terrorism (C-TPAT), supply chain security, counter-terrorism

CORE1011

[/s2If]

SUPPLY CHAIN SECURITY – Examinations of High- Risk Cargo at Foreign Seaports Have Increased, but Improved Data Collection and Performance Measures Are Needed, GAO, January 2008 (CORE1010)

Summary: This report reviews the progress that the US Customs and Border Protection (CBP) has made with the Container Security Initiative (CSI) – a program for screening US-bound high-risk shipping containers in foreign ports with X-ray and radiation detection solutions – since the latest 2005 GAO review. The report discusses how the CBP’s CSI efforts have (1) contributed to the long-term, strategic planning on the US supply chain security, (2) strengthened CSI activities worldwide and (3) established means to evaluate performance of the CSI activities. The report recommends CBP to develop its data collection practices that are related to the CSI team performance and the host government’s inspections of the US-bound containers. This report provides relevant information for CORE demonstrations that deal with US-bound maritime logistics and commerce. Also the risk cluster might benefit from the descriptions of the US risk-based supply chain security scheme – Automated Targeting System (AST), 24-hour rule and the importer security filing 10+2 – that the report elaborates in detail. The report is available at http://www.gao.gov/new.items/d08187.pdf.

[s2If is_user_logged_in()]

Full review: This GAO report elaborates the status and challenges of the US Container Security Initiative, but it also provides a comprehensive outlook on the US maritime supply chain security. This information is likely to be relevant for the CORE’s demonstrations (WP9 and WP14) that deal with US-bound container traffic. The report is a good reference document for those CORE work packages that seek to describe the state-of-the-art of the global supply chain and that are producing relevant training material on supply chain security. The CORE’s risk and IT clusters benefit from the information the report offers on risk-based security solutions that use advance cargo information to calculate risk scores for US-bound shipments by the aid of automatic risk assessment algorithms.

Cross-references:

  • Preventing Nuclear Smuggling: DOE Has Made Limited Progress in Installing Radiation Detection Equipment at Highest Priority Foreign Seaports. GAO-05-375. Washington, D.C.: March 31, 2005.
  • Homeland Security: Process for Reporting Lessons Learned from Seaport Exercises Needs Further Attention. GAO-05-170. Washington, D.C.: January 14, 2005.
  • Port Security: Better Planning Needed to Develop and Operate Maritime Worker Identification Card Program. GAO-05-106. Washington, D.C.: December 10, 2004.
  • Maritime Security: Substantial Work Remains to Translate New Planning Requirements into Effective Port Security. GAO-04-838. Washington, D.C.: June 30, 2004.
  • Homeland Security: Summary of Challenges Faced in Targeting Oceangoing Cargo Containers for Inspection. GAO-04-557T. Washington, D.C.: March 31, 2004.
  • Container Security: Expansion of Key Customs Programs Will Require Greater Attention to Critical Success Factors. GAO-03-770. Washington, D.C.: July 25, 2003.

Additional keywords: Container Security Initiative (CSI), counter-terrorism, homeland security, maritime supply chain security

CORE1010

[/s2If]

SUPPLY CHAIN SECURITY – CBP Works with International Entities to Promote Global Customs Security Standards and Initiatives, but Challenges Remain, GAO, August 2008 (CORE1009)

Summary: This report discusses how the US Customs and Border Protection (CBP) has (1) contributed to international supply chain security standards and (2) promoted mutual recognition in the customs security area and (3) how the agency expects to implement the 100% scanning requirement of the containerized US-bound maritime cargo. The report provides a detailed outlook on the US customs supply chain security scheme, and it highlights challenges and problems that the US government faces in promoting its supply chain security strategy internationally. The development and the implementation of the World Customs Organization’s (WCO) SAFE Framework of Standards, a suite of best practices on customs security, is a central theme throughout this GAO report. Because of its broad scope, the customs-related supply chain security, this document contains information that is likely to be useful for all CORE work packages, and especially for those that involve customs administrations. The report is available at http://www.gao.gov/assets/280/279730.pdf.

