Better Management of EU Borders through Cooperation, 2011 (CORE1114)

Summary: This report by the Center for the Study of Democracy investigates existing forms of cooperation between Border Guards and customs administrations in the European Union. The study highlights obstacles to cooperation and proposes solutions and best practices for overcoming them. The study finds that despite the common policy interest on border agency cooperation and the associated pan-European standardisation efforts, the individual Member states decide the extent and forms of customs-border guard co-operation on their own. As a result, the current state of border agency collaboration and potential for improvements differ substantially between the member states. The main differences arise from the institutional set-up (e.g., number and roles of border control agencies), powers and competencies of the border control agencies, and the legislative basis (especially legal differences in terms of privacy, data protection and confidentiality of trade information). Download the report here: http://ec.europa.eu. Review by Toni Männistö (CBRA)

[s2If is_user_logged_in()]

Full review: The study concludes with a large number of recommendations for the European Union, the member states, and for the customs and border guards. The European Union should generate political will to act upon remaining challenges of border agency cooperation by creating awareness through public debates, communications and impact assessments. The EU bodies should act mediators to reconcile institutional interests of different border control agencies. The EU could also commission pilot projects on border agency cooperation, encourage joint training and increase funding of related research and development activities. Also the mandate of Frontex could be expanded to cover customs cooperation.

The individual member states should, according to the report, also mediate negotiations between border control agencies to overcome possible conflicts of interest. The member states should also evaluate impacts of various forms of customs-border guard cooperation.

The border guards and customs administrations themselves should identify and exchange best practices for strengthening their mutual collaboration. The agencies, the report recommends, should take responsibility for the pilot projects and for evaluating outcomes of the different forms of cooperation. To further improve the cooperation across the entire EU customs union, the customs and border control agencies should use Frontex more as their platform to conduct joint operations at the EU’s external border.

Reference: Center for the Study of Democracy, (2011), “Better Management of EU Borders through Cooperation”, Study to Identify Best Practices on the Cooperation Between Border Guards and Customs Administrations Working at the External Borders of the EU

 

CORE1114

[/s2If]

A Decade of GAO’s Supply Chain Security Oversight, 2015 (CORE1113)

Summary: The US Government Accountability Office (GAO) is an independent government watchdog organization that has been publishing many reports on the US government’s supply chain security initiatives over the past ten years. This article reviews 25 most relevant GAO’s reports that discuss strengths, weaknesses and future challenges of the US policies and regulations on supply chain security. The review findings reveal interesting facts about similarities and differences of the US and the EU approaches to supply chain security. This comparison opens new venues for further Transatlantic benchmarking as well as harmonisation and mutual recognition of supply chain security programs. This review was conducted as part of European FP7-Project CORE.  The reviewed document is available for download here: https://hicl.org. Review by Toni Männistö (CBRA)

[s2If is_user_logged_in()]

Full review: The GAO reports suggest that the US administration has been struggling with effective performance monitoring and auditing of its supply chain security initiatives. The reports indicate that there is some confusion about costs of security initiatives for the government and for the business community. There is also a lack of common understanding about the actual benefits of many of these programs. The GAO reports also urge US government officials to adopt risk-based approach to supply chain security, for example to use information and intelligence to assess risk levels of specific shipments, people, trading companies, and other entities, and then employ security solutions that are commensurate to the risk level. The GAO reports also emphasize the importance of involving the industry in the process of defining new policies and regulations.

Altogether, the review team found that the GAO documents are not only highly relevant for SCS management and governance but also of high quality. The study concludes that it might be useful for the EU to establish a quality-assurance organization similar to the US GAO. This new EU body would oversee spending of the EU and its member states on supply chain security programs and projects and this way improve efficiency of such investments.

Reference: Männistö, T., and Hintsa J., (2015), “A Decade of GAO’s Supply Chain Security Oversight,” Proceedings of the Hamburg International Conference in Logistics (HICL), September 24-25, 2015, Hamburg

 

CORE1113

[/s2If]

Collaborative Border Management in Thailand and Neighbouring Countries: Needs, Challenges and Issues, June 2013 (CORE2014)

Summary: Thailand is interested in coordinated border management conceptualization and implementation like many other countries. There are, however, some special challenges that Thailand faces when the country tries to strengthen cooperation with its neighbouring countries. The reviewed document is available for download at: Collaborative Border Management in Thailand and Neighboring Countries: Needs, Challenges and Issues.

