Interview with Dr. Vittoria Luda di Cortemiglia

CBRA Interview with Dr. Vittoria Luda di Cortemiglia, Program Coordinator with the Emerging Crimes Unit at the United Nations Interregional Crime and Justice Research Institute, UNICRI, Torino, Italy.

Hi Vittoria, and thanks for joining a CBRA Interview – can you first tell a bit who are you and what you do?

I am the Programme Coordinator of the UNICRI Emerging Crimes Unit. Since joined the U.N. in 2001, I have been in charge of the coordination of a number of applied-research programmes in the field of illicit trafficking and emerging crimes, including environmental crimes, cybercrimes, counterfeiting, and organized crime in general.  I am UNICRI Focal Point for Strategic Approach to International Chemicals Management, SAICM, as well as UNICRI Focal Point within the UN Inter-Agency Coordination Group on Human Trafficking, ICAT.

Can you explain us bit more about UNICRI, including the governance model and the research areas?

UNICRI is a United Nations entity created by the Economic and Social Council of the United Nations, ECOSOC, in 1967 to assist Intergovernmental, Governmental and Non-Governmental Organizations in formulating and implementing improved policies in the field of criminal justice. The Institute is part of the United Nations Crime Prevention and Criminal Justice Program, which report annually through the UN Commission on Crime Prevention and Criminal Justice, CCPCJ, to the ECOSOC.

UNICRI is involved in research projects and capacity building activities in a broad number of areas, ranging from environmental crimes; human trafficking; trafficking in goods and products – including precious metals, pesticides, counterfeiting as well as chemicals, biological, radiological and nuclear risks; terrorism and foreign fighters; hate crimes and hate speech; cyber-security; urban security; violence against women; and, maritime piracy.

UNICRI, CBRA and other partners have just finished a 2-year FP7-project called CWIT, focusing on identifying and quantifying criminal and non-compliance problems and proposing solutions against illicit trade and logistics in electronic waste materials. What was the biggest thing you learned during the project, and which of our recommendations you find as most important when moving to the future?

The CWIT project has been a great experience from a personal as well as professional point of view, as gave me the possibility to work side by side with a number of wonderful professionals from the WEEE industry, enforcement agencies, international organisations, lawyers, academia and consultants specialised in supply chain security.

The objectives of the project were quite ambitious, as CWIT aimed at identifying the policy, regulatory, procedural and technical gaps as observed in today’s business environment, and at suggesting tangible improvements. The CWIT team produced set of recommendations to support the European Commission, law enforcement authorities and industry practitioners in countering the illegal trade of WEEE in and from Europe.

With regards to the recommendations which I consider particularly important are the ones related to the necessity of establishing robust and uniform legal framework and relevant implementation. As mentioned in the final CWIT report, without a clear and comprehensive legislative base, enforcers and prosecutors are powerless to address illegal WEEE flows. At the very minimum, a clear and global definition of what constitutes WEEE is the basis for improving detection, inspection, and enforcement and sentencing rates related to illegal WEEE trade.

In parallel, harmonisation and enhancement of penalty system is needed to increase the effectiveness of the existing legal framework.  In fact, penalties for the illegal trade in e-waste vary greatly in terms of monetary fines and prison durations. Today, the participation in WEEE illegal activities does not appear risky to offenders due to the low probability of being prosecuted and sentenced. Even when successfully prosecuted, penalties foreseen in legislation and penalties applied in court decisions are typically very low. For these reasons, it is important to also enhance prosecuting and sentencing, so that WEEE trade and environmental crimes in general are not considered a low- priority/low sentenced area.

UNICRI kindly invited CBRA to Torino last October to join a 2-day workshop on “Illicit Pesticides, Organized Crime and Supply Chain Integrity”. Can you elaborate on this emerging supply chain crime area, including about the estimated size and the negative socio-economic consequences of the problem?

Illicit pesticides cover a wide variety of products, including obsolete pesticides, unauthorized imports, counterfeit or fake pesticides; re- or up-labelled pesticides and refilled containers. Estimates of the illicit pesticides penetration of the legal market range from 10 to 25% – both in the EU and at international level-, representing several billion annually (USD 6-10 billion at global level and USD 1.1 billion at European level).

