Supply chain security orientation: conceptual development and a proposed framework (Autry and Bobbit 2008)

Summary

Even though supply chain security has become an increasingly important managerial domain, there is little understanding about what security aware firms are, what enables and drives security awareness, and what are the outcomes of supply chain security (SCS) orientation. Autry and Bobbit (2008) set out conceptualize, validate and operationalize the construct of SCS orientation. Based on 31 interviews with US-based managers, they conclude that SCS orientation comprises four general categories of security solutions: security preparation and planning, security-related partnerships, organizational adaptation and security-dedicated communications and technology. The authors write that these security solutions “could result in supply chain risk management-related efficiencies, such as decreased lead times to customers, greater product reliability, waste reduction, and increased delivery reliability, due to the lessened need for operations workers to perform security-related tasks such as redundant container checking, securing shipments, or other similar tasks.” The abstract is available at: http://www.emeraldinsight.com.

Review by Toni Männistö (CBRA) based on his doctoral thesis.

[s2If is_user_logged_in()]

Full review

The CORE demonstrators could a learn lesson from the research paper of Autry and Bobbit (2008) that organizational commitment to security plays a critical role in the fight against supply chain crime. Ideas and findings of the research paper also contribute to the development of the CORE educational and training material (WP19). The article shows that top management support, employee security attitudes, employee integrity/loyalty are key internal factors that strengthen the SCS orientation. External contributing factors include political political/legal factors/support, partner cooperation, and partner support. Strong SCS orientation is expected to translate into higher business performance, customer satisfaction and supply chain chain continuity.

Reference

Autry, C.W. & Bobbitt, L.M., 2008. Supply chain security orientation: conceptual development and a proposed framework. The International Journal of Logistics Management, 19(1), pp.42–64.

[/s2If]

Interview with Ms. Sarma on the US CSP-program

28.6.2016: Today’s CBRA Interview with Ms. Dace Sarma from CRDF Global focuses on the U.S. Department of State’s Chemical Security Program

 

Hi Dace, and thanks for joining CBRA Interview. Can you please tell first a bit of your background and what you do today?

I work at CRDF Global, an independent nonprofit organization that promotes international scientific and technical collaboration through grants, technical resources, training and services. At CRDF Global, I work in partnership with the U.S. Department of State’s Chemical Security Program, CSP in short, on programming collaborating with government, security, academic, and industrial communities around the world to strengthen their ability to thwart chemical attacks. Prior to working with CSP, I supported and implemented the Department of State’s Office of Weapons of Mass Destruction and Terrorism, WMDT in short, projects within the scope of CRDF Global support for the WMDT.

 

Thanks for sharing that. Can you explain more about CRDF Global and the Chemical Security Program, CSP, by the US State Department?

CSP works with a number of implementing partners, including CRDF Global, to promote chemical security through sponsorship of projects designed to identify and address chemical security vulnerabilities and prevent chemical attacks.

CSP collaborates with diverse stakeholders, including partner governments, subject matter experts, and international organizations, to enhance chemical security through capacity building workshops, and trainings.

 

I had the pleasure to join twice the CRDF Global workshops in 2015: first to Hurghada, Egypt, in March 2015, and second to Istanbul, Turkey, in December 2015. The former workshop was targeted for the Egyptian government and chemical industry, and the latter one for the Iraqi government and chemical industry. Extremely interesting 3-4 days in both workshops, with great audiences and co-speakers / co-facilitators. In both workshops I gave presentations e.g. on FP7-project CORE / dangerous goods tracking, and on Dow Chemical supply chain security – thanks again to Ms. Antonella Di Fazio of Telespazio and Dr. Toni Mannisto of CBRA for co-producing these presentations. What is the current status of CSP regarding these countries today, if I may ask?

Thank you again for your participation in these workshops, Juha. We all appreciated you sharing your experience in chemical supply chain and transportation security.