[s2If is_user_logged_in()]

Full review: The report proposes a set of recommendations for implementing coordinated border management:

  1. A policy approach is needed, in which control and facilitation are not considered as mutually exclusive. Agencies from Thailand and neighbouring countries should define a common framework for the operations, with the awareness of the importance of costs and time reduction.
  2. There is no key host for negotiations to develop rules and regulations on border crossings with neighbouring countries. The agencies, which should be involved in the decision making and integration process, have not been identified yet. The implementation of CBM needs a clear definition about the role of the agencies involved.
  3. One topic being discussed on the implementation of CBM is the screening of people who cross the border. In this case, it is necessary to define a government policy to enhance the efficiency in border crossing.
  4. Information technology. There is a lack of necessary databases, materials and equipment to improve the efficiency of people screening. Definitely, IT is one of the most important topics to be improved, and it is necessary to define a single system for screening and monitoring border crossings.
  5. The border check points lack standardized systems for managing public utilities and suffer from congestion. There is a clear need for a government policy that would standardize the border activities and improve border infrastructure.

CORE2014

[/s2If]

Transit electronic platform in Central America, December 2010 (CORE2013a and 2013b)

Summary: The Inter-American Development Bank (IDB) reports that more than 95% of commercial goods in the Mesoamerican region are transported overland using the Pacific Corridor. This traffic represents approximately 6 billion USD worth of goods on a highway which runs from Puebla, Mexico to Panama and crosses six national borders. The problem with the Pacific Corridor is with unreliable, inefficient and substandard infrastructure. In 2008, to upgrade the inadequate infrastructure, the IDB launched a ambitious project called International Goods in Transit. According to the report, the results of the project were outstanding: average time to cross a border was reduced from 62 minutes to eight. The project also succeeded to reduce the number of documents that traders needed to submit to border control agencies.  The two reviewed files are available for download at: Interoperability at the Border: Coordinated Border Management Best Practices & Case Studies and Automating the Control of Goods in International Transit: Implementing the TIM in Central America.

[s2If is_user_logged_in()]

Full review: The solution, that the International Goods in Transit project produced, is basically an electronic system for managing and controlling the movement of goods in transit. The system builds on three main pillars that unlock better services at border crossing:

  1. Process reengineering: the system harmonizes multiple paper-based declarations into an electronic document. This digital file stores all data that customs, migration, and phytosanitary agencies need.
  2. Information technology: the project created a new intranet system that features state- of-the-art risk analysis and cargo control systems.
  3. Cooperation: the project promoted cooperation within the country and between the different agencies operating at border crossings in the Mesoamerican Region.

Important lessons learned from the project include the following:

  • Political support for harmonizing regulations and processes is critical. Real and full commitment from the highest authorities in every participating country contributes to a cooperative environment based on mutual trust. In the case of this project, the IDB supported the decision of governments to include the project as one of the priorities highlighted in the Joint Declaration of Chiefs of State at the Presidential Summit of Tuxtla in 2008. The choice of the project coordinator is also critical for the success of the project. The coordinator must have good relationships with top government officials and have the support of the participating countries, and naturally of the IDB.
  • The project involved large number of stakeholders that have their unique characteristics and interests and operate within their legal remits. The IDB project was designed in a way that changes in national laws and regulations were not necessary.
  • All relevant agencies should participate in the coordination and harmonization process.
  • Information technology should be flexible and open to modifications.

CORE2013a

CORE2013b

[/s2If]

Integrated Border Management Strategy in Croatia, April 2005 (CORE2012)

Summary: An Integrated Border Management (IBM) Strategy was written in Croatia in accordance with the guidelines of the European Union and in collaboration with international experts. This strategy and its implementation action plan was adopted by the Croatian government on the 21 April 2005. The reviewed document is available for download at: Strategy for Integrated Border Management (Croatia).

