The displacement effect in cargo theft (Ekwall 2009)

Summary

Cargo theft has always been a problem for shippers and logistics service providers. Even so, regardless of the persistent efforts to reduce cargo theft, crime continues to strive. This classic supply chain security paper by Daniel Ekwall analyzes and explains why cargo theft continues to occur in the transport network despite all implemented countermeasures. Focusing on Swedish transport and logistics facilities, the Ekwall’s research builds on interviews with six subject matter experts, survey with four terminal operators, and macro-statistics from TAPA (Transported Asset Protection Association). The paper finds some evidence on crime displacement in terms of method (modus operandi): cargo thieves target increasingly cargo in-transit because logistics facilities are nowadays better protected. However, displacement is likely to be partial in contrast to complete displacement. This means that absolute theft risk can be reduced. Download the abstract here: http://www.emeraldinsight.com.

Review by Toni Männistö (CBRA) based on his doctoral thesis.

[s2If is_user_logged_in()]

Full review

The Ekwall’s research gives an interesting overview on criminological theories underpinning supply chain security research. The theoretical outlook provides the foundation for the CORE work and all CORE work packages can therefore benefit from the analytical discussion and findings of this research paper. The main lesson is that criminals and terrorists are calculating antagonists who adapt their behavior in response to information on risks and rewards of crime opportunities. More specifically, Ekwall argues that professional cargo thieves seem to target increasingly “cargo on wheels” instead of warehoused goods. He explains this shift in the behavior with the fact that, facility security has improved relatively more than in-transit security over the past decade. However, he stresses that it is hard to establish a causal relationship between security interventions and changes in criminal behavior. He holds further that if displacement occurs, it is likely to be partial rather than complete.

Reference

Ekwall, D. (2009b). The displacement effect in cargo theft. International Journal of Physical Distribution & Logistics Management, 39(1), 47-62.

[/s2If]

Supply chain security orientation: conceptual development and a proposed framework (Autry and Bobbit 2008)

Summary

Even though supply chain security has become an increasingly important managerial domain, there is little understanding about what security aware firms are, what enables and drives security awareness, and what are the outcomes of supply chain security (SCS) orientation. Autry and Bobbit (2008) set out conceptualize, validate and operationalize the construct of SCS orientation. Based on 31 interviews with US-based managers, they conclude that SCS orientation comprises four general categories of security solutions: security preparation and planning, security-related partnerships, organizational adaptation and security-dedicated communications and technology. The authors write that these security solutions “could result in supply chain risk management-related efficiencies, such as decreased lead times to customers, greater product reliability, waste reduction, and increased delivery reliability, due to the lessened need for operations workers to perform security-related tasks such as redundant container checking, securing shipments, or other similar tasks.” The abstract is available at: http://www.emeraldinsight.com.

Review by Toni Männistö (CBRA) based on his doctoral thesis.

[s2If is_user_logged_in()]

Full review

The CORE demonstrators could a learn lesson from the research paper of Autry and Bobbit (2008) that organizational commitment to security plays a critical role in the fight against supply chain crime. Ideas and findings of the research paper also contribute to the development of the CORE educational and training material (WP19). The article shows that top management support, employee security attitudes, employee integrity/loyalty are key internal factors that strengthen the SCS orientation. External contributing factors include political political/legal factors/support, partner cooperation, and partner support. Strong SCS orientation is expected to translate into higher business performance, customer satisfaction and supply chain chain continuity.

Reference

Autry, C.W. & Bobbitt, L.M., 2008. Supply chain security orientation: conceptual development and a proposed framework. The International Journal of Logistics Management, 19(1), pp.42–64.

[/s2If]

Interview with Ms. Sarma on the US CSP-program

28.6.2016: Today’s CBRA Interview with Ms. Dace Sarma from CRDF Global focuses on the U.S. Department of State’s Chemical Security Program

 

Hi Dace, and thanks for joining CBRA Interview. Can you please tell first a bit of your background and what you do today?

I work at CRDF Global, an independent nonprofit organization that promotes international scientific and technical collaboration through grants, technical resources, training and services. At CRDF Global, I work in partnership with the U.S. Department of State’s Chemical Security Program, CSP in short, on programming collaborating with government, security, academic, and industrial communities around the world to strengthen their ability to thwart chemical attacks. Prior to working with CSP, I supported and implemented the Department of State’s Office of Weapons of Mass Destruction and Terrorism, WMDT in short, projects within the scope of CRDF Global support for the WMDT.

 

Thanks for sharing that. Can you explain more about CRDF Global and the Chemical Security Program, CSP, by the US State Department?

