First results from the WCO Cancun AEO benefit survey

In today’s CBRA Blog we provide a sneak preview of the outcomes of the AEO Benefit survey carried out by CBRA research team at the 3rd Global WCO AEO Conference, in Cancun, Mexico, 11-13 May 2016.

We keep today’s Blog very simple. First, we would like to introduce a new test-categorization of Customs granted AEO benefits, with the following five groups:

  1. More streamlined / simplified Customs (and related) procedures
  2. Less frequent interventions by the Customs administration
  3. Increased priority over non-AEO companies (“getting to the front of the queue”)
  4. Increased (positive) attention by the Customs administration
  5. Increased number of other privileges granted by the customs administration

And second, we list the AEO benefits from our survey (only question 2 in the survey form, which focuses explicitly on Customs granted benefits to the supply chain companies, and not benefits for Customs themselves, or any kind of “side benefits” for the companies) under each of the five categories. The order of the benefits per category is based on the survey outcomes, i.e. the first bullet point benefit was the most common one in the survey, followed by the second bullet and so forth. Please note that there are no ranking indications between the five groups, neither when it comes to the groups per se, nor to the individual benefits – these will be included in our academic publications, bit later this year…

Group 1. More streamlined / simplified Customs (and related) procedures

  • Enjoying increased paperless processing of import/export shipments
  • Enjoying an access to / pre-qualification with various simplified customs procedures
  • Enjoying having a reduced number of data elements in the (final) declaration
  • Enjoying having entry/exit summary declarations with reduced data sets
  • Enjoying easier access to other governmental certification in the supply chain (e.g. in aviation security)

Group 2. Less frequent interventions by the Customs administration

  • Enjoying minimum number of cargo security inspections
  • Enjoying the option of audit-based / account-based controls (versus only transaction-based controls)
  • Enjoying access to self-audit or reduced audit programs

Group 3. Increased priority over non-AEO companies (“getting to the front of the queue”)

  • Enjoying priority use of non-intrusive inspection techniques when examination is required
  • Enjoying a priority status in Customs processing during a period of elevated threat conditions
  • Enjoying priority response to requests for ruling from Customs
  • Enjoying expedited processes to resolve post-entry or post-clearance inquiries
  • Enjoying priority treatment of consignments if selected for control
  • Enjoying preferential treatment at border crossings in post-disaster/post-attack situations
  • Enjoying a priority status in exporting to affected countries after a security incident

Group 4. Increased (positive) attention by the Customs administration

  • Privilege to deal with designated Customs contact points / assistance by Customs supply chain security experts
  • Privilege to receive training provided by Customs experts
  • Privilege to be notified of the intention to release goods prior to their arrival (“pre-clearance”)
  • Enjoying special treatment in some non-criminal legal cases
  • Privilege to exploit “extended Customs office opening hours”, during high peak / congestion times

Group 5. Increased number of other privileges granted by the Customs administration

  • Enjoying from tax privileges, such as speedier tax refunds and compensation
  • Enjoying the option to manage clearance formalities, inspections etc. at the business site
  • Enjoying from financial guarantee waivers, reductions or rebates
  • Privilege to self-manage the bonded warehouses
  • Enjoying tangible benefits due to mutual recognition agreements / arrangements (MRAs) with 3rd countries
  • Privilege to choose the place of controls (if selected for control)
  • Enjoying reductions on some Customs fees or charges
  • Privilege to conduct self-assessments when Customs automated systems are not functioning

And that’s about it! Please be reminded again that this CBRA Blog is just a first scratch on the surface to start publishing results from the WCO Cancun 2016 AEO conference… And by the way, we are also working to publish the results from the WCO Madrid 2014 AEO conference, as we have been waiting to publish the full results of the both conferences in a parallel manner / in a same paper. In the meanwhile, please email us any feedback, ideas and/or criticism regarding this Blog!

