AVIATION SECURITY – Transportation Security Administration Has Strengthened Planning to Guide Investments in Key Aviation Security Programs, but More Work Remains, GAO 2008 (CORE1067)

Summary: This GAO report discusses the impact of the 26 billion USD that the Transportation Security Administration (TSA) has spent on aviation security since 2004. The report focuses especially on the current status and the future challenges of passenger screening, air cargo security and passenger watch-list matching program known as Secure Flight. The air cargo security discussion is the report’s most relevant section from the CORE’s viewpoint. The information in the report, that has been published as early as July 2008, is anyhow largely outdated: it discusses challenges that TSA and the air cargo community need to overcome before starting the 100% screening of air cargo that flies on board passenger planes, a legal requirement that become into force in August 2010 and that was set by the Implementing Recommendation of the 9/11 Commission Act of 2007 (aka the 9/11 Act). The report also recommended strengthening the security of US-bound foreign air cargo (into the US from the rest of the world), to bring it on a par with outbound air cargo security (from the US to rest of the world). More recent regulations and initiatives have corrected this weakness in the US air cargo security: today, third country air carriers must screen cargo up to US standards (or national standards if the country of origin and the US recognize each other’s air cargo regimes) before loading cargo on US-bound planes. The source document is available at: http://www.gao.gov/products/GAO-08-1024T.

[s2If is_user_logged_in()]

Full review: This GAO report provides useful background information about the US air cargo security regime. This information is going to be useful for the CORE demonstration 17.1 that is about time-critical express shipping of military aircraft parts from the US to Spain. In the demonstration, the express operator DHL ships the parts by plane, and thus compliance with the US air cargo security requirements is one of the key themes of this demo. Also WP 1 might use this GAO report to describe evolution of the US air cargo regime over the years. But though this analysis would be interesting, it is not going to be the essential content in the deliverable of the WP1.

 Cross-references:

  • GAO, Aviation Security: Federal Coordination for Responding to In-flight Security Threats Has Matured, but Procedures Can Be Strengthened, (Washington, D.C.: July 31, 2007).
  • G_A_O_, Aviation Security: Transportation Security Administration May Face Resource and other Challenges in Developing a System to Screen All Cargo Transported on Passenger Aircraft
  • GAO, Aviation Security: Federal Efforts to Secure U.S.-Bound Air Cargo Are in the Early Stages and Could Be Strengthened, GAO-07-660 (Washington, D.C.: April 2007).
  • GAO, Aviation Security: Progress Made in Systematic Planning to Guide Key Investment Decisions, but More Work Remains, GAO-07-448T (Washington, D.C.: February 13, 2007).

Full citation:

U.S. Government Accountability Office (GAO), 2008. Aviation Security – Transportation Security Administration Has Strengthened Planning to Guide Investments in Key Aviation Security Programs.

CORE1067

Additional keywords: Air cargo security, Certified Cargo Screening Program (CCSP)

[/s2If]

SUPPLY CHAIN SECURITY: Feasibility and Cost-Benefit Analysis Would Assist DHS and Congress in Assessing and Implementing the Requirement to Scan 100 Percent of U.S.-Bound Containers, GAO (October 2009, CORE1066)

Summary: The document provides a comprehensive outlook on the past and recent US initiatives on container security. The report focuses on the challenges that prevent global implementation of the 100% scanning of US-bound containers in foreign ports with both non-intrusive inspection (NII) technologies and radiation detection devices, as mandated by the SAFE Port Act and the 9/11 Acts. The 100% scanning is believed to deter and detect terrorist attempts of smuggling weapons of mass destruction (WMD) into the United States inside a cargo container. The reports dates back to late 2009, so the description of the current state of the US container security it provides is not necessarily no longer accurate. The report anticipates that the implementation of the 100% scanning requirement will be delayed due to various problems that were identified during the precursory Secure Freight Initiative (SFI) pilots. These problems are related mainly to port logistics (routing of containers through scanning sites), employee safety (radiation of screening equipment) and technical constraints (equipment failures and poor quality of scanning images). Today, we know that the US authorities have deferred the implementation already twice, first to 2014 and for the second time until 2016. Altogether, this GAO report describes in detail the challenges of the 100% scanning law and elaborates some ongoing alternative risk-based approaches to container security: (1) the strategic trade lane strategy that aims to establish 100% scanning only in high terrorist risk foreign sea ports and (2) the “10 + 2” data requirements that importers and ocean carriers must submit to the US Customs and Border Protection (CBP) prior to a container is loaded aboard a US-bound vessel so that the US authorities can calculate more precise risk for each shipping container. This report includes relevant information for all the CORE’s demonstrations that involve US-bound maritime transportation. The source document is available at: http://www.gao.gov/products/GAO-10-12.

