SUPPLY CHAIN SECURITY – CBP Works with International Entities to Promote Global Customs Security Standards and Initiatives, but Challenges Remain, GAO, August 2008 (CORE1009)

Summary: This report discusses how the US Customs and Border Protection (CBP) has (1) contributed to international supply chain security standards and (2) promoted mutual recognition in the customs security area and (3) how the agency expects to implement the 100% scanning requirement of the containerized US-bound maritime cargo. The report provides a detailed outlook on the US customs supply chain security scheme, and it highlights challenges and problems that the US government faces in promoting its supply chain security strategy internationally. The development and the implementation of the World Customs Organization’s (WCO) SAFE Framework of Standards, a suite of best practices on customs security, is a central theme throughout this GAO report. Because of its broad scope, the customs-related supply chain security, this document contains information that is likely to be useful for all CORE work packages, and especially for those that involve customs administrations. The report is available at http://www.gao.gov/assets/280/279730.pdf.

[s2If is_user_logged_in()]

Full review: This document provides a detailed outlook on customs-centric supply chain security from the US government’s perspective. This unique view on the customs security is going to be useful for the CORE’s early work packages that seek to describe the state-of-the-art of the global supply chain security. The information is also useful for the CORE demonstrations, in which customs administrations are involved. In particular, the demonstrations (WP9 and WP14) that are about US-bound trade and logistics benefit from the detailed description of the customs security initiatives that the US government has introduced since the 9/11 tragedy.

Cross-references:

  • Supply Chain Security: Challenges to Scanning 100 Percent of U.S.-Bound Cargo Containers. GAO-08-533T. Washington, D.C.: June 12, 2008.
  • Supply Chain Security: Examinations of High-Risk Cargo at Foreign Seaports Have Increased, but Improved Data Collection and Performance Measures Are Needed. GAO-08-187. Washington, D.C.: January 25, 2008.
  • Maritime Security: The SAFE Port Act: Status and Implementation One Year Later. GAO-08-126T. Washington, D.C.: October 30, 2007.
  • Maritime Security: One Year Later: A Progress Report on the SAFE Port Act. GAO-08-171T. Washington, D.C.: October 16, 2007.
  • Maritime Security: The SAFE Port Act and Efforts to Secure Our Nation’s Seaports. GAO-08-86T. Washington, D.C.: October 4, 2007.
  • Combating Nuclear Smuggling: Additional Actions Needed to Ensure Adequate Testing of Next Generation Radiation Detection Equipment. GAO-07-1247T. Washington, D.C.: September 18, 2007.
  • Maritime Security: Observations on Selected Aspects of the SAFE Port Act. GAO-07-754T. April 26, 2007.
  • Customs Revenue: Customs and Border Protection Needs to Improve Workforce Planning and Accountability. GAO-07-529. Washington, D.C.: April 12, 2007.
  • Cargo Container Inspections: Preliminary Observations on the Status of Efforts to Improve the Automated Targeting System. GAO-06-591T. Washington, D.C.: March 30, 2006.
  • Combating Nuclear Smuggling: Efforts to Deploy Radiation Detection Equipment in the United States and in Other Countries. GAO-05-840T. Washington, D.C.: June 21, 2005.
  • Container Security: A Flexible Staffing Model and Minimum Equipment Requirements Would Improve Overseas Targeting and Inspection Efforts. GAO-05-557. Washington, D.C.: April 26, 2005.

Additional keywords: Mutual recognition, regulatory harmonization, 100% scanning legislation, SAFE framework of standards, World Customs Organizations, Authorized Economic Operators (AEO) programs, Customs-Trade Partnership against Terrorism

CORE1009

[/s2If]

AVIATION SECURITY – Federal Efforts to Secure U.S.-Bound Air Cargo Are in the Early Stages and Could Be Strengthened, GAO, April 2007 (CORE1008)

Summary: This GAO reports reviews the current state and future challenges of the Transportation Security Administration’s (TSA) and the Customs and Border Protection’s (CBP) efforts for enhanced security of foreign origin US-bound air cargo. The report also discusses how the Department of Homeland Security (DHS) has reached out to the air cargo industry and foreign authorities in order to strengthen the international air cargo security. The GAO report recommends that the DHS would establish a risk-based air cargo security strategy, improve interagency communication nationally, to step up compliance monitoring for the air cargo industry’s stakeholders and to assess the foreign authorities’ intent and capabilities to meet US expectations on the air cargo security that is the foundation for mutual recognition and international harmonization of regulatory frameworks on the air cargo security. This GAO report is going to be useful for the CORE risk and education cluster as well as for all the demonstrations that involve shipping of air cargo by air. The report is available at http://www.gao.gov/assets/600/590789.pdf.

[s2If is_user_logged_in()]

Full review: This GAO report provides a comprehensive picture of the air cargo security in the US, in a country that is no doubt the leading force in supply chain security in general, and in air cargo security in particular. All CORE work that is related to air transport might benefit from the insights and information this GAO report offers. The DHL demonstration, that involves transport of parts for military aircraft from the US to Spain, is the most obvious work detail in CORE that can directly benefit from this GAO report. In addition, the CORE’s risk cluster can use the description of the US approach to risk-based air cargo security as a starting point when designing the CORE-specific risk-based strategies. Given that the report is very detailed and informative, the CORE’s education cluster can benefit from the report’s analysis and learn from its conclusions.

Cross-references:

  • GAO, Aviation Security: Federal Coordination for Responding to In-flight Security Threats Has Matured, but Procedures Can Be Strengthened, (Washington, D.C.: July 31, 2007).
  • GAO, Aviation Security: Transportation Security Administration May Face Resource and other Challenges in Developing a System to Screen All Cargo Transported on Passenger Aircraft
  • GAO, Aviation Security: Federal Efforts to Secure U.S.-Bound Air Cargo Are in the Early Stages and Could Be Strengthened, GAO-07-660 (Washington, D.C.: April 2007).
  • GAO, Aviation Security: Progress Made in Systematic Planning to Guide Key Investment Decisions, but More Work Remains, GAO-07-448T (Washington, D.C.: February 13, 2007).