In Lausanne, 8 June 2016, CBRA Blog Dr. Juha Hintsa

Blog-080616-1

PS. Our earlier Blog with all the WCO Cancun 2016 AEO survey questions can be read at: https://www.cross-border.org/2016/05/08/aeo-benefits-or-no-benefits-thats-the/

PPS. Related literature by the Cross-border Research Association team and key partners:

Most of these papers are available for download at ResearchGate, https://www.researchgate.net/profile/Juha_Hintsa/publications . And all of them can be naturally requested by email ( cbra@cross-border.org )

Hintsa, J., Mohanty, S., Rudzitis, N., Fossen, C. and Heijmann, F. (2014), “The role and value of customs administrations in minimization of socio-economic negative impacts related to illicit import flows in freight logistics systems- three preliminary cases in Europe – FP7-CORE”, Proceedings of the 9th WCO PICARD Conference, September 17-19, 2014, Puebla.

Hintsa, J. (2013), AEO – MRA Study for RTC- Thailand Europe Cooperation TEC-II, PDSC: Implementation of international standards on Supply Chain Security leading to a secure Trade Environment and to increased Trade Facilitation (Activity Code : TRA 4), Final Report, Bangkok.

Urciuoli, L. and Ekwall, D. (2012), “Possible impacts of supply chain security certifications on efficiency – a survey study about the possible impacts of AEO security certifications on supply chain efficiency”, Proceedings of Nofoma Conference, June 6-8, 2012, Naantali.

Hintsa, J., Männistö, T., Hameri, A.P., Thibedeau, C., Sahlstedt, J., Tsikolenko, V., Finger, M. and Granqvist, M. (2011), Customs Risk Management (CRiM): A Survey of 24 WCO Member Administrations, Study for World Customs Organization (WCO), February 28, 2011, Lausanne

Hintsa, J., Hameri, A.P., Männistö, T., Lazarescu, M., Ahokas, J. and Holmström, J. (2010), ”Conceptual model for measuring benefits of security in global supply chains”, Proceedings of the the 3rd International Conference on Transportation and Logistics (T-LOG), September 6-8, 2010, Fukuoka City.

Hintsa, J., Ahokas, J., Männistö, T. and Sahlstedt, J. (2010), “CEN supply chain security (SCS) feasibility study”, CEN/TC 379 Supply Chain Security, Final report, January 15, 2010

Gutiérrez, X., Hintsa, J., Wieser, P. and Hameri, A.P. (2007), “Voluntary supply chain security program impacts: an empirical study with BASC member companies”, World Customs Journal, Vol. 1 No. 2, pp.31-48.

Gutierrez, X. and Hintsa, J. (2006), “Voluntary supply chain security programs: a systematic comparison”, Proceedings of the International Conference on Information Systems, Logistics and Supply Chain (ILS), May 15-17, 2006, Lyon.

MARITIME SECURITY – Vessel Tracking Systems Provide Key Information, but the Need for Duplicate Data Should Be Reviewed, GAO, March 2009 (CORE1065)

Summary: The US government considers identification and tracking of vessels at the US coastal areas, inland waterways and ports important for protecting the US homeland and economy from maritime terrorism. The US coastal guards use a range of identification and tracking solutions to detect any anomalies in maritime traffic that might suggest terrorist activity, such as transportation of weapons of mass destruction, use of explosive-laden boats as weapons, smuggling of weapons, drugs, people or other contraband. This GAO report reviews the US Coast Guards’ current and future solutions for monitoring the maritime traffic: long-range identification and tracking system (LRIT), long-range automatic identification system (AIS) and various radar and camera systems. The report elaborates strengths and weaknesses of these identification and tracking solutions and proposes a roadmap for further strengthening of the US coastal security. The future advancements should pay particular attention to tracking of small and non-commercial vessels and to reconsider ways to collect and analyze data that is relevant for coastal surveillance.  Offering background information about vessel-level tracking and tracing of maritime cargo movements, the report is a relevant source document for those CORE demonstrations that involve shipping of containers from, through and into the US. The report is available for download at: www.gao.gov/new.items/d09337.pdf.

