New survey on European postal security

PostEurop and Cross-border Research Association have launched a new online survey on postal security management to promote further development and implementation of best security practices in the postal sector. The survey is part of the ongoing SAFEPOST project that the European Commission is co-funding under the Seventh Framework Programme (FP7). SAFEPOST project going to finish in the end of July after four years of work towards higher postal security in the European Union.

The survey studies the current state of postal security management among PostEurop members, 52 postal operators in 49 European countries. The goal is to collect responses mainly from security and safety managers of the PostEurop members, but also postal expert familiar with sorting and distribution processes are welcome to provide their inputs. The first part of the survey focuses on security implementation and security performance, and the second part studies postal managers’ expectations and concerns regarding the following six main SAFEPOST innovations:

Common Postal Security Space:

SAFEPOST has created an online platform for sharing security-related information between postal operators. This Common Postal Security Space provides a digital track record of security controls and related evidence (for example X-ray images) that a postal parcel has encountered over its journey, and facilitates an easy and controlled way to exchange information both with other operators as well as the authorities.

D-tube drug screening station:

SAFEPOST has demonstrated a new screening solution, D-tube, that can be fully integrated into the sorting process. The D-Tube’s prototype detects illegal substances, such as narcotics and explosives, at high accuracy.

Explosive detection system:

SAFEPOST has demonstrated a Raman spectroscopy screening device for detecting trace amounts of explosives and explosive precursors on the outside of postal items. The device is designed to be seamlessly integrated, at the same level as X-ray machines already used today, in the sorting process and detect the explosive threats at a high accuracy and at a low false alarm rate (≈ 1 %).

Image recognition system:

SAFEPOST has developed an Image Recognition solution that photographs five visible sides of a postal parcel at one or more locations in the postal network. The solution compares these images to detect signs of tampering or damage (≈ 92% detection rate). The current solution functions properly when the conveyor belt moves no faster than 0.5 m/s.

Radiological screening:

SAFEPOST has demonstrated detection of radiation in moving parcels, that can be fully integrated into the sorting process. The current version of the detector is able to detect any harmful level of radiation, and identify the radioactive isotope, and when possible to consider effects of possible attempts of hiding the radioactivity with lead or other shielding material by detecting neutron radiation.

Security standard and certificate:

SAFEPOST project is working towards a new European security standard for the postal operators that would give recommendations about use of security inspection technologies, exchange of security-related information, cyber security, and key security performance indicators. This standard would pave the road towards a voluntary security certification program that would help the postal operators to show their commitment to security.

This survey research is expected to produce interesting new insights about postal security activities and security performance among the PostEurop members. If the response rate is high, the survey findings will set a basis for pan-European benchmarking of security activities. The findings would also contribute to smart policy making, legislation, and standardisation in the field of postal security.

Finally, depending on the response rate, CBRA is going to publish an academic journal paper based on the results. Building on solid theory on supply chain security risk management, the journal paper would provide new empirical about how supply chain security implementation is associated operational and security performance. We expect that collaborative security measures improve both on-time delivery performance (a proxy for operational performance) and supply chain security performance simultaneously. Collaborative security measures include survey items such as “we coordinate security activities with our business customers” and “we exchange customs declaration information with customs authorities electronically [for example, ITMATT or CUSITM messages]”. Another hypothesis is that, on the one hand, non-collaborative security contributes to supply chain security performance but decrease on-time delivery performance on the other hand. Examples of such non-collaborative measures include “we use tamper-evident mail bags to transport high-value postal items” and “We perform security controls also on non-airmail items to detect explosives.” The figure below summarises the theory and hypotheses of the research paper.

blog1506161

Figure 1 Theoretical framework of the SAFEPOST survey paper

The survey findings will be presented in the final SAFEPOST meeting in Madrid 5-6 July 2016. After the meeting, we hope that we can expand the scope of the survey to cover the rest of the world, as well. The next step would be to contact representatives of the Universal Postal Union (UPU) and coordinate distribution of the survey into the organisations’ 192 member countries.