Besides the evident risks for human safety and health and environmental risks, illicit pesticides also pose serious threats to the economies and security. The agricultural market is extremely important for a large number of countries and companies and might be jeopardize by the introduction of illicit pesticides which can deeply affect the local and national economies. The economic losses have multiple sources and victims and long-term consequences, in particular possible loss of harvest/crop, soil and water contamination affecting the cultivable lands, decrease in innovation, reputation challenges with a decrease of exports, etc. The penetration of the pesticides market by criminal actors, including organised crime groups attracted by high profits and low risk of detection, prosecution and sentencing is another worrying trend.

Do you foresee opportunities for future research projects in the field of illicit pesticides?

Many national and international actors are becoming more and more aware of the threats posed by illicit pesticides to the legal supply chain. The attention and awareness of the problem is increasing at international level. In particular, the World Customs Organisation and the Organisation for Economic Co-operation and Development are becoming increasingly active in the field and it would be interesting to establish joint actions so as to raise awareness, capacities and response to secure the legal supply chain of such products. Indeed, through this research, we realised that the issue of illicit pesticide is neither well acknowledged nor well-documented. Our study is one of the first detailing the mechanisms and trends in the trafficking of illicit pesticides, the involvement of criminal actors, networks and organised crime groups and related criminal activities, as well as identifying the risks for the supply chain and pesticide markets.

UNICRI is very interested in continue working with partners, including CBRA, on this issue. The report details a number of initiatives which UNICRI stands ready to launch supporting countries in addressing the challenges of illicit pesticides, in particular research, raising stakeholders’ awareness, training and technical assistance programmes, supporting in capacity building activities and reinforcing national and international cooperation.

Thanks Vittoria for this interview – and we are of course more than willing to join a project-team on this highly important illicit pesticides trade and supply chains -topic

FP7-CORE Education – Two new diagrams

Today’s CBRA Blog presents two new diagrams which have been recently designed and developed in the context of FP7-CORE Education and training work (Work package 19.1). The information visualized in the diagram is based on CBRA’s supply chain security research work since year 2001, particularly from the past 5-6 years.

Some background information on the first diagram of crime types in global supply chains has been presented before for example in CBRA’s Blog of 13 October 2014 – Crime taxonomies from Athens. In the center of this diagram we list the crime types – including document fraud and cybercrime – which in the supply chain criminal context are performed in order to succeed with the actual economic or ideological crime, e.g. cargo theft or terrorism.

The left area of the circle lists four examples of crime types, which typically are of primary concern for supply chain companies: cargo theft, sabotage, parallel trade and product specification fraud. With such crime types it is commonly up to the companies to prevent, to detect and to react – of course, law enforcement agencies can be called for any time there is reasonable suspicion of such activities (and naturally in certain cases the government agencies may even be the first ones to detect and react, e.g. in case of armed robberies and truck hijackings).

The right area of the circle deals with supply chain incidents where the authorities typically focus on prevention, detection and reaction: fraud in indirect border taxes; trafficking / violations in cross-border restrictions and prohibitions; human trafficking; and exploitation of illicit labor. From supply chain perspective one can characterize them as “a priori non-disruptive illegal activities – only if / after authorities detect the violations, the supply chain is disrupted and the involved supply chain companies can get in trouble”.

Lastly, on the bottom area of the circle, we list four supply chain crime areas where the prevention typically is in strong interest of both supply chain companies and governmental agencies – and, the detection and (instant) reaction varies on case-by-case basis: counterfeiting, sales channel violations, sea piracy and terrorism. Counterfeiting hits revenues on both sides of the equation, and, with many products can also be health damaging or even lethal. Not having proper sales licenses, and/or selling to unauthorized buyers – for example cigarettes and alcohol, dual use and strategic goods etc. – can again harm both the involved companies and the society as a whole. And of course, sea pirates hijacking cargo ships; bombs exploding and bringing planes down; and terrorists attacking critical supply chain infrastructures, all are in the best interest of both companies and government agencies to prevent, to detect, and to react – in the fastest and most effective possible manner.

blog10.03.161

The second new educational diagram below depicts the negative socio-economic impact areas – six in total – caused by twelve typical smuggling and trafficking activities. The data behind it has been presented before e.g. in CBRA’s Blog of 14 January 2015 – Socio-economic damages. Inside the square we present the six societal impact areas – the larger the area, the more links there are between the trafficking activities and the negative impacts. As an example of a “big area”, seven different types of trafficking typically lead into increasing market place distortions and/or unfair competition. In the other extreme, only trafficking in stolen cultural products leads to losses in cultural heritage.

