Review on“Contributing to shipping container security: can passive sensors bring a solution?” G. Janssens-Maenhout a, F. De Roob, W. Janssens, Journal of Environmental Radioactivity, 2009 (CORE1096)

Summary: Illicit trafficking of fissionable material in container cargoes is recognized as a potential weakness in Nuclear Security. Triggered by the attacks of 11 September 2001, measures were undertaken to enhance maritime security in extension to the Safety Of Life At Sea (SOLAS) Convention and in line with the US Container Security Initiatives. Effective detection techniques are needed that allow the inspector to intercept illicit trafficking of nuclear weapons components or components of other nuclear explosive devices. Report abstract is available at (one can ask for the full report e.g. vie ResearchGate): https://www.researchgate.net/publication/38053693_Contributing_to_shipping_container_security_can_passive_sensors_bring_a_solution

[s2If is_user_logged_in()]

Full review: Many security measures focus on active interrogation of the container content by X-ray scan, which might be extended with the newly developed tagged neutron inspection system. Both active interrogation techniques can, with the current huge volume of container traffic, only be applied to a limited number of selected containers. The question arises whether a passive detection technique can offer an alternative solution.

This study investigates if containers equipped with a small passive detector will register during transport the neutron irradiation by fissionable material such as plutonium in a measurable way. In practice, 4/5 of the containers are about 1/8 filled with hydrogenous material and undergo a typical 2 months route. For this reference case, it was found that the most compatible passive detector would be an activation foil of iridium. Monte-Carlo simulations showed that for the reference case the activity of a 250 μm thin foil with 6 cm2 cross-section would register 1.2 Bq when it is irradiated by a significant quantity of Reactor-Grade PuO2. However this activity drops with almost two orders of magnitude for other fillings and other isotopic compositions and forms of the Pu-source. The procedure of selecting the target material for Pu detection is detailed with the theoretical methods, in order to be useful for other applications. Moreover the value of such additional passive sensors for securing maritime container transport is situated within the global framework of the First, Second and Third Line of Defense against illicit trafficking.

Full citation:   G. Janssens-Maenhout a, F. De Roob, W. Janssens (2009). Contributing to shipping container security: can passive sensors bring a solution?” Journal of Environmental Radioactivity 101(2):95-105 · OCTOBER 2009.

Keywords: Nuclear illicit trafficking, Maritime container transport, Passive detection technique

[/s2If]

Review on The Critical Infrastructure Gap: U.S. Port Facilities and Cyber Vulnerabilities, Policy Paper, July 2013, Center for 21st Century Security and Intelligence (CORE1095)

Summary: In a 50-page policy paper by the Brookings Institute and authored by Commander Joseph Kramek of the U.S.Coast Guard and a Federal Executive Fellow at the institute, the current state of affairs related to vulnerabilities at our national seaports is discussed and options to shore up cyber security are presented. In the executive summary, Commander Kramek writes that today’s U.S. port facilities rely as much upon networked computer and control systems as they do upon stevedores to ensure the flow of maritime commerce that the economy, homeland, and national security depend upon. Yet, unlike other sectors of critical infrastructure, little attention has been paid to the networked systems that undergird port operations. Report is available at: http://www.brookings.edu/~/media/research/files/papers/2013/07/02%20cyber%20port%20security%20kramek/03%20cyber%20port%20security%20kramek.pdf

[s2If is_user_logged_in()]

Full review: No cybersecurity standards have been promulgated for U.S. ports, nor has the U.S. Coast Guard, the lead federal agency for maritime security, been granted cybersecurity authorities to regulate ports or other areas of maritime critical infrastructure. In the midst of this lacuna of authority is a sobering fact: according to the most recent National Intelligence Estimate (NIE) the next terrorist attack on U.S. Critical Infrastructure and Key Resources (CIKR) is just as likely to be a cyber attack as a kinetic attack.

The potential consequences of even a minimal disruption of the flow of goods in U.S. ports would be high. The zero-inventory, just-in-time delivery system that sustains the flow of U.S. commerce would grind to a halt in a matter of days; shelves at grocery stores and gas tanks at service stations would run empty. In certain ports, a cyber disruption affecting energy supplies would likely send not just a ripple but a shockwave through the U.S. and even global economy.

Given the absence of standards and authorities, this paper explores the current state of cybersecurity awareness and culture in selected U.S. port facilities. The use of the post-9/11 Port Security Grant Program (PSGP), administered by the Federal Emergency Management Agency, is also examined to see whether these monies are being used to fund cybersecurity projects.

Full citation:   The Critical Infrastructure Gap: U.S. Port Facilities and Cyber Vulnerabilities, Policy Paper, July 2013, Center for 21st Century Security and Intelligence.

CORE1095

Keywords: Maritime Security, Cyber-security, Port Security Grant Program (PSGP), Port facility, Coast Guard, Maritime Transportation Security Act (MTSA).