Additional keywords: Air cargo security, mutual recognition, regulatory harmonization, screening, advance cargo information, and counterterrorism

CORE1008

[/s2If]

Border Agency Cooperation, Part 3 of 3

The last blog in our three-part series on Border Agency Cooperation introduces a conceptual framework capturing the essential dimensions of Border Agency Coordination: three levels of collaboration, four areas of integration and four objects for sharing. We hope that the framework helps the customs and other border agency communities to see all levels of Border Agency Cooperation (BAC) so that they can move from isolated coexistence towards more active cooperation at the borders. Higher levels of cooperation are likely to translate into higher levels of trade facilitation, control over cross-border cargo flows and resource efficiency, simultaneously. Compared with the previous BAC Blog Part 2, this BAC Blog Part 3 intends to present a comprehensive framework surrounding BAC ambitions, plans, implementations and monitoring activities – while the previous BAC Bloc 2 focused purely on a set of 15 key BAC actions, grouped according to the main beneficiary groups. This final BAC Blog has been written by Dr. Toni Männistö of CBRA.

Let’s start by first presenting the BAC diagram: Conceptual framework on Border Agency Cooperation (source: Männistö, T., and Hintsa J., 2015; inspired by Polner, 2011 and by Institute of Policy Studies, 2008)

blog-200516-1

Levels of cooperation

Intra-agency cooperation is about aligning goals and work within one organization, either horizontally between departments or vertically between headquarters and local branches, in particular border-crossing offices / stations. Ways to foster horizontal intra-agency cooperation include development of intranet networks, cross-training, inter-departmental rotation of staff, and establishment of joint task forces that tackle multifaceted challenges like transnational terrorism. Ideally, the vertical cooperation would be bi-directional: headquarters would define priorities and objectives and then communicate them to local branches. The branches would, reciprocally, send back status reports and suggest improvements to the general policies. Solving intra-agency cooperation lays a basis for broader cooperation: it’s hard for any organization to cooperate efficiently with external stakeholders if it struggles with internal problems. The logical first step in coordinated border management is therefore breaking departmental silos and building a culture of cooperation within boundaries of one organization.

Inter-agency cooperation, at the operational level, concerns relationships among a broad range of border agencies that play a role in controlling cross-border trade and travel. In many countries, primary agencies present at the borders include customs, border guards, immigration authorities and transport security agencies. However, also police organizations, health authorities, and phytosanitary and veterinary controllers, among others, take part in border management. According to a recent study, typical areas of customs- border guard inter-agency cooperation can include strategic planning, communication and information exchange, coordination of workflow of border crossing points, risk analysis, criminal investigations, joint operations, control outside border control points, mobile units, contingency/emergency, infrastructure and equipment sharing, and training and human resource management (CSD, 2011). Governmental inter-agency cooperation occurs between border control agencies and ministries and policy making bodies that are responsible for oversight and financing of border management activities.

International cooperation may take place locally at both sides of a border. One Stop Border Posts, OSBPs – border crossings managed jointly by two neighboring countries – are prime examples of such cooperation. One Stop Border Posts can involve various forms of collaboration: harmonization of documentation, shared maintenance of the infrastructure, joint or mutually recognized controls, exchange of data and information and common investments in infrastructure and so forth. Operational arrangements between the Norwegian, Finnish and Swedish customs illustrate advanced international cross-border cooperation that save time and money of border control authorities and trading companies. The cooperation builds on division of labor, where the national border authorities of each country are allowed to provide services and exercise legal powers of their home country and neighboring countries. For instance, when goods are exported from Norway, all paperwork related to both exports and imports may be attended by either Swedish, Finnish or Norwegian customs office (Norwegian Customs, 2011). At the political level, this requires international cooperation between authorities and policy makers in two or more countries. Operational cooperation (e.g., mutual recognition of controls or regional Single Window), often bringing tangible trade facilitation benefits, usually follows from political, supranational decisions (e.g., the WCO’s Revised Kyoto Convention and SAFE Framework of Standards).

Areas of integration

Technical integration often entails improving connectivity and interoperability of information and communication technology systems within and across organizations. Single Window solutions are typical outcomes of technical cooperation as they enable automatic exchange of electronic trade information among border control agencies. The UN Centre for Trade Facilitation and Electronic Business, UN/CEFACT, is an important international organization helping to build connectivity across countries and between business and governmental stakeholders. UN/CEFACT, for instance, develops and maintains globally recognized standards for EDI messages.

Operational integration is largely about coordination of inspection and auditing activities among border control agencies. Benefits of synchronized activities are evident: organizing necessary controls at one place and at the same time reduces delays and administrative burden that trading companies and travelers face at borders. A simple and powerful example of operational integration is coordination of opening hours and days of customs offices at the both sides of a border. Operational integration also covers provision of mutual administrative assistance, joint criminal investigations and prosecution, and sharing of customs intelligence and other information.

Legislative integration seeks to remove legal barriers and ambiguities that prevent border control agencies from exchanging information, sharing responsibilities or otherwise deepening their cooperation. Essentially, most forms of Border Agency Coordination require some degree of legislative harmonization and political commitment. For example, Article 8 of the WTO/TFA to the WTO Members requires that national authorities and agencies responsible for border controls and dealing with the importation, exportation and transit of goods must cooperate with one another and coordinate their activities in order to facilitate trade.

Institutional integration is about restructuring roles and responsibilities of border controls agencies. An example of a major restructuring is the annexing of US border control agencies – including the US Customs and Border Protection, Transportation Security Administration and Coast Guard – into the Department of Homeland Security, DHS, a body that took over the key governmental functions involved in the US non-military counter-terrorism efforts in the aftermaths of the September 11th, 2001, terrorist attacks.

Objects of sharing

Sharing of information – data, knowledge and intelligence – reduce duplicate work (e.g., sharing of audit findings), enable operational coordination (e.g., synchronized border controls) and facilitate development of common agenda for future border agency coordination. At the global level, the WCO’s Customs Enforcement Network CEN is an example of a trusted communication system for exchanging information and intelligence, especially seizure records, between customs officials worldwide. Another WCO initiative, the Globally Networked Customs, analyzes potential to further “rationalize, harmonize and standardize the secure and efficient exchange of information between WCO Members” (WCO 2015).

Resource sharing involves multi-agency joint investments in equipment, facilities, IT systems, databases, expertise and other common resources. The joint investment activities are likely to result in higher resource utilization and bulk purchasing discounts. For example, national and regional Single Window solutions are often outcomes of joint development and investment activities of various government agencies.