[s2If is_user_logged_in()]

Full review: This document provides a detailed outlook on customs-centric supply chain security from the US government’s perspective. This unique view on the customs security is going to be useful for the CORE’s early work packages that seek to describe the state-of-the-art of the global supply chain security. The information is also useful for the CORE demonstrations, in which customs administrations are involved. In particular, the demonstrations (WP9 and WP14) that are about US-bound trade and logistics benefit from the detailed description of the customs security initiatives that the US government has introduced since the 9/11 tragedy.

Cross-references:

  • Supply Chain Security: Challenges to Scanning 100 Percent of U.S.-Bound Cargo Containers. GAO-08-533T. Washington, D.C.: June 12, 2008.
  • Supply Chain Security: Examinations of High-Risk Cargo at Foreign Seaports Have Increased, but Improved Data Collection and Performance Measures Are Needed. GAO-08-187. Washington, D.C.: January 25, 2008.
  • Maritime Security: The SAFE Port Act: Status and Implementation One Year Later. GAO-08-126T. Washington, D.C.: October 30, 2007.
  • Maritime Security: One Year Later: A Progress Report on the SAFE Port Act. GAO-08-171T. Washington, D.C.: October 16, 2007.
  • Maritime Security: The SAFE Port Act and Efforts to Secure Our Nation’s Seaports. GAO-08-86T. Washington, D.C.: October 4, 2007.
  • Combating Nuclear Smuggling: Additional Actions Needed to Ensure Adequate Testing of Next Generation Radiation Detection Equipment. GAO-07-1247T. Washington, D.C.: September 18, 2007.
  • Maritime Security: Observations on Selected Aspects of the SAFE Port Act. GAO-07-754T. April 26, 2007.
  • Customs Revenue: Customs and Border Protection Needs to Improve Workforce Planning and Accountability. GAO-07-529. Washington, D.C.: April 12, 2007.
  • Cargo Container Inspections: Preliminary Observations on the Status of Efforts to Improve the Automated Targeting System. GAO-06-591T. Washington, D.C.: March 30, 2006.
  • Combating Nuclear Smuggling: Efforts to Deploy Radiation Detection Equipment in the United States and in Other Countries. GAO-05-840T. Washington, D.C.: June 21, 2005.
  • Container Security: A Flexible Staffing Model and Minimum Equipment Requirements Would Improve Overseas Targeting and Inspection Efforts. GAO-05-557. Washington, D.C.: April 26, 2005.

Additional keywords: Mutual recognition, regulatory harmonization, 100% scanning legislation, SAFE framework of standards, World Customs Organizations, Authorized Economic Operators (AEO) programs, Customs-Trade Partnership against Terrorism

CORE1009

[/s2If]

MARITIME SECURITY – DHS Could Benefit from Tracking Progress in Implementing the Small Vessel Security Strategy, GAO, October 2013 (CORE1016)

Summary: This GAO report reviews current activities the Department of Homeland Security, its component agencies and its stakeholders are doing to protect the US-centric seaborne trade and logistics from threats arising from small vessels. The report argues that the small vessels pose two “great threats” to the US maritime system: (1) explosive-laden small vessels can be used to ram into maritime structures or (2) the small vessels can be used as vehicles for transporting tools, weapons and tools for terrorism into the US. The GAO report highlights that DHS has its Small Vessel Security Strategy (SVSS), but the organization is not monitoring the progress its component agencies are doing in meeting its objectives. This report focuses mainly on security initiatives that affect navigation of small vessels at the US territorial waters and ports and operations of the US coastal guards and customs. Although US-based maritime logistics operations benefit from the increased security the small vessel security initiatives likely bring, they can continue their business as usual. Therefore, the CORE’s early work packages can use this report’s information to define the context of the global supply chain security, the CORE demonstrations do not need much attention to the small vessel security initiatives or this GAO report. The report is available at: http://gao.gov/assets/660/658703.pdf

[s2If is_user_logged_in()]

