Introducción a la Gestión de la Cadena de Suministro (Capítulo 2 Compendio CASSANDRA, CORE2007a)

Resumen

El segundo capítulo del Compendio CASSANDRA brinda una visión general sobre la teoría y práctica de la gestión moderna de la cadena de suministro. Escrito en un lenguaje común, el texto explica una amplia gama de estrategias para la gestión de cadenas de suministro, desde la gestión eficiente a la logística ágil y de rápida reacción. El capítulo también define terminología fundamental de cadena de suministro y discute las tendencias actuales en la logística, incluyendo la “sincro-modalidad”, el uso de los proveedores de servicios logísticos “4PL” (fourth-party logistics) y la logística verde. El capítulo presenta varios marcos de referencia de la cadena de suministro que ilustran una serie de actividades interdependientes y actores de interés involucrados en el transporte internacional de carga. El compendio CASSANDRA está disponible en(disponible solo en inglés).

Revisión por Toni Männistö (CBRA).

[s2If is_user_logged_in()]

Full review

The compendium summarizes the SCOR and UN/CEFACT supply chain models, that may be the two most used logistics reference frameworks in the world. The document also discusses less known academic conceptual models that seek to simplify the complexity of supply chain management by categorizing and explaining management strategies, activities, stakeholders and their roles and responsibilities. The section on the future trends in logistics offers a great outlook on the most likely changes and driving forces in the logistics industry. The outlook suggests that for example synchromodality (increased flexibility in transport mode selection), green logistics (less emissions), use of 4PL logistics service providers (outsourced supply chain management), and continuously increasing ship and port sizes will reshape the cross-border logistics over the years. The document also explains key CASSANDRA concepts and their impacts on international supply chain management. For instance, the Data Pipeline, a pivotal CASSANDRA concept, seeks to enhance sharing of information across supply chain stakeholders, in particularly from business operators to customs and other border control authorities. Most importantly, the Data Pipeline would allow customs officers to access commercial information, that normally is exchanged only between buyers and sellers, early in the upstream supply chain at the consignment completion point (CCP). This accurate, early commercial information would enable the customs and other border control agencies to assess security and other risks of cargo early on.

All in all, the document provides a crash refresher course on basic and advanced logistics terminology that would be beneficial for many the CORE consortium, especially for those partners whose expertise is mainly outside the logistics industry. The CORE demonstrators benefit from descriptions of CASSANDRA innovations that support information exchange and improve visibility across the supply chain. The demos might choose to reuse some of these CASSANDRA innovations or their components. The CASSANDRA compendium also contains a great deal of material that could be reused for education and training purposes in CORE (WP19). Finally, the chapter concludes with recommendations that are relevant also for CORE. The chapter recommends, for example, that because of broad variety of international supply chains, CASSANDRA solutions should be adaptable for different contexts.

Reference

Hintsa, J. and Uronen, K. (Eds.) (2012), “Common assessment and analysis of risk in global supply chains “, Compendium of FP7-project CASSANDRA, Chapter 2

CORE2007

[/s2If]

Chemical Security in Istanbul

2015-12-15 09.02.08I had the most interesting week in Istanbul with the Iraqi government representatives, chemical sector companies and the US State Department Chemical Security Program, CSP.

Security in the chemical supply chain is a major challenge for government agencies and chemical supply chain companies across the globe, including those in the Middle-East and North African (MENA) region. Theft, diversion, trafficking, export violations, counterfeit chemicals, sabotage and terrorism – among other criminal threats – keep the agencies and companies constantly on their toes when considering how to best tackle the vulnerabilities and threats in their respective chemical supply chains.

This was my second time to join as an external expert in a Chemical Security Program (CSP) event in the MENA region. The first time was in Hurghada, Egypt, in March 2015 – thanks again to Professor Andrew Thomas, the Chief Editor of the Journal of Transportation Security, for hooking me up with CRDF Global and the US State Department on this. Now the four day event targeted for the relevant Iraqi government agencies as well as the Iraqi chemical sector companies was held in Istanbul, Turkey, on 14-17 December 2015.

We had a fully packed agenda: Day 1 consisted of several introductory and state-of-play speeches by the workshop facilitators and by Iraqi experts, the latter group sharing key governmental, industry and academic perspectives to the chemical security progress in Iraq.  Day 2 started with a case study presentation on “Post-2001 supply chain security developments at Dow Chemicals”, followed by private-public partnership considerations in chemical supply chain security. During the afternoon of day 2, two more presentations were given on potential threats to materials of interest, as well as on site-physical security. Day 3 started with presentations on international transport of dangerous goods and security rules, followed later by presentations on export control and border security issues, as well as risk assessment methodological aspects.