We have continued work with our partners in Egypt on chemical supply chain security. CRDF Global, the Federation of Egyptian Industries’ Environmental Compliance Office (FEI-ECO) and the Federation of Egyptian Industries’ Chamber of Chemical Industries (CCI) held an event in December, also sponsored by CSP, which convened 170 government, industry and academia representatives from Egypt’s chemical sector to highlight Egypt’s achievements in securing the chemical supply chain and identify further steps required to secure their chemicals in transit.  FEI-ECO and CCI are also working to provide technical guidance and support for Egyptian chemical companies to adopt Responsible Care®, an international voluntary chemical management initiative developed by the chemical industry to help chemical companies operate safely, securely and profitably.

In Iraq, CRDF Global and CSP have continued to work closely with a variety of partners from across the chemical and security communities. Most recently in April, with sponsorship from CSP, CRDF Global implemented the 1st National Chemical and Biological Security Coordination Conference in Baghdad. The conference convened Iraqi government, security, industrial, and academic sectors to discuss national efforts, interagency coordination, and best practices to counter chemical and biological proliferation in Iraq.

 

Any plans in 2016 to organize similar workshops in the MENA region?

We will continue to work with our international partners, including in the MENA region, in 2016. As the world becomes more connected, we will continue to focus on securing the chemical supply chain.  Many of our partners have also identified chemical ground transportation security as an area of particular interest.  We look forward to working with technical experts like CBRA and leaders from chemical communities worldwide to enhance global chemical security.

 

Thanks a lot Dace for this interview – and hope to meet you soon again, at one the upcoming missions / workshops! Juha

New survey on European postal security

PostEurop and Cross-border Research Association have launched a new online survey on postal security management to promote further development and implementation of best security practices in the postal sector. The survey is part of the ongoing SAFEPOST project that the European Commission is co-funding under the Seventh Framework Programme (FP7). SAFEPOST project going to finish in the end of July after four years of work towards higher postal security in the European Union.

The survey studies the current state of postal security management among PostEurop members, 52 postal operators in 49 European countries. The goal is to collect responses mainly from security and safety managers of the PostEurop members, but also postal expert familiar with sorting and distribution processes are welcome to provide their inputs. The first part of the survey focuses on security implementation and security performance, and the second part studies postal managers’ expectations and concerns regarding the following six main SAFEPOST innovations:

Common Postal Security Space:

SAFEPOST has created an online platform for sharing security-related information between postal operators. This Common Postal Security Space provides a digital track record of security controls and related evidence (for example X-ray images) that a postal parcel has encountered over its journey, and facilitates an easy and controlled way to exchange information both with other operators as well as the authorities.

D-tube drug screening station:

SAFEPOST has demonstrated a new screening solution, D-tube, that can be fully integrated into the sorting process. The D-Tube’s prototype detects illegal substances, such as narcotics and explosives, at high accuracy.

Explosive detection system:

SAFEPOST has demonstrated a Raman spectroscopy screening device for detecting trace amounts of explosives and explosive precursors on the outside of postal items. The device is designed to be seamlessly integrated, at the same level as X-ray machines already used today, in the sorting process and detect the explosive threats at a high accuracy and at a low false alarm rate (≈ 1 %).

Image recognition system:

SAFEPOST has developed an Image Recognition solution that photographs five visible sides of a postal parcel at one or more locations in the postal network. The solution compares these images to detect signs of tampering or damage (≈ 92% detection rate). The current solution functions properly when the conveyor belt moves no faster than 0.5 m/s.

Radiological screening:

SAFEPOST has demonstrated detection of radiation in moving parcels, that can be fully integrated into the sorting process. The current version of the detector is able to detect any harmful level of radiation, and identify the radioactive isotope, and when possible to consider effects of possible attempts of hiding the radioactivity with lead or other shielding material by detecting neutron radiation.

Security standard and certificate:

SAFEPOST project is working towards a new European security standard for the postal operators that would give recommendations about use of security inspection technologies, exchange of security-related information, cyber security, and key security performance indicators. This standard would pave the road towards a voluntary security certification program that would help the postal operators to show their commitment to security.

This survey research is expected to produce interesting new insights about postal security activities and security performance among the PostEurop members. If the response rate is high, the survey findings will set a basis for pan-European benchmarking of security activities. The findings would also contribute to smart policy making, legislation, and standardisation in the field of postal security.