 

CASSANDRA compendium. Standards in supply chain management (Ch. 9)

Summary: Chapter 9 of the CASSANDRA compendium lists and discusses various standards that set the context for international supply chain management. The chapter focuses especially on management standards (e.g., ISO28000), technical standards (e.g., RFID, electronic seals and barcodes), standards for exchange of information among supply chain stakeholders (e.g., UN/EDIFACT and XML messaging), and customs security standards (especially the World Customs Organisations’ SAFE Framework of Standards). GS1 Global Visibility Framework and other industry standards are included in the discussion, as well. The chapter points out that because a large variety of standards are already available, the challenge is not a lack of standardisation but the lack of harmonisation between different standards. The section also concludes that even if the diversity of standards was harmonised, the next step would be to ensure that the standards would be consistently implemented in different contexts.

[s2If is_user_logged_in()]

Full review: The chapter focuses on listing different standards that affect the modern supply chain management. There not much details to be reported in this section. However, especially people working with CORE work package 6 “SCS Reference Framework and Standards” should read the brief listing and general discussion of standards and standardisation. Other chapters of the CASSANDRA compendium provide complementary information about standardisation in the field of supply chain management (e.g., Ch. 5 & 6).

Reference

Hintsa, J. and Uronen, K. (Eds.) (2012), “Common assessment and analysis of risk in global supply chains “, Compendium of FP7-project CASSANDRA, Chapter 9

CORE2007

[/s2If]

CASSANDRA compendium. Technologies for supply chain visibility and security (Ch. 8)

Summary: Chapter 8 of the CASSANDRA compendium reviews current and future technologies that help managers to improve visibility and security over global end-to-end supply chains. The supply chain visibility technologies, in essence, provide logistics managers with a variety of information – shipment data, performance metrics, inventory levels, production / delivery schedules and sales forecast, for example – in or close to real time. The chapter’s review on supply chain security technologies focus mainly on security sensors (e.g., motion detectors), container seals, biometric user authentication devices (e.g., fingerprints), and non-intrusive inspection equipment (e.g., X-ray screening stations). The section also elaborates modern ways for sharing information among stakeholders that are concerned about security of the supply chain. The CASSANDRA compendium is available for download: www.cassandra-project.eu. Review by Toni Männistö (CBRA)

[s2If is_user_logged_in()]

Full review: Chapter 8 includes some interesting details and insights about modern visibility and security technologies, many of which are relevant especially for CORE demonstrations but also for other work packages such as WP2 (SCS controls), WP7 (CORE Connectivity Infrastructure and Solutions Development Environment) and WP8 (CORE Ecosystem).

Many large logistics operators have developed own supply chain visibility systems to coordinate and organise logistics operations. A large logistics service provider, Kühne+Nagel uses its KN login visibility system that allows the company to optimise its complex global operations in terms of speed, time-certainty, security and cost-efficiency and many other relevant metrics. DHL, a German-based international express courier and logistics company, uses its LOGIS software for its operations. Previous EU projects have also developed visibility systems, for example Smart CM SICIS (Shared Intermodal Container Information System).

These visibility systems enable fast response to most operational contingencies that are about cause deviations from original plans. For instance, if a shipper got instant information about a stolen container, a new delivery could be quickly arranged and the consignee could be informed as soon as possible about the reshipment. Moreover, the visibility systems often interface ITC systems of other key stakeholders in the international supply chains. Customs, for example, receive advance cargo information (ACI) automatically from these systems.

The second part of the chapter 8 focuses exclusively on security technologies. The review starts with description of security sensors that are designed to detect tampering, unplanned detours, and other suspicious events in the supply chain. The modern sensor technologies sense at least changes in lighting, acceleration, location (geo-fencing functionality), motion and CO2 levels (used, e.g., to detect stowaways inside shipping containers). The chapter introduces modern user authentication technologies (e.g., fingerprints, face, retina, hand geometry and other unique biometric characteristics). Some information is provided regarding non-intrusive screening solutions that are often considered to be necessary for fast and secure screening operations. The rest of the chapter discusses various technical and institutional solutions for exchanging security-relevant information among supply chain operators and relevant government agencies. Especially interoperability of ICT systems seems to be crucial for effective security efforts in the global supply chains. The CASSANDRA compendium is available for download: www.cassandra-project.eu. Review by Toni Männistö (CBRA)

Reference

Hintsa, J. and Uronen, K. (Eds.) (2012), “Common assessment and analysis of risk in global supply chains “, Compendium of FP7-project CASSANDRA, Chapter 8

CORE2007

[/s2If]

CASSANDRA compendium. Private sector perspectives on risk management (Ch. 5) and crime prevention and security management in supply chains (Ch. 6)

