Review on “MARITIME CRITICAL INFRASTRUCTURE PROTECTION – DHS Needs to Better Address Port Cybersecurity”, Report to the Chairman, Committee on Commerce, Science, and Transportation, U.S. Senate, United States Government Accountability Office, June 2014 (CORE1098)

CORE1098-Summary: Actions taken by the Department of Homeland Security (DHS) and two of its component agencies, the U.S. Coast Guard and Federal Emergency Management Agency (FEMA), as well as other federal agencies, to address cybersecurity in the maritime port environment have been limited. Report is available at: http://www.gao.gov/assets/670/663828.pdf

[s2If is_user_logged_in()]

Full review: While the Coast Guard initiated a number of activities and coordinating strategies to improve physical security in specific ports, it has not conducted a risk assessment that fully addresses cyber-related threats, vulnerabilities, and consequences. Coast Guard officials stated that they intend to conduct such an assessment in the future, but did not provide details to show how it would address cybersecurity. Until the Coast Guard completes a thorough assessment of cyber risks in the maritime environment, the ability of stakeholders to appropriately plan and allocate resources to protect ports and other maritime facilities will be limited.

Maritime security plans required by law and regulation generally did not identify or address potential cyber-related threats or vulnerabilities. This was because the guidance issued by Coast Guard for developing these plans did not require cyber elements to be addressed. Officials stated that guidance for the next set of updated plans, due for update in 2014, will include cybersecurity requirements. However, in the absence of a comprehensive risk assessment, the revised guidance may not adequately address cyber-related risks to the maritime environment.

The degree to which information-sharing mechanisms (e.g., councils) were active and shared cybersecurity-related information varied. Specifically, the Coast Guard established a government coordinating council to share information among government entities, but it is unclear to what extent this body has shared information related to cybersecurity. In addition, a sector coordinating council for sharing information among nonfederal stakeholders is no longer active, and the Coast Guard has not convinced stakeholders to reestablish it. Until the Coast Guard improves these mechanisms, maritime stakeholders in different locations are at greater risk of not being aware of, and thus not mitigating, cyber-based threats.

Under a program to provide security-related grants to ports, FEMA identified enhancing cybersecurity capabilities as a funding priority for the first time in fiscal year 2013 and has provided guidance for cybersecurity-related proposals. However, the agency has not consulted cybersecurity-related subject matter experts to inform the multi-level review of cyber-related proposals—partly because FEMA has downsized the expert panel that reviews grants. Also, because the Coast Guard has not assessed cyber-related risks in the maritime risk assessment, grant applicants and FEMA have not been able to use this information to inform funding proposals and decisions. As a result, FEMA is limited in its ability to ensure that the program is effectively addressing cyber-related risks in the maritime environment.

Why GAO Did This Study? U.S. maritime ports handle more than $1.3 trillion in cargo annually. The operations of these ports are supported by information and communication systems, which are susceptible to cyber-related threats. Failures in these systems could degrade or interrupt operations at ports, including the flow of commerce. Federal agencies—in particular DHS—and industry stakeholders have specific roles in protecting maritime facilities and ports from physical and cyber threats. GAO’s objective was to identify the extent to which DHS and other stakeholders have taken steps to address cybersecurity in the maritime port environment. GAO examined relevant laws and regulations; analyzed federal cybersecurity-related policies and plans; observed operations at three U.S. ports selected based on being a high-risk port and a leader in calls by vessel type, e.g. container; and interviewed federal and nonfederal officials.

What GAO Recommends? GAO recommends that DHS direct the Coast Guard to (1) assess cyber-related risks, (2) use this assessment to inform maritime security guidance, and (3) determine whether the sector coordinating council should be reestablished. DHS should also direct FEMA to (1) develop procedures to consult DHS cybersecurity experts for assistance in reviewing grant proposals and (2) use the results of the cyber-risk assessment to inform its grant guidance. DHS concurred with GAO’s recommendations.