Full review: This report provides interesting background information about the US government’s efforts to secure their domestic maritime logistics and transportation from the threat of small vessels that navigate largely anonymously and unregulated. The document might be useful for the CORE early work packages that describe the context of the global supply chain security. It is however unlikely that the demonstrators would need to pay much attention to the US small vessel security initiatives because the legal requirements of the initiatives do not affect the operations of large commercial vessels, which carry most of the world’s seaborne cargo. Of course the small vessel security initiatives also affect the way the component agencies of DHS operate, but because CORE does not involve these agencies directly, in CORE, there is no need to put much effort on understanding technicalities of the small vessel security initiatives. Finally, the CORE’s clusters on education and training as well as risk management might anyhow consider the information of this GAO report relevant.

Cross-references:

  • Critical Infrastructure Protection: An Implementation Strategy Could Advance DHS’s Coordination of Resilience Efforts across Ports and Other Infrastructure. GAO-13-11. Washington, D.C.: October 25, 2012.
  • Supply Chain Security: CBP Needs to Conduct Regular Assessments of Its Cargo Targeting System. GAO-13-9. Washington, D.C.: October 25, 2012.
  • Maritime Security: Progress Made but Further Actions Needed to Secure the Maritime Energy Supply. GAO-11-883T. Washington, D.C.: August 24, 2011.
  • Supply Chain Security: Feasibility and Cost-Benefit Analysis Would Assist DHS and Congress in Assessing and Implementing the Requirement to Scan 100 Percent of U.S.-Bound Containers. GAO-10-12. Washington, D.C.: October 30, 2009.

CORE1016

Additional keywords: Maritime security, small vessel security, terrorism, smuggling

[/s2If]

Border Posts, Checkpoints, and Intra-African Trade: Challenges and Solutions. Barka, H., B., 2012 (CORE2009)

Summary

Pan-African economic integration has progressed over past years, producing a broad range of regional trade agreements and economic communities that seek to harmonise policies, develop common infrastructure and remove barriers to intra-African trade. Against expectations, however, this increased integration has not translated into strong economic growth in Africa. This article discusses how sub-Saharan countries can overcome trade barriers that undermine the African economic integration. The article’s focus is on border posts and customs procedures that play a key role in facilitating cross-border traffic.

According to the article, the problems of international trade in Africa are largely explained by inadequate infrastructure that creates congestion and limits connectivity, delays that stem from complex and manual customs procedures, corruption and by illicit trade. One-stop-border-posts are a promising approach to streamline customs procedures and curb corruption. The joint border post may bring trade facilitation benefits as significant as costly investments on roads, ports, bridges and other transport infrastructure. The articles highlights the Chirundu One-Stop Border Post between Zambia and Zimbabwe as a successful case of border agency cooperation. Previous Observatory review (CORE2008, 20 January 2016) describes the Chirundu border crossing in more detail.

The paper concludes by suggesting One-Stop-Border-Post as a promising way towards higher trade facilitation and African integration. To organise one-stop-border-post, the first thing to do is to analyse roles and procedures of different border control agencies. The task of high-level governance is to define how responsibilities across the various border control agencies are harmonised, coordinated and delegated. Metrics and statistics should underpin the design, as numerical data into traffic flows and clearance times are likely to reveal the major bottlenecks in the cross-border traffic. Finally, the article proposes extended exchange of information and data across government agencies, domestically and internationally. The article is available at http://www.afdb.org/fileadmin/uploads/afdb/Documents/Publications/INTRA%20AFRICAN%20TRADE_INTRA%20AFRICAN%20TRADE.pdf

Review by Toni Männistö (CBRA)

[s2If is_user_logged_in()]

Full review

The discussion on one-stop-border-posts in the African context is closely related to the CORE project and its many work packages. Especially the WP12, the demonstrator Schipol, that deals with imports of fresh cut flowers from Kenya to the Netherlands, benefits from the insights into African bureaucratic practices at many African borders. The demonstrator should consider the set of recommendations for higher border agency cooperation that the article proposes. Besides the demonstrators, the article provides a concise and informative outlook on international in Africa. At least CORE’s WP19, should consider the African perspective on cross-border trade when developing training material.