[s2If is_user_logged_in()]

Full review: CORE demonstrations of WP9 and WP14 benefit from the background information this GAO document offers on identification and tracking of vessels because these two demos involve US seaports and shipping at the US territorial waters. Also the CORE’s risk and IT clusters might find the information of this GAO document useful. The information that the identification and tracking provide allow the coastal guards to assess risk-levels of individual vessel movements and decide when it is reasonable to intervene and check anomalies. The vessel tracking and identification involves also a great deal of IT integration because it currently involves many technical components and synthetizes data collected from many different sources.

Cross-references:

  • Maritime Security: Information Sharing Efforts Are Improving. GAO-06-933T. Washington, D.C.: July 10, 2006.
  • Maritime Security: Public Safety Consequences of a Terrorist Attack on a Tanker Carrying Liquefied Natural Gas Need Clarification. GAO-07-316. Washington, D.C.: February 22, 2007.
  • Maritime Security: Coast Guard Inspections Identify and Correct Facility Deficiencies, but More Analysis Needed of Program’s Staffing, Practices, and Data. GAO-08-12. Washington, D.C.: February 14, 2008.

Additional keywords: Maritime security, long-range identification and tracking system (LRIT), long-range automatic identification system (AIS), track & trace

 

CORE1065

[/s2If]

MARITIME SECURITY – DHS Progress and Challenges in Key Areas of Port Security, GAO, July 2010 (CORE1064)

Summary: This GAO report analyses the progress the US Department of Homeland Security (DHS) has made in maritime supply chain security over the past five to ten years. The report raises problems that the DHS and its component agencies – the Coast Guard and the Customs and Border Protection (CBP) – have encountered regarding improvement of risk management, reduction of the vulnerability to threats of small vessels, implementation of security assessment in foreign ports, and the overall progress in supply chain security.  The report states that so far the Coast Guard has carried out risk assessments, but their results do not allow effective comparison and prioritization of risks across ports. The Coast guard has also identified points of vulnerability related to waterside attacks by small vessels, reached out to the general public to encourage recreational sailors to report anomalies, started tracking of small vessel, tested equipment to screen small vessels for nuclear material and conducted security maneuvers such as vessel escorts. Nevertheless, resource constraints and technical problems prevent the Coast Guard to protect the US coastline and maritime infrastructure from small-vessel threats effectively. Moreover, the Coast Guard has been assessing security in foreign ports, but the lack of the agency’s resources and certain countries’ reluctance to collaborate with the US authorities have slowed down the global security assessment. Finally, as for the general supply chain security, the DHS has been running the Secure Freight Initiative (SFI) in foreign ports to test the feasibility of the 100% scanning of US-bound shipping containers with non-intrusive inspection (NII) technologies and radiation detection equipment. The findings of the SFI pilots indicate that the 100% scanning is not a feasible policy because it would disrupt port logistics, damage international trade and raise healthy concerns, among other things. The report is available for download at: www.gao.gov/assets/660/659087.pdf.

[s2If is_user_logged_in()]

Full review: This GAO review concentrates on the US maritime supply chain security. The document provides important information for people who are working for the CORE demonstrations of WP1 and WP14 because these demos involve maritime transportation into and from the US mainland. Those demonstrations that test tracking & tracking solutions might benefit from the document’s update on small-vessel identification and tracking systems.

Cross-references:

  • Coast Guard: Deployable Operations Group Achieving Organizational Benefits, but Challenges Remain. GAO-10-433R. Washington, D.C.: April 7, 2010.
  • Supply Chain Security: Feasibility and Cost-Benefit Analysis Would Assist DHS and Congress in Assessing and Implementing the Requirement to Scan 100 Percent of U.S.-Bound Containers. GAO-10-12. Washington, D.C.: October 30, 2009.
  • Maritime Security: The SAFE Port Act: Status and Implementation One Year Later. GAO-08-126T. Washington, D.C.: October 30, 2007.
  • Maritime Security: Vessel Tracking Systems Provide Key Information, but the Need for Duplicate Data Should Be Reviewed. GAO-09-337. Washington, D.C.: March 17, 2009.
  • Supply Chain Security: Challenges to Scanning 100 Percent of U.S.-Bound Cargo Containers. GAO-08-533T. Washington, D.C., June 12, 2008.

