Border Agency Cooperation, Part 3 of 3

The last blog in our three-part series on Border Agency Cooperation introduces a conceptual framework capturing the essential dimensions of Border Agency Coordination: three levels of collaboration, four areas of integration and four objects for sharing. We hope that the framework helps the customs and other border agency communities to see all levels of Border Agency Cooperation (BAC) so that they can move from isolated coexistence towards more active cooperation at the borders. Higher levels of cooperation are likely to translate into higher levels of trade facilitation, control over cross-border cargo flows and resource efficiency, simultaneously. Compared with the previous BAC Blog Part 2, this BAC Blog Part 3 intends to present a comprehensive framework surrounding BAC ambitions, plans, implementations and monitoring activities – while the previous BAC Bloc 2 focused purely on a set of 15 key BAC actions, grouped according to the main beneficiary groups. This final BAC Blog has been written by Dr. Toni Männistö of CBRA.

Let’s start by first presenting the BAC diagram: Conceptual framework on Border Agency Cooperation (source: Männistö, T., and Hintsa J., 2015; inspired by Polner, 2011 and by Institute of Policy Studies, 2008)

blog-200516-1

Levels of cooperation

Intra-agency cooperation is about aligning goals and work within one organization, either horizontally between departments or vertically between headquarters and local branches, in particular border-crossing offices / stations. Ways to foster horizontal intra-agency cooperation include development of intranet networks, cross-training, inter-departmental rotation of staff, and establishment of joint task forces that tackle multifaceted challenges like transnational terrorism. Ideally, the vertical cooperation would be bi-directional: headquarters would define priorities and objectives and then communicate them to local branches. The branches would, reciprocally, send back status reports and suggest improvements to the general policies. Solving intra-agency cooperation lays a basis for broader cooperation: it’s hard for any organization to cooperate efficiently with external stakeholders if it struggles with internal problems. The logical first step in coordinated border management is therefore breaking departmental silos and building a culture of cooperation within boundaries of one organization.

Inter-agency cooperation, at the operational level, concerns relationships among a broad range of border agencies that play a role in controlling cross-border trade and travel. In many countries, primary agencies present at the borders include customs, border guards, immigration authorities and transport security agencies. However, also police organizations, health authorities, and phytosanitary and veterinary controllers, among others, take part in border management. According to a recent study, typical areas of customs- border guard inter-agency cooperation can include strategic planning, communication and information exchange, coordination of workflow of border crossing points, risk analysis, criminal investigations, joint operations, control outside border control points, mobile units, contingency/emergency, infrastructure and equipment sharing, and training and human resource management (CSD, 2011). Governmental inter-agency cooperation occurs between border control agencies and ministries and policy making bodies that are responsible for oversight and financing of border management activities.

International cooperation may take place locally at both sides of a border. One Stop Border Posts, OSBPs – border crossings managed jointly by two neighboring countries – are prime examples of such cooperation. One Stop Border Posts can involve various forms of collaboration: harmonization of documentation, shared maintenance of the infrastructure, joint or mutually recognized controls, exchange of data and information and common investments in infrastructure and so forth. Operational arrangements between the Norwegian, Finnish and Swedish customs illustrate advanced international cross-border cooperation that save time and money of border control authorities and trading companies. The cooperation builds on division of labor, where the national border authorities of each country are allowed to provide services and exercise legal powers of their home country and neighboring countries. For instance, when goods are exported from Norway, all paperwork related to both exports and imports may be attended by either Swedish, Finnish or Norwegian customs office (Norwegian Customs, 2011). At the political level, this requires international cooperation between authorities and policy makers in two or more countries. Operational cooperation (e.g., mutual recognition of controls or regional Single Window), often bringing tangible trade facilitation benefits, usually follows from political, supranational decisions (e.g., the WCO’s Revised Kyoto Convention and SAFE Framework of Standards).

Areas of integration

Technical integration often entails improving connectivity and interoperability of information and communication technology systems within and across organizations. Single Window solutions are typical outcomes of technical cooperation as they enable automatic exchange of electronic trade information among border control agencies. The UN Centre for Trade Facilitation and Electronic Business, UN/CEFACT, is an important international organization helping to build connectivity across countries and between business and governmental stakeholders. UN/CEFACT, for instance, develops and maintains globally recognized standards for EDI messages.

Operational integration is largely about coordination of inspection and auditing activities among border control agencies. Benefits of synchronized activities are evident: organizing necessary controls at one place and at the same time reduces delays and administrative burden that trading companies and travelers face at borders. A simple and powerful example of operational integration is coordination of opening hours and days of customs offices at the both sides of a border. Operational integration also covers provision of mutual administrative assistance, joint criminal investigations and prosecution, and sharing of customs intelligence and other information.

