CASSANDRA compendium. Technologies for supply chain visibility and security (Ch. 8)

Summary: Chapter 8 of the CASSANDRA compendium reviews current and future technologies that help managers to improve visibility and security over global end-to-end supply chains. The supply chain visibility technologies, in essence, provide logistics managers with a variety of information – shipment data, performance metrics, inventory levels, production / delivery schedules and sales forecast, for example – in or close to real time. The chapter’s review on supply chain security technologies focus mainly on security sensors (e.g., motion detectors), container seals, biometric user authentication devices (e.g., fingerprints), and non-intrusive inspection equipment (e.g., X-ray screening stations). The section also elaborates modern ways for sharing information among stakeholders that are concerned about security of the supply chain. The CASSANDRA compendium is available for download: www.cassandra-project.eu. Review by Toni Männistö (CBRA)

[s2If is_user_logged_in()]

Full review: Chapter 8 includes some interesting details and insights about modern visibility and security technologies, many of which are relevant especially for CORE demonstrations but also for other work packages such as WP2 (SCS controls), WP7 (CORE Connectivity Infrastructure and Solutions Development Environment) and WP8 (CORE Ecosystem).

Many large logistics operators have developed own supply chain visibility systems to coordinate and organise logistics operations. A large logistics service provider, Kühne+Nagel uses its KN login visibility system that allows the company to optimise its complex global operations in terms of speed, time-certainty, security and cost-efficiency and many other relevant metrics. DHL, a German-based international express courier and logistics company, uses its LOGIS software for its operations. Previous EU projects have also developed visibility systems, for example Smart CM SICIS (Shared Intermodal Container Information System).

These visibility systems enable fast response to most operational contingencies that are about cause deviations from original plans. For instance, if a shipper got instant information about a stolen container, a new delivery could be quickly arranged and the consignee could be informed as soon as possible about the reshipment. Moreover, the visibility systems often interface ITC systems of other key stakeholders in the international supply chains. Customs, for example, receive advance cargo information (ACI) automatically from these systems.

The second part of the chapter 8 focuses exclusively on security technologies. The review starts with description of security sensors that are designed to detect tampering, unplanned detours, and other suspicious events in the supply chain. The modern sensor technologies sense at least changes in lighting, acceleration, location (geo-fencing functionality), motion and CO2 levels (used, e.g., to detect stowaways inside shipping containers). The chapter introduces modern user authentication technologies (e.g., fingerprints, face, retina, hand geometry and other unique biometric characteristics). Some information is provided regarding non-intrusive screening solutions that are often considered to be necessary for fast and secure screening operations. The rest of the chapter discusses various technical and institutional solutions for exchanging security-relevant information among supply chain operators and relevant government agencies. Especially interoperability of ICT systems seems to be crucial for effective security efforts in the global supply chains. The CASSANDRA compendium is available for download: www.cassandra-project.eu. Review by Toni Männistö (CBRA)

Reference

Hintsa, J. and Uronen, K. (Eds.) (2012), “Common assessment and analysis of risk in global supply chains “, Compendium of FP7-project CASSANDRA, Chapter 8

CORE2007

[/s2If]

MARITIME SECURITY – Vessel Tracking Systems Provide Key Information, but the Need for Duplicate Data Should Be Reviewed, GAO, March 2009 (CORE1065)

Summary: The US government considers identification and tracking of vessels at the US coastal areas, inland waterways and ports important for protecting the US homeland and economy from maritime terrorism. The US coastal guards use a range of identification and tracking solutions to detect any anomalies in maritime traffic that might suggest terrorist activity, such as transportation of weapons of mass destruction, use of explosive-laden boats as weapons, smuggling of weapons, drugs, people or other contraband. This GAO report reviews the US Coast Guards’ current and future solutions for monitoring the maritime traffic: long-range identification and tracking system (LRIT), long-range automatic identification system (AIS) and various radar and camera systems. The report elaborates strengths and weaknesses of these identification and tracking solutions and proposes a roadmap for further strengthening of the US coastal security. The future advancements should pay particular attention to tracking of small and non-commercial vessels and to reconsider ways to collect and analyze data that is relevant for coastal surveillance.  Offering background information about vessel-level tracking and tracing of maritime cargo movements, the report is a relevant source document for those CORE demonstrations that involve shipping of containers from, through and into the US. The report is available for download at: www.gao.gov/new.items/d09337.pdf.