Reference

Barka, H., B., 2012. Border Posts, Checkpoints, and Intra-African Trade: Challenges and Solutions. African Development Bank

CORE2009

[/s2If]

Criminalization of global supply chains, by Mr. Hamon

Hi David, and thanks for joining a CBRA Interview – can you first tell a bit who are you and what you do?

I served in the US Army as a logistician, served with the United Nations Peacekeeping Department as well as work with the UN humanitarian organizations.  I recently retired from a not-for-profit government contractor to pursue more creative work.  Whilst at the latter position I was seconded to the US Defense Department, first in African Affairs, and then as Research and Studies Director for a strategic studies office within a US Defense Agency.  I currently work, mostly independently, on a great many things related to future threats and re-defining of security/stability as it pertains and impacts diplomacy, development, defense, society, and economics/finance.

We met first time in Lausanne, Switzerland, around 2005 – what was that roundtable event again about?

Many years before cyber based terror threats were on the radar, we launched an inquiry into what we termed “Economic/Financial Terrorism” and whether security threats emanating from terrorism in the future would take the form of attacks on the Western system of finance and the economy.  We brought in a host of experts from the US and Europe to debate the changing face of terrorism and likely goals of future terror groups.  We examined everything from evolving ideology, motivation and intent, culture and identity to strategy, tactics, targets, weapons, and groups.  It was an extremely interesting event with industry admitting – at the time – they were not prepared for this phenomenon and governments largely split on the issue.  Additionally, experts and think tanks disagreed on whether economic terrorism was tangible.  It was very forward-looking for its time.  All participants came away with greater awareness on the subject as we went above and beyond what is currently called “financial crimes,” exploring potential kinetic based threats terror groups would use against the economic and financial machinery that included physical attacks on the supply chain, tourist industry, psychological undermining of the Western economic system to disrupt the normal provision of goods and services.

Can you tell more about your views on ´criminalization of global supply chains´?

I take similar views on the subject as Dr. Moisés Naim, in his 2005 book ‘Illicit: How smugglers, traffickers, and copycats are hijacking the global economy.’ He addresses several tenants that remain true today including the role of governments, technology, the Illicit traders mimicking licit trade and logistics actors – while simultaneously collaborating with many of them, and criminal groups seek high-profit opportunities as opposed to any other attribution (see CBRA Blog 21 October 2014).  Terror groups care less about profit but when thinking about logistics networks, what if the two groups collaborated?  Today logistics systems are more complex and move faster than ever in history, have less margin to fail, are far less ‘hands-on’ and offer many ways and places to hide illegal activity.  Detection and interdiction of this activity isn’t exclusively in the realm of governments. Industry has a role to play if it wishes to minimize new regulations, taxes, deter corruption, and other drains on efficiency and profit.  Experts, both public and private, rarely take a systems approach to detecting criminal activity with much throughput going undetected.  Both parties want to specialize on one aspect and miss the big picture.  A good example was the AQ Khan network.  How long has it been since industry has undertaken an assessment of whether there is a new “Khan” network out there?  Do trade organizations war-game with governments on criminality within supply chains?

Interesting! What are your views on ‘multi-commodity trafficking / crime portfolios’?

At the last corporate organization where I worked my team did some analysis on unregulated, illegal fishing as a security threat to Pacific Island nations.  In the course of this analysis, we discovered it was the same actors doing the illegal fishing as doing illegal dumping, illegal smuggling, illegal trafficking, among other illicit activities.  The criminality was only one aspect of the supply chain as the “demand” side as well as the delivery side was entirely legal and within businesses who conduct practically all business legally.  The same boats as platforms – and their crews – were used to conduct all activity legal and illegal and to the local authorities – as well as donor nations attempting to help – it was impossible to project accurately when the activity would switch between licit and illicit.  We couldn’t analyze if this was a regional or global phenomena but I guess it was a widely copied practice.  As Anthony Barone has pointed out, border management and controls are not the panacea of containment but need to be part of a larger practice (see CBRA Interview 18 December 2015). Criminals use technology just as effectively!  His idea of assembling a group of independent experts to rethink new approaches to border management – and I might add, redefining the meaning of borders and how thinking differently about borders per se – is a good start.   Using strategic foresight come up with several alternative futures to present to a dedicated [supply chain] private-public partnership empowered to make changes would be my overarching recommendation

Sounds that the global supply chain community is facing increasingly more threats and risks! Any other suggestions on how to improve the situation, both short term and long term?