Finally, depending on the response rate, CBRA is going to publish an academic journal paper based on the results. Building on solid theory on supply chain security risk management, the journal paper would provide new empirical about how supply chain security implementation is associated operational and security performance. We expect that collaborative security measures improve both on-time delivery performance (a proxy for operational performance) and supply chain security performance simultaneously. Collaborative security measures include survey items such as “we coordinate security activities with our business customers” and “we exchange customs declaration information with customs authorities electronically [for example, ITMATT or CUSITM messages]”. Another hypothesis is that, on the one hand, non-collaborative security contributes to supply chain security performance but decrease on-time delivery performance on the other hand. Examples of such non-collaborative measures include “we use tamper-evident mail bags to transport high-value postal items” and “We perform security controls also on non-airmail items to detect explosives.” The figure below summarises the theory and hypotheses of the research paper.

blog1506161

Figure 1 Theoretical framework of the SAFEPOST survey paper

The survey findings will be presented in the final SAFEPOST meeting in Madrid 5-6 July 2016. After the meeting, we hope that we can expand the scope of the survey to cover the rest of the world, as well. The next step would be to contact representatives of the Universal Postal Union (UPU) and coordinate distribution of the survey into the organisations’ 192 member countries.

 

CASSANDRA compendium. Technologies for supply chain visibility and security (Ch. 8)

Summary: Chapter 8 of the CASSANDRA compendium reviews current and future technologies that help managers to improve visibility and security over global end-to-end supply chains. The supply chain visibility technologies, in essence, provide logistics managers with a variety of information – shipment data, performance metrics, inventory levels, production / delivery schedules and sales forecast, for example – in or close to real time. The chapter’s review on supply chain security technologies focus mainly on security sensors (e.g., motion detectors), container seals, biometric user authentication devices (e.g., fingerprints), and non-intrusive inspection equipment (e.g., X-ray screening stations). The section also elaborates modern ways for sharing information among stakeholders that are concerned about security of the supply chain. The CASSANDRA compendium is available for download: www.cassandra-project.eu. Review by Toni Männistö (CBRA)

[s2If is_user_logged_in()]

Full review: Chapter 8 includes some interesting details and insights about modern visibility and security technologies, many of which are relevant especially for CORE demonstrations but also for other work packages such as WP2 (SCS controls), WP7 (CORE Connectivity Infrastructure and Solutions Development Environment) and WP8 (CORE Ecosystem).

Many large logistics operators have developed own supply chain visibility systems to coordinate and organise logistics operations. A large logistics service provider, Kühne+Nagel uses its KN login visibility system that allows the company to optimise its complex global operations in terms of speed, time-certainty, security and cost-efficiency and many other relevant metrics. DHL, a German-based international express courier and logistics company, uses its LOGIS software for its operations. Previous EU projects have also developed visibility systems, for example Smart CM SICIS (Shared Intermodal Container Information System).

These visibility systems enable fast response to most operational contingencies that are about cause deviations from original plans. For instance, if a shipper got instant information about a stolen container, a new delivery could be quickly arranged and the consignee could be informed as soon as possible about the reshipment. Moreover, the visibility systems often interface ITC systems of other key stakeholders in the international supply chains. Customs, for example, receive advance cargo information (ACI) automatically from these systems.

The second part of the chapter 8 focuses exclusively on security technologies. The review starts with description of security sensors that are designed to detect tampering, unplanned detours, and other suspicious events in the supply chain. The modern sensor technologies sense at least changes in lighting, acceleration, location (geo-fencing functionality), motion and CO2 levels (used, e.g., to detect stowaways inside shipping containers). The chapter introduces modern user authentication technologies (e.g., fingerprints, face, retina, hand geometry and other unique biometric characteristics). Some information is provided regarding non-intrusive screening solutions that are often considered to be necessary for fast and secure screening operations. The rest of the chapter discusses various technical and institutional solutions for exchanging security-relevant information among supply chain operators and relevant government agencies. Especially interoperability of ICT systems seems to be crucial for effective security efforts in the global supply chains. The CASSANDRA compendium is available for download: www.cassandra-project.eu. Review by Toni Männistö (CBRA)

Reference

Hintsa, J. and Uronen, K. (Eds.) (2012), “Common assessment and analysis of risk in global supply chains “, Compendium of FP7-project CASSANDRA, Chapter 8