blog10.03.162

That’s all for the CBRA Blog today – please let us know if you see this type of visualization as beneficial when teaching and learning about the big picture of supply chain security!  Thanks, Juha Hintsa ( email: cbra@cross-border.org )

C-TPAT Program Benefits Reference Guide, 2014 (CORE1032)

Summary: This guidebook outlines the key elements and benefits of the Customs-Trade Partnership Against Terrorism (C-TPAT) program that is designed to secure global supply chains and to improve United States border security. Document is available at: https://www.cbp.gov/sites/default/files/documents/C-TPAT%20Program%20Benefits%20Guide.pdf (link tested on 3 March 2016)

[s2If is_user_logged_in()]

Full review: C-TPAT partners receive a wide range of benefits listed below:

  • C-TPAT Partners are examined at a considerably lower rate than non-C-TPAT Partners.
  • C-TPAT certified/validated highway carrier Partners are granted expedited border crossing privileges. C-TPAT Partners at many Canada/Mexico land border ports of entry have access to Free and Secure Trade (FAST) Lanes.
  • Some categories of C-TPAT importer Partners are exempt from stratified exams.
  • C-TPAT shipments subject to examination are moved ahead of any non-C-TPAT shipments, to the extent possible.
  • In the event of a significant disruption/delay in cargo processing operations, actions are taken to maintain communication and coordination with C-TPAT Partners for business resumption.
  • C-TPAT Partners’ trade compliance issues are given priority over those issues related to non-C-TPAT Partners.
  • Each C-TPAT Partner is assigned a Supply Chain Security Specialist (SCSS) who coordinates between the C-TPAT Partner and the US Customs and Border Protection agency (CBP). The Specialist also assists the Partner with supply chain security issues.
  • Partners have access to the C-TPAT’s automated Portal system, to communicate with CBP and exchange program related information in a secure manner.
  • C-TPAT Partners are eligible to attend C-TPAT events like the annual Conference and other training seminars organized by the program.
  • C-TPAT importer Partners are eligible to participate in the Importer Self-Assessment (ISA) Program.
  • The Penalty Mitigation benefit is granted to sea carriers for late submission of data required under the Importer Security Filing requirements.
  • C-TPAT members are eligible to participate in other U.S. Government pilot programs, such as the Food and Drug Administration’s Secure Supply Chain program.

In addition, some benefits are associated with Mutual Recognition Arrangements (MRAs) when two customs authorities formally acknowledge the security requirements or standards of one program, as being equivalent to the other program. Some of the resulting benefits to the trade community are illustrated below:

  • C-TPAT importer Partners that also conduct export operations and Partners of the foreign Customs Administration programs (manufacturers and exporters of record) are granted a reduction in their overall cargo risk score, implying fewer examinations at export and import ports.
  • A C-TPAT validation for an overseas partner is not required if an MRA is in place because CBP recognizes the status of the Partner in the foreign partnership program.
  • Companies covered by MRAs need only to comply with a common set of security requirements, avoiding the hassle of following multiple sets of requirements from one partnership program to another.
  • MRAs lead to more transparency in international commerce. Mutual exchange of information between these partners facilitates trade across Mutual Recognition Partner nations.

CORE1032

[/s2If]

C-TPAT Best Practices Catalog Addendum, 2009 (CORE1031)

Summary: This addendum document lists cargo security best practices with focus on prevention of weapons of mass effect, terrorists, and/or contraband from infiltrating into the international supply chain. Each best practice is linked to a specific business entity, such as a Manufacturing Company, a Highway Carrier, an Importer or a Foreign Consolidator but these may apply to other business types as well. The document is available at: https://www.cbp.gov/sites/default/files/documents/ctpat_bpa_2009_0.pdf (link tested on 3 March 2016)

[s2If is_user_logged_in()]

Full review: The best practices are outlined as follows:

Risk assessment: Programs are in place to enable the identification of the most vulnerable supply chain areas, to grade suppliers supply chain security criteria. Specific processes have been developed to manage the supplier’s products, software and services and internal monitoring systems to enhance the safety and security procedures.