In the short term, as I mentioned, conduct a public-private-partnership exercise to rethink the concept supply chain surveillance for illicit activity and anticipating new and emerging illicit activity.  In the long run, we don’t give enough thought to knowledge as a part of the supply chain.  Using the supply chain for illicit activity begins with motivation and intent getting out in front of those who may do harm.  To address alternative futures will take some innovation and creativity, but the stakes are high.  The next AQ Khan Network may bring very bad things into Europe (and beyond!) compliments of ISIS.  We don’t know what knowledge the current refugee population possesses that may be part of some future attack on the financial and economic system of the EU or if some refugees worked on chemical or biological programs in their countries of origin.

Thanks David for this interview – and let´s start working towards a joint project on these topics of common professional and research interest!

Web-links:

https://www.cross-border.org/2014/10/21/dr-naim-on-illicit-trade/

https://www.cross-border.org/interviews/new-approaches-to-border-management/

Updates on Customs brokers, by Ms. Carol West

int-300116-1Hi Carol, and thanks for joining a CBRA Interview – can you first tell a bit who are you and what you do?

I am the President of the Canadian Society of Customs Brokers and the Secretary of the International Federation of Customs Brokers Associations, IFCBA. My office is in Ottawa, Canada. I have spent my professional life in the world of Customs, border management and trade facilitation. I am an advocate for the value and importance of customs brokers and I am passionate about the possibilities of Customs-business partnership, in Canada and worldwide. I believe strongly that building knowledge, investing in technology and managing relationships are critical to effective border management.

IFCBA and CBRA produced jointly the first survey study on future roles of customs brokers around 2004-2005. Looking now, in 2016, at the study outcomes: do you see that anything has changed or evolved in the “world of customs brokers” the way we anticipated a decade ago?

It is difficult to generalize as the role of a customs broker still differs so much between countries. The regulatory framework for licensing customs brokers and their scope of practice may be different, and the level of automation of a country’s Customs administration may influence the role of customs brokers in effective border management. Having said that, I believe that in the last decade the role of a customs broker as a trade facilitator has been even more effective than we had anticipated. Both importers and Customs recognize that knowledgeable, regulated customs brokers not only provide expedited navigation through and compliance with complex Customs requirements, they are widely used by businesses looking to reach new markets, with a minimum of cost and delay.

With Customs administrations automating their systems for risk management and implementing coordinated border management processes, there is also more focus on gathering information on the goods being imported prior to arrival, for admissibility and security purposes. In this context, the automation of carrier and cargo information is more important than it was ten years ago. With that in mind, the role of a customs broker is even more crucial today as the broker acts as a hub for all the data relating to a client’s transaction, ensuring its accuracy and compliance with Customs requirements.

Ten years ago, we thought that, by now, we would have made more progress with consistency of data requirements globally. There has been great work done by the World Customs Organization with its data model, but we still find that data requirements are not as harmonized or standardized as they could or should be.

From a business process standpoint, where licensed customs brokers exist they are used by the majority of importers – large multinational companies as well as small to medium enterprises. In a competitive marketplace, customs brokers are seeing more emphasis on performance measurement and key performance indications during the procurement process as well as in standard operations. Today, there is greater uncertainty in the business environment and increased complexity of the global supply chain. We think this also reflects the maturation of the brokerage industry where business managers focus on continuing improvements to their processes to reach maximum efficiencies in delivering value to clients.

By the way, are you aware of any recent research focusing on customs brokers, either on global or on national level?