Legislative integration seeks to remove legal barriers and ambiguities that prevent border control agencies from exchanging information, sharing responsibilities or otherwise deepening their cooperation. Essentially, most forms of Border Agency Coordination require some degree of legislative harmonization and political commitment. For example, Article 8 of the WTO/TFA to the WTO Members requires that national authorities and agencies responsible for border controls and dealing with the importation, exportation and transit of goods must cooperate with one another and coordinate their activities in order to facilitate trade.

Institutional integration is about restructuring roles and responsibilities of border controls agencies. An example of a major restructuring is the annexing of US border control agencies – including the US Customs and Border Protection, Transportation Security Administration and Coast Guard – into the Department of Homeland Security, DHS, a body that took over the key governmental functions involved in the US non-military counter-terrorism efforts in the aftermaths of the September 11th, 2001, terrorist attacks.

Objects of sharing

Sharing of information – data, knowledge and intelligence – reduce duplicate work (e.g., sharing of audit findings), enable operational coordination (e.g., synchronized border controls) and facilitate development of common agenda for future border agency coordination. At the global level, the WCO’s Customs Enforcement Network CEN is an example of a trusted communication system for exchanging information and intelligence, especially seizure records, between customs officials worldwide. Another WCO initiative, the Globally Networked Customs, analyzes potential to further “rationalize, harmonize and standardize the secure and efficient exchange of information between WCO Members” (WCO 2015).

Resource sharing involves multi-agency joint investments in equipment, facilities, IT systems, databases, expertise and other common resources. The joint investment activities are likely to result in higher resource utilization and bulk purchasing discounts. For example, national and regional Single Window solutions are often outcomes of joint development and investment activities of various government agencies.

Sharing of work is mostly about rationalization of overlapping border control activities, controls and formalities. If two border control agencies, for instance, agree to recognize each other’s controls, there is no need to control the same goods more than once. Combining forces to investigate and prosecute crime also often help border control agencies to use their limited resources more efficiently.

Sharing of responsibilities is about coordinating and streamlining administrative and control tasks among border control agencies. Norway, again, sets a good example of sharing the responsibilities. The Norwegian customs represents all other border control agencies – except the veterinary office – at the frontier. Customs officers are responsible for routine border formalities, and they summon representatives of other border control agencies as and when the officers need assistance. Internationally, the Norwegian customs cooperates closely with Swedish and Finnish border control authorities at the Northern Scandinavian border posts. Bilateral agreements between its neighbors allow Norwegian customs officers authority to perform most customs checks and formalities for and on behalf of their Swedish and Finnish colleagues. The coordination decreases border-crossing times and lowers administrative costs for trading companies and the border control agencies in the three countries.

This concludes now our three-part series on Border Agency Cooperation. In Part 1, we shared an illustrative worst case example on how complex, slow and expensive a cross-border supply chain execution comes when no cooperation takes place between relevant government agencies, neither nationally nor internationally. In Part 2, we presented a conceptual BAC model with 15 key actions to improve the degree of cooperation in a given country or region – for the direct benefit of supply chain companies, or government agencies, or both. And in this Part 3, we finally presented our comprehensive BAC framework, which hopefully helps government policy makers and border agencies to design, implement and monitor their future BAC programs and initiatives in an effective and transparent manner. Toni Männistö and Juha Hintsa.

Bibliography:

Center for the Study of Democracy (CSD), 2011. “Better Management of EU Borders through Cooperation”, Study to Identify Best Practices on the Cooperation Between Border Guards and Customs Administrations Working at the External Borders of the EU.

Institute of Policy Studies 2008, Better connected services for Kiwis: a discussion document for managers and front-line staff on better joining up the horizontal and vertical, Institute of Policy Studies, Wellington, NZ.

Männistö, T., and Hintsa J., “Theory of Border Agency Cooperation”, CBRA working paper 2015, Lausanne, Switzerland.

Norwegian Customs, 2011. Case Study on Border Agency Cooperation Submitted by Norway for the November Symposium.

Polner, M. (2011). Coordinated border management: from theory to practice. World Customs Journal, 5(2), 49-61.

United Nations Conference on Trade and Development (UNCTAD), 2011 Border Agency Coordination”, UNCTAD Trust Fund for Trade Facilitation Negotiations Technical Note No. 14.