Business partner requirements: Several security measures have been taken by entities. These include conducting supply chain security audits to ensure compliance of non-C-TPAT business partners; carrying out security audits of a foreign manufacturer; making security self-assessments, conducting onsite inspections to ensure freight security; shipping cargo only through accredited ports and steamship lines; monitoring compliance of manufacturing facilities; screening procurements to identify ineligible status of suppliers, and performing audits of business partners.

Conveyance/Container/Trailer Security: Examples of such security practices are: integrating special security features in the GPS (global positioning system); using laser beams to protect trailers; using colour codes for matching consignments; installing infrared sensors in docks to prevent unauthorized access; using special codes to identify correct shipments; documenting all seal changes for shipments in transit; ensuring delivery by authorized Company drivers; sealing containers; operating through C-TPAT carriers; using only “seaworthy” containers; installing in-transit temperature data sensors to ensure product quality; enclosing container storage area; conducting non-intrusive inspection prior to loading a vessel; establishing specific inspection points; using multiple security devices on each container; using automated container yards; instructing foreign suppliers to provide inspection checklists; using dock locking arms for container storage; installing motion sensors in a trailer; operating through contracted highway carriers and security services; documenting a seal destruction policy, and so forth.

Physical Access Controls: Some practices by Importers include establishing multiple security stations within the building; using metal detectors for employees; installing an electronic swipe card/ lock box systems for access control for sensitive documents; conducting electronic scanning of visitors’ drivers licenses; utilizing a third-party software system to manage key inventory; and providing panic buttons for company employees.

Physical Security: Several innovative solutions have been designed to ensure physical security, such as electronically closing gates and activating tire puncturing devices to prevent vehicle exits; using an electronic security information reporting system, installing invisible electronic fences; installing laser sensors; setting up optical light beams to detect intruders; fitting double locks on doors; Installing infrared sensors on fences; using body alarm functions for emergencies; appointing patrolling guards, using multiple glass meeting rooms; using multiple interior infrared security alarm beams to detect unauthorized access; and installing security guard view towers.

Personnel Security: An Importer requires business partners to provide a monthly master list of employees and immediately notify when their employees are hired or terminated, in order to ensure that only authorized business partner’s employees enter the manufacturing facilities.

Security Training/Threat Awareness/Outreach: Business entities have invested in a wide range of training programs. One such initiative is the four-tier C-TPAT training targeted for management and supervisors, shipping and receiving personnel, internal personnel dealing with contractors and hourly staff. Other businesses use different approaches, like establishing an online training portal;; offering general security training and of site-specific training for security guards; issuing security advisories; making regular security awareness assessments; establishing a situation matrix chart to address possible incidents; establishing a direct communication channel between the president of the company and employees; putting in place a toll free hotline for company personnel; conducting security drills and exercises; establishing a web-based security awareness training; documenting security incidents in a central database; and establishing a global communication system to contact all employees and contractors remotely.

Procedural Security: Instances of this type of security measures include a bio-thermal intrusion alarm system; a global SAP network to generate all written orders for import and export; automatic screening procedures of purchase orders for restricted parties; lock boxes for sensitive documentation; an automated loading module called the Automatic Truck Loading System (ATLS); a container seal number as the shipment tracking (invoice/bill of lading) number, and so forth.

Information Technology (IT) Security: Such security practices include a biometric fingerprint door lock; a remote data backup center; a retina scanning system for access to the computer system; requiring supervisory approval to copy data; use of electronic password protected purchase orders; establishing a daily “e-test” for employees to access computers, and so forth.

CORE1031

[/s2If]

CEN Supply Chain Security — Good Practice Guide for Small and Medium Sized Operators, 2012 (CORE1030)

Summary: This is a guidance document for small and medium sized enterprises, SMEs. on how to apply a supply chain security approach to their operations in order to mitigate the risk of criminal activities. It gives an overview of the main crime types occurring in the supply chain along with some countermeasures, as well as the supply chain security initiatives, and the compliance requirements thereof. The document is available for purchase e.g. at:   http://shop.bsigroup.com/ProductDetail/?pid=000000000030258778  (link tested on 3 March 2016)

[s2If is_user_logged_in()]