Full citation:  “MARITIME CRITICAL INFRASTRUCTURE PROTECTION – DHS Needs to Better Address Port Cybersecurity”, Report to the Chairman, Committee on Commerce, Science, and Transportation, U.S. Senate, United States Government Accountability Office, June 2014.

CORE1098

Keywords: Maritime Security, Port Security, Cyber – Security, CBP U.S. – Customs and Border Protection, Coast Guard U.S., DHS-Department of Homeland Security, FEMA-Federal Emergency Management Agency, ISAC-information sharing and analysis center, IT-information technology, MTSA-Maritime Transportation Security Act of 2002, NIPP-National Infrastructure Protection Plan, AFE Port Act-Security and Accountability for Every Port Act of 2006, TSA-Transportation Security Administration

[/s2If]

Review on Consideration and Adoption of Amendments to the International Convention for the Safety of Life at Sea, 1974, International Maritime Organization (CORE1097)

Summary: The International Ship and Port Facility Security (ISPS) Code sets new standards for security for ships at sea as well as port facilities around the world. It aims to make shipping activities more secure against threats of terrorism, piracy and smuggling. Security at sea has been a concern to governments, shipping lines, port authorities and importers and exporters for years. The terrorist attacks of September 11, 2001, however, provided the catalyst for formalizing tough new security measures. In December of 2002, the International Maritime Organization (IMO) a specialized agency of the United Nations (UN) organized a conference to discuss issues related to security at sea. At this conference, representatives from 150 nations (the Contracting Governments) participated in drafting amendments to the Safety of Life at Sea (SOLAS) Convention, and the ISPS Code was adopted. Changes to the SOLAS Convention include amendments to Chapters V and XI, and Chapter XI was divided into Chapters XI-1 and XI-2. The new Chapter XI-2 provides the umbrella ISPS regulations. The Code itself is divided into two parts. Part A presents mandatory requirements, Part B contains guidance regarding the provisions of Chapter XI-2 of the Convention and part A of the Code. Source document is available at: http://www.un.org/en/sc/ctc/docs/bestpractices/32.pdf

[s2If is_user_logged_in()]

Full review: The Code aims, among other things, to establish an international framework for co-operation between Contracting Governments, government agencies, local administrations and the shipping and port industries to detect security threats and take preventive measures against security incidents affecting ships or port facilities used in international trade and to establish relevant roles and responsibilities at the national and international level. ISPS provisions relating to port facilities relate solely to the ship/port interface. Also, ISPS provisions do not extend to the actual response to attacks or to any necessary clear-up activities after such an attack. In addition, for each ship and port authority affected, the ISPS Code requires:

  • The implementation of a Ship Security Plan (SSP),
  • The implementation of a Port Facility Security Plan (PFSP),
  • The appointment of a Ship Security Officer (SSO),
  • The appointment of a Company Security Officer (CSO),
  • The appointment of a Port Facility Security Officer (PFSO),
  • The installation of ship alarms, and
  • The installation of shipboard Automatic Identification Systems (AIS).

Enforcement Date: The ISPS Code went into effect on July 1, 2004.

Full citation:   Consideration and Adoption of Amendments to the International Convention for the Safety of Life at Sea, 1974, International Maritime Organization. SOLAS/CONF.5/32. 12 December 2002

CORE1097

Keywords: Maritime Security, Port Security, Ship Security Plan (SSP), Port Facility Security Plan (PFSP), Ship Security Officer (SSO), Port Facility Security Officer (PFSO), International Maritime Organization (IMO), Safety of Life at Sea (SOLAS).

[/s2If]

Review on“Contributing to shipping container security: can passive sensors bring a solution?” G. Janssens-Maenhout a, F. De Roob, W. Janssens, Journal of Environmental Radioactivity, 2009 (CORE1096)

Summary: Illicit trafficking of fissionable material in container cargoes is recognized as a potential weakness in Nuclear Security. Triggered by the attacks of 11 September 2001, measures were undertaken to enhance maritime security in extension to the Safety Of Life At Sea (SOLAS) Convention and in line with the US Container Security Initiatives. Effective detection techniques are needed that allow the inspector to intercept illicit trafficking of nuclear weapons components or components of other nuclear explosive devices. Report abstract is available at (one can ask for the full report e.g. vie ResearchGate): https://www.researchgate.net/publication/38053693_Contributing_to_shipping_container_security_can_passive_sensors_bring_a_solution

[s2If is_user_logged_in()]

Full review: Many security measures focus on active interrogation of the container content by X-ray scan, which might be extended with the newly developed tagged neutron inspection system. Both active interrogation techniques can, with the current huge volume of container traffic, only be applied to a limited number of selected containers. The question arises whether a passive detection technique can offer an alternative solution.