TRANSPORTATION SECURITY – Action Needed to Strengthen TSA’s Security Threat Assessment Process, GAO, 2013 (CORE1015)

Summary: The GAO report is about measuring the performance of the Adjudication Centre that is a department within the Transportation Security Administration (TSA) responsible for administering background checks for people who need access to secure facilities unescorted. The centre issues the access credentials based on a through vetting of the applicant’s criminal history, immigration status, and connections to terrorist groups, among other checks. The report argues that the Adjunction Centre could improve the efficiency of the background checks – the individual security threat assessment – by improving its performance measurement system through better data and indicators. Although this GAO report focuses on a rather narrow topic, management of the background checking process, the report’s insights could benefit the CORE’s risk management cluster and those demonstrations that deal with access control matters. The report is available at: http://gao.gov/assets/660/656051.pdf

[s2If is_user_logged_in()]

Full review: This GAO document is closely related to the work the CORE’s risk cluster. The report describes problems the TSA’s Adjudication Centre faces when it manages the background checking process of the US-based transportation worker identification credentials (TWIC), hazardous materials endorsements (HME) and Aviation Worker (AV) authorization programs. Moreover, since access control is a central security solution in nearly all CORE demonstrators, the demonstrations might benefit from tips and guidance this report offers. At the final stages of the project, this GAO report might prove a useful document when the project consortium produces training materials on how to manage access control systems and how to administer background checks.

Cross-references:

  • Port Risk Management: Additional Federal Guidance Would Aid Ports in Disaster Planning and Recovery. GAO-07-412. Washington, D.C.: March 28, 2007.
  • Critical Infrastructure Protection: An Implementation Strategy Could Advance DHS’s Coordination of Resilience Efforts across Ports and Other Infrastructure. GAO-13-11. Washington, D.C.: October 25, 2012.

CORE1015

Additional keywords: Terrorism, background checks

[/s2If]

SUPPLY CHAIN SECURITY – CBP Needs to Conduct Regular Assessments of Its Cargo Targeting System, GAO, October 2012 (CORE1014)

Summary: The US maritime security strategy uses advance cargo information to assess risk levels of US-bound maritime shipping containers. This GAO report reviews how the Automated Targeting System, a web-based computer program that calculates risk scores for the containers, support the US Customs and Border Protection’s (CBP) targeting efforts. The report argues that CBP could improve its targeting program by establishing sound procedures and criteria for assessing the performance of the targeting activity. This GAO report contains information about the US risk-based shipment targeting solution that benefit the CORE’s risk and IT clusters. The US-related demonstrations may also find the report’s information useful. The report is available at: http://gao.gov/assets/650/649695.pdf

[s2If is_user_logged_in()]

Full review: The risk targeting systems are part of governments’ supply chain security programs worldwide. The GAO reports gives unparalleled, detailed information about the principles that the US authorities follow to collect and analyse data about cargo movements that allow them to calculate risk scores for US-bound maritime shipping containers. The CORE’s risk cluster should pay attention to this information and learn how risk-based screening and examination of maritime shipping containers has been organized in the US, in the leading country of supply chain security. The report reveals useful information about IT infrastructure that support the risk targeting system, therefore providing a sound reference material for the CORE’s IT cluster. Project partners engaged in the CORE’s demonstrations – logistics operators, authorities and technology providers – benefit from the report’s description of the US automated targeting system (ATS) that play an important security role in the US-bound maritime trade and logistics.

Cross-references:

  • Supply Chain Security: Container Security Programs Have Matured, but Uncertainty Persists over the Future of 100 Percent Scanning. GAO-12-422T. Washington, D.C.: February 7, 2012.
  • Supply Chain Security: Feasibility and Cost-Benefit Analysis Would Assist DHS and Congress in Assessing and Implementing the Requirement to Scan 100 Percent of U.S.-Bound Containers. GAO-10-12. Washington, D.C.: October 30, 2009.
  • Supply Chain Security: CBP Has Made Progress in Assisting the Trade Industry in Implementing the New Importer Security Filing Requirements, but Some Challenges Remain. GAO-10-841. Washington, D.C.: September 10, 2010.

CORE1014

Additional keywords: Terrorism, automated targeting system (ATS), 24-hour rule, the importer security filing and additional carrier requirements (10 + 2 rule)

[/s2If]

MARITIME SECURITY – Progress and Challenges 10 Years after the Maritime Transportation Security Act, GAO, September 2012 (CORE1013)