Full review: The recommended supply chain strategy rests on a six-step approach. The first step is to define a context for the supply chain, crime prevention and security management activities taking into consideration the security sensitiveness, the geography and transport modes, and the main stakeholders involved in the supply chain operation. The second step is to make a threat and vulnerability analysis with regard to terrorist and other criminal threats in the supply chain. The main criteria included are the gaps existing in enhanced security, the high-risk crime types, and the potential consequences of crime occurrences. The third step covers the regulatory framework, the major aspects being the regulations and programs required for successful business operations, expectations of customers and suppliers, requirements laid down by insurance providers, and relevant government authorities. The fourth step refers to an overall security plan, taking into account the physical security, data security, human resources security (including selection, training, and exit procedures), business partner security (including selection, and auditing), and process control and monitoring of deviations. The fifth step involves implementing into practice concrete security measures, investment in technologies, procurement of services, in-house solutions and so forth. The final step is to monitor and measure the security performance and take appropriate corrective actions.

Five supply chain crime types have been elucidated in this guide. These include:  Property theft (cargo theft, intellectual property breaches); targeted damage (terrorism, sabotage); cross-border duty and tax fraud; illegitimate transporting, exporting and/or importing (smuggling of prohibited and restricted goods, people smuggling); and crime facilitation (document forgery, bogus companies, cybercrime). For each crime type, the main focus should be on the issue (main features and typical sectors/products involved), scope of the problem and actions to mitigate risks.

This guidebook has chosen eight security initiatives for illustration purposes. It explains the context of each initiative, whom it is meant for, and some basic requirements and the implications. These are as follows:

  • Import Control System (ICS) in the EU (a systems tool meant for the lodging and processing of Entry Summary Declarations, and for the exchange of messages across national customs agencies, economic operators and the European Commission).
  • Export Control System (ECS) in the EU (introduces EU procedures to computerize and control indirect exports and to implement the EU safety and security regulations);
  • Maritime Security Legislation, International Ship and Port Facility Security (ISPS) Code in the EU (International regulations to ensure the security of maritime transportation are being issued by the International Maritime Organization, IMO, in the International Ship and Port Facility Security Code);
  • Aviation Security Legislation, Air Cargo Supply Chains in the EU (three categories of aviation security legislation exist in the EU- Framework regulation, supplementing regulations, and implementing regulations-all targeted towards civil aviation security).
  • European Union Authorized Economic Operator, EU AEO (operators involved in international trade of goods certified as complying with WCO or equivalent supply chain security standards);
  • Regulated agent, Known consignor and Account consignor in the EU (Specific “trusted trader” status existing in the European air cargo supply chains);
  • ISO 28000 Series of Standards on Supply Chain Security Management Systems (address potential security issues at all stages of the supply process, e.g. terrorism, fraud and piracy);
  • Transported Asset Protection Association (TAPA) in Europe (fighting cargo crime using real-time intelligence and the latest preventative measures).

CORE1030

[/s2If]

SUPPLY CHAIN SECURITY – Examinations of High- Risk Cargo at Foreign Seaports Have Increased, but Improved Data Collection and Performance Measures Are Needed, GAO, January 2008 (CORE1010)

Summary: This report reviews the progress that the US Customs and Border Protection (CBP) has made with the Container Security Initiative (CSI) – a program for screening US-bound high-risk shipping containers in foreign ports with X-ray and radiation detection solutions – since the latest 2005 GAO review. The report discusses how the CBP’s CSI efforts have (1) contributed to the long-term, strategic planning on the US supply chain security, (2) strengthened CSI activities worldwide and (3) established means to evaluate performance of the CSI activities. The report recommends CBP to develop its data collection practices that are related to the CSI team performance and the host government’s inspections of the US-bound containers. This report provides relevant information for CORE demonstrations that deal with US-bound maritime logistics and commerce. Also the risk cluster might benefit from the descriptions of the US risk-based supply chain security scheme – Automated Targeting System (AST), 24-hour rule and the importer security filing 10+2 – that the report elaborates in detail. The report is available at http://www.gao.gov/new.items/d08187.pdf.

[s2If is_user_logged_in()]

Full review: This GAO report elaborates the status and challenges of the US Container Security Initiative, but it also provides a comprehensive outlook on the US maritime supply chain security. This information is likely to be relevant for the CORE’s demonstrations (WP9 and WP14) that deal with US-bound container traffic. The report is a good reference document for those CORE work packages that seek to describe the state-of-the-art of the global supply chain and that are producing relevant training material on supply chain security. The CORE’s risk and IT clusters benefit from the information the report offers on risk-based security solutions that use advance cargo information to calculate risk scores for US-bound shipments by the aid of automatic risk assessment algorithms.