CORE2007

[/s2If]

CASSANDRA compendium. Private sector perspectives on risk management (Ch. 5) and crime prevention and security management in supply chains (Ch. 6)

Summary: Chapters 5 & 6 of the CASSANDRA compendium provide a general overview on supply chain security risk management from the private sector perspective. Explaining the essentials of supply chain risk management, Chapter 5 introduces commonly used risk management models and tools (e.g., risk matrices and risk registers), discusses various classifications of supply chain risks, and elaborates current trends of risks and risk management in the supply chain context. Chapter 6 focuses on specific challenges of supply chain security risks – the risks that arise from intentional, man-made criminal activities such as terrorism, theft, trafficking, and sabotage. The chapter explains a few early classifications of supply chain security risks (e.g., motive-based typology and taxonomies based on private sector perspectives). Following the classifications of security risks, the chapter puts forth a few models for managing security risks in the supply chain context (e.g., the 8-layer model for supply chain security management). The chapter concludes with a detailed case study on security management of an international security company and a comparison of supply chain security management and the total quality management (TQM) management philosophy. The CASSANDRA compendium is available for download: www.cassandra-project.eu. Review by Toni Männistö (CBRA)

[s2If is_user_logged_in()]

Full review: Previous observatory entries have already shown the relevance of the CASSANDRA compendium to the community of supply chain management professionals. The compendium’s chapters 5 & 6 give a brief summary of risk management and security risk management in the context of international supply chains. The contents of the chapters are relevant and useful for people involved in FP7 CORE project, especially for those involved in work packages 3 (Multi-method Threat and Vulnerability Analysis Suite) and 4 (SC Situational Awareness Tools & Maps).

Chapter 5 elaborates a set of common supply chain risk management tools. The model of Waters (2007) summarises rather obvious three steps of the risk management process: identifying risks, analysing risks and responding to risks. The model proposes, for example, that managers can identify supply chain risks through analysis of past events, collection of opinions, and through operational analysis. The model also calls for managerial attention to prerequisites of successful risk management – mutual trust, cooperation and information exchange among relevant stakeholders involved in supply chain management – and highlights importance of continuous monitoring and controlling the risk management process. The chapter concludes with the four classic approaches to risk management: risk avoidance, risk reduction, risk transfer (e.g., insurance and contractual agreements), and acceptance. The classifications of supply chain risks include typologies focusing on risk sources (natural hazards operational failure and terrorism), risk consequences (e.g., risk to operations, risk to reputation and risk to profits), and objects of vulnerability (e.g., information, materials, personnel and financial flows).

The chapter on crime prevention and security management (Ch. 6) in supply chains provides a concise summary on supply chain security management from the private sector perspective. The chapter starts by describing some early classifications of supply chain security risks. A motive-based taxonomy classifies such risks into the three categories: economic crime (profit as motive), other crime types (ideological, emotional and other reasons as motive) and facilitating crime that covers activities that do not bring direct crime benefits but help committing other rewarding crime crimes later on. (e.g., document fraud, bribery and use of intimidation). The chapter’s next section elaborates ways to mitigate security risks in the global supply chains, highlighting the key ideas of the so-called 8-layer model for supply chain security management (the model incorporates multiple aspects of risk assessment, hands-on design and planning, implementation of a variety of technologies, procedures, and incentives as well as preparation for dealing with the consequences of supply chain crime). The chapter provides also a case study with an international tobacco company that runs high security risk supply chain operations. The section also contrasts, rather interestingly, principles of security management against the fundaments of the total quality management (TQM) management philosophy. The chapter continues with a brief review of regulations (e.g., EU customs security and aviation security regulations) and standards on supply chain security management (World Customs Organization’s SAFE framework of standards, and industry standards of the Transported Asset Protection Association).