Summary: Chapters 5 & 6 of the CASSANDRA compendium provide a general overview on supply chain security risk management from the private sector perspective. Explaining the essentials of supply chain risk management, Chapter 5 introduces commonly used risk management models and tools (e.g., risk matrices and risk registers), discusses various classifications of supply chain risks, and elaborates current trends of risks and risk management in the supply chain context. Chapter 6 focuses on specific challenges of supply chain security risks – the risks that arise from intentional, man-made criminal activities such as terrorism, theft, trafficking, and sabotage. The chapter explains a few early classifications of supply chain security risks (e.g., motive-based typology and taxonomies based on private sector perspectives). Following the classifications of security risks, the chapter puts forth a few models for managing security risks in the supply chain context (e.g., the 8-layer model for supply chain security management). The chapter concludes with a detailed case study on security management of an international security company and a comparison of supply chain security management and the total quality management (TQM) management philosophy. The CASSANDRA compendium is available for download: www.cassandra-project.eu. Review by Toni Männistö (CBRA)

[s2If is_user_logged_in()]

Full review: Previous observatory entries have already shown the relevance of the CASSANDRA compendium to the community of supply chain management professionals. The compendium’s chapters 5 & 6 give a brief summary of risk management and security risk management in the context of international supply chains. The contents of the chapters are relevant and useful for people involved in FP7 CORE project, especially for those involved in work packages 3 (Multi-method Threat and Vulnerability Analysis Suite) and 4 (SC Situational Awareness Tools & Maps).

Chapter 5 elaborates a set of common supply chain risk management tools. The model of Waters (2007) summarises rather obvious three steps of the risk management process: identifying risks, analysing risks and responding to risks. The model proposes, for example, that managers can identify supply chain risks through analysis of past events, collection of opinions, and through operational analysis. The model also calls for managerial attention to prerequisites of successful risk management – mutual trust, cooperation and information exchange among relevant stakeholders involved in supply chain management – and highlights importance of continuous monitoring and controlling the risk management process. The chapter concludes with the four classic approaches to risk management: risk avoidance, risk reduction, risk transfer (e.g., insurance and contractual agreements), and acceptance. The classifications of supply chain risks include typologies focusing on risk sources (natural hazards operational failure and terrorism), risk consequences (e.g., risk to operations, risk to reputation and risk to profits), and objects of vulnerability (e.g., information, materials, personnel and financial flows).

The chapter on crime prevention and security management (Ch. 6) in supply chains provides a concise summary on supply chain security management from the private sector perspective. The chapter starts by describing some early classifications of supply chain security risks. A motive-based taxonomy classifies such risks into the three categories: economic crime (profit as motive), other crime types (ideological, emotional and other reasons as motive) and facilitating crime that covers activities that do not bring direct crime benefits but help committing other rewarding crime crimes later on. (e.g., document fraud, bribery and use of intimidation). The chapter’s next section elaborates ways to mitigate security risks in the global supply chains, highlighting the key ideas of the so-called 8-layer model for supply chain security management (the model incorporates multiple aspects of risk assessment, hands-on design and planning, implementation of a variety of technologies, procedures, and incentives as well as preparation for dealing with the consequences of supply chain crime). The chapter provides also a case study with an international tobacco company that runs high security risk supply chain operations. The section also contrasts, rather interestingly, principles of security management against the fundaments of the total quality management (TQM) management philosophy. The chapter continues with a brief review of regulations (e.g., EU customs security and aviation security regulations) and standards on supply chain security management (World Customs Organization’s SAFE framework of standards, and industry standards of the Transported Asset Protection Association).

Reference

Hintsa, J. and Uronen, K. (Eds.) (2012), “Common assessment and analysis of risk in global supply chains “, Compendium of FP7-project CASSANDRA, Chapters 5 & 6

CORE2007

[/s2If]

First results from the WCO Cancun AEO benefit survey

In today’s CBRA Blog we provide a sneak preview of the outcomes of the AEO Benefit survey carried out by CBRA research team at the 3rd Global WCO AEO Conference, in Cancun, Mexico, 11-13 May 2016.