[s2If is_user_logged_in()]

Full review: The main objective of the Integrated Border Management (IBM) Strategy is to provide effective support for economic development of the country and to raise the standard of living of citizens. The strategy also seeks to protect life and health of people and their property from cross-border crime. Integrated Border Management requires participation of many government agencies, including border police, customs, border veterinary service, border phytosanitary service, border sanitary service and the state inspectorate. Many times also state authorities in charge of culture, mining and radiation protection contribute to the IBM Strategy formulation and implementation.

As part of the Strategy, the Croatian government created a new interdepartmental working group. The primary objective was to facilitate cross-border traffic through reduction overlapping border control activities. The working group eliminated duplicate processes by aligning responsibilities of border control agencies and by exploiting the time of the relevant synergies between relevant governmental bodies. The working group launched initiatives in following areas:

  • Delegation of power from one border control authority;
  • Information sharing (apart from Single Window);
  • Coordination of passenger and crew movements;
  • Joint controls Joint controls (including joint examinations); and
  • Coordination of law enforcement activities.

CORE2012

[/s2If]

Cooperation experiences of the Canada Border Services Agency, July 2012 (CORE2011)

Summary: The Canada Border Services Agency (CBSA) has a dual mandate (1) to facilitate cross-border movements of cargo and people and (2) to protect security and safety of the Canadian people. The agency seeks to provide integrated border services, by closely cooperating with other Canadian border control agencies as well as with foreign customs administrations. The reviewed document is available for download here: Customs Cooperation Case Study for Canada.

[s2If is_user_logged_in()]

Full review: Forms of cooperation depend on needs of the partner agencies, but the cooperation typically includes:

  1. Participation in and cooperation with international organizations: CBSA participates and cooperates in various committees and working groups, especially as part of the WCO, WTO and Asia-Pacific Economic Cooperation.
  1. Technical Assistance and Capacity Building (TACB): The CBSA is an active contributor to least-developed countries and global capacity building such as the Columbus Programme from the WCO. CBSA´s TACB focuses on two areas: (i) senior decision makers seeking to modernize their border administration and (ii) technical level design for operational and field personnel.
  1. CBSA Liaison Officers: Canada has over 60 liaison officers in more than 40 countries around the world, who are in charge of cooperation-related tasks including training transport personnel and combating fraud.
  1. CBSA Science and Engineering Directorate (Lab): Multilaterally, the Lab helps to disseminate information and intelligence on new trends in critical areas including narcotics. Bilaterally, CBSA Lab expertise and best practices have contributed to contraband detection, while supporting multiple countries in exploiting new instruments and technologies.
  1. Customs Cooperation with the United States: After the September 11, 2001 event, Canada and US increased security and compliance measures that obviously slowed down cross-border trade and travel. To reduce such negative impacts, both countries signed the Smart Border Declaration in 2001, and engaged in the Security and Prosperity Partnership in 2005. The CBSA and the US Customs and Border Protection (CBP) developed the Framework for Co-operative Border Management, that aimed to enhance facilitation while maintaining security, and managing risk by dealing with threats as close to the point of origin as possible. Other US-Canadian cooperation forms have been developed with the objective of expanding and enhancing the benefits of trusted trader and traveller programs; coordinating investments in infrastructure and technology; simplifying business reporting requirements; enhancing screening of cargo and travellers at the perimeter to improve facilitation within the both countries; improving information sharing between both governments; and eliminating double inspections for air cargo and passenger baggage.

CORE2011

[/s2If]

C-TPAT Program Benefits Reference Guide, 2014 (CORE1032)

Summary: This guidebook outlines the key elements and benefits of the Customs-Trade Partnership Against Terrorism (C-TPAT) program that is designed to secure global supply chains and to improve United States border security. Document is available at: https://www.cbp.gov/sites/default/files/documents/C-TPAT%20Program%20Benefits%20Guide.pdf (link tested on 3 March 2016)

[s2If is_user_logged_in()]

Full review: C-TPAT partners receive a wide range of benefits listed below:

  • C-TPAT Partners are examined at a considerably lower rate than non-C-TPAT Partners.
  • C-TPAT certified/validated highway carrier Partners are granted expedited border crossing privileges. C-TPAT Partners at many Canada/Mexico land border ports of entry have access to Free and Secure Trade (FAST) Lanes.
  • Some categories of C-TPAT importer Partners are exempt from stratified exams.
  • C-TPAT shipments subject to examination are moved ahead of any non-C-TPAT shipments, to the extent possible.
  • In the event of a significant disruption/delay in cargo processing operations, actions are taken to maintain communication and coordination with C-TPAT Partners for business resumption.
  • C-TPAT Partners’ trade compliance issues are given priority over those issues related to non-C-TPAT Partners.
  • Each C-TPAT Partner is assigned a Supply Chain Security Specialist (SCSS) who coordinates between the C-TPAT Partner and the US Customs and Border Protection agency (CBP). The Specialist also assists the Partner with supply chain security issues.
  • Partners have access to the C-TPAT’s automated Portal system, to communicate with CBP and exchange program related information in a secure manner.
  • C-TPAT Partners are eligible to attend C-TPAT events like the annual Conference and other training seminars organized by the program.
  • C-TPAT importer Partners are eligible to participate in the Importer Self-Assessment (ISA) Program.
  • The Penalty Mitigation benefit is granted to sea carriers for late submission of data required under the Importer Security Filing requirements.
  • C-TPAT members are eligible to participate in other U.S. Government pilot programs, such as the Food and Drug Administration’s Secure Supply Chain program.

In addition, some benefits are associated with Mutual Recognition Arrangements (MRAs) when two customs authorities formally acknowledge the security requirements or standards of one program, as being equivalent to the other program. Some of the resulting benefits to the trade community are illustrated below:

  • C-TPAT importer Partners that also conduct export operations and Partners of the foreign Customs Administration programs (manufacturers and exporters of record) are granted a reduction in their overall cargo risk score, implying fewer examinations at export and import ports.
  • A C-TPAT validation for an overseas partner is not required if an MRA is in place because CBP recognizes the status of the Partner in the foreign partnership program.
  • Companies covered by MRAs need only to comply with a common set of security requirements, avoiding the hassle of following multiple sets of requirements from one partnership program to another.
  • MRAs lead to more transparency in international commerce. Mutual exchange of information between these partners facilitates trade across Mutual Recognition Partner nations.

CORE1032

[/s2If]

C-TPAT Best Practices Catalog Addendum, 2009 (CORE1031)

Summary: This addendum document lists cargo security best practices with focus on prevention of weapons of mass effect, terrorists, and/or contraband from infiltrating into the international supply chain. Each best practice is linked to a specific business entity, such as a Manufacturing Company, a Highway Carrier, an Importer or a Foreign Consolidator but these may apply to other business types as well. The document is available at: https://www.cbp.gov/sites/default/files/documents/ctpat_bpa_2009_0.pdf (link tested on 3 March 2016)

[s2If is_user_logged_in()]

Full review: The best practices are outlined as follows:

Risk assessment: Programs are in place to enable the identification of the most vulnerable supply chain areas, to grade suppliers supply chain security criteria. Specific processes have been developed to manage the supplier’s products, software and services and internal monitoring systems to enhance the safety and security procedures.

Business partner requirements: Several security measures have been taken by entities. These include conducting supply chain security audits to ensure compliance of non-C-TPAT business partners; carrying out security audits of a foreign manufacturer; making security self-assessments, conducting onsite inspections to ensure freight security; shipping cargo only through accredited ports and steamship lines; monitoring compliance of manufacturing facilities; screening procurements to identify ineligible status of suppliers, and performing audits of business partners.

Conveyance/Container/Trailer Security: Examples of such security practices are: integrating special security features in the GPS (global positioning system); using laser beams to protect trailers; using colour codes for matching consignments; installing infrared sensors in docks to prevent unauthorized access; using special codes to identify correct shipments; documenting all seal changes for shipments in transit; ensuring delivery by authorized Company drivers; sealing containers; operating through C-TPAT carriers; using only “seaworthy” containers; installing in-transit temperature data sensors to ensure product quality; enclosing container storage area; conducting non-intrusive inspection prior to loading a vessel; establishing specific inspection points; using multiple security devices on each container; using automated container yards; instructing foreign suppliers to provide inspection checklists; using dock locking arms for container storage; installing motion sensors in a trailer; operating through contracted highway carriers and security services; documenting a seal destruction policy, and so forth.