[s2If is_user_logged_in()]

Full review: CORE demonstrations of WP9 and WP14 benefit from the background information this GAO document offers on identification and tracking of vessels because these two demos involve US seaports and shipping at the US territorial waters. Also the CORE’s risk and IT clusters might find the information of this GAO document useful. The information that the identification and tracking provide allow the coastal guards to assess risk-levels of individual vessel movements and decide when it is reasonable to intervene and check anomalies. The vessel tracking and identification involves also a great deal of IT integration because it currently involves many technical components and synthetizes data collected from many different sources.

Cross-references:

  • Maritime Security: Information Sharing Efforts Are Improving. GAO-06-933T. Washington, D.C.: July 10, 2006.
  • Maritime Security: Public Safety Consequences of a Terrorist Attack on a Tanker Carrying Liquefied Natural Gas Need Clarification. GAO-07-316. Washington, D.C.: February 22, 2007.
  • Maritime Security: Coast Guard Inspections Identify and Correct Facility Deficiencies, but More Analysis Needed of Program’s Staffing, Practices, and Data. GAO-08-12. Washington, D.C.: February 14, 2008.

Additional keywords: Maritime security, long-range identification and tracking system (LRIT), long-range automatic identification system (AIS), track & trace

 

CORE1065

[/s2If]

MARITIME SECURITY – DHS Progress and Challenges in Key Areas of Port Security, GAO, July 2010 (CORE1064)

Summary: This GAO report analyses the progress the US Department of Homeland Security (DHS) has made in maritime supply chain security over the past five to ten years. The report raises problems that the DHS and its component agencies – the Coast Guard and the Customs and Border Protection (CBP) – have encountered regarding improvement of risk management, reduction of the vulnerability to threats of small vessels, implementation of security assessment in foreign ports, and the overall progress in supply chain security.  The report states that so far the Coast Guard has carried out risk assessments, but their results do not allow effective comparison and prioritization of risks across ports. The Coast guard has also identified points of vulnerability related to waterside attacks by small vessels, reached out to the general public to encourage recreational sailors to report anomalies, started tracking of small vessel, tested equipment to screen small vessels for nuclear material and conducted security maneuvers such as vessel escorts. Nevertheless, resource constraints and technical problems prevent the Coast Guard to protect the US coastline and maritime infrastructure from small-vessel threats effectively. Moreover, the Coast Guard has been assessing security in foreign ports, but the lack of the agency’s resources and certain countries’ reluctance to collaborate with the US authorities have slowed down the global security assessment. Finally, as for the general supply chain security, the DHS has been running the Secure Freight Initiative (SFI) in foreign ports to test the feasibility of the 100% scanning of US-bound shipping containers with non-intrusive inspection (NII) technologies and radiation detection equipment. The findings of the SFI pilots indicate that the 100% scanning is not a feasible policy because it would disrupt port logistics, damage international trade and raise healthy concerns, among other things. The report is available for download at: www.gao.gov/assets/660/659087.pdf.

[s2If is_user_logged_in()]

Full review: This GAO review concentrates on the US maritime supply chain security. The document provides important information for people who are working for the CORE demonstrations of WP1 and WP14 because these demos involve maritime transportation into and from the US mainland. Those demonstrations that test tracking & tracking solutions might benefit from the document’s update on small-vessel identification and tracking systems.