Cross-references:

  • Preventing Nuclear Smuggling: DOE Has Made Limited Progress in Installing Radiation Detection Equipment at Highest Priority Foreign Seaports. GAO-05-375. Washington, D.C.: March 31, 2005.
  • Homeland Security: Process for Reporting Lessons Learned from Seaport Exercises Needs Further Attention. GAO-05-170. Washington, D.C.: January 14, 2005.
  • Port Security: Better Planning Needed to Develop and Operate Maritime Worker Identification Card Program. GAO-05-106. Washington, D.C.: December 10, 2004.
  • Maritime Security: Substantial Work Remains to Translate New Planning Requirements into Effective Port Security. GAO-04-838. Washington, D.C.: June 30, 2004.
  • Homeland Security: Summary of Challenges Faced in Targeting Oceangoing Cargo Containers for Inspection. GAO-04-557T. Washington, D.C.: March 31, 2004.
  • Container Security: Expansion of Key Customs Programs Will Require Greater Attention to Critical Success Factors. GAO-03-770. Washington, D.C.: July 25, 2003.

Additional keywords: Container Security Initiative (CSI), counter-terrorism, homeland security, maritime supply chain security

CORE1010

[/s2If]

AVIATION SECURITY – Federal Efforts to Secure U.S.-Bound Air Cargo Are in the Early Stages and Could Be Strengthened, GAO, April 2007 (CORE1008)

Summary: This GAO reports reviews the current state and future challenges of the Transportation Security Administration’s (TSA) and the Customs and Border Protection’s (CBP) efforts for enhanced security of foreign origin US-bound air cargo. The report also discusses how the Department of Homeland Security (DHS) has reached out to the air cargo industry and foreign authorities in order to strengthen the international air cargo security. The GAO report recommends that the DHS would establish a risk-based air cargo security strategy, improve interagency communication nationally, to step up compliance monitoring for the air cargo industry’s stakeholders and to assess the foreign authorities’ intent and capabilities to meet US expectations on the air cargo security that is the foundation for mutual recognition and international harmonization of regulatory frameworks on the air cargo security. This GAO report is going to be useful for the CORE risk and education cluster as well as for all the demonstrations that involve shipping of air cargo by air. The report is available at http://www.gao.gov/assets/600/590789.pdf.

[s2If is_user_logged_in()]

Full review: This GAO report provides a comprehensive picture of the air cargo security in the US, in a country that is no doubt the leading force in supply chain security in general, and in air cargo security in particular. All CORE work that is related to air transport might benefit from the insights and information this GAO report offers. The DHL demonstration, that involves transport of parts for military aircraft from the US to Spain, is the most obvious work detail in CORE that can directly benefit from this GAO report. In addition, the CORE’s risk cluster can use the description of the US approach to risk-based air cargo security as a starting point when designing the CORE-specific risk-based strategies. Given that the report is very detailed and informative, the CORE’s education cluster can benefit from the report’s analysis and learn from its conclusions.

Cross-references:

  • GAO, Aviation Security: Federal Coordination for Responding to In-flight Security Threats Has Matured, but Procedures Can Be Strengthened, (Washington, D.C.: July 31, 2007).
  • GAO, Aviation Security: Transportation Security Administration May Face Resource and other Challenges in Developing a System to Screen All Cargo Transported on Passenger Aircraft
  • GAO, Aviation Security: Federal Efforts to Secure U.S.-Bound Air Cargo Are in the Early Stages and Could Be Strengthened, GAO-07-660 (Washington, D.C.: April 2007).
  • GAO, Aviation Security: Progress Made in Systematic Planning to Guide Key Investment Decisions, but More Work Remains, GAO-07-448T (Washington, D.C.: February 13, 2007).

Additional keywords: Air cargo security, mutual recognition, regulatory harmonization, screening, advance cargo information, and counterterrorism

CORE1008

[/s2If]

Mr. Mike Ellis, INTERPOL, on illicit trade and counterfeiting

Today’s CBRA Interview is with Mr. Mike Ellis who is the Assistant Director of Illicit Trade and Anti-counterfeit Sub-crime Directorate at INTERPOL, Lyon, France.