Physical Access Controls: Some practices by Importers include establishing multiple security stations within the building; using metal detectors for employees; installing an electronic swipe card/ lock box systems for access control for sensitive documents; conducting electronic scanning of visitors’ drivers licenses; utilizing a third-party software system to manage key inventory; and providing panic buttons for company employees.

Physical Security: Several innovative solutions have been designed to ensure physical security, such as electronically closing gates and activating tire puncturing devices to prevent vehicle exits; using an electronic security information reporting system, installing invisible electronic fences; installing laser sensors; setting up optical light beams to detect intruders; fitting double locks on doors; Installing infrared sensors on fences; using body alarm functions for emergencies; appointing patrolling guards, using multiple glass meeting rooms; using multiple interior infrared security alarm beams to detect unauthorized access; and installing security guard view towers.

Personnel Security: An Importer requires business partners to provide a monthly master list of employees and immediately notify when their employees are hired or terminated, in order to ensure that only authorized business partner’s employees enter the manufacturing facilities.

Security Training/Threat Awareness/Outreach: Business entities have invested in a wide range of training programs. One such initiative is the four-tier C-TPAT training targeted for management and supervisors, shipping and receiving personnel, internal personnel dealing with contractors and hourly staff. Other businesses use different approaches, like establishing an online training portal;; offering general security training and of site-specific training for security guards; issuing security advisories; making regular security awareness assessments; establishing a situation matrix chart to address possible incidents; establishing a direct communication channel between the president of the company and employees; putting in place a toll free hotline for company personnel; conducting security drills and exercises; establishing a web-based security awareness training; documenting security incidents in a central database; and establishing a global communication system to contact all employees and contractors remotely.

Procedural Security: Instances of this type of security measures include a bio-thermal intrusion alarm system; a global SAP network to generate all written orders for import and export; automatic screening procedures of purchase orders for restricted parties; lock boxes for sensitive documentation; an automated loading module called the Automatic Truck Loading System (ATLS); a container seal number as the shipment tracking (invoice/bill of lading) number, and so forth.

Information Technology (IT) Security: Such security practices include a biometric fingerprint door lock; a remote data backup center; a retina scanning system for access to the computer system; requiring supervisory approval to copy data; use of electronic password protected purchase orders; establishing a daily “e-test” for employees to access computers, and so forth.

CORE1031

[/s2If]

CEN Supply Chain Security — Good Practice Guide for Small and Medium Sized Operators, 2012 (CORE1030)

Summary: This is a guidance document for small and medium sized enterprises, SMEs. on how to apply a supply chain security approach to their operations in order to mitigate the risk of criminal activities. It gives an overview of the main crime types occurring in the supply chain along with some countermeasures, as well as the supply chain security initiatives, and the compliance requirements thereof. The document is available for purchase e.g. at:   http://shop.bsigroup.com/ProductDetail/?pid=000000000030258778  (link tested on 3 March 2016)

[s2If is_user_logged_in()]

Full review: The recommended supply chain strategy rests on a six-step approach. The first step is to define a context for the supply chain, crime prevention and security management activities taking into consideration the security sensitiveness, the geography and transport modes, and the main stakeholders involved in the supply chain operation. The second step is to make a threat and vulnerability analysis with regard to terrorist and other criminal threats in the supply chain. The main criteria included are the gaps existing in enhanced security, the high-risk crime types, and the potential consequences of crime occurrences. The third step covers the regulatory framework, the major aspects being the regulations and programs required for successful business operations, expectations of customers and suppliers, requirements laid down by insurance providers, and relevant government authorities. The fourth step refers to an overall security plan, taking into account the physical security, data security, human resources security (including selection, training, and exit procedures), business partner security (including selection, and auditing), and process control and monitoring of deviations. The fifth step involves implementing into practice concrete security measures, investment in technologies, procurement of services, in-house solutions and so forth. The final step is to monitor and measure the security performance and take appropriate corrective actions.

Five supply chain crime types have been elucidated in this guide. These include:  Property theft (cargo theft, intellectual property breaches); targeted damage (terrorism, sabotage); cross-border duty and tax fraud; illegitimate transporting, exporting and/or importing (smuggling of prohibited and restricted goods, people smuggling); and crime facilitation (document forgery, bogus companies, cybercrime). For each crime type, the main focus should be on the issue (main features and typical sectors/products involved), scope of the problem and actions to mitigate risks.