Summary: This GAO report reviews how the US government has advanced maritime security since the introduction of the Maritime Transportation Security Act (MTSA) in 2002 and what kind of challenges the Department of Homeland Security (DHS) and its component agencies have encountered in translating the Act’s requirements into practice. The report describes in detail the character, progress and future vision of main US maritime security programs, which, according to the report, fall into four domains: (1) security planning, (2) port and vessel security, (3) maritime domain awareness and information exchange and (4) international supply chain security. The report points out that the US maritime security scheme calls for further improvements in the areas of (1) program management and implementation, (2) partnerships and collaboration, (3) resources, funding, and sustainability as well as (4) performance measures.  This report describes the entire field of US maritime security, and this information is very useful for CORE demonstrations that involve shipping into, through or out of the US ports. The report is available at: http://www.gao.gov/assets/650/647999.pdf

[s2If is_user_logged_in()]

Full review: This scope of this GAO document is broad as it covers the entire US maritime security, its many themes from funding to practical initiatives and risk assessment. CORE’s demonstrations that involve US-related maritime shipping can use this document to get a comprehensive and detailed information about the status and future challenges of the US maritime security scheme. Also the CORE’s risk cluster can use this document to analyze how the US government has established a risk-based, layered security system to protect the seaborne trade and logistics from terrorism, smuggling and other criminal activities. Because of the complete description of the US maritime security scheme, the report is excellent reference material for producing training material and educational contents in the CORE training cluster.

Cross-references:

  • Maritime Security: DHS Progress and Challenges in Key Areas of Port Security. GAO-10-940T. Washington, D.C.: July 21, 2010. See pages 10-11.
  • Maritime Security: The SAFE Port Act: Status and Implementation One Year Later. GAO-08-126T. Washington, D.C.: October 30, 2007. See pages 15-19.
  • Information on Port Security in the Caribbean Basin. GAO-07-804R. Washington, D.C.: June 29, 2007.
  • Supply Chain Security: Container Security Programs Have Matured, but Uncertainty Persists over the Future of 100 Percent Scanning. GAO-12-422T. Washington, D.C.: February 7, 2012. See pages 13-14.
  • Supply Chain Security: Feasibility and Cost-Benefit Analysis Would Assist DHS and Congress in Assessing and Implementing the Requirement to Scan 100 Percent of U.S.-Bound Containers. GAO-10-12. Washington, D.C.: October 30, 2009. See pages 41-43.
  • Supply Chain Security: U.S. Customs and Border Protection Has Enhanced Its Partnership with Import Trade Sectors, but Challenges Remain in Verifying Security Practices. GAO-08-240. Washington, D.C.: April 25, 2008.

CORE1013

Additional keywords: Maritime Transportation Security Act, Secure Freight Initiative, Customs-Trade Partnership Against Terrorism (C-TPAT), Container Security Initiative (CSI), risk assessment, container screening, counter-terrorism, maritime security

[/s2If]

Vision and Strategy 2020, U.S. Customs and Border Protection Strategic Plan – Delivering safety, security, and prosperity through collaboration, innovation, and integration 2015 (CORE2010)

Summary

This document sets a vision of the US Customs and Border Protection (CBP), the primary border control agency present at the US borders, for year 2020. The vision builds on four general goals and associated objectives that aim to improve safety, security and prosperity of the American people. Collaboration, risk management as well as exchange and exploitation of information and intelligence are in the heart of the vision document and integral elements of its goals and objectives. The vision document is available at: http://www.cbp.gov/sites/default/files/documents/CBP-Vision-Strategy-2020.pdf

Review by Toni Männistö (CBRA)

[s2If is_user_logged_in()]

Full review

The vision’s first goal is to counter transnational terrorism and crime at and beyond the US borders. Keys to effective counter-terrorism and anti-crime efforts are understanding of threat landscape as well as interagency and international coordination on border management. The second goal is about promoting a comprehensive, whole-of-government approach to border security and management, in order to exploit complementary capabilities of various border control agencies to the fullest extent. Specific objectives underpinning this goal are “situational awareness of the air, land and maritime borders”, “detection, interdiction and disruption of illegal border activities” and “strengthening comprehensive trade enforcement. Here the key is to collect information and intelligence about trade flows and carry out risk assessment to identify and target high-risk cargo movements and facilitate low-risk traffic. Other objectives are strengthening processes to conduct out-bound enforcement and interdiction of travelers and cargo as well as advance a comprehensive, predictive targeting strategy to identify threats as early as possible.

The third goal is about enhancing the US economic competitiveness by facilitating lawful trade and travel. The goal consists of objectives that seek to reduce cost of trade and travel by streamlining customs processes. Other objectives are to harmonize procedures throughout US government agencies and to develop risk-segmentation for better facilitation of low-risk trade and travel. Agility and adaptability of the CBP organization is the fourth goal. Sub-goals, or objectives, include optimization of CBP’s organizational structure, strengthening organizational structure and advance CBP’s effectiveness through technologies and business innovations. The vision document concludes with a presentation of principles and process of risk management in the customs context.