Additional keywords: Maritime security, supply chain security, 100% scanning and track & trace

 

CORE1064

[/s2If]

AVIATION SECURITY – Progress Made, but Challenges Persist in Meeting the Screening Mandate for Air Cargo, GAO, March 2011 (CORE1062)

Summary: This GAO report reviews the recent progress of the US air cargo security scheme. The Transportation Security Administration (TSA), the main agency responsible for the US air cargo security, has been working towards the implementation of the 100% screening requirements of the 9/11 Commission Act of 2007. So far TSA has set up a voluntary Certified Cargo Screening Program (CCSP) to allow trusted logistics operators to screen air cargo outside congested airports, launched a program for testing technologies for air cargo screening and expanding its program for approving explosive detection dog teams. The main obstacle in meeting the 100% screening requirement is that TSA has no reliable mechanism for verifying screening data from domestic foreign screening operators, which self-report the data. TSA also struggles in finding resources to employ as many transport security inspectors as it is required to oversee the Certified Cargo Screening Program. The report also points out that the current technologies that TSA has approved for cargo screening cannot screen large cargo units – pallets or unit loading devices (ULDs) – and this incapability reduces speed and cost-efficiency of air cargo screening. Overall, this GAO document provides a general outlook on state and challenges the US air cargo security regime, and therefore those CORE demonstrations that focus on the US-bound or US-origin air transport should consider the report as a key source material. The report is available for download at: www.gao.gov/assets/130/125678.pdf.

[s2If is_user_logged_in()]

Full review: This document is relevant for the CORE demonstrations that involve air transportation into or through or from the US. Especially the DHL demo, that concentrates on shipping of military aircraft parts from the US to Spain, is affected by the TSA’s programs and initiatives that the report analyses. The report is very concise and informative, so it might be beneficial to the CORE’s educational and training activities.

Cross-references:

  • GAO, Aviation Security: Federal Coordination for Responding to In-flight Security Threats Has Matured, but Procedures Can Be Strengthened, (Washington, D.C.: July 31, 2007).
  • GAO, Aviation Security: Transportation Security Administration May Face Resource and other Challenges in Developing a System to Screen All Cargo Transported on Passenger Aircraft
  • GAO, Aviation Security: Federal Efforts to Secure U.S.-Bound Air Cargo Are in the Early Stages and Could Be Strengthened, GAO-07-660 (Washington, D.C.: April 2007).
  • GAO, Aviation Security: Progress Made in Systematic Planning to Guide Key Investment Decisions, but More Work Remains, GAO-07-448T (Washington, D.C.: February 13, 2007).

Additional keywords: Air cargo security, 100% screening, Certified Cargo Screening Program (CCSP)

 

CORE1062

[/s2If]

MARITIME SECURITY – Progress Made, but further actions needed to secure the maritime energy supply, GAO, August 2011 (CORE1061)

Summary: The GAO report discusses actions the US Coast Guard and the Federal Bureau of Investigation (FBI) have taken to strengthen security of energy tankers and offshore energy infrastructure – that produces, transports, or receives oil and natural gas – from terrorist attacks. The report’s key recommendation is that the Coast Guard need to assess risks to all offshore facilities in the US territorial waters, to improve emergency response plans in case of oil spills and to design performance measures for emergency response activities. This GAO document focuses on a rather narrow field of critical infrastructure, the US maritime energy infrastructure, which is not in the CORE’s scope. The CORE’s risk cluster might consider useful the description how the Coast Guard has applied its Maritime Security Risk Analysis Model (MSRAM) to determine risk of the US maritime energy infrastructure. The report is available for download at: www.gao.gov/new.items/d11883t.pdf.