Hi Mike, can you first tell a bit who are you and what you do?

I am the Assistant Director for Police Services at INTERPOL, based in Lyon France.  INTERPOL is the world’s largest international police organization. Our role is to assist law enforcement agencies in our 190 member countries to combat all forms of transnational crime. We work to help police across the world meet the growing challenges of crime in the 21st century by providing a high-tech infrastructure of technical and operational support. Our services include targeted training, expert investigative support, specialized databases and secure police communications channels. I am responsible for the coordination of all activities related to illicit trade, smuggling of illicit goods and counterfeiting for the organization and police forces within our 190 member countries.  I lead a team of expert officers who are engaged in training, capacity building, and operational support who operate along with my analytical support who manage risk awareness and intelligence handling.

interview111

From your perspective, how bad is the current situation with counterfeit and other illicit trade in global supply chains? Can one for example see links between illicit trade and transnational organized crime groups; or, even terrorist organizations?

For many years the clear link has been established between the trafficking of illicit goods and transnational organized crime. Criminal organizations are attracted by the lucrative profits involved in trading counterfeit or fake goods, or in trading legitimate goods through illicit channels. The criminals involved manufacture and trade illicit goods on a regional and increasingly global scale.  It is well documented that they use the profits to fund other criminal activities such as drug trafficking and people smuggling, and for investment into funding subversive political groups.  Selling fake or counterfeit products is one aspect of illicit trade, as is selling genuine goods on the black market to avoid paying taxes. By avoiding regulatory controls, the criminals behind these activities peddle dangerous and illicit goods with a complete disregard for the health and safety of consumers. The phenomenon has grown to an unprecedented level, posing tremendous risks to society and the global economy. Counterfeiting harms businesses which produce and sell legitimate products, governments lose tax revenue from products manufactured or sold on the black market, and consumers are at risk from substandard products.

By the way, we met first time about one year ago in Lyon at an INTERPOL workshop linked to FP7-Project CORE. One of the main objectives of CORE-project is to develop leading edge education and training materials on supply chain security – for the benefit of law enforcement agencies, supply chain practitioners, and academics alike. Can you share your views about law enforcement – academia – industry cooperation in education material development, as well as in the broader field of supply chain security management?

One of our principle functions is capacity building and training.  At INTERPOL we recognize that capacity building brings with it raised identification of the impact of illicit cross-border trade and counterfeiting and all our new operations, or established operations in new regions, are preceded by a capacity building workshop.  The public domain is represented by police, customs, border control officials, and prosecutors, as well as representatives from various regulatory bodies including trading standards.  In addition, INTERPOL TIGC, the Trafficking in Illicit Goods and Counterfeiting program which I am heading, has developed a Mentoring Program which aims to increase cross-border, cross-industry law enforcement operational interventions by: strengthening capacity to deal with all types of cross-border trafficking in illicit and counterfeit products. We have also developed an online International Intellectual Property Crime Investigator’s College and have built already a robust network of over 10.000 law enforcement officers, and partner stakeholders with specialist knowledge and skillset.  This online training course provides specialist knowledge on transnational organized crime.  It is aimed at all law enforcement officials, regulatory authorities and private sector investigators who are committed in the fight against illicit trade and intellectual property crime.   We aim to provide crime professionals with specialist awareness and learning on the subject of transnational organized intellectual property, IP, crime, and illicit trade, by delivery of leading-edge training that meets international standards and allows crime investigators from any discipline to quickly identify other certified investigators.  Through this learning platform we also facilitate cooperation between the public and private sectors in the fight against IP crime, and ensure all public and private sector crime investigators have a common understanding of the problems facing them, while being aware of each other’s competencies and roles.  We seek to promote knowledge on what intervention strategies and tactics work, in order that all stakeholders are better able to work together in partnership in enforcement operations.

Thank you Mike for this highly interesting interview. It complements well our previous interviews on similar themes – with non-law enforcement experts including Mr. David Hamon and Mr. Tony Barone. CBRA and the whole FP7-CORE consortium, around 70 partners in total, wishes to continue the great cooperation in research and education material development with INTERPOL, throughout the CORE-project, until April 2018 – and beyond!  Juha.