We keep today’s Blog very simple. First, we would like to introduce a new test-categorization of Customs granted AEO benefits, with the following five groups:

  1. More streamlined / simplified Customs (and related) procedures
  2. Less frequent interventions by the Customs administration
  3. Increased priority over non-AEO companies (“getting to the front of the queue”)
  4. Increased (positive) attention by the Customs administration
  5. Increased number of other privileges granted by the customs administration

And second, we list the AEO benefits from our survey (only question 2 in the survey form, which focuses explicitly on Customs granted benefits to the supply chain companies, and not benefits for Customs themselves, or any kind of “side benefits” for the companies) under each of the five categories. The order of the benefits per category is based on the survey outcomes, i.e. the first bullet point benefit was the most common one in the survey, followed by the second bullet and so forth. Please note that there are no ranking indications between the five groups, neither when it comes to the groups per se, nor to the individual benefits – these will be included in our academic publications, bit later this year…

Group 1. More streamlined / simplified Customs (and related) procedures

  • Enjoying increased paperless processing of import/export shipments
  • Enjoying an access to / pre-qualification with various simplified customs procedures
  • Enjoying having a reduced number of data elements in the (final) declaration
  • Enjoying having entry/exit summary declarations with reduced data sets
  • Enjoying easier access to other governmental certification in the supply chain (e.g. in aviation security)

Group 2. Less frequent interventions by the Customs administration

  • Enjoying minimum number of cargo security inspections
  • Enjoying the option of audit-based / account-based controls (versus only transaction-based controls)
  • Enjoying access to self-audit or reduced audit programs

Group 3. Increased priority over non-AEO companies (“getting to the front of the queue”)

  • Enjoying priority use of non-intrusive inspection techniques when examination is required
  • Enjoying a priority status in Customs processing during a period of elevated threat conditions
  • Enjoying priority response to requests for ruling from Customs
  • Enjoying expedited processes to resolve post-entry or post-clearance inquiries
  • Enjoying priority treatment of consignments if selected for control
  • Enjoying preferential treatment at border crossings in post-disaster/post-attack situations
  • Enjoying a priority status in exporting to affected countries after a security incident

Group 4. Increased (positive) attention by the Customs administration

  • Privilege to deal with designated Customs contact points / assistance by Customs supply chain security experts
  • Privilege to receive training provided by Customs experts
  • Privilege to be notified of the intention to release goods prior to their arrival (“pre-clearance”)
  • Enjoying special treatment in some non-criminal legal cases
  • Privilege to exploit “extended Customs office opening hours”, during high peak / congestion times

Group 5. Increased number of other privileges granted by the Customs administration

  • Enjoying from tax privileges, such as speedier tax refunds and compensation
  • Enjoying the option to manage clearance formalities, inspections etc. at the business site
  • Enjoying from financial guarantee waivers, reductions or rebates
  • Privilege to self-manage the bonded warehouses
  • Enjoying tangible benefits due to mutual recognition agreements / arrangements (MRAs) with 3rd countries
  • Privilege to choose the place of controls (if selected for control)
  • Enjoying reductions on some Customs fees or charges
  • Privilege to conduct self-assessments when Customs automated systems are not functioning

And that’s about it! Please be reminded again that this CBRA Blog is just a first scratch on the surface to start publishing results from the WCO Cancun 2016 AEO conference… And by the way, we are also working to publish the results from the WCO Madrid 2014 AEO conference, as we have been waiting to publish the full results of the both conferences in a parallel manner / in a same paper. In the meanwhile, please email us any feedback, ideas and/or criticism regarding this Blog!

In Lausanne, 8 June 2016, CBRA Blog Dr. Juha Hintsa

Blog-080616-1

PS. Our earlier Blog with all the WCO Cancun 2016 AEO survey questions can be read at: https://www.cross-border.org/2016/05/08/aeo-benefits-or-no-benefits-thats-the/

PPS. Related literature by the Cross-border Research Association team and key partners:

Most of these papers are available for download at ResearchGate, https://www.researchgate.net/profile/Juha_Hintsa/publications . And all of them can be naturally requested by email ( cbra@cross-border.org )

Hintsa, J., Mohanty, S., Rudzitis, N., Fossen, C. and Heijmann, F. (2014), “The role and value of customs administrations in minimization of socio-economic negative impacts related to illicit import flows in freight logistics systems- three preliminary cases in Europe – FP7-CORE”, Proceedings of the 9th WCO PICARD Conference, September 17-19, 2014, Puebla.

Hintsa, J. (2013), AEO – MRA Study for RTC- Thailand Europe Cooperation TEC-II, PDSC: Implementation of international standards on Supply Chain Security leading to a secure Trade Environment and to increased Trade Facilitation (Activity Code : TRA 4), Final Report, Bangkok.