[/s2If]

Chemical Security in Istanbul

2015-12-15 09.02.08I had the most interesting week in Istanbul with the Iraqi government representatives, chemical sector companies and the US State Department Chemical Security Program, CSP.

Security in the chemical supply chain is a major challenge for government agencies and chemical supply chain companies across the globe, including those in the Middle-East and North African (MENA) region. Theft, diversion, trafficking, export violations, counterfeit chemicals, sabotage and terrorism – among other criminal threats – keep the agencies and companies constantly on their toes when considering how to best tackle the vulnerabilities and threats in their respective chemical supply chains.

This was my second time to join as an external expert in a Chemical Security Program (CSP) event in the MENA region. The first time was in Hurghada, Egypt, in March 2015 – thanks again to Professor Andrew Thomas, the Chief Editor of the Journal of Transportation Security, for hooking me up with CRDF Global and the US State Department on this. Now the four day event targeted for the relevant Iraqi government agencies as well as the Iraqi chemical sector companies was held in Istanbul, Turkey, on 14-17 December 2015.

We had a fully packed agenda: Day 1 consisted of several introductory and state-of-play speeches by the workshop facilitators and by Iraqi experts, the latter group sharing key governmental, industry and academic perspectives to the chemical security progress in Iraq.  Day 2 started with a case study presentation on “Post-2001 supply chain security developments at Dow Chemicals”, followed by private-public partnership considerations in chemical supply chain security. During the afternoon of day 2, two more presentations were given on potential threats to materials of interest, as well as on site-physical security. Day 3 started with presentations on international transport of dangerous goods and security rules, followed later by presentations on export control and border security issues, as well as risk assessment methodological aspects.

Interactive sessions, group exercises and other discussions were vivid throughout the four days. On day 1, the main interactive session was about government-industry coordination. On day 2, the focus shifted to identifying key players in Iraqi chemical supply chain security, as well as exploring private sector specific chemical security issues. On day 3, a major interactive session took place to recognize existing vulnerabilities and threats in the chemical supply chain, as well as to identify appropriate countermeasures and other possible means of improvement. And finally, on day 4, a draft table of content for a potential “Iraqi chemical supply chain security master plan and implementation roadmap” was produced in a highly interactive manner, followed ultimately by drafting some actual planning content in areas including chemical transport security and raising security awareness.

The actual workshop outcomes and possible follow-up actions will be worked upon later by the organizing team and some key participants. In the meanwhile, I want to express my warmest thanks for this opportunity and great on-site collaboration in Istanbul to: Ms. Shawn Garcia from the U.S. Department of State, Chemical Security Program (DOS/CSP); Ms. Pelin Kavak and Mr. Nidal Abu Sammour from CRDF Global, US / Jordan; and Dr. Caner Zanbak and Mr. Mustafa Bagan from the Turkish Chemical Manufacturers Association (TCMA). Hope to meet you again in 2016 in Iraq, Algeria and possibly other locations in the MENA region!

 

Cheers, Juha Hintsa

P.S. We also tested two CBRA frameworks / models – CBRA SCS15/16, and CBRA-BAC-Actions and beneficiaries – with the audience during the Istanbul week. Both of them were well perceived, and will be topics for CBRA Blog during the coming couple of months. (SCS = Supply Chain Security, and BAC = Border Agency Cooperation).

PPS. Last but not least I would like to thank Ms. Antonella Di Fazio of Telespazio, Italy, and FP7-project CORE, for excellent inputs on transport of dangerous goods, traceability and monitoring solutions, demonstrators, and practical experiences.

Punta Cana Resolution, Resolution of the Policy Commission of the World Customs Organization on the Role of Customs in the Security Context, WCO 2015 (CORE2004)

The new Punta Cana Resolution sets guidelines for customs’ security roles in the combat against the new wave of terrorism, as manifested by recent attacks in Tunisia, Turkey, Lebanon, France and Mali. The resolution highlights that the customs authorities are typically the first line of defense against transnational crime, terrorism and extremism: the customs control cross-border movements of people, cargo, money and modes of transport and thus protect communities against terrorists that may exploit international supply chains to move materials, funds or operatives across borders. Building on the previous WCO instruments and agreements, especially on the WCO Security Programme, the Punta Cana resolution is the customs community’s action plan and renewed pledge of solidarity that provides a diplomatic backdrop for further counterterrorism activities. More information at: http://www.wcoomd.org/en/media/newsroom/2015/december/wco-issues-the-punta-cana-resolution.aspx

[s2If is_user_logged_in()]

Full review

The new Punta Cana Resolution sets guidelines for customs’ security roles in the combat against the new wave of terrorism, as manifested by recent attacks in Tunisia, Turkey, Lebanon, France and Mali. The resolution highlights that the customs authorities are typically the first line of defense against transnational crime, terrorism and extremism: the customs control cross-border movements of people, cargo, money and modes of transport and thus protect communities against terrorists that may exploit international supply chains to move materials, funds or operatives across borders. Building on the previous WCO instruments and agreements, especially on the WCO Security Programme, the Punta Cana resolution is the customs community’s action plan and renewed pledge of solidarity that provides a diplomatic backdrop for further counterterrorism activities.