This study investigates if containers equipped with a small passive detector will register during transport the neutron irradiation by fissionable material such as plutonium in a measurable way. In practice, 4/5 of the containers are about 1/8 filled with hydrogenous material and undergo a typical 2 months route. For this reference case, it was found that the most compatible passive detector would be an activation foil of iridium. Monte-Carlo simulations showed that for the reference case the activity of a 250 μm thin foil with 6 cm2 cross-section would register 1.2 Bq when it is irradiated by a significant quantity of Reactor-Grade PuO2. However this activity drops with almost two orders of magnitude for other fillings and other isotopic compositions and forms of the Pu-source. The procedure of selecting the target material for Pu detection is detailed with the theoretical methods, in order to be useful for other applications. Moreover the value of such additional passive sensors for securing maritime container transport is situated within the global framework of the First, Second and Third Line of Defense against illicit trafficking.

Full citation:   G. Janssens-Maenhout a, F. De Roob, W. Janssens (2009). Contributing to shipping container security: can passive sensors bring a solution?” Journal of Environmental Radioactivity 101(2):95-105 · OCTOBER 2009.

Keywords: Nuclear illicit trafficking, Maritime container transport, Passive detection technique

[/s2If]

Review on The Critical Infrastructure Gap: U.S. Port Facilities and Cyber Vulnerabilities, Policy Paper, July 2013, Center for 21st Century Security and Intelligence (CORE1095)

Summary: In a 50-page policy paper by the Brookings Institute and authored by Commander Joseph Kramek of the U.S.Coast Guard and a Federal Executive Fellow at the institute, the current state of affairs related to vulnerabilities at our national seaports is discussed and options to shore up cyber security are presented. In the executive summary, Commander Kramek writes that today’s U.S. port facilities rely as much upon networked computer and control systems as they do upon stevedores to ensure the flow of maritime commerce that the economy, homeland, and national security depend upon. Yet, unlike other sectors of critical infrastructure, little attention has been paid to the networked systems that undergird port operations. Report is available at: http://www.brookings.edu/~/media/research/files/papers/2013/07/02%20cyber%20port%20security%20kramek/03%20cyber%20port%20security%20kramek.pdf

[s2If is_user_logged_in()]

Full review: No cybersecurity standards have been promulgated for U.S. ports, nor has the U.S. Coast Guard, the lead federal agency for maritime security, been granted cybersecurity authorities to regulate ports or other areas of maritime critical infrastructure. In the midst of this lacuna of authority is a sobering fact: according to the most recent National Intelligence Estimate (NIE) the next terrorist attack on U.S. Critical Infrastructure and Key Resources (CIKR) is just as likely to be a cyber attack as a kinetic attack.

The potential consequences of even a minimal disruption of the flow of goods in U.S. ports would be high. The zero-inventory, just-in-time delivery system that sustains the flow of U.S. commerce would grind to a halt in a matter of days; shelves at grocery stores and gas tanks at service stations would run empty. In certain ports, a cyber disruption affecting energy supplies would likely send not just a ripple but a shockwave through the U.S. and even global economy.

Given the absence of standards and authorities, this paper explores the current state of cybersecurity awareness and culture in selected U.S. port facilities. The use of the post-9/11 Port Security Grant Program (PSGP), administered by the Federal Emergency Management Agency, is also examined to see whether these monies are being used to fund cybersecurity projects.

Full citation:   The Critical Infrastructure Gap: U.S. Port Facilities and Cyber Vulnerabilities, Policy Paper, July 2013, Center for 21st Century Security and Intelligence.