Interactive sessions, group exercises and other discussions were vivid throughout the four days. On day 1, the main interactive session was about government-industry coordination. On day 2, the focus shifted to identifying key players in Iraqi chemical supply chain security, as well as exploring private sector specific chemical security issues. On day 3, a major interactive session took place to recognize existing vulnerabilities and threats in the chemical supply chain, as well as to identify appropriate countermeasures and other possible means of improvement. And finally, on day 4, a draft table of content for a potential “Iraqi chemical supply chain security master plan and implementation roadmap” was produced in a highly interactive manner, followed ultimately by drafting some actual planning content in areas including chemical transport security and raising security awareness.

The actual workshop outcomes and possible follow-up actions will be worked upon later by the organizing team and some key participants. In the meanwhile, I want to express my warmest thanks for this opportunity and great on-site collaboration in Istanbul to: Ms. Shawn Garcia from the U.S. Department of State, Chemical Security Program (DOS/CSP); Ms. Pelin Kavak and Mr. Nidal Abu Sammour from CRDF Global, US / Jordan; and Dr. Caner Zanbak and Mr. Mustafa Bagan from the Turkish Chemical Manufacturers Association (TCMA). Hope to meet you again in 2016 in Iraq, Algeria and possibly other locations in the MENA region!

 

Cheers, Juha Hintsa

P.S. We also tested two CBRA frameworks / models – CBRA SCS15/16, and CBRA-BAC-Actions and beneficiaries – with the audience during the Istanbul week. Both of them were well perceived, and will be topics for CBRA Blog during the coming couple of months. (SCS = Supply Chain Security, and BAC = Border Agency Cooperation).

PPS. Last but not least I would like to thank Ms. Antonella Di Fazio of Telespazio, Italy, and FP7-project CORE, for excellent inputs on transport of dangerous goods, traceability and monitoring solutions, demonstrators, and practical experiences.

Trade and money laundering uncontained (the Economist, May 2014, CORE2006)

Summary

International trade is becoming one of the main instruments for cross-border money laundering aside common bank transfers, remittances and cash smuggling. The ”trade-based money laundering” disguises illegal trading as seemingly legitimate commercial transactions. The most common technique is mis-invoicing in which fraudsters undervalue imports or overvalue exports to repatriate ill-gotten money from abroad. For example, official records show that Mexican exports to US are much higher than the US imports from Mexico, a discrepancy that signs fraud by Mexican criminals, most likely drug cartels. In general, the trade-based money laundering offers new financial tools for a broad range of drug traffickers, arms smugglers, corrupt politicians, terrorists and evaders of taxes, duties and capital controls. Review by Toni Männistö (CBRA)

[s2If is_user_logged_in()]

Full review

International trade is becoming one of the main instruments for cross-border money laundering aside common bank transfers, remittances and cash smuggling. The ”trade-based money laundering” disguises illegal trading as seemingly legitimate commercial transactions. The most common technique is mis-invoicing in which fraudsters undervalue imports or overvalue exports to repatriate ill-gotten money from abroad. For example, official records show that Mexican exports to US are much higher than the US imports from Mexico, a discrepancy that signs fraud by Mexican criminals, most likely drug cartels. In general, the trade-based money laundering offers new financial tools for a broad range of drug traffickers, arms smugglers, corrupt politicians, terrorists and evaders of taxes, duties and capital controls.

The new methods for cross-border money laundering and tax evasion concern most CORE demonstrations, especially those involving international cargo movements. The emerging risk of trade-based money laundering calls for new and more effective enforcement of trade transactions. CORE is developing new solutions (e.g., data pipeline and system-based supervision) for capturing and sharing trade information across logistics operators and law enforcement agencies. The new solutions likely improve law enforcement’s capability to detect suspicious trade transactions that may have something to do with the trade-based money laundering. However, building such capability requires IT integration (e.g., interoperability), risk awareness and education and training. CORE consortium addresses these complementary activities in work carried out in risk, IT and educational clusters.

Reference

Trade and money laundering uncontained, the Economist, May 3rd 2014

CORE2006

[/s2If]

Drug trafficking in the Caribbean – the Full circle (the Economist May 2014, CORE2005)

Summary

Anti-drug officials report rising cocaine imports into the US through the Caribbean islands. The officials ascribe the increasing popularity of the Caribbean route to the strengthened enforcement of alternative trafficking routes. The South American cocaine smuggling routes have displaced several times over the years due, and now again the Caribbean route is the same one than traffickers used two decades ago. The new wave of trafficking through is expected to increase violence and undermine anti-corruption efforts in the Caribbean.