Reference

Hintsa, J. and Uronen, K. (Eds.) (2012), “Common assessment and analysis of risk in global supply chains “, Compendium of FP7-project CASSANDRA, Chapters 5 & 6

CORE2007

[/s2If]

MARITIME SECURITY – Vessel Tracking Systems Provide Key Information, but the Need for Duplicate Data Should Be Reviewed, GAO, March 2009 (CORE1065)

Summary: The US government considers identification and tracking of vessels at the US coastal areas, inland waterways and ports important for protecting the US homeland and economy from maritime terrorism. The US coastal guards use a range of identification and tracking solutions to detect any anomalies in maritime traffic that might suggest terrorist activity, such as transportation of weapons of mass destruction, use of explosive-laden boats as weapons, smuggling of weapons, drugs, people or other contraband. This GAO report reviews the US Coast Guards’ current and future solutions for monitoring the maritime traffic: long-range identification and tracking system (LRIT), long-range automatic identification system (AIS) and various radar and camera systems. The report elaborates strengths and weaknesses of these identification and tracking solutions and proposes a roadmap for further strengthening of the US coastal security. The future advancements should pay particular attention to tracking of small and non-commercial vessels and to reconsider ways to collect and analyze data that is relevant for coastal surveillance.  Offering background information about vessel-level tracking and tracing of maritime cargo movements, the report is a relevant source document for those CORE demonstrations that involve shipping of containers from, through and into the US. The report is available for download at: www.gao.gov/new.items/d09337.pdf.

[s2If is_user_logged_in()]

Full review: CORE demonstrations of WP9 and WP14 benefit from the background information this GAO document offers on identification and tracking of vessels because these two demos involve US seaports and shipping at the US territorial waters. Also the CORE’s risk and IT clusters might find the information of this GAO document useful. The information that the identification and tracking provide allow the coastal guards to assess risk-levels of individual vessel movements and decide when it is reasonable to intervene and check anomalies. The vessel tracking and identification involves also a great deal of IT integration because it currently involves many technical components and synthetizes data collected from many different sources.

Cross-references:

  • Maritime Security: Information Sharing Efforts Are Improving. GAO-06-933T. Washington, D.C.: July 10, 2006.
  • Maritime Security: Public Safety Consequences of a Terrorist Attack on a Tanker Carrying Liquefied Natural Gas Need Clarification. GAO-07-316. Washington, D.C.: February 22, 2007.
  • Maritime Security: Coast Guard Inspections Identify and Correct Facility Deficiencies, but More Analysis Needed of Program’s Staffing, Practices, and Data. GAO-08-12. Washington, D.C.: February 14, 2008.

Additional keywords: Maritime security, long-range identification and tracking system (LRIT), long-range automatic identification system (AIS), track & trace

 

CORE1065

[/s2If]

MARITIME SECURITY – DHS Progress and Challenges in Key Areas of Port Security, GAO, July 2010 (CORE1064)

Summary: This GAO report analyses the progress the US Department of Homeland Security (DHS) has made in maritime supply chain security over the past five to ten years. The report raises problems that the DHS and its component agencies – the Coast Guard and the Customs and Border Protection (CBP) – have encountered regarding improvement of risk management, reduction of the vulnerability to threats of small vessels, implementation of security assessment in foreign ports, and the overall progress in supply chain security.  The report states that so far the Coast Guard has carried out risk assessments, but their results do not allow effective comparison and prioritization of risks across ports. The Coast guard has also identified points of vulnerability related to waterside attacks by small vessels, reached out to the general public to encourage recreational sailors to report anomalies, started tracking of small vessel, tested equipment to screen small vessels for nuclear material and conducted security maneuvers such as vessel escorts. Nevertheless, resource constraints and technical problems prevent the Coast Guard to protect the US coastline and maritime infrastructure from small-vessel threats effectively. Moreover, the Coast Guard has been assessing security in foreign ports, but the lack of the agency’s resources and certain countries’ reluctance to collaborate with the US authorities have slowed down the global security assessment. Finally, as for the general supply chain security, the DHS has been running the Secure Freight Initiative (SFI) in foreign ports to test the feasibility of the 100% scanning of US-bound shipping containers with non-intrusive inspection (NII) technologies and radiation detection equipment. The findings of the SFI pilots indicate that the 100% scanning is not a feasible policy because it would disrupt port logistics, damage international trade and raise healthy concerns, among other things. The report is available for download at: www.gao.gov/assets/660/659087.pdf.