Cross-references:

  • Coast Guard: Deployable Operations Group Achieving Organizational Benefits, but Challenges Remain. GAO-10-433R. Washington, D.C.: April 7, 2010.
  • Supply Chain Security: Feasibility and Cost-Benefit Analysis Would Assist DHS and Congress in Assessing and Implementing the Requirement to Scan 100 Percent of U.S.-Bound Containers. GAO-10-12. Washington, D.C.: October 30, 2009.
  • Maritime Security: The SAFE Port Act: Status and Implementation One Year Later. GAO-08-126T. Washington, D.C.: October 30, 2007.
  • Maritime Security: Vessel Tracking Systems Provide Key Information, but the Need for Duplicate Data Should Be Reviewed. GAO-09-337. Washington, D.C.: March 17, 2009.
  • Supply Chain Security: Challenges to Scanning 100 Percent of U.S.-Bound Cargo Containers. GAO-08-533T. Washington, D.C., June 12, 2008.

Additional keywords: Maritime security, supply chain security, 100% scanning and track & trace

 

CORE1064

[/s2If]

AVIATION SECURITY – Progress Made, but Challenges Persist in Meeting the Screening Mandate for Air Cargo, GAO, March 2011 (CORE1062)

Summary: This GAO report reviews the recent progress of the US air cargo security scheme. The Transportation Security Administration (TSA), the main agency responsible for the US air cargo security, has been working towards the implementation of the 100% screening requirements of the 9/11 Commission Act of 2007. So far TSA has set up a voluntary Certified Cargo Screening Program (CCSP) to allow trusted logistics operators to screen air cargo outside congested airports, launched a program for testing technologies for air cargo screening and expanding its program for approving explosive detection dog teams. The main obstacle in meeting the 100% screening requirement is that TSA has no reliable mechanism for verifying screening data from domestic foreign screening operators, which self-report the data. TSA also struggles in finding resources to employ as many transport security inspectors as it is required to oversee the Certified Cargo Screening Program. The report also points out that the current technologies that TSA has approved for cargo screening cannot screen large cargo units – pallets or unit loading devices (ULDs) – and this incapability reduces speed and cost-efficiency of air cargo screening. Overall, this GAO document provides a general outlook on state and challenges the US air cargo security regime, and therefore those CORE demonstrations that focus on the US-bound or US-origin air transport should consider the report as a key source material. The report is available for download at: www.gao.gov/assets/130/125678.pdf.

[s2If is_user_logged_in()]

Full review: This document is relevant for the CORE demonstrations that involve air transportation into or through or from the US. Especially the DHL demo, that concentrates on shipping of military aircraft parts from the US to Spain, is affected by the TSA’s programs and initiatives that the report analyses. The report is very concise and informative, so it might be beneficial to the CORE’s educational and training activities.

Cross-references:

  • GAO, Aviation Security: Federal Coordination for Responding to In-flight Security Threats Has Matured, but Procedures Can Be Strengthened, (Washington, D.C.: July 31, 2007).
  • GAO, Aviation Security: Transportation Security Administration May Face Resource and other Challenges in Developing a System to Screen All Cargo Transported on Passenger Aircraft
  • GAO, Aviation Security: Federal Efforts to Secure U.S.-Bound Air Cargo Are in the Early Stages and Could Be Strengthened, GAO-07-660 (Washington, D.C.: April 2007).
  • GAO, Aviation Security: Progress Made in Systematic Planning to Guide Key Investment Decisions, but More Work Remains, GAO-07-448T (Washington, D.C.: February 13, 2007).

Additional keywords: Air cargo security, 100% screening, Certified Cargo Screening Program (CCSP)

 

CORE1062

[/s2If]

SUPPLY CHAIN SECURITY – CBP Needs to Enhance Its Guidance and Oversight of High-Risk Maritime Cargo Shipments, GAO, January 2015 (CORE1059)

Summary: The report reviews the US Customs and Border Protection’s (CPB) approach to risk assessment and targeting of maritime shipping containers. The report’s highlights that CPB does not have clear decision rules and reporting procedures to monitor percentage of containers that the risk assessment system flags high-risk and that get eventually examined. The source of this problem is that the CPB’s officials (targeters) may waive examination of the high-risk containers if the container (i) falls within a predetermined category (standard exception), or (ii) the targeters can articulate why the shipment should not be considered high risk. The targeting units have currently differing definitions of “standard exceptions” and differing views on what constitutes the “articulate reasons.” The GAO report recommends the CPB to clarify, harmonize and enforce the rules and the procedures for waiving the high-risk containers from examination. As for CORE, this report provides a detailed and recent outlook on the US maritime risk assessment and targeting scheme, and this information is going to support work of the CORE’s risk cluster and the demonstrations that involve shipping of sea containers into the US. The report is available for download at: www.gao.gov/assets/670/668098.pdf.