This guidebook has chosen eight security initiatives for illustration purposes. It explains the context of each initiative, whom it is meant for, and some basic requirements and the implications. These are as follows:

  • Import Control System (ICS) in the EU (a systems tool meant for the lodging and processing of Entry Summary Declarations, and for the exchange of messages across national customs agencies, economic operators and the European Commission).
  • Export Control System (ECS) in the EU (introduces EU procedures to computerize and control indirect exports and to implement the EU safety and security regulations);
  • Maritime Security Legislation, International Ship and Port Facility Security (ISPS) Code in the EU (International regulations to ensure the security of maritime transportation are being issued by the International Maritime Organization, IMO, in the International Ship and Port Facility Security Code);
  • Aviation Security Legislation, Air Cargo Supply Chains in the EU (three categories of aviation security legislation exist in the EU- Framework regulation, supplementing regulations, and implementing regulations-all targeted towards civil aviation security).
  • European Union Authorized Economic Operator, EU AEO (operators involved in international trade of goods certified as complying with WCO or equivalent supply chain security standards);
  • Regulated agent, Known consignor and Account consignor in the EU (Specific “trusted trader” status existing in the European air cargo supply chains);
  • ISO 28000 Series of Standards on Supply Chain Security Management Systems (address potential security issues at all stages of the supply process, e.g. terrorism, fraud and piracy);
  • Transported Asset Protection Association (TAPA) in Europe (fighting cargo crime using real-time intelligence and the latest preventative measures).

CORE1030

[/s2If]

Updates on Customs brokers, by Ms. Carol West

int-300116-1Hi Carol, and thanks for joining a CBRA Interview – can you first tell a bit who are you and what you do?

I am the President of the Canadian Society of Customs Brokers and the Secretary of the International Federation of Customs Brokers Associations, IFCBA. My office is in Ottawa, Canada. I have spent my professional life in the world of Customs, border management and trade facilitation. I am an advocate for the value and importance of customs brokers and I am passionate about the possibilities of Customs-business partnership, in Canada and worldwide. I believe strongly that building knowledge, investing in technology and managing relationships are critical to effective border management.

IFCBA and CBRA produced jointly the first survey study on future roles of customs brokers around 2004-2005. Looking now, in 2016, at the study outcomes: do you see that anything has changed or evolved in the “world of customs brokers” the way we anticipated a decade ago?

It is difficult to generalize as the role of a customs broker still differs so much between countries. The regulatory framework for licensing customs brokers and their scope of practice may be different, and the level of automation of a country’s Customs administration may influence the role of customs brokers in effective border management. Having said that, I believe that in the last decade the role of a customs broker as a trade facilitator has been even more effective than we had anticipated. Both importers and Customs recognize that knowledgeable, regulated customs brokers not only provide expedited navigation through and compliance with complex Customs requirements, they are widely used by businesses looking to reach new markets, with a minimum of cost and delay.

With Customs administrations automating their systems for risk management and implementing coordinated border management processes, there is also more focus on gathering information on the goods being imported prior to arrival, for admissibility and security purposes. In this context, the automation of carrier and cargo information is more important than it was ten years ago. With that in mind, the role of a customs broker is even more crucial today as the broker acts as a hub for all the data relating to a client’s transaction, ensuring its accuracy and compliance with Customs requirements.

Ten years ago, we thought that, by now, we would have made more progress with consistency of data requirements globally. There has been great work done by the World Customs Organization with its data model, but we still find that data requirements are not as harmonized or standardized as they could or should be.

From a business process standpoint, where licensed customs brokers exist they are used by the majority of importers – large multinational companies as well as small to medium enterprises. In a competitive marketplace, customs brokers are seeing more emphasis on performance measurement and key performance indications during the procurement process as well as in standard operations. Today, there is greater uncertainty in the business environment and increased complexity of the global supply chain. We think this also reflects the maturation of the brokerage industry where business managers focus on continuing improvements to their processes to reach maximum efficiencies in delivering value to clients.