The drug traffickers move significant amounts of their cocaine from Colombian coca farms and laboratories to Venezuela by jungle trails, riverboats and small aircraft. From the Venezuelan coast, the contraband is smuggled to Caribbean islands by speedboats, planes, sometimes hidden inside commercial cargo. The cocaine traffickers use then yachts, mules, cruise ships, fast boats and commercial cargo vessels to smuggle the illegal drugs into the US and Europe. The new wave of trafficking through is expected to increase violence and undermine anti-corruption efforts in the Caribbean. Review by Toni Männistö (CBRA)

[s2If is_user_logged_in()]

Full review

Anti-drug officials report rising cocaine imports into the US through the Caribbean islands. The officials ascribe the increasing popularity of the Caribbean route strengthened law enforcement of alternative trafficking routes. Because traffickers prefer smuggling routes that offer the highest profit-to-risk ratios, the South American cocaine smuggling networks are evolving constantly. Routes have displaced several times over the years, and now the route is again the same than two decades ago.

Today, traffickers move again significant amounts of their cocaine from Colombian coca farms and laboratories to Venezuela by jungle trails, riverboats and small aircraft. From the Venezuelan coast, the contraband is smuggled to Caribbean islands by speedboats, planes and sometimes hidden inside commercial cargo. The cocaine traffickers use then yachts, mules, cruise ships, fast boats and commercial cargo vessels to smuggle the illegal drugs into the US and Europe.  The new wave of trafficking through is expected to increase violence and undermine anti-corruption efforts in the Caribbean. The new wave of trafficking through is expected to increase violence and undermine anti-corruption efforts in the Caribbean.

Trends of international drug trafficking often influence intensity of law enforcement efforts in global supply chains. Thus, changes in South American drug trafficking may affect also the two CORE trade lanes that import goods from the region into Europe, (1) imports of fresh cut flowers from Colombia to the Netherlands (WP11) and (2) imports of coffee and cocoa beans from South America to Europe (WP13). These trade lanes may become subject to more intense anti-drug controls over the following years. Besides the CORE demo cluster, also the CORE risk cluster benefit from the insight this article provides on the recent trends in routes, volumes and methods of the South American drug trafficking. This information may be useful for CORE’s activities that are developing educational and training material.

Reference

Drug trafficking in the Caribbean – the Full circle, the Economist, May 24th 2014

CORE2005

[/s2If]

Resolución de Punta Cana, Resolución de la Comisión de Políticas de la Organización Mundial de Aduanas sobre el papel de la aduana en el contexto de la seguridad, OMA 2015 (CORE2004)

La nueva Resolución de Punta Cana establece directrices para los roles de seguridad de las aduanas en la lucha contra la nueva ola de terrorismo, tal como se manifiesta en los recientes ataques a Túnez, Turquía, Líbano, Francia y Malí. La Resolución destaca que las autoridades de aduanas son usualmente la primera línea de defensa contra el crimen transnacional, el terrorismo y el extremismo: las aduanas controlan los movimientos transfronterizos de personas, mercancías, dinero y medios de trasporte, y por lo tanto, protegen a las comunidades contra terroristas que pueden utilizar la cadena internacional de suministros para movilizar materiales, fondos u operativos a través de las fronteras. Sobre la base de los instrumentos y acuerdos anteriores de la OMA, especialmente del Programa de Seguridad de la OMA, la Resolución de Punta Cana es el plan de acción de la comunidad aduanera, y con la promesa renovada de solidaridad que ofrece un fondo diplomático para otras actividades antiterroristas. Más información en: http://www.wcoomd.org/en/media/newsroom/2015/december/wco-issues-the-punta-cana-resolution.aspx

[s2If is_user_logged_in()]

Full review

The new Punta Cana Resolution sets guidelines for customs’ security roles in the combat against the new wave of terrorism, as manifested by recent attacks in Tunisia, Turkey, Lebanon, France and Mali. The resolution highlights that the customs authorities are typically the first line of defense against transnational crime, terrorism and extremism: the customs control cross-border movements of people, cargo, money and modes of transport and thus protect communities against terrorists that may exploit international supply chains to move materials, funds or operatives across borders. Building on the previous WCO instruments and agreements, especially on the WCO Security Programme, the Punta Cana resolution is the customs community’s action plan and renewed pledge of solidarity that provides a diplomatic backdrop for further counterterrorism activities.