Sharing of work is mostly about rationalization of overlapping border control activities, controls and formalities. If two border control agencies, for instance, agree to recognize each other’s controls, there is no need to control the same goods more than once. Combining forces to investigate and prosecute crime also often help border control agencies to use their limited resources more efficiently.

Sharing of responsibilities is about coordinating and streamlining administrative and control tasks among border control agencies. Norway, again, sets a good example of sharing the responsibilities. The Norwegian customs represents all other border control agencies – except the veterinary office – at the frontier. Customs officers are responsible for routine border formalities, and they summon representatives of other border control agencies as and when the officers need assistance. Internationally, the Norwegian customs cooperates closely with Swedish and Finnish border control authorities at the Northern Scandinavian border posts. Bilateral agreements between its neighbors allow Norwegian customs officers authority to perform most customs checks and formalities for and on behalf of their Swedish and Finnish colleagues. The coordination decreases border-crossing times and lowers administrative costs for trading companies and the border control agencies in the three countries.

This concludes now our three-part series on Border Agency Cooperation. In Part 1, we shared an illustrative worst case example on how complex, slow and expensive a cross-border supply chain execution comes when no cooperation takes place between relevant government agencies, neither nationally nor internationally. In Part 2, we presented a conceptual BAC model with 15 key actions to improve the degree of cooperation in a given country or region – for the direct benefit of supply chain companies, or government agencies, or both. And in this Part 3, we finally presented our comprehensive BAC framework, which hopefully helps government policy makers and border agencies to design, implement and monitor their future BAC programs and initiatives in an effective and transparent manner. Toni Männistö and Juha Hintsa.

Bibliography:

Center for the Study of Democracy (CSD), 2011. “Better Management of EU Borders through Cooperation”, Study to Identify Best Practices on the Cooperation Between Border Guards and Customs Administrations Working at the External Borders of the EU.

Institute of Policy Studies 2008, Better connected services for Kiwis: a discussion document for managers and front-line staff on better joining up the horizontal and vertical, Institute of Policy Studies, Wellington, NZ.

Männistö, T., and Hintsa J., “Theory of Border Agency Cooperation”, CBRA working paper 2015, Lausanne, Switzerland.

Norwegian Customs, 2011. Case Study on Border Agency Cooperation Submitted by Norway for the November Symposium.

Polner, M. (2011). Coordinated border management: from theory to practice. World Customs Journal, 5(2), 49-61.

United Nations Conference on Trade and Development (UNCTAD), 2011 Border Agency Coordination”, UNCTAD Trust Fund for Trade Facilitation Negotiations Technical Note No. 14.

TRANSPORTATION SECURITY – Action Needed to Strengthen TSA’s Security Threat Assessment Process, GAO, 2013 (CORE1015)

Summary: The GAO report is about measuring the performance of the Adjudication Centre that is a department within the Transportation Security Administration (TSA) responsible for administering background checks for people who need access to secure facilities unescorted. The centre issues the access credentials based on a through vetting of the applicant’s criminal history, immigration status, and connections to terrorist groups, among other checks. The report argues that the Adjunction Centre could improve the efficiency of the background checks – the individual security threat assessment – by improving its performance measurement system through better data and indicators. Although this GAO report focuses on a rather narrow topic, management of the background checking process, the report’s insights could benefit the CORE’s risk management cluster and those demonstrations that deal with access control matters. The report is available at: http://gao.gov/assets/660/656051.pdf

[s2If is_user_logged_in()]

Full review: This GAO document is closely related to the work the CORE’s risk cluster. The report describes problems the TSA’s Adjudication Centre faces when it manages the background checking process of the US-based transportation worker identification credentials (TWIC), hazardous materials endorsements (HME) and Aviation Worker (AV) authorization programs. Moreover, since access control is a central security solution in nearly all CORE demonstrators, the demonstrations might benefit from tips and guidance this report offers. At the final stages of the project, this GAO report might prove a useful document when the project consortium produces training materials on how to manage access control systems and how to administer background checks.

Cross-references:

  • Port Risk Management: Additional Federal Guidance Would Aid Ports in Disaster Planning and Recovery. GAO-07-412. Washington, D.C.: March 28, 2007.
  • Critical Infrastructure Protection: An Implementation Strategy Could Advance DHS’s Coordination of Resilience Efforts across Ports and Other Infrastructure. GAO-13-11. Washington, D.C.: October 25, 2012.

CORE1015

Additional keywords: Terrorism, background checks

[/s2If]

SUPPLY CHAIN SECURITY – CBP Needs to Conduct Regular Assessments of Its Cargo Targeting System, GAO, October 2012 (CORE1014)

Summary: The US maritime security strategy uses advance cargo information to assess risk levels of US-bound maritime shipping containers. This GAO report reviews how the Automated Targeting System, a web-based computer program that calculates risk scores for the containers, support the US Customs and Border Protection’s (CBP) targeting efforts. The report argues that CBP could improve its targeting program by establishing sound procedures and criteria for assessing the performance of the targeting activity. This GAO report contains information about the US risk-based shipment targeting solution that benefit the CORE’s risk and IT clusters. The US-related demonstrations may also find the report’s information useful. The report is available at: http://gao.gov/assets/650/649695.pdf

[s2If is_user_logged_in()]

Full review: The risk targeting systems are part of governments’ supply chain security programs worldwide. The GAO reports gives unparalleled, detailed information about the principles that the US authorities follow to collect and analyse data about cargo movements that allow them to calculate risk scores for US-bound maritime shipping containers. The CORE’s risk cluster should pay attention to this information and learn how risk-based screening and examination of maritime shipping containers has been organized in the US, in the leading country of supply chain security. The report reveals useful information about IT infrastructure that support the risk targeting system, therefore providing a sound reference material for the CORE’s IT cluster. Project partners engaged in the CORE’s demonstrations – logistics operators, authorities and technology providers – benefit from the report’s description of the US automated targeting system (ATS) that play an important security role in the US-bound maritime trade and logistics.

Cross-references:

  • Supply Chain Security: Container Security Programs Have Matured, but Uncertainty Persists over the Future of 100 Percent Scanning. GAO-12-422T. Washington, D.C.: February 7, 2012.
  • Supply Chain Security: Feasibility and Cost-Benefit Analysis Would Assist DHS and Congress in Assessing and Implementing the Requirement to Scan 100 Percent of U.S.-Bound Containers. GAO-10-12. Washington, D.C.: October 30, 2009.
  • Supply Chain Security: CBP Has Made Progress in Assisting the Trade Industry in Implementing the New Importer Security Filing Requirements, but Some Challenges Remain. GAO-10-841. Washington, D.C.: September 10, 2010.