[s2If is_user_logged_in()]

Full review: The GAO document provides interesting insights on the evolution of the US container security regulations over the years. This is useful supportive information for CORE demonstrations that involve maritime shipping of containers into the US. The GM demonstration of the WP9 for example covers exports of automobile parts from the EU into the US by transatlantic ocean transport. If the US Congress does not repeal or defer the 100% scanning requirement, the port of Felixstove that participates in the demonstration, need to start scanning also all GM’s US-bound containers. Likewise, the FALACUS demo (WP14), which is about shipping of ceramic tiles from Italy to the US, must take into consideration the possible effects of the 100% scanning requirement. This demonstration is particularly interesting from the 100% scanning requirement standpoint because some ceramic tiles are naturally radioactive, and thus they tend to trigger false alarms in the radiation controls. Also the P&G demonstrator in the WP17, that focuses on shipping of consumer goods into the US, the possible impact of the 100% scanning regulation.

Besides the demonstrations, the CORE’s risk cluster might benefit from the detailed analysis of the risk-based approaches to the US container security, such as the strategic trade lane strategy and the “10 + 2” data requirement. All demonstrations might benefit from lessons learnt how GAO has advises DHS and CBP to carry out cost-benefit analyses for the US container security programs (especially the Secure Freight Initiative).

Cross-references:

  • Combating Nuclear Smuggling: Efforts to Deploy Radiation Detection Equipment in the United States and in Other Countries. GAO-05-840T. Washington, D.C.: June 21, 2005.
  • Container Security: A Flexible Staffing Model and Minimum Equipment Requirements Would Improve Overseas Targeting and Inspection Efforts. GAO-05-557. Washington, D.C.: April 26, 2005.
  • Bakshi, N., Flynn, S. E., & Gans, N. (2011). Estimating the operational impact of container inspections at international ports. Management Science, 57(1), 1-.‐‑20.

Full citation:

U.S. Government Accountability Office (GAO), 2009. Supply Chain Security Feasibility and Cost-Benefit Analysis Would Assist DHS and Congress in Assessing and Implementing the Requirement to Scan 100 Percent of U.S.-Bound Containers.

CORE1066

Additional keywords: Ocean transportation, counter-terrorism, non-intrusive inspection

[/s2If]

Review on Consideration and Adoption of Amendments to the International Convention for the Safety of Life at Sea, 1974, International Maritime Organization (CORE1097)

Summary: The International Ship and Port Facility Security (ISPS) Code sets new standards for security for ships at sea as well as port facilities around the world. It aims to make shipping activities more secure against threats of terrorism, piracy and smuggling. Security at sea has been a concern to governments, shipping lines, port authorities and importers and exporters for years. The terrorist attacks of September 11, 2001, however, provided the catalyst for formalizing tough new security measures. In December of 2002, the International Maritime Organization (IMO) a specialized agency of the United Nations (UN) organized a conference to discuss issues related to security at sea. At this conference, representatives from 150 nations (the Contracting Governments) participated in drafting amendments to the Safety of Life at Sea (SOLAS) Convention, and the ISPS Code was adopted. Changes to the SOLAS Convention include amendments to Chapters V and XI, and Chapter XI was divided into Chapters XI-1 and XI-2. The new Chapter XI-2 provides the umbrella ISPS regulations. The Code itself is divided into two parts. Part A presents mandatory requirements, Part B contains guidance regarding the provisions of Chapter XI-2 of the Convention and part A of the Code. Source document is available at: http://www.un.org/en/sc/ctc/docs/bestpractices/32.pdf

[s2If is_user_logged_in()]

Full review: The Code aims, among other things, to establish an international framework for co-operation between Contracting Governments, government agencies, local administrations and the shipping and port industries to detect security threats and take preventive measures against security incidents affecting ships or port facilities used in international trade and to establish relevant roles and responsibilities at the national and international level. ISPS provisions relating to port facilities relate solely to the ship/port interface. Also, ISPS provisions do not extend to the actual response to attacks or to any necessary clear-up activities after such an attack. In addition, for each ship and port authority affected, the ISPS Code requires:

  • The implementation of a Ship Security Plan (SSP),
  • The implementation of a Port Facility Security Plan (PFSP),
  • The appointment of a Ship Security Officer (SSO),
  • The appointment of a Company Security Officer (CSO),
  • The appointment of a Port Facility Security Officer (PFSO),
  • The installation of ship alarms, and
  • The installation of shipboard Automatic Identification Systems (AIS).