 

TRANSPORTATION SECURITY – Action Needed to Strengthen TSA’s Security Threat Assessment Process, GAO, 2013 (CORE1015)

Summary: The GAO report is about measuring the performance of the Adjudication Centre that is a department within the Transportation Security Administration (TSA) responsible for administering background checks for people who need access to secure facilities unescorted. The centre issues the access credentials based on a through vetting of the applicant’s criminal history, immigration status, and connections to terrorist groups, among other checks. The report argues that the Adjunction Centre could improve the efficiency of the background checks – the individual security threat assessment – by improving its performance measurement system through better data and indicators. Although this GAO report focuses on a rather narrow topic, management of the background checking process, the report’s insights could benefit the CORE’s risk management cluster and those demonstrations that deal with access control matters. The report is available at: http://gao.gov/assets/660/656051.pdf

[s2If is_user_logged_in()]

Full review: This GAO document is closely related to the work the CORE’s risk cluster. The report describes problems the TSA’s Adjudication Centre faces when it manages the background checking process of the US-based transportation worker identification credentials (TWIC), hazardous materials endorsements (HME) and Aviation Worker (AV) authorization programs. Moreover, since access control is a central security solution in nearly all CORE demonstrators, the demonstrations might benefit from tips and guidance this report offers. At the final stages of the project, this GAO report might prove a useful document when the project consortium produces training materials on how to manage access control systems and how to administer background checks.

Cross-references:

  • Port Risk Management: Additional Federal Guidance Would Aid Ports in Disaster Planning and Recovery. GAO-07-412. Washington, D.C.: March 28, 2007.
  • Critical Infrastructure Protection: An Implementation Strategy Could Advance DHS’s Coordination of Resilience Efforts across Ports and Other Infrastructure. GAO-13-11. Washington, D.C.: October 25, 2012.

CORE1015

Additional keywords: Terrorism, background checks

[/s2If]

SUPPLY CHAIN SECURITY – CBP Needs to Conduct Regular Assessments of Its Cargo Targeting System, GAO, October 2012 (CORE1014)

Summary: The US maritime security strategy uses advance cargo information to assess risk levels of US-bound maritime shipping containers. This GAO report reviews how the Automated Targeting System, a web-based computer program that calculates risk scores for the containers, support the US Customs and Border Protection’s (CBP) targeting efforts. The report argues that CBP could improve its targeting program by establishing sound procedures and criteria for assessing the performance of the targeting activity. This GAO report contains information about the US risk-based shipment targeting solution that benefit the CORE’s risk and IT clusters. The US-related demonstrations may also find the report’s information useful. The report is available at: http://gao.gov/assets/650/649695.pdf

[s2If is_user_logged_in()]

Full review: The risk targeting systems are part of governments’ supply chain security programs worldwide. The GAO reports gives unparalleled, detailed information about the principles that the US authorities follow to collect and analyse data about cargo movements that allow them to calculate risk scores for US-bound maritime shipping containers. The CORE’s risk cluster should pay attention to this information and learn how risk-based screening and examination of maritime shipping containers has been organized in the US, in the leading country of supply chain security. The report reveals useful information about IT infrastructure that support the risk targeting system, therefore providing a sound reference material for the CORE’s IT cluster. Project partners engaged in the CORE’s demonstrations – logistics operators, authorities and technology providers – benefit from the report’s description of the US automated targeting system (ATS) that play an important security role in the US-bound maritime trade and logistics.

Cross-references:

  • Supply Chain Security: Container Security Programs Have Matured, but Uncertainty Persists over the Future of 100 Percent Scanning. GAO-12-422T. Washington, D.C.: February 7, 2012.
  • Supply Chain Security: Feasibility and Cost-Benefit Analysis Would Assist DHS and Congress in Assessing and Implementing the Requirement to Scan 100 Percent of U.S.-Bound Containers. GAO-10-12. Washington, D.C.: October 30, 2009.
  • Supply Chain Security: CBP Has Made Progress in Assisting the Trade Industry in Implementing the New Importer Security Filing Requirements, but Some Challenges Remain. GAO-10-841. Washington, D.C.: September 10, 2010.

CORE1014

Additional keywords: Terrorism, automated targeting system (ATS), 24-hour rule, the importer security filing and additional carrier requirements (10 + 2 rule)

[/s2If]