CORE1014

Additional keywords: Terrorism, automated targeting system (ATS), 24-hour rule, the importer security filing and additional carrier requirements (10 + 2 rule)

[/s2If]

MARITIME SECURITY – Progress and Challenges 10 Years after the Maritime Transportation Security Act, GAO, September 2012 (CORE1013)

Summary: This GAO report reviews how the US government has advanced maritime security since the introduction of the Maritime Transportation Security Act (MTSA) in 2002 and what kind of challenges the Department of Homeland Security (DHS) and its component agencies have encountered in translating the Act’s requirements into practice. The report describes in detail the character, progress and future vision of main US maritime security programs, which, according to the report, fall into four domains: (1) security planning, (2) port and vessel security, (3) maritime domain awareness and information exchange and (4) international supply chain security. The report points out that the US maritime security scheme calls for further improvements in the areas of (1) program management and implementation, (2) partnerships and collaboration, (3) resources, funding, and sustainability as well as (4) performance measures.  This report describes the entire field of US maritime security, and this information is very useful for CORE demonstrations that involve shipping into, through or out of the US ports. The report is available at: http://www.gao.gov/assets/650/647999.pdf

[s2If is_user_logged_in()]

Full review: This scope of this GAO document is broad as it covers the entire US maritime security, its many themes from funding to practical initiatives and risk assessment. CORE’s demonstrations that involve US-related maritime shipping can use this document to get a comprehensive and detailed information about the status and future challenges of the US maritime security scheme. Also the CORE’s risk cluster can use this document to analyze how the US government has established a risk-based, layered security system to protect the seaborne trade and logistics from terrorism, smuggling and other criminal activities. Because of the complete description of the US maritime security scheme, the report is excellent reference material for producing training material and educational contents in the CORE training cluster.

Cross-references:

  • Maritime Security: DHS Progress and Challenges in Key Areas of Port Security. GAO-10-940T. Washington, D.C.: July 21, 2010. See pages 10-11.
  • Maritime Security: The SAFE Port Act: Status and Implementation One Year Later. GAO-08-126T. Washington, D.C.: October 30, 2007. See pages 15-19.
  • Information on Port Security in the Caribbean Basin. GAO-07-804R. Washington, D.C.: June 29, 2007.
  • Supply Chain Security: Container Security Programs Have Matured, but Uncertainty Persists over the Future of 100 Percent Scanning. GAO-12-422T. Washington, D.C.: February 7, 2012. See pages 13-14.
  • Supply Chain Security: Feasibility and Cost-Benefit Analysis Would Assist DHS and Congress in Assessing and Implementing the Requirement to Scan 100 Percent of U.S.-Bound Containers. GAO-10-12. Washington, D.C.: October 30, 2009. See pages 41-43.
  • Supply Chain Security: U.S. Customs and Border Protection Has Enhanced Its Partnership with Import Trade Sectors, but Challenges Remain in Verifying Security Practices. GAO-08-240. Washington, D.C.: April 25, 2008.

CORE1013

Additional keywords: Maritime Transportation Security Act, Secure Freight Initiative, Customs-Trade Partnership Against Terrorism (C-TPAT), Container Security Initiative (CSI), risk assessment, container screening, counter-terrorism, maritime security

[/s2If]

Criminalization of global supply chains, by Mr. Hamon

Hi David, and thanks for joining a CBRA Interview – can you first tell a bit who are you and what you do?

I served in the US Army as a logistician, served with the United Nations Peacekeeping Department as well as work with the UN humanitarian organizations.  I recently retired from a not-for-profit government contractor to pursue more creative work.  Whilst at the latter position I was seconded to the US Defense Department, first in African Affairs, and then as Research and Studies Director for a strategic studies office within a US Defense Agency.  I currently work, mostly independently, on a great many things related to future threats and re-defining of security/stability as it pertains and impacts diplomacy, development, defense, society, and economics/finance.

We met first time in Lausanne, Switzerland, around 2005 – what was that roundtable event again about?

Many years before cyber based terror threats were on the radar, we launched an inquiry into what we termed “Economic/Financial Terrorism” and whether security threats emanating from terrorism in the future would take the form of attacks on the Western system of finance and the economy.  We brought in a host of experts from the US and Europe to debate the changing face of terrorism and likely goals of future terror groups.  We examined everything from evolving ideology, motivation and intent, culture and identity to strategy, tactics, targets, weapons, and groups.  It was an extremely interesting event with industry admitting – at the time – they were not prepared for this phenomenon and governments largely split on the issue.  Additionally, experts and think tanks disagreed on whether economic terrorism was tangible.  It was very forward-looking for its time.  All participants came away with greater awareness on the subject as we went above and beyond what is currently called “financial crimes,” exploring potential kinetic based threats terror groups would use against the economic and financial machinery that included physical attacks on the supply chain, tourist industry, psychological undermining of the Western economic system to disrupt the normal provision of goods and services.

Can you tell more about your views on ´criminalization of global supply chains´?

I take similar views on the subject as Dr. Moisés Naim, in his 2005 book ‘Illicit: How smugglers, traffickers, and copycats are hijacking the global economy.’ He addresses several tenants that remain true today including the role of governments, technology, the Illicit traders mimicking licit trade and logistics actors – while simultaneously collaborating with many of them, and criminal groups seek high-profit opportunities as opposed to any other attribution (see CBRA Blog 21 October 2014).  Terror groups care less about profit but when thinking about logistics networks, what if the two groups collaborated?  Today logistics systems are more complex and move faster than ever in history, have less margin to fail, are far less ‘hands-on’ and offer many ways and places to hide illegal activity.  Detection and interdiction of this activity isn’t exclusively in the realm of governments. Industry has a role to play if it wishes to minimize new regulations, taxes, deter corruption, and other drains on efficiency and profit.  Experts, both public and private, rarely take a systems approach to detecting criminal activity with much throughput going undetected.  Both parties want to specialize on one aspect and miss the big picture.  A good example was the AQ Khan network.  How long has it been since industry has undertaken an assessment of whether there is a new “Khan” network out there?  Do trade organizations war-game with governments on criminality within supply chains?