Enforcement Date: The ISPS Code went into effect on July 1, 2004.

Full citation:   Consideration and Adoption of Amendments to the International Convention for the Safety of Life at Sea, 1974, International Maritime Organization. SOLAS/CONF.5/32. 12 December 2002

CORE1097

Keywords: Maritime Security, Port Security, Ship Security Plan (SSP), Port Facility Security Plan (PFSP), Ship Security Officer (SSO), Port Facility Security Officer (PFSO), International Maritime Organization (IMO), Safety of Life at Sea (SOLAS).

[/s2If]

Dr. Federico Magalini on waste logistics crime

Hi Federico, and thanks for agreeing to join a CBRA Interview, as the first expert in year 2016 – can you first tell a bit who are you and what you do?

Thank you for the opportunity of sharing some of the past experiences and projects done, including those with CBRA and looking ahead into the next years. I’m a mechanical engineer as background, with a PhD in Management, Economical and Industrial Engineers and I am working as Associate Programme Officer at United Nations University – Vice-Rectorate in Europe. I’m in particular working for SCYCLE, SCYCLE operating unit of the UN University Institute for the Advanced Study of Sustainability.

Can you explain more on what is the United Nations University, UNU?

UNU is, despite the name, not a classical university as many might think. The United Nations University (UNU) is a global think tank and postgraduate teaching organization headquartered in Japan. The mission of the UN University is to contribute, through collaborative research and education, to efforts to resolve the pressing global problems of human survival, development and welfare that are the concern of the United Nations, its Peoples and Member States. We work a lot with leading universities and research institutes in various countries, functioning as a bridge between the international academic community and the United Nations system. Our operating unit SYCLE is particularly devoted to research in the field of electronic waste.

UNU, INTERPOL, CBRA and other partners finished few months ago a 2-year research project on electronic waste crime and non-compliance, the FP7-CWIT –project. From your perspective, what were the most important outcomes of that project?

The CWIT project contributed in my opinion to increase the general understanding of volumes of electronic waste annually arising in different EU Member States and the fate of the disposed equipment. Knowing the baseline of products annually discarded by EU citizens is a first, fundamental step to allow policymakers and stakeholders at large to develop a strategy to ensure proper collection and treatment. In addition to that the project described the main drivers behind the flows diverted from the actual take back and recycling systems across the EU.

A second important outcome of the project is the analysis and identification of the main crime patterns that are typical of such an Industry: in the illegal trade of WEEE, there is a varying degree of compliance and criminality that spans across a continuum ranging from minor unintentional violations or non-compliance by individuals to deliberate illegal activities following a criminal business model. The organisational structure differs by country and region, from individual traders to structured criminal groups.

The combination of those two elements – knowledge of the market and understanding of criminal behaviours – allowed drawing a roadmap for future improvement in compliance and enforcement.

Do you believe that some of the CWIT outcomes will have practical positive impacts to reduce future crime and non-compliance, in the broader context of e-waste handling and management?

I sincerely hope so. And I am sure this will happen. To which extent is hard to predict but in the second part of the project we really focused on how to derive practical recommendations for the various actors involved along the entire value chain. And we broadly discussed the ideas, in many cases deriving from real cases and best practices, with various stakeholders; I hope this will increase the likelihood of having some of the recommendations actually implemented.

We committed ourselves to disseminate the recommendations beyond the project duration and we have seen already some results, with the project findings being discussed in various fora, conferences and public events, including some internal meeting with EC officials. And we have seen official request from some Members of the EU Parliament, who quizzed the EC on the consequences of the CWIT project, challenging here to take concrete actions.

Now we are launching a new project called DOT.COM WASTE – with several CWIT partners, and few new partners. You are the project manager for this “CWIT follow-up” –project, congratulations on that. Can you please explain what this new project aims to achieve?