CSP works with a number of implementing partners, including CRDF Global, to promote chemical security through sponsorship of projects designed to identify and address chemical security vulnerabilities and prevent chemical attacks.

CSP collaborates with diverse stakeholders, including partner governments, subject matter experts, and international organizations, to enhance chemical security through capacity building workshops, and trainings.

 

I had the pleasure to join twice the CRDF Global workshops in 2015: first to Hurghada, Egypt, in March 2015, and second to Istanbul, Turkey, in December 2015. The former workshop was targeted for the Egyptian government and chemical industry, and the latter one for the Iraqi government and chemical industry. Extremely interesting 3-4 days in both workshops, with great audiences and co-speakers / co-facilitators. In both workshops I gave presentations e.g. on FP7-project CORE / dangerous goods tracking, and on Dow Chemical supply chain security – thanks again to Ms. Antonella Di Fazio of Telespazio and Dr. Toni Mannisto of CBRA for co-producing these presentations. What is the current status of CSP regarding these countries today, if I may ask?

Thank you again for your participation in these workshops, Juha. We all appreciated you sharing your experience in chemical supply chain and transportation security.

We have continued work with our partners in Egypt on chemical supply chain security. CRDF Global, the Federation of Egyptian Industries’ Environmental Compliance Office (FEI-ECO) and the Federation of Egyptian Industries’ Chamber of Chemical Industries (CCI) held an event in December, also sponsored by CSP, which convened 170 government, industry and academia representatives from Egypt’s chemical sector to highlight Egypt’s achievements in securing the chemical supply chain and identify further steps required to secure their chemicals in transit.  FEI-ECO and CCI are also working to provide technical guidance and support for Egyptian chemical companies to adopt Responsible Care®, an international voluntary chemical management initiative developed by the chemical industry to help chemical companies operate safely, securely and profitably.

In Iraq, CRDF Global and CSP have continued to work closely with a variety of partners from across the chemical and security communities. Most recently in April, with sponsorship from CSP, CRDF Global implemented the 1st National Chemical and Biological Security Coordination Conference in Baghdad. The conference convened Iraqi government, security, industrial, and academic sectors to discuss national efforts, interagency coordination, and best practices to counter chemical and biological proliferation in Iraq.

 

Any plans in 2016 to organize similar workshops in the MENA region?

We will continue to work with our international partners, including in the MENA region, in 2016. As the world becomes more connected, we will continue to focus on securing the chemical supply chain.  Many of our partners have also identified chemical ground transportation security as an area of particular interest.  We look forward to working with technical experts like CBRA and leaders from chemical communities worldwide to enhance global chemical security.

 

Thanks a lot Dace for this interview – and hope to meet you soon again, at one the upcoming missions / workshops! Juha

Interview with Mr. Thorsten Neumann on TAPA EMEA

21.6.2016: Today’s CBRA Interview is with Mr. Thorsten Neumann, from TAPA EMEA and Microsoft.

Hey Thorsten, can you first tell a bit about yourself and what you do?

Hey Juha, thanks for the opportunity to give an interview for the CBRA. First of all, my name is Thorsten Neumann, and I’m the chair of the Transport Assets Protection Association TAPA Europe, Middle East and Africa. I’m leading the board of directors in EMEA and I am the representative in the TAPA Worldwide Council. Furthermore, I’m the director for channel security management at Microsoft within the ANTIPIRACY services department, and I’m leading all our risk management-related Original Equipment Manufacturer (OEM) and Volume Licensing (VL) efforts inside our company. I’m in charge of business resilience, as well.

Can you tell more on TAPA EMEA: What are your main activities in the field of supply chain security?

Since TAPA was founded in 1997 in the US by four major global manufacturing companies, the organization has transformed into a completely new business model. And what we mainly do is, that we connect the dots within the end-to-end supply chain security world. In TAPA EMEA, we have people who are experts in various technologies, industries and countries. If you take a look what we’ve achieved in the last ten to twenty years, you can see that our security certification model has been very successful. It is today one of the most important pillars within the TAPA organization globally. The certification program covers mainly the Freight Security Requirements (FSR) and the Truck Security Requirements (TSR). We are now also working on new Parking Security Requirements (PSR). We also offer a lot of other services and systems, like the Incident Information Service (IIS) that provide tremendous benefits to our members. TAPA is involved in regulatory affairs, as well: we are interacting with the European Commission, the United Nations, the World Customs Organization and other great institutions – they all see us as the leading industry association fighting cargo theft in the global supply chain.