This vision document contains lots of relevant information for many CORE work packages, especially for those that deal with US-bound supply chains (WP9, WP14 and WP17. Certainly, also work packages dealing with risk assessment and educational material benefit from this material. Altogether, revealing strategic priorities of the CBP, the document reflects the trends of customs-centric supply chain security worldwide, and this information is very valuable for CORE and its work packages.

Reference

US CBP, 2015. Vision and Strategy 2020, U.S. Customs and Border Protection Strategic Plan – Delivering safety, security, and prosperity through collaboration, innovation, and integration

CORE2010

 [/s2If]

COMMISSION IMPLEMENTING REGULATION (EU) No 889/2014 of 14 August 2014 amending Regulation (EEC) No 2454/93, as regards recognition of the common security requirements under the regulated agent and known consignor programme and the Authorised Economic Operator programme, 2014 (CORE1069)

Summary: Existing customs Regulation ((EEC) No 2913/92 establishing the Community Customs Code) and aviation legislation (Regulation (EC) No 300/2008) provides for certain recognition of the certifications under the respective programmes, in particular with regard to the security examinations done for each of them. Regulation (EU) No 889/2014 is necessary for the recognition of the known consignor status with its relevance for the AEO as well, frame the scope of recognition of the common requirements between the respective programmes and allow for the necessary exchange of information between customs and aviation authorities. The 889/2014 is available for download at: http://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32014R0889&from=EN.

[s2If is_user_logged_in()]

Full review: Commission Regulation (EEC) No 2454/93 now provides that if the applicant for Authorised Economic Operator (AEO) status is already a regulated agent or a known consignor, the criterion on ‘appropriate security and safety standards’ shall be deemed to be met in relation to the premises for which the economic operator obtained the status of regulated agent or known consignor. Points 6.3.1.2 and 6.4.1.2 of the Annex to Commission Regulation (EU) No 185/2010 (4) provide that the appropriate authority, or independent validator acting on its behalf, should take into account whether or not the applicant for regulated agent or known consignor is a holder of an AEO certificate.

The practical implementation of both the customs legislation governing the AEO status and the aviation legislation governing the regulated agent and known consignor has shown that the existing recognition between the programmes is not sufficient to ensure the highest possible synergies between the respective security programmes. The security requirements for both the aviation security regulated agent and known consignor programme and for the customs AEO programme are equivalent to such an extent that both programmes may be aligned further.

Further alignment of both programmes in terms of equal level of recognition, including required exchange of information is necessary in order to decrease the administrative burden for the economic sector concerned and government authorities (both customs and civil aviation) while strengthening further the current level of security.

Regulation (EU) No 889/2014 is necessary for the recognition of the known consignor status with its relevance for the AEO as well, frame the scope of recognition of the common requirements between the respective programmes and allow for the necessary exchange of information between customs and aviation authorities.

The issuing customs authority shall immediately make available to the appropriate national authority responsible for civil aviation security the following minimum information related to the status of authorised economic operator which it has at its disposal:

  • the AEO certificate – security and safety (AEOS) and AEO certificate – customs simplifications/security and safety (AEOF) including the name of the holder of the certificate and, where applicable, their amendment or revocation or the suspension of the status of authorised economic operator and the reasons therefore;
  • information about whether the specific site concerned has been visited by customs authorities, the date of the last visit and the purpose for the visit (authorisation process, reassessment, monitoring); and
  • any reassessments of AEOS and AEOF certificates and the results thereof.

Relevance for CORE: The CORE implementation objectives, which specify what will be done and how to reach the vision, are all subject to the Policies, Regulations, and Standards that exist within the Security Domain of the Global Supply Chain. The following Work Packages are directly impacted by the implementing regulation (EU) No 889/2014:

  • Research and Analysis: Undertake requirements analysis and impact assessment. The project will undertake requirements analysis from different perspectives. In WP1 we will consolidate reviews of SCS regulations policies and standards from Reference Projects and specify implementation support requirements.
  • The Demonstrators: The CORE demonstrators will validate the applicability and benefits of the CORE approach in representative operating scenarios characteristic of the global supply chain. They will specifically show the way towards a Global Secure Supply Chain. The overriding goal is to demonstrate substantial gains in security and facilitation covering every major facet of the supply chain security sector.

The CORE demonstrators affected by the implementing regulation (EU) No 889/2014 are:

  • WP12: Demonstrator Schiphol – apply global data pipeline concept to air cargo supply chains, managing air freight specific trade compliance requirements, and offering supply chain visibility in dashboards. Trade lanes with e.g. Africa, involving multiple inspection authorities.
  • WP17: DHL Demonstrator – managing airfreight trade compliance requirements EU-US in the context of fast supplying of parts.