I am really happy of the DOT.COM waste project as combines some of the results of the CWIT project, particularly the recommendation on the need of better training of enforcement and prosecutors in one of the main areas of my personal interest and work at UNU: capacity building. The DOT.COM WASTE project seeks to increase the capabilities of law enforcement agencies, customs and port authorities, environmental agencies and prosecutors to fight cross-border waste crime more cost-effectively. To achieve this objective, the project aims to increase the stakeholders’ understanding of current waste crime trends and to identify and share good practices for detecting, investigating and prosecuting waste crime activities.

Which aspect of the DOT.COM WASTE project you see as the most challenging one?

I see two main challenges ahead for the DOT.COM WASTE project. The first one is related to the scope of the project itself: there are many waste streams and the challenges of different streams are different. As a consequence also the tools to tackle illegal activities might vary: we will have to identify the priorities in order to be effective.

The second one is related to the duration of the project; the project will translate the knowledge gained into training material and tools and will promote training sessions to help key stakeholders integrate good practices into their day-to-day operations. The project’s underlying objective is to intensify international collaboration through development and implementation of new mechanisms for information exchange, technology transfer and operational coordination. But I really hope that all those efforts will produce effects that will last longer than the two years of the project itself.

I sincerely hope that we will be able to make the difference here!

Thanks a lot Federico for this interview – and talk to you soon at the DOT.COM WASTE kick-off meeting.

Introduction to Supply Chain Management (CASSANDRA Compendium Chapter 2, CORE2007a)

Summary

The second chapter of the CASSANDRA compendium gives a general outlook on the theory and practice of modern supply chain management. Written in lay-man’s language, the text explains a broad range of strategies for managing supply chains, from lean management to agile and responsive logistics. The chapter also defines fundamental supply chain terminology and discusses current trends in the logistics, including synchromodality, use of 4PL logistics service providers, and green logistics. The chapter introduces several supply chain reference frameworks that illustrate a series of interdependent activities and stakeholders involved in the international transport of cargo. The CASSANDRA compendium is available for download here.

Review by Toni Männistö (CBRA)

[s2If is_user_logged_in()]

Full review

The compendium summarizes the SCOR and UN/CEFACT supply chain models, that may be the two most used logistics reference frameworks in the world. The document also discusses less known academic conceptual models that seek to simplify the complexity of supply chain management by categorizing and explaining management strategies, activities, stakeholders and their roles and responsibilities. The section on the future trends in logistics offers a great outlook on the most likely changes and driving forces in the logistics industry. The outlook suggests that for example synchromodality (increased flexibility in transport mode selection), green logistics (less emissions), use of 4PL logistics service providers (outsourced supply chain management), and continuously increasing ship and port sizes will reshape the cross-border logistics over the years. The document also explains key CASSANDRA concepts and their impacts on international supply chain management. For instance, the Data Pipeline, a pivotal CASSANDRA concept, seeks to enhance sharing of information across supply chain stakeholders, in particularly from business operators to customs and other border control authorities. Most importantly, the Data Pipeline would allow customs officers to access commercial information, that normally is exchanged only between buyers and sellers, early in the upstream supply chain at the consignment completion point (CCP). This accurate, early commercial information would enable the customs and other border control agencies to assess security and other risks of cargo early on.

All in all, the document provides a crash refresher course on basic and advanced logistics terminology that would be beneficial for many the CORE consortium, especially for those partners whose expertise is mainly outside the logistics industry. The CORE demonstrators benefit from descriptions of CASSANDRA innovations that support information exchange and improve visibility across the supply chain. The demos might choose to reuse some of these CASSANDRA innovations or their components. The CASSANDRA compendium also contains a great deal of material that could be reused for education and training purposes in CORE (WP19). Finally, the chapter concludes with recommendations that are relevant also for CORE. The chapter recommends, for example, that because of broad variety of international supply chains, CASSANDRA solutions should be adaptable for different contexts.