Interesting! What are your views on ‘multi-commodity trafficking / crime portfolios’?

At the last corporate organization where I worked my team did some analysis on unregulated, illegal fishing as a security threat to Pacific Island nations.  In the course of this analysis, we discovered it was the same actors doing the illegal fishing as doing illegal dumping, illegal smuggling, illegal trafficking, among other illicit activities.  The criminality was only one aspect of the supply chain as the “demand” side as well as the delivery side was entirely legal and within businesses who conduct practically all business legally.  The same boats as platforms – and their crews – were used to conduct all activity legal and illegal and to the local authorities – as well as donor nations attempting to help – it was impossible to project accurately when the activity would switch between licit and illicit.  We couldn’t analyze if this was a regional or global phenomena but I guess it was a widely copied practice.  As Anthony Barone has pointed out, border management and controls are not the panacea of containment but need to be part of a larger practice (see CBRA Interview 18 December 2015). Criminals use technology just as effectively!  His idea of assembling a group of independent experts to rethink new approaches to border management – and I might add, redefining the meaning of borders and how thinking differently about borders per se – is a good start.   Using strategic foresight come up with several alternative futures to present to a dedicated [supply chain] private-public partnership empowered to make changes would be my overarching recommendation

Sounds that the global supply chain community is facing increasingly more threats and risks! Any other suggestions on how to improve the situation, both short term and long term?

In the short term, as I mentioned, conduct a public-private-partnership exercise to rethink the concept supply chain surveillance for illicit activity and anticipating new and emerging illicit activity.  In the long run, we don’t give enough thought to knowledge as a part of the supply chain.  Using the supply chain for illicit activity begins with motivation and intent getting out in front of those who may do harm.  To address alternative futures will take some innovation and creativity, but the stakes are high.  The next AQ Khan Network may bring very bad things into Europe (and beyond!) compliments of ISIS.  We don’t know what knowledge the current refugee population possesses that may be part of some future attack on the financial and economic system of the EU or if some refugees worked on chemical or biological programs in their countries of origin.

Thanks David for this interview – and let´s start working towards a joint project on these topics of common professional and research interest!

Web-links:

https://www.cross-border.org/2014/10/21/dr-naim-on-illicit-trade/

https://www.cross-border.org/interviews/new-approaches-to-border-management/

Border Agency Cooperation, Part 2 of 3

Our second blog on Border Agency Cooperation (BAC) focuses on a conceptual model developed by CBRA. We have crafted this “CBRA-BAC15” diagram to visualize a set of key BAC actions and primary beneficiaries, with contributions by Dr. Toni Männistö (supply chain security post-doc researcher at CBRA), Mr. Gerwin Zomer (TNO, technical manager for the FP7-CORE project) and by Ms. Susana Wong Chan (education and training materials developer at CBRA).BAC-1

The diagram is cut to three sectors: on left side, the supply chain companies are the primary beneficiaries of BAC actions; on the right side, the government agencies form the primary beneficiary group; and on the bottom area, both supply chain companies as well as government agencies benefit from BAC actions. Each of these three sectors contains five examples of concrete border agency cooperation actions – 15 in total – explained in a moment by using real examples, whenever available in the literature or by expert suggestions. In the center of the diagram lies a circle with the more generic “smart cross-border improvement actions”, applicable to virtually any work in global trade facilitation.

The diagram should not be considered exhaustive, when it comes to all optional actions to improve BAC in a given country or region or globally. Some of the 15 key actions may be strongly interconnected, or, partially overlapping. Some of them may apply mainly on national multi-agency environment, and some of them mainly on international e.g. customs-to-customs environment. Also, the division of the key actions into the three beneficiary groups can and should be challenged, by the interested audiences. But, let´s start now by listing and illustrating the key 15 BAC actions:

Supply chain companies as the primary beneficiary (left sector in the diagram). The following five BAC actions can bring immediate benefits to the companies operating in supply chains, in terms of saving administrative costs and speeding up the supply chain – less work dealing with various certifications and audit visits, less variation and IT costs with import/export data filing and less waiting times at the borders.

  • Harmonized ´trusted trader´ & other certification programs: In the European Union, the European Commission´s implementing regulation (No. 889/2014) updates the references to the aviation security legislation in force, including recognition of the Known Consignor (KC) status and its relevance to Authorized Economic Operator (AEO), and framing the scope of recognition of the common requirements between the respective programs.
  • Coordinated company visits & audits: Closely linked to the previous BAC-action, in the Netherlands, the Dutch Customs executes joint audits on AEO security (customs) and known consignor/regulated agent (air cargo) with the Dutch Immigration and air-police agency – during the application phase, as well as during periodical audits.
  • Harmonized data filing requirements: Despite a global, harmonized data model, harmonized tariff codes and standards on clearance procedures, there are many differences in operational import, export and transit procedures and information requirements between countries. This results in additional complexity of IT systems for globally operating traders and logistic service providers. An example is the pre-arrival security declarations, where harmonization would be most useful e.g. between the Importer Security Filing, “10+2” in the US and the Entry Summary Declaration in Europe – Multiple Filing, supported by Standard Trader Interface, under development within the Union Customs Code, UCC.
  • Synchronized border interventions & inspections: The Article 4 of the Greater Mekong Sub-region Cross Border Transport Agreement on Facilitation of Border Crossing Formalities calls upon the contracting parties to progressively adopt measures to simplify and expedite border formalities by carrying out joint and simultaneous inspection of goods and people by respective competent authorities of agencies such as customs, immigration, trade, agriculture, and health. It further provides for single-stop inspection and urges the national authorities of adjacent countries to carry out joint and simultaneous inspections.
  • Harmonized operating hours: This applies particularly in the context of two neighboring country customs offices – having same opening hours across the border helps to maximize the daily throughput volumes. As the Article 8 of the World Trade Organization´s Trade Facilitation Agreement puts it, “Each Member shall, to the extent possible and practicable, cooperate on mutually agreed terms with other Members with whom it shares a common border with a view to coordinating procedures at border crossings to facilitate cross-border trade. Such cooperation and coordination may include: … alignment of working days and hours … “. In the ASEAN region, the Article 7 of the ASEAN Framework Agreement on the Facilitation of Goods in Transit urges the contracting parties to “coordinate working hours of the adjacent border posts”.