The Punta Cana resolution encourages customs administrations worldwide to intensify collaboration within the customs community and with other border control agencies, both domestically and internationally. In case of missing or obsolete counter-terrorism strategy, the resolution urges customs to add new security roles in their mandates and activities. The Punta Cana document also recommends customs to pay close regard to the WCO’s previous agreements and instruments, such as the WCO Compliance and Enforcement Package, SAFE Framework of Standards and the WCO Security Programme. At more practical level, the resolution promotes the use of the full range of modern detection and investigation techniques, especially advance risk profiling on the basis of Advance Passenger Information (API) and Passenger Name Record (PNR). The resolution also calls governments from around the world to provide necessary financial and human support so that their national customs administrations can contribute towards the goals of the WCO Security Programme.

The Punta Cana Resolution informs CORE consortium about the changing risk landscape where the threat of transnational terrorism is high again. The Resolution also reminds the CORE’s risk cluster of the three cornerstones of effective border security management: collaboration, technology and human resources. The Punta Cana document also gives an overlook on the customs’ security priorities over the following years. For example, the global customs community will likely invest a great deal of time and money to develop new risk profiling systems that tap into new data sources such as the Advance Passenger Information (API) and Passenger Name Record (PNR). The same trend towards better risk profiling is likely to define also the future cargo security efforts at the borders.

Reference: WCO, 2015. Punta Cana Resolution, Resolution of the Policy Commission of the World Customs Organization on the Role of Customs in the Security Context.

CORE2004

[/s2If]

New approaches to border management

Today we discuss with Mr. Anthony Barone how to modernize border management techniques. Mr. Barone is a writer and adjunct professor. He has served at the WCO and American Federal Advisory bodies and held senior positions in both the industrial and logistics industries most recently at Pfizer.

Tony, it seems that we are living in a fairly dangerous world today. Threats to society arise from globalized terrorism, organized crime and individual criminal acts, such as the commission of fraud. How do border management techniques address these threats?

Not very well, I’m afraid. Border management techniques that are used today to identify and interdict criminal activities are based on technologies and concepts that are out of date. They cause unpredictability in supply chains, discriminate against smaller companies and opportune official corruption.

The absence of real time information exchange between countries, and even within countries among different departments of border management, is complicating the inherent challenges faced by border management authorities. Unfortunately crime has globalized, but law enforcement has not.

The supply chains are internationalizing rapidly, so all nations need to find ways that facilitate legitimate trade and simultaneously disrupt criminal activity hidden in commercial supply chains. Can emerging technologies be the solution?

Newly emerging technologies present both new threats and new opportunities. Threats arise from the criminal use of new technologies such as the use of social media by terror organizations and bitcoin money exchange by drug cartels. Opportunities to leverage technology arise from the ubiquitous use of integrated supply chain technology within the private sector, relatively inexpensive cloud based processing capabilities and a variety of hardware developments, such as Machine to Machine data processing or Internet of Things.

Emerging technologies may make it possible to accomplish the dual goals of facilitation and security, but certain prerequisites must be addressed in order for such solutions to succeed. The innovations must benefit both the private sector and governments in several different ways. There must be real economic value in transformative strategies. Political leadership must see a match to public policy goals and developers must see profit opportunity in the development of tools.

As you said, various public and private stakeholders may have different interests and priorities, and on top of this private citizens have increasing and legitimate privacy concerns. What should we do that real issues are accommodated despite these potentially contradictory goals?

The importance of engaging the private sector as agents of change cannot be understated. Both goods shippers and logistics service providers must find benefit through significantly reduced costs. And those savings must outweigh out-of-pocket investments that are needed to achieve them.

Articulating possible solutions faces significant headwinds. Among these are the investments made in current practices on both the private and public side. Reluctance to change is further bolstered by financial considerations including possible costs of transformation and the loss of revenue derived from existing systems.

Additionally, authorities charged with these responsibilities may feel threatened by criticism of programs they administer. Importers and exporters may fear reprisal from authorities. Trade associations may be too dependent on access to authorities to seriously challenge extant programs. Without a political constituency and given these challenges, introducing and implementing game changing ideas will be difficult.

So, what would you propose to modernize border management techniques? It seems to require radically transformative ideas.

I propose that we get together a group of independent experts who are willing to explore radically new approaches to border management. They would be tasked to investigate how supply chain facilitation as an open source capability could simultaneously block criminal activity and reduce the costs of border administration. They should consider both private and public sector effects and have a global focus so that all nations can benefit from their work.

Thank you, Tony, for the interview. CBRA team is interested to join the group of independent experts you suggested – hopefully we can get together on this, already during the first couple of months in 2016!