Reference

Hintsa, J. and Uronen, K. (Eds.) (2012), “Common assessment and analysis of risk in global supply chains “, Compendium of FP7-project CASSANDRA, Chapter 2

CORE2007

[/s2If]

Trade and money laundering uncontained (the Economist, May 2014, CORE2006)

Summary

International trade is becoming one of the main instruments for cross-border money laundering aside common bank transfers, remittances and cash smuggling. The ”trade-based money laundering” disguises illegal trading as seemingly legitimate commercial transactions. The most common technique is mis-invoicing in which fraudsters undervalue imports or overvalue exports to repatriate ill-gotten money from abroad. For example, official records show that Mexican exports to US are much higher than the US imports from Mexico, a discrepancy that signs fraud by Mexican criminals, most likely drug cartels. In general, the trade-based money laundering offers new financial tools for a broad range of drug traffickers, arms smugglers, corrupt politicians, terrorists and evaders of taxes, duties and capital controls. Review by Toni Männistö (CBRA)

[s2If is_user_logged_in()]

Full review

International trade is becoming one of the main instruments for cross-border money laundering aside common bank transfers, remittances and cash smuggling. The ”trade-based money laundering” disguises illegal trading as seemingly legitimate commercial transactions. The most common technique is mis-invoicing in which fraudsters undervalue imports or overvalue exports to repatriate ill-gotten money from abroad. For example, official records show that Mexican exports to US are much higher than the US imports from Mexico, a discrepancy that signs fraud by Mexican criminals, most likely drug cartels. In general, the trade-based money laundering offers new financial tools for a broad range of drug traffickers, arms smugglers, corrupt politicians, terrorists and evaders of taxes, duties and capital controls.

The new methods for cross-border money laundering and tax evasion concern most CORE demonstrations, especially those involving international cargo movements. The emerging risk of trade-based money laundering calls for new and more effective enforcement of trade transactions. CORE is developing new solutions (e.g., data pipeline and system-based supervision) for capturing and sharing trade information across logistics operators and law enforcement agencies. The new solutions likely improve law enforcement’s capability to detect suspicious trade transactions that may have something to do with the trade-based money laundering. However, building such capability requires IT integration (e.g., interoperability), risk awareness and education and training. CORE consortium addresses these complementary activities in work carried out in risk, IT and educational clusters.

Reference

Trade and money laundering uncontained, the Economist, May 3rd 2014

CORE2006

[/s2If]

CORE Information Observatory

cbra_blog_post_040116Please visit FP7-CORE Information Observatory . If you find it useful for your work, please consider registering to become a regular CORE Observatory user and to receive the CBRA Monthly Newsletter!

On behalf of the whole CBRA-team – Sangeeta, Susana, Susan, Phan Hien, Toni, Vladlen, Duayner, Perttu, Matti, Ari-Pekka, Ninoslav, Peter, Andrew, Harri x 2, and David x 2 (https://www.cross-border.org/team/ ) – I would like to wish you the best of success for the year 2016, in your professional as well as private life. In the context of global supply chains, we are ready to work with you towards faster and more predictable global logistics, naturally combined with low crime rates and with high compliance rates. One great tool to support such “common industry-government-academia global supply chain mission” is our new media platform – the recently launched FP7-CORE Information Observatory, which you can find at: https://www.cross-border.org/core-observatory/core-observatory-full-list/

CORE Observatory gives you 10-20 regular reviews and updates per month on supply chain security and trade facilitation policies, regulations, standards, good practices, roadmaps, research papers etc. – for the benefit of FP7-CORE partners, and beyond. Our primary focus is currently on European Union and its main trading partners – global expansion is possible later, depending on user needs and priorities. Each CORE Observatory entry has a title and a summary, visible to every user. At the end of the summary we provide a URL for the source document, whenever an electronic version is available in public domain. Starting 1 January 2016, the title and summary are also translated to Spanish. New languages (e.g. French, Arabic or Russian) may be offered later in 2016 depending on user preferences. The full review text is available only for the registered users, who will also receive the CBRA Monthly Newsletter, tailored to their personal information needs and interests. The CORE Observatory entries are listed in chronological order, the latest entry appearing on the top of the list. Any user – registered or not – can search CORE Observatory entries either via pre-defined keywords and tags (most common ones listed on the right side of the web page), or via free text search.

Again, Happy New Year 2016 everyone – and looking forward to having many new visitors at the FP7-CORE Information Observatory!