How would you describe both the benefits and challenges of conducting industry-academia research in the field of supply chain security?

Considering the ongoing TAPA-CBRA work, I think increased transparency and the opportunity to identify and fix the weakest security links in the supply chain are the main benefits. I do strongly believe in proactive partnerships with research experts who are capable of identifying and analysing return on investment linked to the great work we are doing as an association. I trust on CBRA’s professional skills and their outstanding network. I’m convinced that, with inputs from TAPA members, CBRA will build the most robust model possible for estimating the total cost of cargo theft. From the study point of view, I’m looking forward to work with you guys.

Can you elaborate a bit on the “Total Cost of Cargo Theft” study background and the expected outcomes of it?

In the first kick-off phase, we try to estimate the total cost of cargo theft in all three TAPA regions – EMEA, Americas and APAC. This study gives us a unique, global overview on the total cost of cargo theft and estimates on various cost components that account for the total cost. I’m proud to work together with CBRA, the Borås University in Sweden and Texas A&M in the US. The plan is also to engage the Singapore Institute for Materials Management (SIMM) in the study.

The background and motive of this study is the following: we are operating in a very competitive business environment, and therefore security managers need to justify and explain budget that they spend on cargo security. With this study, we could underline how dramatic impact cargo theft has not only on company profits but also on the entire economy of a country. If you take a look on what is happening right now for example in Germany, Italy, Netherlands, France, but also in South Africa, Brazil, Malaysia and so forth, you realize the seriousness of modern cargo crime. The study would give us the analytical background and results we need to sell what we do also to the government, to our own companies, to the CEO, CFO, but also of course the WCO, as one of the driving factors of fight against criminals within the supply chain.

Thanks a lot for this interview, Thorsten! By the way, HEC University of Lausanne Executive MBA students learn every spring about the latest & greatest in supply chain security management, including from “TAPA activists” like our buddy Gilad…. Maybe next year you could also join as a guest lecturer at the UNIL eMBA class?

I would be really happy and proud to be a guest lecturer at your university. This fits quite nicely my current activities as I’m already running lectures at the University in Bremen. Count me in and see you in the class room next year. Thanks!

New survey on European postal security

PostEurop and Cross-border Research Association have launched a new online survey on postal security management to promote further development and implementation of best security practices in the postal sector. The survey is part of the ongoing SAFEPOST project that the European Commission is co-funding under the Seventh Framework Programme (FP7). SAFEPOST project going to finish in the end of July after four years of work towards higher postal security in the European Union.

The survey studies the current state of postal security management among PostEurop members, 52 postal operators in 49 European countries. The goal is to collect responses mainly from security and safety managers of the PostEurop members, but also postal expert familiar with sorting and distribution processes are welcome to provide their inputs. The first part of the survey focuses on security implementation and security performance, and the second part studies postal managers’ expectations and concerns regarding the following six main SAFEPOST innovations:

Common Postal Security Space:

SAFEPOST has created an online platform for sharing security-related information between postal operators. This Common Postal Security Space provides a digital track record of security controls and related evidence (for example X-ray images) that a postal parcel has encountered over its journey, and facilitates an easy and controlled way to exchange information both with other operators as well as the authorities.

D-tube drug screening station:

SAFEPOST has demonstrated a new screening solution, D-tube, that can be fully integrated into the sorting process. The D-Tube’s prototype detects illegal substances, such as narcotics and explosives, at high accuracy.

Explosive detection system:

SAFEPOST has demonstrated a Raman spectroscopy screening device for detecting trace amounts of explosives and explosive precursors on the outside of postal items. The device is designed to be seamlessly integrated, at the same level as X-ray machines already used today, in the sorting process and detect the explosive threats at a high accuracy and at a low false alarm rate (≈ 1 %).

Image recognition system:

SAFEPOST has developed an Image Recognition solution that photographs five visible sides of a postal parcel at one or more locations in the postal network. The solution compares these images to detect signs of tampering or damage (≈ 92% detection rate). The current solution functions properly when the conveyor belt moves no faster than 0.5 m/s.

Radiological screening:

SAFEPOST has demonstrated detection of radiation in moving parcels, that can be fully integrated into the sorting process. The current version of the detector is able to detect any harmful level of radiation, and identify the radioactive isotope, and when possible to consider effects of possible attempts of hiding the radioactivity with lead or other shielding material by detecting neutron radiation.

Security standard and certificate:

SAFEPOST project is working towards a new European security standard for the postal operators that would give recommendations about use of security inspection technologies, exchange of security-related information, cyber security, and key security performance indicators. This standard would pave the road towards a voluntary security certification program that would help the postal operators to show their commitment to security.