[s2If is_user_logged_in()]

Full review: This GAO reports contains crucial information about the US risk assessment and container targeting systems that benefit the CORE’s risk cluster. The report outlines principles, procedures, datasets and scanning methods that constitute the world’s most advanced risk assessment system for maritime shipping containers. The CORE’s IT cluster might also benefit from the report’s description of the CPB’s Automated Targeting System (ATS) that is used to compute risk scores for shipping containers and flag the ones with the highest score as high-risk. Regarding the CORE demonstrations, the GM demon (WP19) must comply with data requirements (24-hour rule and the “10+2” rule) that enable the US risk assessment and targeting system. Also the demos involving customs controls, especially WP11.2 and WP10.1, may learn something from the ways how the US border control authorities are assessing risk levels of incoming containers.

Cross-references:

  • Supply Chain Security: CBP Needs to Conduct Regular Assessments of Its Cargo Targeting System. GAO-13-9. Washington, D.C.: October 25, 2012.
  • Maritime Security: Progress and Challenges in Key DHS Programs to Secure the Maritime Borders. GAO-14-196T. Washington, D.C.: November 19, 2013.
  • Supply Chain Security: Feasibility and Cost-Benefit Analysis Would Assist DHS and Congress in Assessing and Implementing the Requirement to Scan 100 Percent of U.S.-Bound Containers. GAO-10-12. Washington, D.C.: October 30, 2009.

Additional keywords: Security Filing and Additional Carrier Requirements (known as the 10+2 rule), 24-hour rule, risk assessment

 

CORE1059

[/s2If]

MARITIME SECURITY – Progress and Challenges with Selected Port Security Programs, GAO, June 2014 (CORE1019)

Summary: The report provides a comprehensive review of progress and challenges of various port security activities and programs the Department of Homeland Security (DHS) has carried out since 9/11. In essence, the report is a summary and an update of a number of more detailed GAO reports on maritime supply chain security. The report states that needs to strengthen further its efforts on maritime domain awareness through intensified communication among maritime stakeholders. Regarding the US domestic port security, the report recommends DHS to reassess its Port Security Grant Program (PSGP) that allows ports to request funds for security projects and to improve quality of vulnerability assessment in US ports. The report also urges DHS to overcome challenges of risk-based targeting and scanning of US-bound shipping containers.  The findings and recommendations of this report help CORE consortium understand the current state of the US maritime security regime. This understanding benefits particularly the demonstrations of WP9 and WP14. Also educational and training as well as risk clusters of CORE may find the report’s information useful. The report is available for download at: www.gao.gov/assets/670/663784.pdf.

[s2If is_user_logged_in()]

Full review: This GAO document summarizes the US maritime supply chain security and provides useful information for the CORE project across its work packages. This information most obviously benefits WP9 and WP14 that involve US-bound maritime trade lanes. However, also the CORE’s risk cluster can find useful insight in the report, for example about challenges and opportunities of risk-based container targeting and screening approaches. This summary GAO document caters the needs of state-of-the-art work packages and the CORE’s educational and training cluster that aims to produce relevant and up-to-date material about supply chain security for a variety of stakeholders.

Cross-references:

  • Combating Nuclear Smuggling: Additional Actions Needed to Ensure Adequate Testing of Next Generation Radiation Detection Equipment. GAO-07-1247T. Washington, D.C.: September 18,
  • Supply Chain Security: CBP Has Made Progress in Assisting the Trade Industry in Implementing the New Importer Security Filing Requirements, but Some Challenges Remain. GAO-10-841. Washington, D.C.: September 10, 2010.
  • Supply Chain Security: CBP Needs to Conduct Regular Assessments of Its Cargo Targeting System, GAO-13-9. October 25, 2012.