Government agencies themselves as the primary beneficiary (right sector in the diagram). The following five BAC actions can provide instant benefits for the cooperating government agencies, in terms of cost savings and improved efficiency – in other words, identifying more violations and catching more bad guys with less total spending.

  • Sharing of agency intelligence, information & data: Customs Mutual Assistance Agreements (CMAAS), signed bilaterally by Canada Border Services Agency (CBSA) and eight counterparties during years 1979-2010 (European Community, France, Germany, Mexico, the Netherlands, South Africa, South Korea and the United States) provide Canada with a legal basis to share customs information to prevent, investigate and combat customs offences, particularly customs fraud, and to provide reciprocal mutual assistance to ensure the proper application of customs laws. Under CMAAs Canada may share customs information pertaining to: persons, goods and means of transport; activities planned, on-going, or completed, that constitute or appear to constitute a customs offence in the territory of the country requesting the data; proven law enforcement techniques; new and emerging trends, means or methods of committing customs offences; and facilitation of risk assessment activities, within the mandate and authority of the CBSA.
  • Joint investments in common resource pools (equipment, facilities etc.): In Finland the Customs Administration and the Border Guard share common premises and equipment. Each authority has a designated role in the servicing and maintenance of the equipment. X-ray machines are largely the responsibility of Customs. Road-testing equipment, such as lorry brake-testing pads, is also maintained by Customs. All equipment can be shared and operated by each agency upon request. Thus, although the equipment belongs to one agency, it can be easily relocated to the other agency, enabling smoother processing of the workflow without unnecessary and lengthy administrative procedures, thereby reducing costs.
  • Joint teams: In the Netherlands, “HARC” – Hit and Run Cargo Rotterdam team, is a joint operation of Dutch Maritime Police, Dutch Customs, the Fiscal and Economic Crime Agency and the Ministry of Justice collaborating operationally in narcotics enforcement. Joint teams differ from Joint operations below by being a long-term / permanent set-up; while Joint operations “come and go”.
  • Joint operations: A joint operation Meerkat, (23-27 July 2012) involving the World Customs Organization and INTERPOL against the illicit trafficking of cigarettes, tobacco and alcohol in East and Southern Africa, resulted in the seizure of tons of illicitly traded products in seven countries. Operation Meerkat saw Customs and police authorities carry out some 40 raids at seaports, inland border crossing points, markets and shops in Angola, Kenya, Mozambique, Namibia, South Africa, Tanzania and Zimbabwe. More than 32 million cigarettes – equivalent to 1.6 million packets, 134 tons of raw tobacco and almost 3,000 liters of alcohol were seized, resulting in national authorities initiating a number of administrative investigations into tax evasion and other potential criminal offences.
  • Collaborative criminal investigations & prosecutions: In the United States the Border Enforcement Security Task Force (BEST) units gather officers from more than 100 different law enforcement agencies under one roof. The objective is to identify, investigate, disrupt and dismantle transnational organizations posing the greatest threat to border security, public safety and national security, by employing the full range of federal, state, local, tribal and international law enforcement resources. Over the years, the BEST has become a successful interagency law enforcement collaboration model that’s keeping the US safer.

Both supply chain companies as well as government agencies as beneficiaries (bottom sector). The five BAC actions can bring instant benefits to all parties in cross-border supply chains, in terms of lowering costs and improving performance, from supply chain company and from governmental agency perspectives.

  • ‘Single window’ -type import/ export/ transit data submissions: In the Netherlands, the authorities have designed Digipoort, the government’s ‘electronic post office’ for businesses. It provides the communication infrastructure for the exchange of digital information between companies and government authorities. Digipoort enables companies to submit import and export information at a single entry point aimed at multiple government authorities.
  • Common risk indicators, risk profiles & targeting systems: In Finland, common databases are linked to the different agencies’ operational and risk management databases, leading to a common approach when a ‘signal’ is recorded. Some control and enforcement officers have access to each other’s systems on a need-to-know basis, with levels of restricted access determined by rank and functional responsibility.
  • Mutual recognition of supply chain inspection procedures & outcomes: As part of the European Union funded research and development project FP7-CORE ( http://www.coreproject.eu/ ), the phytosanitary and customs administrations in Kenya and the Netherlands are working towards mutual recognition of controls carried out by Kenyan authorities, as well as the exploitation of digital phytosanitary certificates and other trade documents, between the two countries. Outside of the research world, mutual recognitions (MR) of customs inspections are being explored in the context of EU MR Agreements, for example with Japan.
  • Cross-training and empowering manpower: In Finland, Customs officers have been trained by the Border Guard to inspect identification documents and visas, among other procedures. Border guards have, in turn, received basic Customs training, which includes the search of vehicles and the recognition of prohibited and restricted goods, such as drugs, alcohol, and counterfeit items.
  • Joint public-private partnership arrangements, training sessions etc.: In 2011 in Hong Kong, the Customs and Excise Department established a Joint Liaison Group with the representatives of shippers, freight forwarders and truck drivers for exchanging operational views and comments on the Road Cargo System “ROCARS”. Moreover, Customs also launched an extensive publicity program and established outreach teams to assist the industry stakeholders to get used to the ROCARS. Following other government departments are listed on the ROCARS web-site http://www.rocars.gov.hk/ : Commerce and Economic Development Bureau, Census and Statistics Department, and Transport Department.

Finally, the center circle of the CBRA-BAC15 diagram highlights the basic, classical principles of trade facilitation – naturally in the context of multiple agencies dealing with cross-border regulations, procedures, IT-systems and data requirements:

  • Simplification & Harmonization: agencies work together with the first aim to streamline certification requirements and procedures, to minimize the number of data elements required from traders etc.; and the second aim to unify the rules and requirements facing supply chain companies.
  • Interoperability & Synchronization: agencies invest in improving interoperability between their inspection technologies, IT-systems etc.; they also work together to better synchronize their supervision and control processes, particularly for the benefit of supply chain companies.
  • Transparency & Predictability: agencies keep each other well informed of their current regulations, procedures, operations etc., as well as planned future changes – such proactive approach helps to minimize surprises and related hassles.