This survey research is expected to produce interesting new insights about postal security activities and security performance among the PostEurop members. If the response rate is high, the survey findings will set a basis for pan-European benchmarking of security activities. The findings would also contribute to smart policy making, legislation, and standardisation in the field of postal security.

Finally, depending on the response rate, CBRA is going to publish an academic journal paper based on the results. Building on solid theory on supply chain security risk management, the journal paper would provide new empirical about how supply chain security implementation is associated operational and security performance. We expect that collaborative security measures improve both on-time delivery performance (a proxy for operational performance) and supply chain security performance simultaneously. Collaborative security measures include survey items such as “we coordinate security activities with our business customers” and “we exchange customs declaration information with customs authorities electronically [for example, ITMATT or CUSITM messages]”. Another hypothesis is that, on the one hand, non-collaborative security contributes to supply chain security performance but decrease on-time delivery performance on the other hand. Examples of such non-collaborative measures include “we use tamper-evident mail bags to transport high-value postal items” and “We perform security controls also on non-airmail items to detect explosives.” The figure below summarises the theory and hypotheses of the research paper.

blog1506161

Figure 1 Theoretical framework of the SAFEPOST survey paper

The survey findings will be presented in the final SAFEPOST meeting in Madrid 5-6 July 2016. After the meeting, we hope that we can expand the scope of the survey to cover the rest of the world, as well. The next step would be to contact representatives of the Universal Postal Union (UPU) and coordinate distribution of the survey into the organisations’ 192 member countries.

 

CASSANDRA compendium. Technologies for supply chain visibility and security (Ch. 8)

Summary: Chapter 8 of the CASSANDRA compendium reviews current and future technologies that help managers to improve visibility and security over global end-to-end supply chains. The supply chain visibility technologies, in essence, provide logistics managers with a variety of information – shipment data, performance metrics, inventory levels, production / delivery schedules and sales forecast, for example – in or close to real time. The chapter’s review on supply chain security technologies focus mainly on security sensors (e.g., motion detectors), container seals, biometric user authentication devices (e.g., fingerprints), and non-intrusive inspection equipment (e.g., X-ray screening stations). The section also elaborates modern ways for sharing information among stakeholders that are concerned about security of the supply chain. The CASSANDRA compendium is available for download: www.cassandra-project.eu. Review by Toni Männistö (CBRA)

[s2If is_user_logged_in()]

Full review: Chapter 8 includes some interesting details and insights about modern visibility and security technologies, many of which are relevant especially for CORE demonstrations but also for other work packages such as WP2 (SCS controls), WP7 (CORE Connectivity Infrastructure and Solutions Development Environment) and WP8 (CORE Ecosystem).

Many large logistics operators have developed own supply chain visibility systems to coordinate and organise logistics operations. A large logistics service provider, Kühne+Nagel uses its KN login visibility system that allows the company to optimise its complex global operations in terms of speed, time-certainty, security and cost-efficiency and many other relevant metrics. DHL, a German-based international express courier and logistics company, uses its LOGIS software for its operations. Previous EU projects have also developed visibility systems, for example Smart CM SICIS (Shared Intermodal Container Information System).

These visibility systems enable fast response to most operational contingencies that are about cause deviations from original plans. For instance, if a shipper got instant information about a stolen container, a new delivery could be quickly arranged and the consignee could be informed as soon as possible about the reshipment. Moreover, the visibility systems often interface ITC systems of other key stakeholders in the international supply chains. Customs, for example, receive advance cargo information (ACI) automatically from these systems.

The second part of the chapter 8 focuses exclusively on security technologies. The review starts with description of security sensors that are designed to detect tampering, unplanned detours, and other suspicious events in the supply chain. The modern sensor technologies sense at least changes in lighting, acceleration, location (geo-fencing functionality), motion and CO2 levels (used, e.g., to detect stowaways inside shipping containers). The chapter introduces modern user authentication technologies (e.g., fingerprints, face, retina, hand geometry and other unique biometric characteristics). Some information is provided regarding non-intrusive screening solutions that are often considered to be necessary for fast and secure screening operations. The rest of the chapter discusses various technical and institutional solutions for exchanging security-relevant information among supply chain operators and relevant government agencies. Especially interoperability of ICT systems seems to be crucial for effective security efforts in the global supply chains. The CASSANDRA compendium is available for download: www.cassandra-project.eu. Review by Toni Männistö (CBRA)