The Punta Cana resolution encourages customs administrations worldwide to intensify collaboration within the customs community and with other border control agencies, both domestically and internationally. In case of missing or obsolete counter-terrorism strategy, the resolution urges customs to add new security roles in their mandates and activities. The Punta Cana document also recommends customs to pay close regard to the WCO’s previous agreements and instruments, such as the WCO Compliance and Enforcement Package, SAFE Framework of Standards and the WCO Security Programme. At more practical level, the resolution promotes the use of the full range of modern detection and investigation techniques, especially advance risk profiling on the basis of Advance Passenger Information (API) and Passenger Name Record (PNR). The resolution also calls governments from around the world to provide necessary financial and human support so that their national customs administrations can contribute towards the goals of the WCO Security Programme.

The Punta Cana Resolution informs CORE consortium about the changing risk landscape where the threat of transnational terrorism is high again. The Resolution also reminds the CORE’s risk cluster of the three cornerstones of effective border security management: collaboration, technology and human resources. The Punta Cana document also gives an overlook on the customs’ security priorities over the following years. For example, the global customs community will likely invest a great deal of time and money to develop new risk profiling systems that tap into new data sources such as the Advance Passenger Information (API) and Passenger Name Record (PNR). The same trend towards better risk profiling is likely to define also the future cargo security efforts at the borders.

Reference: WCO, 2015. Punta Cana Resolution, Resolution of the Policy Commission of the World Customs Organization on the Role of Customs in the Security Context.

CORE2004
[/s2If]

Cadenas Globales de Suministro Integradas a las TI, Seguras, Eficientes y Resilientes: Introducción, Descripción General y Temas de Investigación, Lecture Notes in Computer Science, por Klievink, B., Zomer, G., 2015 (CORE2003)

Resumen: ¿Cómo la innovación en TI contribuye al desarrollo de las cadenas de suministro internacionales seguras, resilientes e integradas? Esta es la pregunta que Klievink y Zomer buscan abordas mediante el examen de los programas de investigación pasados y presentes de un conjunto de proyectos europeos en cadenas de suministro. En su trabajo de investigación, estos autores identifican tres áreas principales de innovación -tecnología, conceptos de riesgo en la cadena de suministro y conceptos de colaboración y supervisión- que lideran el camino hacia una mayor incorporación de las nuevas TI y servicios en las cadenas de suministro globales. Los autores sostienen que los desarrolladores de modernas cadenas de suministro integradas a las TI, deberían colocar más atención a los desafíos no técnicos que a menudo dificultan la adopción de soluciones modernas de TI. El estudio también presenta y discute cinco trabajos de investigación que serán presentados en el cuarto Taller de Cadenas Globales de Suministro Integradas a las TI, Seguras, Eficientes y Resilientes, WITNESS 2015. El documento completo estará disponible para dominio público en otoño 2016.

[s2If is_user_logged_in()]

Full review: The paper provides a comprehensive outlook on innovation agendas that present EU 7th framework supply chain projects follow. The study summarises CORE’s innovation goals and clarifies definitions and purposes of CORE key concepts such as the system-based supervision, supply chain resiliency and advanced data capture and sharing mechanisms. Therefore, the paper strengthens the conceptual basis of the CORE’s IT and risk management clusters. The CORE demonstrations will benefit from the paper indirectly if the IT and risk clusters refine the paper’s ideas and findings into applicable concepts that could be implemented in the demonstrations. The paper highlights three main areas of innovation that will likely improve security, resiliency and efficiency of the global supply in the future:

Technological innovation – The technological innovation focuses largely on IT-enabled capture and sharing of data among operators who are involved in end-to-end supply chains. Timely sharing of relevant and quality data is believed to support secure and efficient supply chain management because such data helps supply chain actors to detect faster logistics contingencies and disruptions and react to them. The higher data availability also supports use of modern sensor, track & trace and cargo screening technologies. For example, better information about cargo flows allow customs administrations to focus their screening activities on high-risk cargo.

Risk concepts – The data availability leads to higher visibility over the supply chain and empowers supply chain actors to regain control over cargo. The increased control helps the supply chain actors to detect faster to operational contingencies and disruptions.

Collaboration and supervision models – Risk-based approach to customs inspections is a departure from the 100% screening philosophy, under which every single shipment faces inspection. The modern risk-based approach disrupts less cross-border trade and commerce than the 100% screening because customs (and other border control agencies) select only a percentage of shipments, those that represent the highest risk, to inspection. Another new concept is system-based supervision, an approach that seeks to assess traders’ internal controls of customs compliance rather than conducting transaction-driven

Reference: Klievink, B., Zomer, G., 2015. IT-enabled Resilient, Seamless and Secure Global Supply Chains: Introduction, Overview and Research Topics, Lecture Notes in Computer Science (pp. 443-453)

CORE2003
[/s2If]

OMA T&I Foro 2015

Call for papers and posters for the Research Track at the World Customs Organization Technology & Innovation Forum 2015.

Read more