This concludes the second of three parts of our Border Agency Cooperation (BAC) blog. In Part 3 – to be published sometime in February – we focus on the overarching institutional arrangements on Border Agency Cooperation, including establishment of single border agencies (e.g. in the US and Australia); creation of one-stop border posts, OSBPs (multiple examples across the world); carrying work permanently on behalf of other agencies etc. We also plan to discuss bit more on the benefits and costs of BAC, as well as the main challenges and obstacles in BAC-projects across the globe. Talk to you again in February, Juha Hintsa.

 

Bibliography / sources for the examples and cases attached to the 15 BAC key actions:

  • Harmonized ´trusted trader´ & other certification programs: Commission Implementing Regulation (EU) No 889/2014 of 14 August 2014 amending Regulation (EEC) No 2454/93, as regards recognition of the common security requirements under the regulated agent and known consignor programme and the Authorised Economic Operator programme.
  • Coordinated company visits & audits: Email exchange with a Dutch Customs expert
  • Harmonized data filing arrangements: Interview with a Dutch supply chain and trade facilitation expert (29 January 2016); and AnNa Master Plan Extended Collaboration Project Book, December 2015. Available for download at: http://www.annamsw.eu/
  • Synchronized border interventions & inspections: Jain, S.R. (2012), “Coordinated Border Management: The Experience of Asia and the Pacific Region”, World Customs Journal, Vol. 6 No.1. (CBM25).
  • Harmonized operating hours: Article 8 (Border Agency Cooperation) of the WTO Agreement on Trade Facilitation of 15 July 2014; and Jain, S.R. (2012), “Coordinated Border Management: The Experience of Asia and the Pacific Region”, World Customs Journal, Vol. 6 No.1.
  • Sharing of agency intelligence, information & data: “Customs Cooperation Case Study for Canada”, paper submitted by Canada (Canada Border Services Agency – CBSA) for the July 2012 WTO Symposium on Trade Facilitation.
  • Joint investments in common resource pools (equipment, facilities etc.): “Coordinated Border Management”, WCO News, February 2015, No. 76.
  • Joint teams: “Customs find cocaine buried in cocoa bean shipment”, NL Times 25.5.2015, Available online at: http://www.nltimes.nl/2015/05/25/customs-finds-cocaine-buried-in-cocoa-bean-shipment/ (accessed 28 January 2016).
  • Joint operations: “WCO and INTERPOL joint operation against illicit trafficking in Africa leads to tobacco and alcohol seizures”, WCO Press Release, 27 August 2012. Available online at:   http://www.wcoomd.org/en/media/newsroom/2012/august/operation-meerkat.aspx (accessed 28 January 2016).
  • Collaborative criminal investigations & prosecutions: “Coordinated Border Management”, WCO News, February 2015, No. 76
  • ‘Single window’ –type import/ export/ transit data submissions: “Coordinated Border Management”, WCO News, February 2015, No. 76.
  • Common risk indicators, risk profiles & targeting systems: “Coordinated Border Management”, WCO News, February 2015, No. 76.
  • Mutual recognition of supply chain inspection procedures & outcomes: The Consistently Optimised REsilient ecosystem, CORE FP7 project, EU. See online at: http://www.coreproject.eu/ (accessed 28 January 2016).
  • Cross-training and empowering manpower: “Coordinated Border Management”, WCO News, February 2015, No. 76.
  • Joint public-private partnership arrangements, training sessions etc.: “Road Cargo System (ROCARS) (Hong Kong China)”. Available online at: http://www.wcoomd.org/en/topics/wco-implementing-the-wto-atf/atf/border-agency-cooperation.aspx (accessed 28 January 2016).

COMMISSION IMPLEMENTING REGULATION (EU) No 889/2014 of 14 August 2014 amending Regulation (EEC) No 2454/93, as regards recognition of the common security requirements under the regulated agent and known consignor programme and the Authorised Economic Operator programme, 2014 (CORE1069)

Summary: Existing customs Regulation ((EEC) No 2913/92 establishing the Community Customs Code) and aviation legislation (Regulation (EC) No 300/2008) provides for certain recognition of the certifications under the respective programmes, in particular with regard to the security examinations done for each of them. Regulation (EU) No 889/2014 is necessary for the recognition of the known consignor status with its relevance for the AEO as well, frame the scope of recognition of the common requirements between the respective programmes and allow for the necessary exchange of information between customs and aviation authorities. The 889/2014 is available for download at: http://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32014R0889&from=EN.

[s2If is_user_logged_in()]

Full review: Commission Regulation (EEC) No 2454/93 now provides that if the applicant for Authorised Economic Operator (AEO) status is already a regulated agent or a known consignor, the criterion on ‘appropriate security and safety standards’ shall be deemed to be met in relation to the premises for which the economic operator obtained the status of regulated agent or known consignor. Points 6.3.1.2 and 6.4.1.2 of the Annex to Commission Regulation (EU) No 185/2010 (4) provide that the appropriate authority, or independent validator acting on its behalf, should take into account whether or not the applicant for regulated agent or known consignor is a holder of an AEO certificate.

The practical implementation of both the customs legislation governing the AEO status and the aviation legislation governing the regulated agent and known consignor has shown that the existing recognition between the programmes is not sufficient to ensure the highest possible synergies between the respective security programmes. The security requirements for both the aviation security regulated agent and known consignor programme and for the customs AEO programme are equivalent to such an extent that both programmes may be aligned further.

Further alignment of both programmes in terms of equal level of recognition, including required exchange of information is necessary in order to decrease the administrative burden for the economic sector concerned and government authorities (both customs and civil aviation) while strengthening further the current level of security.

Regulation (EU) No 889/2014 is necessary for the recognition of the known consignor status with its relevance for the AEO as well, frame the scope of recognition of the common requirements between the respective programmes and allow for the necessary exchange of information between customs and aviation authorities.

The issuing customs authority shall immediately make available to the appropriate national authority responsible for civil aviation security the following minimum information related to the status of authorised economic operator which it has at its disposal:

  • the AEO certificate – security and safety (AEOS) and AEO certificate – customs simplifications/security and safety (AEOF) including the name of the holder of the certificate and, where applicable, their amendment or revocation or the suspension of the status of authorised economic operator and the reasons therefore;
  • information about whether the specific site concerned has been visited by customs authorities, the date of the last visit and the purpose for the visit (authorisation process, reassessment, monitoring); and
  • any reassessments of AEOS and AEOF certificates and the results thereof.