Urciuoli, L. and Ekwall, D. (2012), “Possible impacts of supply chain security certifications on efficiency – a survey study about the possible impacts of AEO security certifications on supply chain efficiency”, Proceedings of Nofoma Conference, June 6-8, 2012, Naantali.

Hintsa, J., Männistö, T., Hameri, A.P., Thibedeau, C., Sahlstedt, J., Tsikolenko, V., Finger, M. and Granqvist, M. (2011), Customs Risk Management (CRiM): A Survey of 24 WCO Member Administrations, Study for World Customs Organization (WCO), February 28, 2011, Lausanne

Hintsa, J., Hameri, A.P., Männistö, T., Lazarescu, M., Ahokas, J. and Holmström, J. (2010), ”Conceptual model for measuring benefits of security in global supply chains”, Proceedings of the the 3rd International Conference on Transportation and Logistics (T-LOG), September 6-8, 2010, Fukuoka City.

Hintsa, J., Ahokas, J., Männistö, T. and Sahlstedt, J. (2010), “CEN supply chain security (SCS) feasibility study”, CEN/TC 379 Supply Chain Security, Final report, January 15, 2010

Gutiérrez, X., Hintsa, J., Wieser, P. and Hameri, A.P. (2007), “Voluntary supply chain security program impacts: an empirical study with BASC member companies”, World Customs Journal, Vol. 1 No. 2, pp.31-48.

Gutierrez, X. and Hintsa, J. (2006), “Voluntary supply chain security programs: a systematic comparison”, Proceedings of the International Conference on Information Systems, Logistics and Supply Chain (ILS), May 15-17, 2006, Lyon.

AVIATION SECURITY – Progress Made, but Challenges Persist in Meeting the Screening Mandate for Air Cargo, GAO, March 2011 (CORE1062)

Summary: This GAO report reviews the recent progress of the US air cargo security scheme. The Transportation Security Administration (TSA), the main agency responsible for the US air cargo security, has been working towards the implementation of the 100% screening requirements of the 9/11 Commission Act of 2007. So far TSA has set up a voluntary Certified Cargo Screening Program (CCSP) to allow trusted logistics operators to screen air cargo outside congested airports, launched a program for testing technologies for air cargo screening and expanding its program for approving explosive detection dog teams. The main obstacle in meeting the 100% screening requirement is that TSA has no reliable mechanism for verifying screening data from domestic foreign screening operators, which self-report the data. TSA also struggles in finding resources to employ as many transport security inspectors as it is required to oversee the Certified Cargo Screening Program. The report also points out that the current technologies that TSA has approved for cargo screening cannot screen large cargo units – pallets or unit loading devices (ULDs) – and this incapability reduces speed and cost-efficiency of air cargo screening. Overall, this GAO document provides a general outlook on state and challenges the US air cargo security regime, and therefore those CORE demonstrations that focus on the US-bound or US-origin air transport should consider the report as a key source material. The report is available for download at: www.gao.gov/assets/130/125678.pdf.

[s2If is_user_logged_in()]

Full review: This document is relevant for the CORE demonstrations that involve air transportation into or through or from the US. Especially the DHL demo, that concentrates on shipping of military aircraft parts from the US to Spain, is affected by the TSA’s programs and initiatives that the report analyses. The report is very concise and informative, so it might be beneficial to the CORE’s educational and training activities.

Cross-references:

  • GAO, Aviation Security: Federal Coordination for Responding to In-flight Security Threats Has Matured, but Procedures Can Be Strengthened, (Washington, D.C.: July 31, 2007).
  • GAO, Aviation Security: Transportation Security Administration May Face Resource and other Challenges in Developing a System to Screen All Cargo Transported on Passenger Aircraft
  • GAO, Aviation Security: Federal Efforts to Secure U.S.-Bound Air Cargo Are in the Early Stages and Could Be Strengthened, GAO-07-660 (Washington, D.C.: April 2007).
  • GAO, Aviation Security: Progress Made in Systematic Planning to Guide Key Investment Decisions, but More Work Remains, GAO-07-448T (Washington, D.C.: February 13, 2007).