Reference

Hintsa, J. and Uronen, K. (Eds.) (2012), “Common assessment and analysis of risk in global supply chains “, Compendium of FP7-project CASSANDRA, Chapter 8

CORE2007

[/s2If]

CASSANDRA compendium. Private sector perspectives on risk management (Ch. 5) and crime prevention and security management in supply chains (Ch. 6)

Summary: Chapters 5 & 6 of the CASSANDRA compendium provide a general overview on supply chain security risk management from the private sector perspective. Explaining the essentials of supply chain risk management, Chapter 5 introduces commonly used risk management models and tools (e.g., risk matrices and risk registers), discusses various classifications of supply chain risks, and elaborates current trends of risks and risk management in the supply chain context. Chapter 6 focuses on specific challenges of supply chain security risks – the risks that arise from intentional, man-made criminal activities such as terrorism, theft, trafficking, and sabotage. The chapter explains a few early classifications of supply chain security risks (e.g., motive-based typology and taxonomies based on private sector perspectives). Following the classifications of security risks, the chapter puts forth a few models for managing security risks in the supply chain context (e.g., the 8-layer model for supply chain security management). The chapter concludes with a detailed case study on security management of an international security company and a comparison of supply chain security management and the total quality management (TQM) management philosophy. The CASSANDRA compendium is available for download: www.cassandra-project.eu. Review by Toni Männistö (CBRA)

[s2If is_user_logged_in()]

Full review: Previous observatory entries have already shown the relevance of the CASSANDRA compendium to the community of supply chain management professionals. The compendium’s chapters 5 & 6 give a brief summary of risk management and security risk management in the context of international supply chains. The contents of the chapters are relevant and useful for people involved in FP7 CORE project, especially for those involved in work packages 3 (Multi-method Threat and Vulnerability Analysis Suite) and 4 (SC Situational Awareness Tools & Maps).

Chapter 5 elaborates a set of common supply chain risk management tools. The model of Waters (2007) summarises rather obvious three steps of the risk management process: identifying risks, analysing risks and responding to risks. The model proposes, for example, that managers can identify supply chain risks through analysis of past events, collection of opinions, and through operational analysis. The model also calls for managerial attention to prerequisites of successful risk management – mutual trust, cooperation and information exchange among relevant stakeholders involved in supply chain management – and highlights importance of continuous monitoring and controlling the risk management process. The chapter concludes with the four classic approaches to risk management: risk avoidance, risk reduction, risk transfer (e.g., insurance and contractual agreements), and acceptance. The classifications of supply chain risks include typologies focusing on risk sources (natural hazards operational failure and terrorism), risk consequences (e.g., risk to operations, risk to reputation and risk to profits), and objects of vulnerability (e.g., information, materials, personnel and financial flows).

The chapter on crime prevention and security management (Ch. 6) in supply chains provides a concise summary on supply chain security management from the private sector perspective. The chapter starts by describing some early classifications of supply chain security risks. A motive-based taxonomy classifies such risks into the three categories: economic crime (profit as motive), other crime types (ideological, emotional and other reasons as motive) and facilitating crime that covers activities that do not bring direct crime benefits but help committing other rewarding crime crimes later on. (e.g., document fraud, bribery and use of intimidation). The chapter’s next section elaborates ways to mitigate security risks in the global supply chains, highlighting the key ideas of the so-called 8-layer model for supply chain security management (the model incorporates multiple aspects of risk assessment, hands-on design and planning, implementation of a variety of technologies, procedures, and incentives as well as preparation for dealing with the consequences of supply chain crime). The chapter provides also a case study with an international tobacco company that runs high security risk supply chain operations. The section also contrasts, rather interestingly, principles of security management against the fundaments of the total quality management (TQM) management philosophy. The chapter continues with a brief review of regulations (e.g., EU customs security and aviation security regulations) and standards on supply chain security management (World Customs Organization’s SAFE framework of standards, and industry standards of the Transported Asset Protection Association).

Reference

Hintsa, J. and Uronen, K. (Eds.) (2012), “Common assessment and analysis of risk in global supply chains “, Compendium of FP7-project CASSANDRA, Chapters 5 & 6

CORE2007

[/s2If]

EU logistics security – an interesting decade

I had a great pleasure to work intensively on the European surface transport security standardization efforts, some years ago – this CBRA Blog aims to summarize the main work done, and the key objectives achieved.