[s2If is_user_logged_in()]

Full review: This GAO document is not very relevant to CORE because of its topic (the US maritime energy infrastructure) that is not within the CORE’s scope. Even so, the risk cluster, the IT cluster and the demonstrations on maritime transport might consider useful of the insight this report offers on security risk assessment.

Cross-references:

  • Maritime Security: Actions Needed to Assess and Update Plan And Enhance Collaboration among Partners Involved in Countering Piracy off the Horn of Africa. GAO-10-856. Washington, D.C.: September 24, 2010.
  • Critical Infrastructure Protection: Update to National Infrastructure Protection Plan Includes Increased Emphasis on Risk Management and Resilience. GAO-10-296. Washington, D.C.: March 5, 2010.
  • Quadrennial Homeland Security Review: 2010 Reports Addressed Many Required Elements, but Budget Planning Not Yet Completed. GAO-11-153R. Washington, D.C.: December 16, 2010.

Additional keywords: Critical infrastructure protection (CIP), maritime security and security of supply

 

CORE1061

[/s2If]

 

PORT SECURITY GRANT PROGRAM, Risk Model, Grant Management, and Effectiveness Measures Could Be Strengthened, GAO, November 2011 (CORE1060)

Summary: The Department of Homeland Security (DHS) has granted almost 1.7 billion USD to port security through the Port Security Grant Program (PSGP). The program is administered by a component agency of DHS, Federal Emergency Management Agency (FEMA). This GAO reports highlights some problems that the grant program has encountered. The first issue is that the risk assessment the FEMA uses to assess risk levels and assign grants to different ports does not take into account how security improvements affect the vulnerability of the ports to terrorist attacks. The report recommends the FEMA to design a vulnerability index that accounts for security improvement and to coordinate with the Coast Guard to get access to the most accurate vulnerability and threat information. The second issue with the grant program is that much of the grant money does not get used and translate into practical port security projects. The GAO report proposes acceleration of the grant granting process with updated administrative procedures and with more administrative staff.  Finally, this GAO report recommends the FEMA to develop performance metrics to assess its administration in relation to the Port Security Grant Program. The contents of this GAO report is not very relevant to CORE because no US seaports are partners in the project. The report is available for download at: www.gao.gov/assets/590/587142.pdf.

[s2If is_user_logged_in()]

Full review: This document has only a limited relevance for CORE because the consortium does not involve any US seaport operators. The demonstrations of WP9 and WP14 that cover shipping of goods from and into the US through local seaports might find it useful to learn about how US ports can apply for funds to improve the security. Otherwise, other demonstrations do not benefit much of this information. However, the CORE’s risk cluster can benefit from the rather detailed description of the risk analysis model in the report’s Appendix II.

Cross-references:

  • Maritime Security: Actions Needed to Assess and Update Plan And Enhance Collaboration among Partners Involved in Countering Piracy off the Horn of Africa. GAO-10-856. Washington, D.C.: September 24, 2010.
  • Critical Infrastructure Protection: Update to National Infrastructure Protection Plan Includes Increased Emphasis on Risk Management and Resilience. GAO-10-296. Washington, D.C.: March 5, 2010.
  • Quadrennial Homeland Security Review: 2010 Reports Addressed Many Required Elements, but Budget Planning Not Yet Completed. GAO-11-153R. Washington, D.C.: December 16, 2010.