Additional keywords: Maritime security, Port Security Grant Program (PSGP), risk-based controls, targeting, container scanning

 

CORE1019

[/s2If]

MARITIME SECURITY – Progress and Challenges in Key DHS Programs to Secure the Maritime Borders, GAO, November 2013 (CORE1018)

Summary: This report is a summary of previous GAO reports on US maritime supply chain security and border controls. The report focuses on progress and challenges in four main areas of the Department of Homeland Security’s (DHS) activity on the maritime security. The report highlights that DHS and its component Coast Guard agency could improve its maritime domain awareness through increased information sharing and more advanced vessel-tracking systems. The Customs and Border Protection (CBP) in turn could step up its role in securing US-bound container traffic by conducting more frequent risk assessment audits in key foreign ports that ship cargo into the US and by fostering more close relationship with foreign authorities. The GAO report also recommends the Coast Guard to rethink its maritime surveillance, interdiction and security operations because current protection and support is not adequate in high priority locations. The report also calls for more collaboration and coordination among maritime authorities, port operators and ocean carriers. Finally, the report encourages the DHS to develop performance metrics and data collection procedures the agency uses to assess and monitor its maritime security programs and activities. This report gives a recent update on the US maritime security activities that might be helpful for CORE demonstrations and clusters. The report is available for download at: www.gao.gov/assets/660/659087.pdf.

[s2If is_user_logged_in()]

Full review: This summary GAO documents provides detailed background material about the US maritime security programs. This information is very relevant for the CORE demonstrations WP9 and WP14 that involve shipping cargo from and into the US. The information this document offers also help the CORE’s risk and IT clusters to learn lessons from the US approach to risk-based maritime security and security-related IT integration.

Cross-references:

  • Maritime Security: Ferry Security Measures Have Been Implemented, but Evaluating Existing Studies Could Further Enhance Security. GAO-11-207. Washington, D.C.: December 3, 2010.
  • Supply Chain Security: DHS Could Improve Cargo Security by Periodically Assessing Risks from Foreign Ports. GAO-13-764. Washington, D.C.: September 16, 2013.

Additional keywords: Maritime security, maritime surveillance, risk-based controls, targeting, container scanning

 

CORE1018

[/s2If]

 

Review of the TIR Convention and its accompanying Security and Risk Management electronic tools, 2013 (CORE1040)

Summary: The Customs Convention on the International Transport of Goods under Cover of TIR Carnets (TIR Convention, 1975) constitutes the international legal framework for the TIR system. TIR is the only universal Customs transit system, today operational in 58 countries, that allows the goods to transit from a country of origin to a country of destination in sealed load compartments with Customs control recognition along the supply chain. This minimizes administrative and financial burdens, while Customs duties and taxes that may become due are covered by an international guarantee (covering more than USD 1 billion worth of international trade every day). In order to ensure the security of the TIR System, electronic controls run in parallel with the security elements already specified in the TIR Convention. TIR handbook can be found at: http://www.unece.org

[s2If is_user_logged_in()]

Full review: The TIR system is an international Customs transit system for goods. ‘TIR’ stands for Transports Internationaux Routiers (International Road Transport) and is an international harmonized system of Customs control that facilitates trade and transport whilst effectively protecting the revenue of each Country through which goods are carried. It is based on six essential principles and an electronic security and risk management control system composed of four tools:

  • Secure vehicles or containers: Goods are carried in sealed vehicles or containers which are approved for use by Customs and re-approved every two years.
  • International chain of guarantee: Duties and taxes due in case of irregularity are secured by an international guarantee chain throughout the journey.
  • TIR Carnet: The goods are accompanied by the TIR Carnet: a harmonized control document accepted by the Customs authorities of the countries of departure, transit and destination.
  • Mutual recognition of Customs controls: Control measures taken in the country of departure are accepted by countries of transit and destination.
  • Controlled access: Access to the TIR system for national issuing and guaranteeing Associations is given by the competent national authorities, and for transport operators, by the national Customs authorities and the national Association.
  • SafeTIR: An electronic control system for TIR Carnets that provides traceability and risk management, as described in Annex 10 to the TIR Convention.