CORE1095

Keywords: Maritime Security, Cyber-security, Port Security Grant Program (PSGP), Port facility, Coast Guard, Maritime Transportation Security Act (MTSA).

[/s2If]

Dr. Federico Magalini on waste logistics crime

Hi Federico, and thanks for agreeing to join a CBRA Interview, as the first expert in year 2016 – can you first tell a bit who are you and what you do?

Thank you for the opportunity of sharing some of the past experiences and projects done, including those with CBRA and looking ahead into the next years. I’m a mechanical engineer as background, with a PhD in Management, Economical and Industrial Engineers and I am working as Associate Programme Officer at United Nations University – Vice-Rectorate in Europe. I’m in particular working for SCYCLE, SCYCLE operating unit of the UN University Institute for the Advanced Study of Sustainability.

Can you explain more on what is the United Nations University, UNU?

UNU is, despite the name, not a classical university as many might think. The United Nations University (UNU) is a global think tank and postgraduate teaching organization headquartered in Japan. The mission of the UN University is to contribute, through collaborative research and education, to efforts to resolve the pressing global problems of human survival, development and welfare that are the concern of the United Nations, its Peoples and Member States. We work a lot with leading universities and research institutes in various countries, functioning as a bridge between the international academic community and the United Nations system. Our operating unit SYCLE is particularly devoted to research in the field of electronic waste.

UNU, INTERPOL, CBRA and other partners finished few months ago a 2-year research project on electronic waste crime and non-compliance, the FP7-CWIT –project. From your perspective, what were the most important outcomes of that project?

The CWIT project contributed in my opinion to increase the general understanding of volumes of electronic waste annually arising in different EU Member States and the fate of the disposed equipment. Knowing the baseline of products annually discarded by EU citizens is a first, fundamental step to allow policymakers and stakeholders at large to develop a strategy to ensure proper collection and treatment. In addition to that the project described the main drivers behind the flows diverted from the actual take back and recycling systems across the EU.

A second important outcome of the project is the analysis and identification of the main crime patterns that are typical of such an Industry: in the illegal trade of WEEE, there is a varying degree of compliance and criminality that spans across a continuum ranging from minor unintentional violations or non-compliance by individuals to deliberate illegal activities following a criminal business model. The organisational structure differs by country and region, from individual traders to structured criminal groups.

The combination of those two elements – knowledge of the market and understanding of criminal behaviours – allowed drawing a roadmap for future improvement in compliance and enforcement.

Do you believe that some of the CWIT outcomes will have practical positive impacts to reduce future crime and non-compliance, in the broader context of e-waste handling and management?

I sincerely hope so. And I am sure this will happen. To which extent is hard to predict but in the second part of the project we really focused on how to derive practical recommendations for the various actors involved along the entire value chain. And we broadly discussed the ideas, in many cases deriving from real cases and best practices, with various stakeholders; I hope this will increase the likelihood of having some of the recommendations actually implemented.

We committed ourselves to disseminate the recommendations beyond the project duration and we have seen already some results, with the project findings being discussed in various fora, conferences and public events, including some internal meeting with EC officials. And we have seen official request from some Members of the EU Parliament, who quizzed the EC on the consequences of the CWIT project, challenging here to take concrete actions.

Now we are launching a new project called DOT.COM WASTE – with several CWIT partners, and few new partners. You are the project manager for this “CWIT follow-up” –project, congratulations on that. Can you please explain what this new project aims to achieve?

I am really happy of the DOT.COM waste project as combines some of the results of the CWIT project, particularly the recommendation on the need of better training of enforcement and prosecutors in one of the main areas of my personal interest and work at UNU: capacity building. The DOT.COM WASTE project seeks to increase the capabilities of law enforcement agencies, customs and port authorities, environmental agencies and prosecutors to fight cross-border waste crime more cost-effectively. To achieve this objective, the project aims to increase the stakeholders’ understanding of current waste crime trends and to identify and share good practices for detecting, investigating and prosecuting waste crime activities.