 

Couple of years after the US 9/11, 2001 terrorist attacks, the European Commission Directorate General of Transport and Energy, EC DG TREN, started to prepare a proposal for a regulation of the European Parliament and of the Council on enhancing cargo surface transport security. In the meanwhile, 9/11 was already triggering an avalanche of new customs, aviation and maritime supply chain security regulations, programs and standards, in the US, Europe and across the globe. But when it came specifically to surface transport security for road and rail cargo (and inland waterways, to that matter) in Europe, nothing was cooking before the DG TREN initiative “Secure Operator”, first announced in 2004. By 2006, the main goal of the EC proposal for a regulation on enhancing supply chain security (SCS) in the EU was shaped as to achieve greater protection of the European freight transport system against possible terrorist attacks. The specific objectives of the draft regulation were defined as: (i) to increase the level of security along the supply chain without impeding the free flow of trade; (ii) to establish a common framework for a systematic European approach without jeopardizing the common transport market and existing security measures; and (iii) to avoid unnecessary administrative procedures and burdens at European and national levels. In addition, the draft regulation related to the need to prevent a patchwork of various supply chain security standards and solutions across EU.

blog2105162However, it quickly became clear that there was no common sense of urgency in supply chain security regulations across EU Member States, particularly in the context of threat of terrorism to surface (cargo) transport. One was lacking a commitment towards an integrated approach, which would urge everybody to look at the holistic supply chain picture. The countries and especially stakeholder (or, lobby) organizations clearly focused on their specific interests on a part of the supply chain, thus appearing uncomfortable when trying to identify the “big picture”. Ultimately, the draft regulation was blocked in the European legislative process and finally officially withdrawn by the Commission, in 2010.

 

 

In the meanwhile, already in 2005, an expert group in supply chain security was formed under the umbrella of European Committee for Standardization (CEN) – and that’s when Cross-border Research Association started to play a role in the “EU land transport security regulations and standards play”, first as the rapporteur for the expert group, and later as the research party for the technical committee in supply chain security. The expert group was formed technically under the CEN working group “Protection and Security of the Citizen” (CEN/BT/WG161), and the (pre)standardization work was partly based on the Logistics Action Plan of the EC that indicated the need for standardization in the transport security domain for the whole logistic chain.

blog2105163Following the conclusions and recommendations by the expert group, the CEN Technical Committee in Supply Chain Security (CEN/TC 379) was established in 2008, producing ultimately three tangible outputs: Supply Chain Security Feasibility Study (in 2010); CEN Technical Report “Supply Chain Security — Good Practice Guide for Small and Medium Sized Operators” (in 2012, CEN/TR 16412:2012); and, a European Standard: Logistics – Specifications for reporting crime incidents (in 2013, EN 16352:2013-06). The first of the outcomes is available for free (ask by email:  cbra@cross-border.org ), and the latter two you can purchase e.g. from your national standardization institute web shop. All in all, great project experience behind us, couple of good publications, and many new contacts and even few friends for lifetime – thus, no regrets, and if asked, would become rapporteur and lead researcher on these important topics, again and again!

 

 

 

 

And finally, when it comes to the future of SCS regulation and standardization work in Europe – in particular in the land transport security sector (e.g. the LANDSEC expert group, Commission Decision 2012/286/EU): do not be shy in exploiting the tangible outcomes of a decade of our joint work, in particular the Euronorm EN 16352:2013-06, “Logistics: specifications for reporting crime incidents” – no reason to reinvent the wheel!

 

CBRA Blog by Dr. Juha Hintsa on 21.5.2016

 

Summarizing the main milestones of the surface transport security 2004-2014 regulatory and standardization process tracks:

A) Regulatory process -track was largely driven by the European Commission Directorate General for Transport and Energy (EC DG TREN), comprising of the following five sequential steps:
A1. Preparation of the Secure Operator legislation at EC DG TREN (2004-2006)
A2. Publication of the legislative proposal (EC, 2006a)
A3. Publication of an impact assessment study (EC, 2006b)
A4. Announcements and debates at European Parliament and Council (2006-2009)
A5. Withdrawal of the proposal by the Commission, (18.9.2010)

B) Standardization process -track – for which the European Committee for Standardization (CEN) was responsible – consisting of the following seven, chronologically ordered steps:
B1. Establishment of an Expert group in supply chain security, under CEN/BT/WG161, “Protection and Security of the Citizen” (2005)
B2. Publication of the final report of the Expert group, approved by CEN/BT/WG161 (14.11.2006)
B3. Establishment of the CEN Technical Committee in Supply Chain Security, CEN/TC 379 (2008)
B4. Publication of Supply Chain Security Feasibility Study (15.1.2010)
B5. Publication of the CEN Technical Report, CEN/TR 16412:2012 “Supply Chain Security — Good Practice Guide for Small and Medium Sized Operators” (2012)
B6. Publication of a European Standard: Logistics – Specifications for reporting crime incidents, EN 16352:2013-06 (2013)
B7. Closure of the CEN Technical Committee in Supply Chain Security, CEN/TC 379 (2014).