Real-Time SafeTIR (RTS) allows customs officers to enhance their risk management procedures and comprises following three modules:

  • SafeTIR data transmission module: Once a TIR operation is terminated, RTS automatically sends a SafeTIR message to the IRU.
  • TCHQ: TIR Carnet Query Module allows any customs office to obtain immediate information on the status of the Carnet for the prompt detection of any possible irregularities.
  • SafeTIR Reconciliation Automation module: automates the SafeTIR data reconciliation procedure.

TIR Customs Portal is an online service developed by the IRU, which allows customs officers to:

  • obtain immediate information on the status of the TIR Carnet for the prompt detection of any possible irregularities; and
  • transmit SafeTIR data on the termination of the TIR operation.

ASKTIRweb makes it easier for TIR associations to manage the entire life-cycle of the TIR Carnets from the time of order and delivery from IRU until their return to the IRU and the subsequent administrative procedures such as claims and SafeTIR. ASKTIRweb is a mandatory TIR Carnet management system for all new TIR associations.

The TIR-EPD application is intended for submission of advance information on transported goods to Customs Authorities. Fully compliant with WCO SAFE Framework of Standards and with the national regulations of connected countries, TIR-EPD enables Customs Authorities to perform advance risk analysis. TIR Carnet Holders can send advance information free-of-charge simultaneously to the Customs Authorities of the countries according to their itineraries.

In order to ensure the security of the TIR System, electronic controls run in parallel with the security elements already specified in the TIR Convention.

The perceived strengths of the TIR-system include: Access to 58 TIR operational countries; Management of a low cost, high value guarantee; Intermodality; Security in the supply chain; Reduced delays and costs for the international transit of goods; and Trade facilitation – goods move across international borders with minimum interference. Future opportunities include: Increased trust with national Customs; Encouragement of international trade; and Economic benefits for supply chain actors and nations.

Detailed analysis and relevance for CORE:

Research and analysis: The TIR system is based on proven business-to-governments solutions and both CORE and the TIR system could benefit from an investigation and evaluation of the legal, technical and operational feasibility as well as the business benefits of integrating TIR data to the CORE ecosystem and CORE concepts and solutions such as “trusted trade lane”, “data pipeline”, “piggy-backing” for customs and “dashboards”.

Demonstrators: The use of TIR and its security and risk management electronic tools in the framework of CORE demonstrators can have four different types of advantages which meet CORE’s overarching objectives to optimize the security of global supply chain whilst maintaining or improving business performance:

  • Compliance with customs requirements: customs duties attached to the goods guaranteed by the TIR guarantee chain.
  • Security of exchanges: transmission of safety and security data, in accordance with e.g. EU Customs legislation, to national customs before the arrival of the goods at borders.
  • Facilitation of international trade: mutual recognition of customs controls for all TIR countries and reduction of customs formalities at borders.
  • Visibility of data: use of TIR security and risk management electronic tools to check the status of TIR operations in real-time.

CORE Impact anticipation: CORE can have an important impact on the TIR system by reinforcing its place as a global multimodal logistics and trade solution. The investigation and evaluation of the legal, technical and operational feasibility as well as the business benefits of using the existing features of the TIR system within the CORE ecosystem and opening cargo-related datasets can contribute to improving freight and logistics services provision and operations by shippers, LSPs, transport operators, ports and customs authorities. The efficiency and security upgrades will come by significantly reducing waiting times and administrative burden at borders and at the same time providing a more cost efficient way of improved supply chain visibility and traceability of cargo to the benefit of all private and public stakeholders.

Cross-references:

Application of the TIR Convention in the EU: Council Regulation (EEC) No 2913/92; Commission Regulation (EEC) No 2454/93 and Regulation (EU) No 952/2013 of the European Parliament and of the Council applicable as of 1 May 2016.