Yours, Juha

Punta Cana Resolution, Resolution of the Policy Commission of the World Customs Organization on the Role of Customs in the Security Context, WCO 2015 (CORE2004)

The new Punta Cana Resolution sets guidelines for customs’ security roles in the combat against the new wave of terrorism, as manifested by recent attacks in Tunisia, Turkey, Lebanon, France and Mali. The resolution highlights that the customs authorities are typically the first line of defense against transnational crime, terrorism and extremism: the customs control cross-border movements of people, cargo, money and modes of transport and thus protect communities against terrorists that may exploit international supply chains to move materials, funds or operatives across borders. Building on the previous WCO instruments and agreements, especially on the WCO Security Programme, the Punta Cana resolution is the customs community’s action plan and renewed pledge of solidarity that provides a diplomatic backdrop for further counterterrorism activities. More information at: http://www.wcoomd.org/en/media/newsroom/2015/december/wco-issues-the-punta-cana-resolution.aspx

[s2If is_user_logged_in()]

Full review

The new Punta Cana Resolution sets guidelines for customs’ security roles in the combat against the new wave of terrorism, as manifested by recent attacks in Tunisia, Turkey, Lebanon, France and Mali. The resolution highlights that the customs authorities are typically the first line of defense against transnational crime, terrorism and extremism: the customs control cross-border movements of people, cargo, money and modes of transport and thus protect communities against terrorists that may exploit international supply chains to move materials, funds or operatives across borders. Building on the previous WCO instruments and agreements, especially on the WCO Security Programme, the Punta Cana resolution is the customs community’s action plan and renewed pledge of solidarity that provides a diplomatic backdrop for further counterterrorism activities.

The Punta Cana resolution encourages customs administrations worldwide to intensify collaboration within the customs community and with other border control agencies, both domestically and internationally. In case of missing or obsolete counter-terrorism strategy, the resolution urges customs to add new security roles in their mandates and activities. The Punta Cana document also recommends customs to pay close regard to the WCO’s previous agreements and instruments, such as the WCO Compliance and Enforcement Package, SAFE Framework of Standards and the WCO Security Programme. At more practical level, the resolution promotes the use of the full range of modern detection and investigation techniques, especially advance risk profiling on the basis of Advance Passenger Information (API) and Passenger Name Record (PNR). The resolution also calls governments from around the world to provide necessary financial and human support so that their national customs administrations can contribute towards the goals of the WCO Security Programme.

The Punta Cana Resolution informs CORE consortium about the changing risk landscape where the threat of transnational terrorism is high again. The Resolution also reminds the CORE’s risk cluster of the three cornerstones of effective border security management: collaboration, technology and human resources. The Punta Cana document also gives an overlook on the customs’ security priorities over the following years. For example, the global customs community will likely invest a great deal of time and money to develop new risk profiling systems that tap into new data sources such as the Advance Passenger Information (API) and Passenger Name Record (PNR). The same trend towards better risk profiling is likely to define also the future cargo security efforts at the borders.

Reference: WCO, 2015. Punta Cana Resolution, Resolution of the Policy Commission of the World Customs Organization on the Role of Customs in the Security Context.

CORE2004

[/s2If]

IT-enabled Resilient, Seamless and Secure Global Supply Chains: Introduction, Overview and Research Topics, Lecture Notes in Computer Science, by Klievink, B., Zomer, G., 2015 (CORE2003)

Summary: How does IT innovation contribute towards development of secure, resilient and integrated international supply chains? This is the question that Bram and Zomer seek to address by examining research agendas of a set of past and present European supply chain projects. In their research paper, these authors identify three main areas of innovation – technology, supply chain risk concepts and collaboration and supervision concepts – that lead the way towards higher uptake of new IT technologies and services in the global supply chains. The authors argue that developers of modern IT-enabled supply chains should pay more regard on non-technical challenges that often hinder adoption of modern IT solutions. The study also introduces and discusses five research papers that will be presented at the fourth Workshop on IT-enabled Resilient, Seamless and Secure Global Supply Chains, WITNESS 2015. The full paper will be available in public domain by fall 2016.

[s2If is_user_logged_in()]

Full review: The paper provides a comprehensive outlook on innovation agendas that present EU 7th framework supply chain projects follow. The study summarises CORE’s innovation goals and clarifies definitions and purposes of CORE key concepts such as the system-based supervision, supply chain resiliency and advanced data capture and sharing mechanisms. Therefore, the paper strengthens the conceptual basis of the CORE’s IT and risk management clusters. The CORE demonstrations will benefit from the paper indirectly if the IT and risk clusters refine the paper’s ideas and findings into applicable concepts that could be implemented in the demonstrations. The paper highlights three main areas of innovation that will likely improve security, resiliency and efficiency of the global supply in the future:

Technological innovation – The technological innovation focuses largely on IT-enabled capture and sharing of data among operators who are involved in end-to-end supply chains. Timely sharing of relevant and quality data is believed to support secure and efficient supply chain management because such data helps supply chain actors to detect faster logistics contingencies and disruptions and react to them. The higher data availability also supports use of modern sensor, track & trace and cargo screening technologies. For example, better information about cargo flows allow customs administrations to focus their screening activities on high-risk cargo.