Which aspect of the DOT.COM WASTE project you see as the most challenging one?

I see two main challenges ahead for the DOT.COM WASTE project. The first one is related to the scope of the project itself: there are many waste streams and the challenges of different streams are different. As a consequence also the tools to tackle illegal activities might vary: we will have to identify the priorities in order to be effective.

The second one is related to the duration of the project; the project will translate the knowledge gained into training material and tools and will promote training sessions to help key stakeholders integrate good practices into their day-to-day operations. The project’s underlying objective is to intensify international collaboration through development and implementation of new mechanisms for information exchange, technology transfer and operational coordination. But I really hope that all those efforts will produce effects that will last longer than the two years of the project itself.

I sincerely hope that we will be able to make the difference here!

Thanks a lot Federico for this interview – and talk to you soon at the DOT.COM WASTE kick-off meeting.

Supply chain finances and liabilities (CASSANDRA Compendium Chapter 3 – CORE2007b)

Summary

The third chapter of the CASSANDRA compendium clarifies financial and insurance concepts and techniques of international supply chain management. In cross-border trade, exporters and importers often insure themselves against a variety of risks, including loss or damage of goods in transit, currency fluctuations, and a business partner’s default. In particular, exchange of goods for money between sellers (exporters) and buyers (importers) is a great source risk and uncertainty in international logistics transactions. For example, advance payment is unfavorable for importers in terms of cost, cash-flow and risk of default. On the contrary, selling goods on consignment puts exporters at a risk. For risk mitigation, exporters commonly protect themselves against buyers that fail to pay for goods whereas importers protect themselves against exporters that fail to deliver goods. The chapter illustrates how financial transactions and conventions underpin physical flow of goods in international supply chains. The CASSANDRA compendium is available for download here.

Review by Toni Männistö (CBRA).

[s2If is_user_logged_in()]

Full review

International trading involves many risks. Exporters bear the risk that buyers fail to pay for goods in full or in time. On the other hand, if the exporter requires the importer to pay for goods before shipping them, the importer faces a risk of paying but not receiving the purchased goods in right time, quantity and condition. There are, fortunately, various financial instruments and insurances that both the exporters and importers may purchase to reduce or eliminate such risks. Perhaps the most common instrument is the letter of credit (LC), a guarantee from the buyers’ bank to pay the seller if the seller dispatch goods and meets the terms of delivery. Other common financial services, that allow exporters to hedge against non-payment of foreign buyers, include export credit insurance, export factoring and forfeiting (selling one’s receivable debts for cash). These financial products cost money, but they reduce or eliminate the risks involved in cross-border commerce. Prices and terms of these credit and insurance schemes depend on the creditworthiness of applying companies and riskiness of concerned logistics operations.

The CASSANDRA compendium chapter provides insights into the legal infrastructure – laws, conventions and standard business practices – that set the basis for trust between sellers and buyers in the cross-border commerce. For example, the Rotterdam Rules (“Convention of Contracts for the International Carrying of Goods Wholly or Partly by Sea”) and Hague-Visby determine much of the legal rules for carrying goods by sea. International contract schemes are not always straightforward, but fortunately there are Incoterms, standard trade terms, published by the International Chamber of Commerce (ICC), that determine when ownership of goods change, how costs of shipping are shared, and who is responsible for insuring cargo at different stages in the supply chain. Incoterms are defined in the contract between buyer and seller. The contracts between cargo owners (shipper or consignee) and freight forwarder, an agent organizing the transport, is a separate document, the same way than the agreement between the freight forwarders and carriers.