Additional keywords: Air cargo security, 100% screening, Certified Cargo Screening Program (CCSP)

 

CORE1062

[/s2If]

PORT SECURITY GRANT PROGRAM, Risk Model, Grant Management, and Effectiveness Measures Could Be Strengthened, GAO, November 2011 (CORE1060)

Summary: The Department of Homeland Security (DHS) has granted almost 1.7 billion USD to port security through the Port Security Grant Program (PSGP). The program is administered by a component agency of DHS, Federal Emergency Management Agency (FEMA). This GAO reports highlights some problems that the grant program has encountered. The first issue is that the risk assessment the FEMA uses to assess risk levels and assign grants to different ports does not take into account how security improvements affect the vulnerability of the ports to terrorist attacks. The report recommends the FEMA to design a vulnerability index that accounts for security improvement and to coordinate with the Coast Guard to get access to the most accurate vulnerability and threat information. The second issue with the grant program is that much of the grant money does not get used and translate into practical port security projects. The GAO report proposes acceleration of the grant granting process with updated administrative procedures and with more administrative staff.  Finally, this GAO report recommends the FEMA to develop performance metrics to assess its administration in relation to the Port Security Grant Program. The contents of this GAO report is not very relevant to CORE because no US seaports are partners in the project. The report is available for download at: www.gao.gov/assets/590/587142.pdf.

[s2If is_user_logged_in()]

Full review: This document has only a limited relevance for CORE because the consortium does not involve any US seaport operators. The demonstrations of WP9 and WP14 that cover shipping of goods from and into the US through local seaports might find it useful to learn about how US ports can apply for funds to improve the security. Otherwise, other demonstrations do not benefit much of this information. However, the CORE’s risk cluster can benefit from the rather detailed description of the risk analysis model in the report’s Appendix II.

Cross-references:

  • Maritime Security: Actions Needed to Assess and Update Plan And Enhance Collaboration among Partners Involved in Countering Piracy off the Horn of Africa. GAO-10-856. Washington, D.C.: September 24, 2010.
  • Critical Infrastructure Protection: Update to National Infrastructure Protection Plan Includes Increased Emphasis on Risk Management and Resilience. GAO-10-296. Washington, D.C.: March 5, 2010.
  • Quadrennial Homeland Security Review: 2010 Reports Addressed Many Required Elements, but Budget Planning Not Yet Completed. GAO-11-153R. Washington, D.C.: December 16, 2010.

Additional keywords: Critical infrastructure protection (CIP), maritime security and security of supply, Port Security Grant Program (PSGP)

 

CORE1060

[/s2If]

SUPPLY CHAIN SECURITY – CBP Needs to Enhance Its Guidance and Oversight of High-Risk Maritime Cargo Shipments, GAO, January 2015 (CORE1059)

Summary: The report reviews the US Customs and Border Protection’s (CPB) approach to risk assessment and targeting of maritime shipping containers. The report’s highlights that CPB does not have clear decision rules and reporting procedures to monitor percentage of containers that the risk assessment system flags high-risk and that get eventually examined. The source of this problem is that the CPB’s officials (targeters) may waive examination of the high-risk containers if the container (i) falls within a predetermined category (standard exception), or (ii) the targeters can articulate why the shipment should not be considered high risk. The targeting units have currently differing definitions of “standard exceptions” and differing views on what constitutes the “articulate reasons.” The GAO report recommends the CPB to clarify, harmonize and enforce the rules and the procedures for waiving the high-risk containers from examination. As for CORE, this report provides a detailed and recent outlook on the US maritime risk assessment and targeting scheme, and this information is going to support work of the CORE’s risk cluster and the demonstrations that involve shipping of sea containers into the US. The report is available for download at: www.gao.gov/assets/670/668098.pdf.

[s2If is_user_logged_in()]

Full review: This GAO reports contains crucial information about the US risk assessment and container targeting systems that benefit the CORE’s risk cluster. The report outlines principles, procedures, datasets and scanning methods that constitute the world’s most advanced risk assessment system for maritime shipping containers. The CORE’s IT cluster might also benefit from the report’s description of the CPB’s Automated Targeting System (ATS) that is used to compute risk scores for shipping containers and flag the ones with the highest score as high-risk. Regarding the CORE demonstrations, the GM demon (WP19) must comply with data requirements (24-hour rule and the “10+2” rule) that enable the US risk assessment and targeting system. Also the demos involving customs controls, especially WP11.2 and WP10.1, may learn something from the ways how the US border control authorities are assessing risk levels of incoming containers.