Also, WP19 is affected here: Stakeholder Engagement – Knowledge Diffusion and Sustainable Development. Specify and apply an inclusive Stakeholder Engagement Strategy emphasizing international co-operation to promote harmonization of regulations, and to support further development and implementation of international standards.

Cross-references and citations:

  • http://ec.europa.eu/transport/modes/air/security/
  • Regulation (EEC) No 2913/92. EU Regulation establishing the Community Customs Code.
  • Regulation (EC) No 300/2008. EU Regulation on common rules in the field of civil aviation security allows that entities complying with certain conditions and requirements may be certified to ensure and contribute to a secure supply chain.
  • Barosso, J. (2014), “COMMISSION IMPLEMENTING REGULATION (EU) No 889/2014 of 14 August 2014 amending Regulation (EEC) No 2454/93, as regards recognition of the common security requirements under the regulated agent and known consignor programme and the Authorised Economic Operator programme”, available at: http://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32014R0889&from=EN.

CORE1069
[/s2If]

Supply Chain Security: DHS Should Test and Evaluate Container Security Technologies Consistent with All Identified Operational Scenarios to Ensure the Technologies Will Function as Intended, GAO, 2010 (CORE1068)

Summary: This report reviews container security technologies that the Science and Technology (S&T) Directorate of the US Department of Homeland Security (DHS) has evaluated and tested between 2004 and 2009. These container security technologies aim to (1) detect and report unauthorized intrusions into the shipping containers and (2) to track the movement of the containers through the supply chain. As of 2009, DHS has funded and tested four different container security technologies. So far, none of the candidate technologies meet all desired functional requirements: main problems are high false alarm rates, low detection probability, and difficult installation and calibration. Besides the unsatisfactory test results, the report points out problems of conducting the phase II practical “trade lane” testing in the context of the maritime transport only. The report recommends to test the technologies “across all operational scenarios,” considering contextual differences across different modes of transport. Once the technologies would pass this extended trade lane testing, the DHS should (1) obtain support from the trade industry and international partners, (2) develop a concept of operations (CONOPS) for using the technology, and (3) certify the container security technologies for use. The source document is available at: http://www.gao.gov/products/GAO-10-887.

[s2If is_user_logged_in()]

Full review: This GAO document describes in detail the four container security technologies that DHS has tested since 2004, and one of these technologies happens to be the very same “composite security container” that the WP22 CORE demonstration studies. The report discusses in details the problems that the previous tests and pilots of container security technologies have encountered. Being aware of the past problems help the CORE demonstrations to avoid past mistakes. In addition to the WP22 demonstration, the other demonstrations that involve tracking & tracing of intermodal containers benefit from the information of this GAO report. For instance, the GM demonstration on maritime shipping of automobile parts from the EU to the US via the port of Bremerhaven (WP9) might use this GAO document to evaluate available technical solutions for tracking the shipping containers. The demonstrations in work packages 14-17 involve tracking and tracing and therefore may use the detailed analysis this GAO report offers on available container security technologies.

 Cross-references:

  • Homeland Security: Key Cargo Security Programs Can Be Improved. GAO-05-466T. Washington, D.C.: May 26, 2005.
  • Cargo Container Inspections: Preliminary Observations on the Status of Efforts to Improve the Automated Targeting System. GAO-06-591T. Washington, D.C.: March 30, 2006.
  • Supply Chain Security: Feasibility and Cost-Benefit Analysis Would Assist DHS and Congress in Assessing and Implementing the Requirement to Scan 100 Percent of U.S.-Bound Containers. GAO-10-12. Washington, D.C.: October 30, 2009.
  • Maritime Security: DHS Progress and Challenges in Key Areas of Port Security. GAO-10-940T. Washington, D.C.: July 21, 2010.

Full citation:

U.S. Government Accountability Office (GAO), 2008. Supply Chain Security: DHS Should Test and Evaluate Container Security Technologies Consistent with All Identified Operational Scenarios to Ensure the Technologies Will Function as Intended.