Supply chain finances is a crucial topic for trading companies, but how do the financial aspect relate to CORE, a supply chain security and optimization project? Related to security, if customs and other border control authorities had visibility over financial transactions, they could use this information for more accurate risk assessment of cross-border shipments. The authorities might be able to identify suspicious financial transactions that do not correspond physical flow of goods (e.g., routing or cargo description). With respect to the logistics optimization, CORE visibility solutions enable companies to monitor location and status of their consignments and help them to react faster to logistics contingencies and disruptions. If increased visibility lowers risk of supply chain glitches, it may also lower insurance premiums and interest rates for credits. Visibility also facilitates investigation of insurance claims, helps resolve liability disputes, and may lower related litigation costs. Track & trace data on cargo en route, for example, helps determine the location and time of unauthorized tampering of a container, with obvious benefit for resolving liability issues. The CORE’s demonstrations will likely benefit from this account of basic trade finances that the third chapter of the CASSANDRA compendium provides. The financial aspects should be considered also in CORE’s education and training material.

Reference

Hintsa, J. and Uronen, K. (Eds.) (2012), “Common assessment and analysis of risk in global supply chains “, Compendium of FP7-project CASSANDRA, Chapter 3

CORE2007b

[/s2If]

Introduction to Supply Chain Management (CASSANDRA Compendium Chapter 2, CORE2007a)

Summary

The second chapter of the CASSANDRA compendium gives a general outlook on the theory and practice of modern supply chain management. Written in lay-man’s language, the text explains a broad range of strategies for managing supply chains, from lean management to agile and responsive logistics. The chapter also defines fundamental supply chain terminology and discusses current trends in the logistics, including synchromodality, use of 4PL logistics service providers, and green logistics. The chapter introduces several supply chain reference frameworks that illustrate a series of interdependent activities and stakeholders involved in the international transport of cargo. The CASSANDRA compendium is available for download here.

Review by Toni Männistö (CBRA)

[s2If is_user_logged_in()]

Full review

The compendium summarizes the SCOR and UN/CEFACT supply chain models, that may be the two most used logistics reference frameworks in the world. The document also discusses less known academic conceptual models that seek to simplify the complexity of supply chain management by categorizing and explaining management strategies, activities, stakeholders and their roles and responsibilities. The section on the future trends in logistics offers a great outlook on the most likely changes and driving forces in the logistics industry. The outlook suggests that for example synchromodality (increased flexibility in transport mode selection), green logistics (less emissions), use of 4PL logistics service providers (outsourced supply chain management), and continuously increasing ship and port sizes will reshape the cross-border logistics over the years. The document also explains key CASSANDRA concepts and their impacts on international supply chain management. For instance, the Data Pipeline, a pivotal CASSANDRA concept, seeks to enhance sharing of information across supply chain stakeholders, in particularly from business operators to customs and other border control authorities. Most importantly, the Data Pipeline would allow customs officers to access commercial information, that normally is exchanged only between buyers and sellers, early in the upstream supply chain at the consignment completion point (CCP). This accurate, early commercial information would enable the customs and other border control agencies to assess security and other risks of cargo early on.

All in all, the document provides a crash refresher course on basic and advanced logistics terminology that would be beneficial for many the CORE consortium, especially for those partners whose expertise is mainly outside the logistics industry. The CORE demonstrators benefit from descriptions of CASSANDRA innovations that support information exchange and improve visibility across the supply chain. The demos might choose to reuse some of these CASSANDRA innovations or their components. The CASSANDRA compendium also contains a great deal of material that could be reused for education and training purposes in CORE (WP19). Finally, the chapter concludes with recommendations that are relevant also for CORE. The chapter recommends, for example, that because of broad variety of international supply chains, CASSANDRA solutions should be adaptable for different contexts.

Reference

Hintsa, J. and Uronen, K. (Eds.) (2012), “Common assessment and analysis of risk in global supply chains “, Compendium of FP7-project CASSANDRA, Chapter 2

CORE2007

[/s2If]

Chemical Security in Istanbul

2015-12-15 09.02.08I had the most interesting week in Istanbul with the Iraqi government representatives, chemical sector companies and the US State Department Chemical Security Program, CSP.

Security in the chemical supply chain is a major challenge for government agencies and chemical supply chain companies across the globe, including those in the Middle-East and North African (MENA) region. Theft, diversion, trafficking, export violations, counterfeit chemicals, sabotage and terrorism – among other criminal threats – keep the agencies and companies constantly on their toes when considering how to best tackle the vulnerabilities and threats in their respective chemical supply chains.