The World Customs Organization, WCO conducted a survey of its members in 2015 on the subject of customs broker regulation and had an outstanding response rate. With many models of customs broker regulatory regimes among the WCO members, from no regulation to the mandatory use of a licensed customs broker, the results of the survey point to some opportunities for cooperation between Customs administrations and customs brokers, and, based on existing best practices, suggests considerations for a model for establishing a broker licensing system, particularly valuable where none exists today. It also offers ideas on engagement with customs brokers and other private sector players to enhance compliance and trade facilitation. We see this as a positive indicator of interest in issues that are of critical importance to the international customs broker community, and a sign that there is value in doing some additional work in this area.

From a customs broker’s perspective, which areas of global trade facilitation and supply chain security do you see as most important in 2016? What about the most difficult or challenging ones?

A very important development that might impact global trade is the Trans-Pacific Partnership, TTP. I say might because coming into force depends on the US Congress ratification of the agreement, and currently the rhetoric coming from Washington shows little support for it. I guess we’ll have to wait and see what happens. But assuming the TPP is ratified by the 12 signatories, even though it means elimination of tariffs and tariff barriers, it also means a more complex environment to navigate the multiple free trade agreements for the multi-national importers. Customs brokers as experts in rules of origin and compliance, in general will continue playing a very important role in the trade chain.

Looking a bit further out, one of the most challenging issues of the next 5 years will be the immense growth in e-commerce globally, and the pressure put on governments world-wide by online retailers to increase the de-minimis thresholds. It is projected that the online sales will reach US $3.5 trillion by 2020. That represents a lot of import duties that may not be collected and remitted if the de-minimis thresholds are increased or standardized. We expect that the impact of this will be seen differently depending on positions taken by national administrations given their own economic situations and pressures for competitiveness. Customs brokers will no doubt integrate any such changes into their compliance models and service offerings, keeping their clients’ interests and obligations foremost.

We can’t speak of challenges without mentioning the global trade slowdown we’ve experienced since the 2008 global financial crisis. Many factors seem to be contributing to the continued sluggishness which some consider cyclical others structural in nature. Regardless, governments have to remember that trade can be a powerful tool in their policy toolkit and customs brokers are natural allies in promoting its growth.

Any other greetings you would like to send to the CBRA Interview and Blog readers?

IFCBA will be holding its next World Conference in Shanghai 17-21 May, 2016, and the theme is “Facilitating Trade Through the Customs-Business Connection”. Hundreds of delegates from all regions of the world will be in attendance representing national customs brokers associations, international customs organizations such as the WCO, freight forwarding firms, shipping companies, cross-border e-commerce associations, world logistics enterprises, and many more. Our conferences are held only every two years, and we are very excited about sharing ideas and strategies for success with business and government colleagues from around the world.

Thanks a lot Carol for this concluding note – we just added the IFCBA World Conference to CBRA´s Events calendar – and thanks for the whole interview; maybe we can explore bit later this year on joint research, training or other project opportunities…!

 

Web-resources:

http://ifcba.org/

http://www.wcoomd.org/en/topics/facilitation/resources/~/~/media/234D5143B2344B918496C93F24B48586.ashx

https://www.internetretailer.com/2015/07/29/global-e-commerce-set-grow-25-2015

http://bruegel.org/2015/08/the-global-trade-slowdown-puzzle/

https://www.wto.org/english/news_e/pres15_e/pr752_e.htm

https://globalconnections.hsbc.com/global/en/tools-data/trade-forecasts/global

https://www.imf.org/external/pubs/ft/weo/2016/update/01/pdf/0116.pdf 

Related CBRA studies:  

Gutierrez, X., Hintsa, J., Wieser, P. and Hameri, A.P. (2005), “New roles for customs brokers in international supply chain”, Proceedings of First International Conference on Transportation Logistics (T-LOG), July 27-29, 2005, Singapore.

Hintsa, J., Mohanty, S., Tsikolenko, V., Ivens, B., Leischnig, A., Kähäri, P., Hameri, A.P., and Cadot, O. (2014), The import VAT and duty de-minimis in the European Union – Where should they be and what will be the impact? Final Report, Brussels, Belgium.