 

blog2105164

Main references / bibliography:

  • CEN (2013), “Logistics: specifications for reporting crime incidents”, EN 16352:2013-06
  • CEN (2012), “Supply chain security (SCS): Good practice guide for small and medium sized operators”, CEN/TR 16412:2012
  • CEN (2006), “Expert group: Supply chain security”, approved by CEN/BT/WG161, 14.1.2006
  • EC (2012), “Commission Staff Working Document on Transport Security”, SWD(2012), 143 final.
  • EC (2006a), COM(2006)79 final, 2006/0025(COD), COMMUNICATION FROM THE COMMISSION TO THE COUNCIL, THE EUROPEAN PARLIAMENT, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS on enhancing supply chain security Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on enhancing supply chain security, (SEC(2006)251)
  • EC (2006b), SEC(2006)251 COMMISSION STAFF WORKING DOCUMENT. Annex to the COMMUNICATION FROM THE COMMISSION TO THE COUNCIL, THE EUROPEAN PARLIAMENT, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS on enhancing supply chain security and Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on enhancing supply chain security – IMPACT ASSESSMENT – {COM(2006)79 final}
  • Hintsa, J., Ahokas, J., Männistö, T. and Sahlstedt, J. (2010), “CEN supply chain security (SCS) feasibility study”, CEN/TC 379 Supply Chain Security, Final report, 15.12010

 

 

Review of TAPA TACSS – Air Cargo Security Standards, 2012 (CORE1045)

Summary: TAPA TACSS – Air Cargo Security Standards (TACSS) is a certifiable security program for the air cargo industry to close down, as much as possible, all risks for high value freight whilst being handled and transported on the ground. Available to General Public at the TAPA Website, this standard is hyperlinked here: https://www.tapaemea.com

[s2If is_user_logged_in()]

Full review: The Transported Asset Protection Association (TAPA) is a self-funded industry group comprising of manufacturers, shippers, logistics providers and law enforcement agencies that share the objective to eliminate loss of product by criminal act. The theft of high value, high risk products moving in supply chains in Europe costs businesses in excess of € 8.2 billion a year.

Although the focus of TAPA is to stop the unauthorized removal of items from the logistics chain, many of the methods used by criminals to achieve this are entirely relevant to the other security threats seen within the industry. E.g. unauthorized entry, deception techniques, tampering of shipments etc.  TAPA has created a number of certifiable security standards:

  • FSR (Freight Security Requirements)
  • TSR (Trucking Security Requirements)
  • PSR (Parking Security Requirements)
  • TACSS (TAPA Air Cargo Security Standards)

The latter one, TACSS is a set of security standards designed specifically for Air Cargo Handling Facilities. It takes into account the mode of operation of such terminals often having open doors, and yet often operating inside a secure area within an airport, behind a fence. By providing comprehensive requirements and a certification scheme for the protection of air cargo whilst being transported on the ground, TAPA hopes to provide its own members and industry partners with viable options for improving and/or maintaining an effective air cargo security program.

There are two levels to the Standard. Level 1 & Level 2, with 1 being the higher level of security, and the decision of which Level to certify against is decided by risk assessment which takes into account the geographical location of the facility and crime levels in the area. Certification is by Independent Validator against a checklist and valid for 2 years.

Detailed analysis of relevance for CORE: The CORE implementation objectives, which specify what will be done and how to reach the vision, are all subject to the Policies, Regulations, and Standards that exist within the Security Domain of the Global Supply Chain. Among all Work Packages of the project, some are directly impacted by the project, while others are solely primarily or secondarily contributed. Among these Work Packages, the CORE demonstrators will validate the applicability and benefits of the CORE approach in representative operating scenarios characteristic of the global supply chain. They will specifically show the way towards a Global Secure Supply Chain. The overriding goal is to demonstrate substantial gains in security and facilitation covering every major facet of the supply chain security sector.

The following Work Packages are directly impacted by the TACSS initiative:

  • WP7: CORE Connectivity Infrastructure and Solutions Development Environment – provide an integrated set of tools for developing solutions for the Demonstrators in line with SCSRF utilizing results from reference projects particularly e-Freight and ICargo.
  • WP12: Demonstrator Schiphol – apply global data pipeline concept to air cargo supply chains, managing air freight specific trade compliance requirements, and offering supply chain visibility in dashboards. Trade lanes with e.g. Africa, involving multiple inspection authorities.
  • WP17: DHL Demonstrator – managing airfreight trade compliance requirements EU-US in the context of fast supplying of parts. In this demonstrator, TAPA TACSS and mutual recognition with the US will become evident.