[s2If is_user_logged_in()]

Full review: This GAO review concentrates on the US maritime supply chain security. The document provides important information for people who are working for the CORE demonstrations of WP1 and WP14 because these demos involve maritime transportation into and from the US mainland. Those demonstrations that test tracking & tracking solutions might benefit from the document’s update on small-vessel identification and tracking systems.

Cross-references:

  • Coast Guard: Deployable Operations Group Achieving Organizational Benefits, but Challenges Remain. GAO-10-433R. Washington, D.C.: April 7, 2010.
  • Supply Chain Security: Feasibility and Cost-Benefit Analysis Would Assist DHS and Congress in Assessing and Implementing the Requirement to Scan 100 Percent of U.S.-Bound Containers. GAO-10-12. Washington, D.C.: October 30, 2009.
  • Maritime Security: The SAFE Port Act: Status and Implementation One Year Later. GAO-08-126T. Washington, D.C.: October 30, 2007.
  • Maritime Security: Vessel Tracking Systems Provide Key Information, but the Need for Duplicate Data Should Be Reviewed. GAO-09-337. Washington, D.C.: March 17, 2009.
  • Supply Chain Security: Challenges to Scanning 100 Percent of U.S.-Bound Cargo Containers. GAO-08-533T. Washington, D.C., June 12, 2008.

Additional keywords: Maritime security, supply chain security, 100% scanning and track & trace

 

CORE1064

[/s2If]

AVIATION SECURITY – Progress Made, but Challenges Persist in Meeting the Screening Mandate for Air Cargo, GAO, March 2011 (CORE1062)

Summary: This GAO report reviews the recent progress of the US air cargo security scheme. The Transportation Security Administration (TSA), the main agency responsible for the US air cargo security, has been working towards the implementation of the 100% screening requirements of the 9/11 Commission Act of 2007. So far TSA has set up a voluntary Certified Cargo Screening Program (CCSP) to allow trusted logistics operators to screen air cargo outside congested airports, launched a program for testing technologies for air cargo screening and expanding its program for approving explosive detection dog teams. The main obstacle in meeting the 100% screening requirement is that TSA has no reliable mechanism for verifying screening data from domestic foreign screening operators, which self-report the data. TSA also struggles in finding resources to employ as many transport security inspectors as it is required to oversee the Certified Cargo Screening Program. The report also points out that the current technologies that TSA has approved for cargo screening cannot screen large cargo units – pallets or unit loading devices (ULDs) – and this incapability reduces speed and cost-efficiency of air cargo screening. Overall, this GAO document provides a general outlook on state and challenges the US air cargo security regime, and therefore those CORE demonstrations that focus on the US-bound or US-origin air transport should consider the report as a key source material. The report is available for download at: www.gao.gov/assets/130/125678.pdf.

[s2If is_user_logged_in()]

Full review: This document is relevant for the CORE demonstrations that involve air transportation into or through or from the US. Especially the DHL demo, that concentrates on shipping of military aircraft parts from the US to Spain, is affected by the TSA’s programs and initiatives that the report analyses. The report is very concise and informative, so it might be beneficial to the CORE’s educational and training activities.

Cross-references:

  • GAO, Aviation Security: Federal Coordination for Responding to In-flight Security Threats Has Matured, but Procedures Can Be Strengthened, (Washington, D.C.: July 31, 2007).
  • GAO, Aviation Security: Transportation Security Administration May Face Resource and other Challenges in Developing a System to Screen All Cargo Transported on Passenger Aircraft
  • GAO, Aviation Security: Federal Efforts to Secure U.S.-Bound Air Cargo Are in the Early Stages and Could Be Strengthened, GAO-07-660 (Washington, D.C.: April 2007).
  • GAO, Aviation Security: Progress Made in Systematic Planning to Guide Key Investment Decisions, but More Work Remains, GAO-07-448T (Washington, D.C.: February 13, 2007).