Cross-references:

  • Supply Chain Security: CBP Needs to Conduct Regular Assessments of Its Cargo Targeting System. GAO-13-9. Washington, D.C.: October 25, 2012.
  • Maritime Security: Progress and Challenges in Key DHS Programs to Secure the Maritime Borders. GAO-14-196T. Washington, D.C.: November 19, 2013.
  • Supply Chain Security: Feasibility and Cost-Benefit Analysis Would Assist DHS and Congress in Assessing and Implementing the Requirement to Scan 100 Percent of U.S.-Bound Containers. GAO-10-12. Washington, D.C.: October 30, 2009.

Additional keywords: Security Filing and Additional Carrier Requirements (known as the 10+2 rule), 24-hour rule, risk assessment

 

CORE1059

[/s2If]

TRANSPORTATION SECURITY INFORMATION SHARING – Stakeholder Satisfaction Varies; TSA Could Take Additional Actions to Strengthen Efforts, GAO, June 2014 (CORE1020)

Summary: This report presents and discuses findings of a survey on stakeholders’ satisfaction to the US Transportation Security Administration’s security-related activities and to the way the TSA disseminates information about its activities. The survey’s scope is the overall US transportation system, covering aviation, rail, and highway modalities and transport of passengers and freight. Given the broad scope and the US-centricity of the survey, this report is not very relevant for CORE. The education and training cluster could anyhow learn how security-related user satisfaction surveys are done and how to establish a mechanism for collecting regular user feedback. The report is available for download at: http://gao.gov/assets/670/664350.pdf.

[s2If is_user_logged_in()]

Full review: The scope of the report is very broad and the information about cargo security is limited, so the CORE project cannot much benefit from this report. However, the project’s educational and training cluster might use the report’s information to design ways administer end-user surveys: what questions to ask, which stakeholders to survey and how to report the findings. Some demonstrations adopt some of the report’s ideas and methods to collect high-quality user requirements.

Additional keywords: Transportation security, aviation security

 

CORE1020

[/s2If]

MARITIME SECURITY – Progress and Challenges with Selected Port Security Programs, GAO, June 2014 (CORE1019)

Summary: The report provides a comprehensive review of progress and challenges of various port security activities and programs the Department of Homeland Security (DHS) has carried out since 9/11. In essence, the report is a summary and an update of a number of more detailed GAO reports on maritime supply chain security. The report states that needs to strengthen further its efforts on maritime domain awareness through intensified communication among maritime stakeholders. Regarding the US domestic port security, the report recommends DHS to reassess its Port Security Grant Program (PSGP) that allows ports to request funds for security projects and to improve quality of vulnerability assessment in US ports. The report also urges DHS to overcome challenges of risk-based targeting and scanning of US-bound shipping containers.  The findings and recommendations of this report help CORE consortium understand the current state of the US maritime security regime. This understanding benefits particularly the demonstrations of WP9 and WP14. Also educational and training as well as risk clusters of CORE may find the report’s information useful. The report is available for download at: www.gao.gov/assets/670/663784.pdf.

[s2If is_user_logged_in()]

Full review: This GAO document summarizes the US maritime supply chain security and provides useful information for the CORE project across its work packages. This information most obviously benefits WP9 and WP14 that involve US-bound maritime trade lanes. However, also the CORE’s risk cluster can find useful insight in the report, for example about challenges and opportunities of risk-based container targeting and screening approaches. This summary GAO document caters the needs of state-of-the-art work packages and the CORE’s educational and training cluster that aims to produce relevant and up-to-date material about supply chain security for a variety of stakeholders.

Cross-references:

  • Combating Nuclear Smuggling: Additional Actions Needed to Ensure Adequate Testing of Next Generation Radiation Detection Equipment. GAO-07-1247T. Washington, D.C.: September 18,
  • Supply Chain Security: CBP Has Made Progress in Assisting the Trade Industry in Implementing the New Importer Security Filing Requirements, but Some Challenges Remain. GAO-10-841. Washington, D.C.: September 10, 2010.
  • Supply Chain Security: CBP Needs to Conduct Regular Assessments of Its Cargo Targeting System, GAO-13-9. October 25, 2012.

Additional keywords: Maritime security, Port Security Grant Program (PSGP), risk-based controls, targeting, container scanning

 

CORE1019

[/s2If]