CORE1068

Additional keywords: Container security, maritime logistics, container security device, tracking & tracing
[/s2If]

AVIATION SECURITY – Transportation Security Administration Has Strengthened Planning to Guide Investments in Key Aviation Security Programs, but More Work Remains, GAO 2008 (CORE1067)

Summary: This GAO report discusses the impact of the 26 billion USD that the Transportation Security Administration (TSA) has spent on aviation security since 2004. The report focuses especially on the current status and the future challenges of passenger screening, air cargo security and passenger watch-list matching program known as Secure Flight. The air cargo security discussion is the report’s most relevant section from the CORE’s viewpoint. The information in the report, that has been published as early as July 2008, is anyhow largely outdated: it discusses challenges that TSA and the air cargo community need to overcome before starting the 100% screening of air cargo that flies on board passenger planes, a legal requirement that become into force in August 2010 and that was set by the Implementing Recommendation of the 9/11 Commission Act of 2007 (aka the 9/11 Act). The report also recommended strengthening the security of US-bound foreign air cargo (into the US from the rest of the world), to bring it on a par with outbound air cargo security (from the US to rest of the world). More recent regulations and initiatives have corrected this weakness in the US air cargo security: today, third country air carriers must screen cargo up to US standards (or national standards if the country of origin and the US recognize each other’s air cargo regimes) before loading cargo on US-bound planes. The source document is available at: http://www.gao.gov/products/GAO-08-1024T.

[s2If is_user_logged_in()]

Full review: This GAO report provides useful background information about the US air cargo security regime. This information is going to be useful for the CORE demonstration 17.1 that is about time-critical express shipping of military aircraft parts from the US to Spain. In the demonstration, the express operator DHL ships the parts by plane, and thus compliance with the US air cargo security requirements is one of the key themes of this demo. Also WP 1 might use this GAO report to describe evolution of the US air cargo regime over the years. But though this analysis would be interesting, it is not going to be the essential content in the deliverable of the WP1.

 Cross-references:

  • GAO, Aviation Security: Federal Coordination for Responding to In-flight Security Threats Has Matured, but Procedures Can Be Strengthened, (Washington, D.C.: July 31, 2007).
  • G_A_O_, Aviation Security: Transportation Security Administration May Face Resource and other Challenges in Developing a System to Screen All Cargo Transported on Passenger Aircraft
  • GAO, Aviation Security: Federal Efforts to Secure U.S.-Bound Air Cargo Are in the Early Stages and Could Be Strengthened, GAO-07-660 (Washington, D.C.: April 2007).
  • GAO, Aviation Security: Progress Made in Systematic Planning to Guide Key Investment Decisions, but More Work Remains, GAO-07-448T (Washington, D.C.: February 13, 2007).

Full citation:

U.S. Government Accountability Office (GAO), 2008. Aviation Security – Transportation Security Administration Has Strengthened Planning to Guide Investments in Key Aviation Security Programs.

CORE1067

Additional keywords: Air cargo security, Certified Cargo Screening Program (CCSP)

[/s2If]

SUPPLY CHAIN SECURITY: Feasibility and Cost-Benefit Analysis Would Assist DHS and Congress in Assessing and Implementing the Requirement to Scan 100 Percent of U.S.-Bound Containers, GAO (October 2009, CORE1066)

Summary: The document provides a comprehensive outlook on the past and recent US initiatives on container security. The report focuses on the challenges that prevent global implementation of the 100% scanning of US-bound containers in foreign ports with both non-intrusive inspection (NII) technologies and radiation detection devices, as mandated by the SAFE Port Act and the 9/11 Acts. The 100% scanning is believed to deter and detect terrorist attempts of smuggling weapons of mass destruction (WMD) into the United States inside a cargo container. The reports dates back to late 2009, so the description of the current state of the US container security it provides is not necessarily no longer accurate. The report anticipates that the implementation of the 100% scanning requirement will be delayed due to various problems that were identified during the precursory Secure Freight Initiative (SFI) pilots. These problems are related mainly to port logistics (routing of containers through scanning sites), employee safety (radiation of screening equipment) and technical constraints (equipment failures and poor quality of scanning images). Today, we know that the US authorities have deferred the implementation already twice, first to 2014 and for the second time until 2016. Altogether, this GAO report describes in detail the challenges of the 100% scanning law and elaborates some ongoing alternative risk-based approaches to container security: (1) the strategic trade lane strategy that aims to establish 100% scanning only in high terrorist risk foreign sea ports and (2) the “10 + 2” data requirements that importers and ocean carriers must submit to the US Customs and Border Protection (CBP) prior to a container is loaded aboard a US-bound vessel so that the US authorities can calculate more precise risk for each shipping container. This report includes relevant information for all the CORE’s demonstrations that involve US-bound maritime transportation. The source document is available at: http://www.gao.gov/products/GAO-10-12.