Additional keywords: Critical infrastructure protection (CIP), maritime security and security of supply, Port Security Grant Program (PSGP)

 

CORE1060

[/s2If]

SUPPLY CHAIN SECURITY – CBP Needs to Enhance Its Guidance and Oversight of High-Risk Maritime Cargo Shipments, GAO, January 2015 (CORE1059)

Summary: The report reviews the US Customs and Border Protection’s (CPB) approach to risk assessment and targeting of maritime shipping containers. The report’s highlights that CPB does not have clear decision rules and reporting procedures to monitor percentage of containers that the risk assessment system flags high-risk and that get eventually examined. The source of this problem is that the CPB’s officials (targeters) may waive examination of the high-risk containers if the container (i) falls within a predetermined category (standard exception), or (ii) the targeters can articulate why the shipment should not be considered high risk. The targeting units have currently differing definitions of “standard exceptions” and differing views on what constitutes the “articulate reasons.” The GAO report recommends the CPB to clarify, harmonize and enforce the rules and the procedures for waiving the high-risk containers from examination. As for CORE, this report provides a detailed and recent outlook on the US maritime risk assessment and targeting scheme, and this information is going to support work of the CORE’s risk cluster and the demonstrations that involve shipping of sea containers into the US. The report is available for download at: www.gao.gov/assets/670/668098.pdf.

[s2If is_user_logged_in()]

Full review: This GAO reports contains crucial information about the US risk assessment and container targeting systems that benefit the CORE’s risk cluster. The report outlines principles, procedures, datasets and scanning methods that constitute the world’s most advanced risk assessment system for maritime shipping containers. The CORE’s IT cluster might also benefit from the report’s description of the CPB’s Automated Targeting System (ATS) that is used to compute risk scores for shipping containers and flag the ones with the highest score as high-risk. Regarding the CORE demonstrations, the GM demon (WP19) must comply with data requirements (24-hour rule and the “10+2” rule) that enable the US risk assessment and targeting system. Also the demos involving customs controls, especially WP11.2 and WP10.1, may learn something from the ways how the US border control authorities are assessing risk levels of incoming containers.

Cross-references:

  • Supply Chain Security: CBP Needs to Conduct Regular Assessments of Its Cargo Targeting System. GAO-13-9. Washington, D.C.: October 25, 2012.
  • Maritime Security: Progress and Challenges in Key DHS Programs to Secure the Maritime Borders. GAO-14-196T. Washington, D.C.: November 19, 2013.
  • Supply Chain Security: Feasibility and Cost-Benefit Analysis Would Assist DHS and Congress in Assessing and Implementing the Requirement to Scan 100 Percent of U.S.-Bound Containers. GAO-10-12. Washington, D.C.: October 30, 2009.

Additional keywords: Security Filing and Additional Carrier Requirements (known as the 10+2 rule), 24-hour rule, risk assessment

 

CORE1059

[/s2If]

TRANSPORTATION SECURITY INFORMATION SHARING – Stakeholder Satisfaction Varies; TSA Could Take Additional Actions to Strengthen Efforts, GAO, June 2014 (CORE1020)

Summary: This report presents and discuses findings of a survey on stakeholders’ satisfaction to the US Transportation Security Administration’s security-related activities and to the way the TSA disseminates information about its activities. The survey’s scope is the overall US transportation system, covering aviation, rail, and highway modalities and transport of passengers and freight. Given the broad scope and the US-centricity of the survey, this report is not very relevant for CORE. The education and training cluster could anyhow learn how security-related user satisfaction surveys are done and how to establish a mechanism for collecting regular user feedback. The report is available for download at: http://gao.gov/assets/670/664350.pdf.

[s2If is_user_logged_in()]

Full review: The scope of the report is very broad and the information about cargo security is limited, so the CORE project cannot much benefit from this report. However, the project’s educational and training cluster might use the report’s information to design ways administer end-user surveys: what questions to ask, which stakeholders to survey and how to report the findings. Some demonstrations adopt some of the report’s ideas and methods to collect high-quality user requirements.