Youtube video on TIR: https://www.youtube.com

 

CORE1040

[/s2If]

Better Management of EU Borders through Cooperation, 2011 (CORE1114)

Summary: This report by the Center for the Study of Democracy investigates existing forms of cooperation between Border Guards and customs administrations in the European Union. The study highlights obstacles to cooperation and proposes solutions and best practices for overcoming them. The study finds that despite the common policy interest on border agency cooperation and the associated pan-European standardisation efforts, the individual Member states decide the extent and forms of customs-border guard co-operation on their own. As a result, the current state of border agency collaboration and potential for improvements differ substantially between the member states. The main differences arise from the institutional set-up (e.g., number and roles of border control agencies), powers and competencies of the border control agencies, and the legislative basis (especially legal differences in terms of privacy, data protection and confidentiality of trade information). Download the report here: http://ec.europa.eu. Review by Toni Männistö (CBRA)

[s2If is_user_logged_in()]

Full review: The study concludes with a large number of recommendations for the European Union, the member states, and for the customs and border guards. The European Union should generate political will to act upon remaining challenges of border agency cooperation by creating awareness through public debates, communications and impact assessments. The EU bodies should act mediators to reconcile institutional interests of different border control agencies. The EU could also commission pilot projects on border agency cooperation, encourage joint training and increase funding of related research and development activities. Also the mandate of Frontex could be expanded to cover customs cooperation.

The individual member states should, according to the report, also mediate negotiations between border control agencies to overcome possible conflicts of interest. The member states should also evaluate impacts of various forms of customs-border guard cooperation.

The border guards and customs administrations themselves should identify and exchange best practices for strengthening their mutual collaboration. The agencies, the report recommends, should take responsibility for the pilot projects and for evaluating outcomes of the different forms of cooperation. To further improve the cooperation across the entire EU customs union, the customs and border control agencies should use Frontex more as their platform to conduct joint operations at the EU’s external border.

Reference: Center for the Study of Democracy, (2011), “Better Management of EU Borders through Cooperation”, Study to Identify Best Practices on the Cooperation Between Border Guards and Customs Administrations Working at the External Borders of the EU

 

CORE1114

[/s2If]

A Decade of GAO’s Supply Chain Security Oversight, 2015 (CORE1113)

Summary: The US Government Accountability Office (GAO) is an independent government watchdog organization that has been publishing many reports on the US government’s supply chain security initiatives over the past ten years. This article reviews 25 most relevant GAO’s reports that discuss strengths, weaknesses and future challenges of the US policies and regulations on supply chain security. The review findings reveal interesting facts about similarities and differences of the US and the EU approaches to supply chain security. This comparison opens new venues for further Transatlantic benchmarking as well as harmonisation and mutual recognition of supply chain security programs. This review was conducted as part of European FP7-Project CORE.  The reviewed document is available for download here: https://hicl.org. Review by Toni Männistö (CBRA)

[s2If is_user_logged_in()]

Full review: The GAO reports suggest that the US administration has been struggling with effective performance monitoring and auditing of its supply chain security initiatives. The reports indicate that there is some confusion about costs of security initiatives for the government and for the business community. There is also a lack of common understanding about the actual benefits of many of these programs. The GAO reports also urge US government officials to adopt risk-based approach to supply chain security, for example to use information and intelligence to assess risk levels of specific shipments, people, trading companies, and other entities, and then employ security solutions that are commensurate to the risk level. The GAO reports also emphasize the importance of involving the industry in the process of defining new policies and regulations.

Altogether, the review team found that the GAO documents are not only highly relevant for SCS management and governance but also of high quality. The study concludes that it might be useful for the EU to establish a quality-assurance organization similar to the US GAO. This new EU body would oversee spending of the EU and its member states on supply chain security programs and projects and this way improve efficiency of such investments.

Reference: Männistö, T., and Hintsa J., (2015), “A Decade of GAO’s Supply Chain Security Oversight,” Proceedings of the Hamburg International Conference in Logistics (HICL), September 24-25, 2015, Hamburg

 

CORE1113

[/s2If]