Risk concepts – The data availability leads to higher visibility over the supply chain and empowers supply chain actors to regain control over cargo. The increased control helps the supply chain actors to detect faster to operational contingencies and disruptions.

Collaboration and supervision models – Risk-based approach to customs inspections is a departure from the 100% screening philosophy, under which every single shipment faces inspection. The modern risk-based approach disrupts less cross-border trade and commerce than the 100% screening because customs (and other border control agencies) select only a percentage of shipments, those that represent the highest risk, to inspection. Another new concept is system-based supervision, an approach that seeks to assess traders’ internal controls of customs compliance rather than conducting transaction-driven

Reference: Klievink, B., Zomer, G., 2015. IT-enabled Resilient, Seamless and Secure Global Supply Chains: Introduction, Overview and Research Topics, Lecture Notes in Computer Science (pp. 443-453)

CORE2003

[/s2If]

New approaches to border management

Today we discuss with Mr. Anthony Barone how to modernize border management techniques. Mr. Barone is a writer and adjunct professor. He has served at the WCO and American Federal Advisory bodies and held senior positions in both the industrial and logistics industries most recently at Pfizer.

Tony, it seems that we are living in a fairly dangerous world today. Threats to society arise from globalized terrorism, organized crime and individual criminal acts, such as the commission of fraud. How do border management techniques address these threats?

Not very well, I’m afraid. Border management techniques that are used today to identify and interdict criminal activities are based on technologies and concepts that are out of date. They cause unpredictability in supply chains, discriminate against smaller companies and opportune official corruption.

The absence of real time information exchange between countries, and even within countries among different departments of border management, is complicating the inherent challenges faced by border management authorities. Unfortunately crime has globalized, but law enforcement has not.

The supply chains are internationalizing rapidly, so all nations need to find ways that facilitate legitimate trade and simultaneously disrupt criminal activity hidden in commercial supply chains. Can emerging technologies be the solution?

Newly emerging technologies present both new threats and new opportunities. Threats arise from the criminal use of new technologies such as the use of social media by terror organizations and bitcoin money exchange by drug cartels. Opportunities to leverage technology arise from the ubiquitous use of integrated supply chain technology within the private sector, relatively inexpensive cloud based processing capabilities and a variety of hardware developments, such as Machine to Machine data processing or Internet of Things.

Emerging technologies may make it possible to accomplish the dual goals of facilitation and security, but certain prerequisites must be addressed in order for such solutions to succeed. The innovations must benefit both the private sector and governments in several different ways. There must be real economic value in transformative strategies. Political leadership must see a match to public policy goals and developers must see profit opportunity in the development of tools.

As you said, various public and private stakeholders may have different interests and priorities, and on top of this private citizens have increasing and legitimate privacy concerns. What should we do that real issues are accommodated despite these potentially contradictory goals?

The importance of engaging the private sector as agents of change cannot be understated. Both goods shippers and logistics service providers must find benefit through significantly reduced costs. And those savings must outweigh out-of-pocket investments that are needed to achieve them.

Articulating possible solutions faces significant headwinds. Among these are the investments made in current practices on both the private and public side. Reluctance to change is further bolstered by financial considerations including possible costs of transformation and the loss of revenue derived from existing systems.

Additionally, authorities charged with these responsibilities may feel threatened by criticism of programs they administer. Importers and exporters may fear reprisal from authorities. Trade associations may be too dependent on access to authorities to seriously challenge extant programs. Without a political constituency and given these challenges, introducing and implementing game changing ideas will be difficult.

So, what would you propose to modernize border management techniques? It seems to require radically transformative ideas.

I propose that we get together a group of independent experts who are willing to explore radically new approaches to border management. They would be tasked to investigate how supply chain facilitation as an open source capability could simultaneously block criminal activity and reduce the costs of border administration. They should consider both private and public sector effects and have a global focus so that all nations can benefit from their work.

Thank you, Tony, for the interview. CBRA team is interested to join the group of independent experts you suggested – hopefully we can get together on this, already during the first couple of months in 2016!