Relevance for CORE: The CORE implementation objectives, which specify what will be done and how to reach the vision, are all subject to the Policies, Regulations, and Standards that exist within the Security Domain of the Global Supply Chain. The following Work Packages are directly impacted by the implementing regulation (EU) No 889/2014:

  • Research and Analysis: Undertake requirements analysis and impact assessment. The project will undertake requirements analysis from different perspectives. In WP1 we will consolidate reviews of SCS regulations policies and standards from Reference Projects and specify implementation support requirements.
  • The Demonstrators: The CORE demonstrators will validate the applicability and benefits of the CORE approach in representative operating scenarios characteristic of the global supply chain. They will specifically show the way towards a Global Secure Supply Chain. The overriding goal is to demonstrate substantial gains in security and facilitation covering every major facet of the supply chain security sector.

The CORE demonstrators affected by the implementing regulation (EU) No 889/2014 are:

  • WP12: Demonstrator Schiphol – apply global data pipeline concept to air cargo supply chains, managing air freight specific trade compliance requirements, and offering supply chain visibility in dashboards. Trade lanes with e.g. Africa, involving multiple inspection authorities.
  • WP17: DHL Demonstrator – managing airfreight trade compliance requirements EU-US in the context of fast supplying of parts.

Also, WP19 is affected here: Stakeholder Engagement – Knowledge Diffusion and Sustainable Development. Specify and apply an inclusive Stakeholder Engagement Strategy emphasizing international co-operation to promote harmonization of regulations, and to support further development and implementation of international standards.

Cross-references and citations:

  • http://ec.europa.eu/transport/modes/air/security/
  • Regulation (EEC) No 2913/92. EU Regulation establishing the Community Customs Code.
  • Regulation (EC) No 300/2008. EU Regulation on common rules in the field of civil aviation security allows that entities complying with certain conditions and requirements may be certified to ensure and contribute to a secure supply chain.
  • Barosso, J. (2014), “COMMISSION IMPLEMENTING REGULATION (EU) No 889/2014 of 14 August 2014 amending Regulation (EEC) No 2454/93, as regards recognition of the common security requirements under the regulated agent and known consignor programme and the Authorised Economic Operator programme”, available at: http://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32014R0889&from=EN.

CORE1069
[/s2If]

Border Agency Cooperation, Part 1 of 3

“A beloved child has many names”, goes an old Finnish proverb. This saying applies quite well in the conblog-210116text of ´smart cooperation between multiple agencies when dealing with cross-border supply chains, goods movements and transports´. The World Customs Organization talks about Coordinated Border Management (CBM); the European Union about Integrated Border Management (IBM); the World Bank about Collaborative Border Management (CBM); and Organization for Security and Cooperation in Europe about Comprehensive Border Management (CBM). Cross-border Research Association is aligning with a fifth term: Border Agency Cooperation (BAC), a term used in the Trade Facilitation Agreement of the World Trade Organization. Despite minor differences in scope, priorities, underlying principles and philosophies among these five terms (and possibly even more), one can easily agree that the work carried out under any and all of them aims to coordinate activities across and within various border control agencies, for the benefit of both governmental agencies themselves as well as supply chain companies.

Our first blog on Border Agency Cooperation, BAC, provides an illustrative worst case example on how complex, slow and expensive a cross-border supply chain execution comes when no cooperation takes place between relevant government agencies, neither nationally nor internationally. The illustration is about meat export from Latin America (Country X) to the European Union (Country Y), with maritime transport in reefer containers.

A well-known beef producer in country X– also the first Authorized Economic Operator (AEO) beef producing company in the region – has just signed an annual contract with a beef importer and distributor in country Y. As this is the producer ‘s first export deal to the EU, the producer needs to ensure that all licenses and certificates are up to the EU standard. Organizing health certificates, certificates of origin, sanitary certificates, export licenses – and what have we – takes weeks and weeks of time. There is no communication or procedures in place between the various agencies and officials to facilitate the process, no coordinated company visits or audits, no sharing of information, and no mutual recognition of inspections.

When all documents are finally in place, and regular exports can start, the beef producer and it´s forwarding agent face the burden of filing export data to customs, to sanitary agencies, and to national security agencies – with somewhat similar datasets, but with no single-window filing opportunity. And when export controls and inspections take place – which happens often – there is no synchronization of inspection times between the different agencies. One agency might come to inspect the reefer container on Monday noon, second one on Wednesday morning, and third on Friday afternoon – another week lost in the beef supply chain lead-time.

Once the consignment is happily on board towards the EU, one continues to experience lost BAC opportunities: no data is passed from country X customs or sanitary agencies to their counterparties in country Y, to enable pre-arrival compliance control and risk assessment. In case of criminal suspicions – e.g. when supply chain insiders exploit beef shipments for cocaine smuggling – no intelligence is shared between police and customs, from country X to country Y. The option of joint law enforcement operations between country X and Y police and customs agencies has never been even considered. Even on national level, both in country X and Y, the agencies are not co-operating neither on risk profiling and targeting systems, nor during criminal investigations and prosecutions – what a waste of resources when it comes to catching and convicting the bad guys…

In the meanwhile, some ten days later, the ship arrives at a major sea port in country Y. For the importer, there is no option for single-window data filing; instead, import data must be transferred separately to all different agencies in country Y. As the customs administration in country Y has no Mutual Recognition Agreement (MRA) in place with country X customs – neither when it comes to AEO certificates nor when it comes to recognizing inspections carried out at export – it treats the import as a “medium to high risk” one, calling for physical inspections. And as the sanitary agency does not share any common resources with the customs administration – particularly no joint inspection facilities and equipment, including x-ray machines – and even the daily opening hours are different from the customs hours, the sanitary agency carries out their own inspections only two days after the customs intervention. And finally, improving the situation does not seem likely, as there are no joint public-private partnerships, and no export/import compliance training sessions or similar in place, neither in country Y nor in country X.

This concludes the first of three parts of our Border Agency Cooperation (BAC) blog. In Part 2 – to be published next week – we will present CBRA´s conceptual model (Hintsa J., Dec.2015) on BAC key actions and beneficiaries: which key actions to take in order to speed up the logistics chain, to save costs with all actors, to increase overall predictability, and to improve government agency performance e.g. in terms of number of seizures and convictions. In the BAC Blog Part 2, we plan to present some preliminary experiences and real-life results from FP7-project CORE. Please stay tuned!