This was my second time to join as an external expert in a Chemical Security Program (CSP) event in the MENA region. The first time was in Hurghada, Egypt, in March 2015 – thanks again to Professor Andrew Thomas, the Chief Editor of the Journal of Transportation Security, for hooking me up with CRDF Global and the US State Department on this. Now the four day event targeted for the relevant Iraqi government agencies as well as the Iraqi chemical sector companies was held in Istanbul, Turkey, on 14-17 December 2015.

We had a fully packed agenda: Day 1 consisted of several introductory and state-of-play speeches by the workshop facilitators and by Iraqi experts, the latter group sharing key governmental, industry and academic perspectives to the chemical security progress in Iraq.  Day 2 started with a case study presentation on “Post-2001 supply chain security developments at Dow Chemicals”, followed by private-public partnership considerations in chemical supply chain security. During the afternoon of day 2, two more presentations were given on potential threats to materials of interest, as well as on site-physical security. Day 3 started with presentations on international transport of dangerous goods and security rules, followed later by presentations on export control and border security issues, as well as risk assessment methodological aspects.

Interactive sessions, group exercises and other discussions were vivid throughout the four days. On day 1, the main interactive session was about government-industry coordination. On day 2, the focus shifted to identifying key players in Iraqi chemical supply chain security, as well as exploring private sector specific chemical security issues. On day 3, a major interactive session took place to recognize existing vulnerabilities and threats in the chemical supply chain, as well as to identify appropriate countermeasures and other possible means of improvement. And finally, on day 4, a draft table of content for a potential “Iraqi chemical supply chain security master plan and implementation roadmap” was produced in a highly interactive manner, followed ultimately by drafting some actual planning content in areas including chemical transport security and raising security awareness.

The actual workshop outcomes and possible follow-up actions will be worked upon later by the organizing team and some key participants. In the meanwhile, I want to express my warmest thanks for this opportunity and great on-site collaboration in Istanbul to: Ms. Shawn Garcia from the U.S. Department of State, Chemical Security Program (DOS/CSP); Ms. Pelin Kavak and Mr. Nidal Abu Sammour from CRDF Global, US / Jordan; and Dr. Caner Zanbak and Mr. Mustafa Bagan from the Turkish Chemical Manufacturers Association (TCMA). Hope to meet you again in 2016 in Iraq, Algeria and possibly other locations in the MENA region!

 

Cheers, Juha Hintsa

P.S. We also tested two CBRA frameworks / models – CBRA SCS15/16, and CBRA-BAC-Actions and beneficiaries – with the audience during the Istanbul week. Both of them were well perceived, and will be topics for CBRA Blog during the coming couple of months. (SCS = Supply Chain Security, and BAC = Border Agency Cooperation).

PPS. Last but not least I would like to thank Ms. Antonella Di Fazio of Telespazio, Italy, and FP7-project CORE, for excellent inputs on transport of dangerous goods, traceability and monitoring solutions, demonstrators, and practical experiences.

Trade and money laundering uncontained (the Economist, May 2014, CORE2006)

Summary

International trade is becoming one of the main instruments for cross-border money laundering aside common bank transfers, remittances and cash smuggling. The ”trade-based money laundering” disguises illegal trading as seemingly legitimate commercial transactions. The most common technique is mis-invoicing in which fraudsters undervalue imports or overvalue exports to repatriate ill-gotten money from abroad. For example, official records show that Mexican exports to US are much higher than the US imports from Mexico, a discrepancy that signs fraud by Mexican criminals, most likely drug cartels. In general, the trade-based money laundering offers new financial tools for a broad range of drug traffickers, arms smugglers, corrupt politicians, terrorists and evaders of taxes, duties and capital controls. Review by Toni Männistö (CBRA)

[s2If is_user_logged_in()]

Full review

International trade is becoming one of the main instruments for cross-border money laundering aside common bank transfers, remittances and cash smuggling. The ”trade-based money laundering” disguises illegal trading as seemingly legitimate commercial transactions. The most common technique is mis-invoicing in which fraudsters undervalue imports or overvalue exports to repatriate ill-gotten money from abroad. For example, official records show that Mexican exports to US are much higher than the US imports from Mexico, a discrepancy that signs fraud by Mexican criminals, most likely drug cartels. In general, the trade-based money laundering offers new financial tools for a broad range of drug traffickers, arms smugglers, corrupt politicians, terrorists and evaders of taxes, duties and capital controls.