Additional keywords: Transportation security, aviation security

 

CORE1020

[/s2If]

MARITIME SECURITY – Progress and Challenges with Selected Port Security Programs, GAO, June 2014 (CORE1019)

Summary: The report provides a comprehensive review of progress and challenges of various port security activities and programs the Department of Homeland Security (DHS) has carried out since 9/11. In essence, the report is a summary and an update of a number of more detailed GAO reports on maritime supply chain security. The report states that needs to strengthen further its efforts on maritime domain awareness through intensified communication among maritime stakeholders. Regarding the US domestic port security, the report recommends DHS to reassess its Port Security Grant Program (PSGP) that allows ports to request funds for security projects and to improve quality of vulnerability assessment in US ports. The report also urges DHS to overcome challenges of risk-based targeting and scanning of US-bound shipping containers.  The findings and recommendations of this report help CORE consortium understand the current state of the US maritime security regime. This understanding benefits particularly the demonstrations of WP9 and WP14. Also educational and training as well as risk clusters of CORE may find the report’s information useful. The report is available for download at: www.gao.gov/assets/670/663784.pdf.

[s2If is_user_logged_in()]

Full review: This GAO document summarizes the US maritime supply chain security and provides useful information for the CORE project across its work packages. This information most obviously benefits WP9 and WP14 that involve US-bound maritime trade lanes. However, also the CORE’s risk cluster can find useful insight in the report, for example about challenges and opportunities of risk-based container targeting and screening approaches. This summary GAO document caters the needs of state-of-the-art work packages and the CORE’s educational and training cluster that aims to produce relevant and up-to-date material about supply chain security for a variety of stakeholders.

Cross-references:

  • Combating Nuclear Smuggling: Additional Actions Needed to Ensure Adequate Testing of Next Generation Radiation Detection Equipment. GAO-07-1247T. Washington, D.C.: September 18,
  • Supply Chain Security: CBP Has Made Progress in Assisting the Trade Industry in Implementing the New Importer Security Filing Requirements, but Some Challenges Remain. GAO-10-841. Washington, D.C.: September 10, 2010.
  • Supply Chain Security: CBP Needs to Conduct Regular Assessments of Its Cargo Targeting System, GAO-13-9. October 25, 2012.

Additional keywords: Maritime security, Port Security Grant Program (PSGP), risk-based controls, targeting, container scanning

 

CORE1019

[/s2If]

MARITIME SECURITY – Progress and Challenges in Key DHS Programs to Secure the Maritime Borders, GAO, November 2013 (CORE1018)

Summary: This report is a summary of previous GAO reports on US maritime supply chain security and border controls. The report focuses on progress and challenges in four main areas of the Department of Homeland Security’s (DHS) activity on the maritime security. The report highlights that DHS and its component Coast Guard agency could improve its maritime domain awareness through increased information sharing and more advanced vessel-tracking systems. The Customs and Border Protection (CBP) in turn could step up its role in securing US-bound container traffic by conducting more frequent risk assessment audits in key foreign ports that ship cargo into the US and by fostering more close relationship with foreign authorities. The GAO report also recommends the Coast Guard to rethink its maritime surveillance, interdiction and security operations because current protection and support is not adequate in high priority locations. The report also calls for more collaboration and coordination among maritime authorities, port operators and ocean carriers. Finally, the report encourages the DHS to develop performance metrics and data collection procedures the agency uses to assess and monitor its maritime security programs and activities. This report gives a recent update on the US maritime security activities that might be helpful for CORE demonstrations and clusters. The report is available for download at: www.gao.gov/assets/660/659087.pdf.

[s2If is_user_logged_in()]

Full review: This summary GAO documents provides detailed background material about the US maritime security programs. This information is very relevant for the CORE demonstrations WP9 and WP14 that involve shipping cargo from and into the US. The information this document offers also help the CORE’s risk and IT clusters to learn lessons from the US approach to risk-based maritime security and security-related IT integration.

Cross-references:

  • Maritime Security: Ferry Security Measures Have Been Implemented, but Evaluating Existing Studies Could Further Enhance Security. GAO-11-207. Washington, D.C.: December 3, 2010.
  • Supply Chain Security: DHS Could Improve Cargo Security by Periodically Assessing Risks from Foreign Ports. GAO-13-764. Washington, D.C.: September 16, 2013.

Additional keywords: Maritime security, maritime surveillance, risk-based controls, targeting, container scanning

 

CORE1018

[/s2If]