By the way, are you aware of any recent research focusing on customs brokers, either on global or on national level?

The World Customs Organization, WCO conducted a survey of its members in 2015 on the subject of customs broker regulation and had an outstanding response rate. With many models of customs broker regulatory regimes among the WCO members, from no regulation to the mandatory use of a licensed customs broker, the results of the survey point to some opportunities for cooperation between Customs administrations and customs brokers, and, based on existing best practices, suggests considerations for a model for establishing a broker licensing system, particularly valuable where none exists today. It also offers ideas on engagement with customs brokers and other private sector players to enhance compliance and trade facilitation. We see this as a positive indicator of interest in issues that are of critical importance to the international customs broker community, and a sign that there is value in doing some additional work in this area.

From a customs broker’s perspective, which areas of global trade facilitation and supply chain security do you see as most important in 2016? What about the most difficult or challenging ones?

A very important development that might impact global trade is the Trans-Pacific Partnership, TTP. I say might because coming into force depends on the US Congress ratification of the agreement, and currently the rhetoric coming from Washington shows little support for it. I guess we’ll have to wait and see what happens. But assuming the TPP is ratified by the 12 signatories, even though it means elimination of tariffs and tariff barriers, it also means a more complex environment to navigate the multiple free trade agreements for the multi-national importers. Customs brokers as experts in rules of origin and compliance, in general will continue playing a very important role in the trade chain.

Looking a bit further out, one of the most challenging issues of the next 5 years will be the immense growth in e-commerce globally, and the pressure put on governments world-wide by online retailers to increase the de-minimis thresholds. It is projected that the online sales will reach US $3.5 trillion by 2020. That represents a lot of import duties that may not be collected and remitted if the de-minimis thresholds are increased or standardized. We expect that the impact of this will be seen differently depending on positions taken by national administrations given their own economic situations and pressures for competitiveness. Customs brokers will no doubt integrate any such changes into their compliance models and service offerings, keeping their clients’ interests and obligations foremost.

We can’t speak of challenges without mentioning the global trade slowdown we’ve experienced since the 2008 global financial crisis. Many factors seem to be contributing to the continued sluggishness which some consider cyclical others structural in nature. Regardless, governments have to remember that trade can be a powerful tool in their policy toolkit and customs brokers are natural allies in promoting its growth.

Any other greetings you would like to send to the CBRA Interview and Blog readers?

IFCBA will be holding its next World Conference in Shanghai 17-21 May, 2016, and the theme is “Facilitating Trade Through the Customs-Business Connection”. Hundreds of delegates from all regions of the world will be in attendance representing national customs brokers associations, international customs organizations such as the WCO, freight forwarding firms, shipping companies, cross-border e-commerce associations, world logistics enterprises, and many more. Our conferences are held only every two years, and we are very excited about sharing ideas and strategies for success with business and government colleagues from around the world.

Thanks a lot Carol for this concluding note – we just added the IFCBA World Conference to CBRA´s Events calendar – and thanks for the whole interview; maybe we can explore bit later this year on joint research, training or other project opportunities…!

 

Web-resources:

http://ifcba.org/

http://www.wcoomd.org/en/topics/facilitation/resources/~/~/media/234D5143B2344B918496C93F24B48586.ashx

https://www.internetretailer.com/2015/07/29/global-e-commerce-set-grow-25-2015

http://bruegel.org/2015/08/the-global-trade-slowdown-puzzle/

https://www.wto.org/english/news_e/pres15_e/pr752_e.htm

https://globalconnections.hsbc.com/global/en/tools-data/trade-forecasts/global

https://www.imf.org/external/pubs/ft/weo/2016/update/01/pdf/0116.pdf 

Related CBRA studies:  

Gutierrez, X., Hintsa, J., Wieser, P. and Hameri, A.P. (2005), “New roles for customs brokers in international supply chain”, Proceedings of First International Conference on Transportation Logistics (T-LOG), July 27-29, 2005, Singapore.

Hintsa, J., Mohanty, S., Tsikolenko, V., Ivens, B., Leischnig, A., Kähäri, P., Hameri, A.P., and Cadot, O. (2014), The import VAT and duty de-minimis in the European Union – Where should they be and what will be the impact? Final Report, Brussels, Belgium.