[s2If is_user_logged_in()]

Full review: The GAO document provides interesting insights on the evolution of the US container security regulations over the years. This is useful supportive information for CORE demonstrations that involve maritime shipping of containers into the US. The GM demonstration of the WP9 for example covers exports of automobile parts from the EU into the US by transatlantic ocean transport. If the US Congress does not repeal or defer the 100% scanning requirement, the port of Felixstove that participates in the demonstration, need to start scanning also all GM’s US-bound containers. Likewise, the FALACUS demo (WP14), which is about shipping of ceramic tiles from Italy to the US, must take into consideration the possible effects of the 100% scanning requirement. This demonstration is particularly interesting from the 100% scanning requirement standpoint because some ceramic tiles are naturally radioactive, and thus they tend to trigger false alarms in the radiation controls. Also the P&G demonstrator in the WP17, that focuses on shipping of consumer goods into the US, the possible impact of the 100% scanning regulation.

Besides the demonstrations, the CORE’s risk cluster might benefit from the detailed analysis of the risk-based approaches to the US container security, such as the strategic trade lane strategy and the “10 + 2” data requirement. All demonstrations might benefit from lessons learnt how GAO has advises DHS and CBP to carry out cost-benefit analyses for the US container security programs (especially the Secure Freight Initiative).

Cross-references:

  • Combating Nuclear Smuggling: Efforts to Deploy Radiation Detection Equipment in the United States and in Other Countries. GAO-05-840T. Washington, D.C.: June 21, 2005.
  • Container Security: A Flexible Staffing Model and Minimum Equipment Requirements Would Improve Overseas Targeting and Inspection Efforts. GAO-05-557. Washington, D.C.: April 26, 2005.
  • Bakshi, N., Flynn, S. E., & Gans, N. (2011). Estimating the operational impact of container inspections at international ports. Management Science, 57(1), 1-.‐‑20.

Full citation:

U.S. Government Accountability Office (GAO), 2009. Supply Chain Security Feasibility and Cost-Benefit Analysis Would Assist DHS and Congress in Assessing and Implementing the Requirement to Scan 100 Percent of U.S.-Bound Containers.

CORE1066

Additional keywords: Ocean transportation, counter-terrorism, non-intrusive inspection

[/s2If]

Zambia and Zimbabwe’s single-stop solution to boosting intra-African trade, The Guardian 2012 (CORE2008)

Summary

The Guardian news article summarizes benefits and challenges of the African first one-stop border post, located at the Chirundu border crossing across the Zambezi river between Zambia and Zimbabwe. At the border post, officials in both countries inspect only inbound traffic, for example Zambian authorities control only incoming traffic from Zimbabwe. Thanks to this one-stop arrangement, trucks and barges are obliged to stop only once and undergo only one set of border formalities. The one-stop system has accelerated border crossing times tremendously, from a two or three day wait down to a thirty-minute rest. Moreover, the faster border formalities have translated into higher traffic at the border post (from earlier 2000 to today’s 14000 trucks per month) and associated larger tax and duty revenues. But most importantly, the faster and simpler border formalities have facilitated trade of many small-scale merchants, who commonly trade small amounts of food, clothes, and other everyday commodities. Today, these small merchants face less delays, cumbersome formalities, and arbitrary duties and facilitation payments that dishonest customs officials may impose on their goods. This progress has brought many of the informal merchants, who used to smuggle their merchandise before, back into the sphere of the formal economy. Even so, the smuggling is still a major problem in Africa: the article suggests that there are smuggling routes so established that 30 tonne trucks use them to evade customs controls, and that this informal smuggling economy accounts for a staggering one-third of the African gross domestic product (GDP). The article implies that the share of the informal economy could be further reduced through consolidation of African trade blocks (there are several), harmonization and simplification of border formalities, and enhanced border agency cooperation. The news report is available at: http://www.theguardian.com/global-development/2012/may/29/zambia-zimbabwe-intra-african-trade

Review by Toni Männistö (CBRA)

[s2If is_user_logged_in()]

Full review

This Guardian article showcases a great example of successful border agency cooperation in Africa. The CORE WP12, the “demonstrator Schipol” focusing on shipping of fresh cut flowers from Kenya to the Netherlands, might choose to study this African one-stop border concept in more detail. Closer analysis may reveal key success factors and obstacles that characterize the border agency cooperation in Africa. Also CORE’s WP19, that produces material for training and education, may use this African one-stop border as an illustrative example of border agency cooperation in developing countries. The CORE’s risk and IT clusters might need to explore this case in more detail to understand technical aspects of this one-stop border post concept.

Reference

The Guardian, Zambia and Zimbabwe’s single-stop solution to boosting intra-African trade, the Guardian, 29. May, 2012. Retrieved from http://www.theguardian.com/global-development/2012/may/29/zambia-zimbabwe-intra-african-trade

CORE2008

[/s2If]