The new methods for cross-border money laundering and tax evasion concern most CORE demonstrations, especially those involving international cargo movements. The emerging risk of trade-based money laundering calls for new and more effective enforcement of trade transactions. CORE is developing new solutions (e.g., data pipeline and system-based supervision) for capturing and sharing trade information across logistics operators and law enforcement agencies. The new solutions likely improve law enforcement’s capability to detect suspicious trade transactions that may have something to do with the trade-based money laundering. However, building such capability requires IT integration (e.g., interoperability), risk awareness and education and training. CORE consortium addresses these complementary activities in work carried out in risk, IT and educational clusters.

Reference

Trade and money laundering uncontained, the Economist, May 3rd 2014

CORE2006

[/s2If]

Drug trafficking in the Caribbean – the Full circle (the Economist May 2014, CORE2005)

Summary

Anti-drug officials report rising cocaine imports into the US through the Caribbean islands. The officials ascribe the increasing popularity of the Caribbean route to the strengthened enforcement of alternative trafficking routes. The South American cocaine smuggling routes have displaced several times over the years due, and now again the Caribbean route is the same one than traffickers used two decades ago. The new wave of trafficking through is expected to increase violence and undermine anti-corruption efforts in the Caribbean.

The drug traffickers move significant amounts of their cocaine from Colombian coca farms and laboratories to Venezuela by jungle trails, riverboats and small aircraft. From the Venezuelan coast, the contraband is smuggled to Caribbean islands by speedboats, planes, sometimes hidden inside commercial cargo. The cocaine traffickers use then yachts, mules, cruise ships, fast boats and commercial cargo vessels to smuggle the illegal drugs into the US and Europe. The new wave of trafficking through is expected to increase violence and undermine anti-corruption efforts in the Caribbean. Review by Toni Männistö (CBRA)

[s2If is_user_logged_in()]

Full review

Anti-drug officials report rising cocaine imports into the US through the Caribbean islands. The officials ascribe the increasing popularity of the Caribbean route strengthened law enforcement of alternative trafficking routes. Because traffickers prefer smuggling routes that offer the highest profit-to-risk ratios, the South American cocaine smuggling networks are evolving constantly. Routes have displaced several times over the years, and now the route is again the same than two decades ago.

Today, traffickers move again significant amounts of their cocaine from Colombian coca farms and laboratories to Venezuela by jungle trails, riverboats and small aircraft. From the Venezuelan coast, the contraband is smuggled to Caribbean islands by speedboats, planes and sometimes hidden inside commercial cargo. The cocaine traffickers use then yachts, mules, cruise ships, fast boats and commercial cargo vessels to smuggle the illegal drugs into the US and Europe.  The new wave of trafficking through is expected to increase violence and undermine anti-corruption efforts in the Caribbean. The new wave of trafficking through is expected to increase violence and undermine anti-corruption efforts in the Caribbean.

Trends of international drug trafficking often influence intensity of law enforcement efforts in global supply chains. Thus, changes in South American drug trafficking may affect also the two CORE trade lanes that import goods from the region into Europe, (1) imports of fresh cut flowers from Colombia to the Netherlands (WP11) and (2) imports of coffee and cocoa beans from South America to Europe (WP13). These trade lanes may become subject to more intense anti-drug controls over the following years. Besides the CORE demo cluster, also the CORE risk cluster benefit from the insight this article provides on the recent trends in routes, volumes and methods of the South American drug trafficking. This information may be useful for CORE’s activities that are developing educational and training material.

Reference

Drug trafficking in the Caribbean – the Full circle, the Economist, May 24th 2014

CORE2005

[/s2If]