Additional keywords: Air cargo security, 100% screening, Certified Cargo Screening Program (CCSP)

 

CORE1062

[/s2If]

MARITIME SECURITY – Progress Made, but further actions needed to secure the maritime energy supply, GAO, August 2011 (CORE1061)

Summary: The GAO report discusses actions the US Coast Guard and the Federal Bureau of Investigation (FBI) have taken to strengthen security of energy tankers and offshore energy infrastructure – that produces, transports, or receives oil and natural gas – from terrorist attacks. The report’s key recommendation is that the Coast Guard need to assess risks to all offshore facilities in the US territorial waters, to improve emergency response plans in case of oil spills and to design performance measures for emergency response activities. This GAO document focuses on a rather narrow field of critical infrastructure, the US maritime energy infrastructure, which is not in the CORE’s scope. The CORE’s risk cluster might consider useful the description how the Coast Guard has applied its Maritime Security Risk Analysis Model (MSRAM) to determine risk of the US maritime energy infrastructure. The report is available for download at: www.gao.gov/new.items/d11883t.pdf.

[s2If is_user_logged_in()]

Full review: This GAO document is not very relevant to CORE because of its topic (the US maritime energy infrastructure) that is not within the CORE’s scope. Even so, the risk cluster, the IT cluster and the demonstrations on maritime transport might consider useful of the insight this report offers on security risk assessment.

Cross-references:

  • Maritime Security: Actions Needed to Assess and Update Plan And Enhance Collaboration among Partners Involved in Countering Piracy off the Horn of Africa. GAO-10-856. Washington, D.C.: September 24, 2010.
  • Critical Infrastructure Protection: Update to National Infrastructure Protection Plan Includes Increased Emphasis on Risk Management and Resilience. GAO-10-296. Washington, D.C.: March 5, 2010.
  • Quadrennial Homeland Security Review: 2010 Reports Addressed Many Required Elements, but Budget Planning Not Yet Completed. GAO-11-153R. Washington, D.C.: December 16, 2010.

Additional keywords: Critical infrastructure protection (CIP), maritime security and security of supply

 

CORE1061

[/s2If]

 

PORT SECURITY GRANT PROGRAM, Risk Model, Grant Management, and Effectiveness Measures Could Be Strengthened, GAO, November 2011 (CORE1060)

Summary: The Department of Homeland Security (DHS) has granted almost 1.7 billion USD to port security through the Port Security Grant Program (PSGP). The program is administered by a component agency of DHS, Federal Emergency Management Agency (FEMA). This GAO reports highlights some problems that the grant program has encountered. The first issue is that the risk assessment the FEMA uses to assess risk levels and assign grants to different ports does not take into account how security improvements affect the vulnerability of the ports to terrorist attacks. The report recommends the FEMA to design a vulnerability index that accounts for security improvement and to coordinate with the Coast Guard to get access to the most accurate vulnerability and threat information. The second issue with the grant program is that much of the grant money does not get used and translate into practical port security projects. The GAO report proposes acceleration of the grant granting process with updated administrative procedures and with more administrative staff.  Finally, this GAO report recommends the FEMA to develop performance metrics to assess its administration in relation to the Port Security Grant Program. The contents of this GAO report is not very relevant to CORE because no US seaports are partners in the project. The report is available for download at: www.gao.gov/assets/590/587142.pdf.

[s2If is_user_logged_in()]

Full review: This document has only a limited relevance for CORE because the consortium does not involve any US seaport operators. The demonstrations of WP9 and WP14 that cover shipping of goods from and into the US through local seaports might find it useful to learn about how US ports can apply for funds to improve the security. Otherwise, other demonstrations do not benefit much of this information. However, the CORE’s risk cluster can benefit from the rather detailed description of the risk analysis model in the report’s Appendix II.

Cross-references:

  • Maritime Security: Actions Needed to Assess and Update Plan And Enhance Collaboration among Partners Involved in Countering Piracy off the Horn of Africa. GAO-10-856. Washington, D.C.: September 24, 2010.
  • Critical Infrastructure Protection: Update to National Infrastructure Protection Plan Includes Increased Emphasis on Risk Management and Resilience. GAO-10-296. Washington, D.C.: March 5, 2010.
  • Quadrennial Homeland Security Review: 2010 Reports Addressed Many Required Elements, but Budget Planning Not Yet Completed. GAO-11-153R. Washington, D.C.: December 16, 2010.

Additional keywords: Critical infrastructure protection (CIP), maritime security and security of supply, Port Security Grant Program (PSGP)

 

CORE1060

[/s2If]