The following Work Packages are primarily affected by TAPA TACSS, as airfreight is part of global supply chain:

  • WP14: Demonstrator FALACUS – FastLAne through CUStoms – implement an extensive supply chain of ceramics products along international corridors between Italy and USA.
  • WP15: Decathlon Demonstrator – operational and security related Key Performance Indicators (KPIs) within the CORE framework will be applied to monitor the overall level of security within the supply chain for different supply chain actors Taiwan to retail shop destinations across Europe implementation of this new transit modality and the impact it would have on the overall performance of the supply chain.
  • WP19: Stakeholder Engagement – Knowledge Diffusion and Sustainable Development – Specify and apply an inclusive Stakeholder Engagement Strategy emphasizing international co-operation to promote harmonization of regulations, and to support further development and implementation of international standards.

The TACSS Initiative could also help with the following Work Packages, with the following secondary effects:

  • WP3: Multi-method Threat and Vulnerability Analysis (MTVA) Suite
  • WP4: SC Situational Awareness Tools & Maps
  • WP5: Real-time Lean Agile Resilient Green Optimized (LARG+O) SC
  • WP16: ENI Demonstrator
  • WP22: Analysis and Testing of a Secure Hybrid Composite Container

CORE Impact anticipation: CORE seeks to give consolidated solutions and develop the resilience, optimization and interoperability of the global supply chain, including Port, Container, Post, Truck, Rail, Maritime and Air. Air freight is thence a part of the global vision of CORE. TAPA TACCS contributes thence directly to CORE vision. Impact?

Cross-references: Air Cargo World on TAPA TACSS and air cargo crimes: www.aircargoworld.com

Full citation: TAPA EMEA Website, TACSS Page, accessed 23 September 2014: https://www.tapaemea.com

 

CORE1045

[/s2If]

Review of TRANSPark truck parking service (CORE1041)

Summary: As a response to the increasing security concerns surrounding goods transport by road, the IRU Membership has been providing information on safe and secure truck parking areas to road hauliers and truck drivers for more than two decades. Since the early 1990s, this information was disseminated in the form of a printed handbook. In 2007 the online website was launched.  In 2013 a smartphone app was launched. Currently initiatives are taken to encourage the use of TRANSPark globally. It does not have much documentation available, except promotional fliers and the website and the app themselves. Available to the General Public at: http://www.iru.org and through the Android and iPhone TRANSPark app, which can be downloaded from the stores. Overall relevance to CORE is high, as truck transports constantly risk being attacked by organised crime with the aim to either steal fuel, cargo or potentially even to use a truck for terrorist purposes. Therefore, ensuring that trucks are parked at safe and secure truck parking areas is essential for drivers, road hauliers, shippers and other stakeholders involved in supply chain security.

[s2If is_user_logged_in()]

Full review: The current strengths include: Bringing information on safe and secure truck parking areas to drivers and road hauliers; Offering a driver-haulier-shipper-enforcement social network, enabling info sharing on latest road cargo related security threats; and providing flexible platform with expected future expansions to further ensure information sharing between key road haulage actors. Future opportunity is: Using this established communication channel for two-way information sharing with truck drivers, road hauliers, shippers and enforcement. And future threat is: The success of this community, as any other, depends strongly on the uptake by users.

Detailed analysis and relevance for CORE: The CORE implementation objectives depend on securing every element of the supply chain, and ensuring swift information sharing between different actors. TRANSPark could be relevant to following Work Packages:

  • Research and Analysis: TRANSPark-relevant information could contribute to understanding the amount of crime against road hauliers on roads, such as fuel theft and cargo theft.
  • Demonstrators: TRANSPark webservice and app(s) could be made available to the CORE demonstrators. Certain TRANSPark functionalities could be amended to suit CORE developments better, in all demonstrators where trucks need to take a rest or stay at truck parking areas.

CORE Impact anticipation: CORE could have a strong impact on future developments of the TRANSPark webservice and the app. The service is constantly evolving and is looking for new ways to improve security of the road haulage for drivers, hauliers, and other relevant stakeholders.

App and video:

Available to General Public at: http://www.iru.org  and through the Android and iPhone TRANSPark app, which can be downloaded from the stores.

Youtube video on TRANSPark: https://www.youtube.com

 

CORE 1041

[/s2If]