Assessing the drivers of change for cross-border supply chains (CORE1205)

Summary: This paper explores the main global change drivers and how they impact on international supply chain management in the next two decades. The Delhi method is adapted to structure communication, to produce well-grounded opinions and counter-arguments, and to find consensus among selected experts. The results highlight efficient networking and business-to-business and business-to-government collaboration as core supply chain management competences. The paper can be viewed here: http://www.emeraldinsight.com.

[s2If is_user_logged_in()]

Full review: The study aims at identifying the main change drivers that make companies to prioritize specific indicators and metrics in order to manage their operations. The experts concluded to the following eight key drivers: internet and e-commerce, new technologies for managing movements of goods and materials, versatility of customer demands, continuing chase after low cost labor in manufacturing, tighter security regulations, emerging role of ethics in corporate decision-making, increasing security and environmental concerns, and fluctuation of energy prices. Delivery performance and perfect order fulfillment will be the most important supply chain management indicators and metrics in the future. Customers will demand more tailored products to meet their individual needs what forces companies to manage material flows with an increasing number of stock keeping units.

While companies are required to offer wide product portfolio, they are also expected to have tools to manage harmful events and risks in their supply chain network. Unforeseen threats such as natural disasters, epidemics and customs inspections must be considered when structuring supply chain networks and selecting partners in the future. Consequently, companies must share more supply chain risk related information between business and governmental actors almost in real-time.  Automated data management with streamlined system interfaces between customs and companies will be the key for real time information sharing and networking. Current data exchange and compliance initiatives have already created a foundation for automation and faster flow of customs clearance documents. In addition, better relationship management between trade operators and customs are highlighted in the study.

The CORE concepts, technologies and services are very well aligned with findings in the study. Trusted trade lanes, system based approach and data pipelines reduce need for customs inspections at international borders. Visibility tools create an integrated solution to share information and collaborate between government agencies and privates supply chain stakeholders. Over 40 experts representing customs agencies, manufacturing companies, logistics operators, technology providers and insurance sector took part in the study. The study provides good arguments that help readers to sell supply chain security initiatives, technologies and services for both private and governmental operators.

Reference: Hameri, A.-P., & Hintsa, J. (2009). Assessing the drivers of change for cross-border supply chains. International Journal of Physical Distribution & Logistics Management, 39(9), 741–761.

 

CORE1205

[/s2If]

Analytical method to identify the number of containers to inspect at U.S. ports to deter terrorist attacks (CORE1204)

Summary: The requirement for 100% container scanning has been a burning topic, since U.S. Department of Homeland Security issued the initiative in order to prevent terrorists from smuggling weapons of mass destructions into the U.S. The paper explores how much it is reasonable to come down from the 100% inspection rate, if deterrence and cost of retaliation are considered in the model. Deterrence means the power to dissuade an attacker from attempting to smuggle weapons as opposite to use coerce or compel.  Retaliation cost describes the cost incurred by an attacker e.g. due to dismantling the attacker’s network. It is assumed the defender discloses in advance how many containers are inspected. The paper can be viewed here: https://www.researchgate.net.

[s2If is_user_logged_in()]

Full review: The study provides an economical model based on the game theory to estimate the optimal inspection rates in order to deter perpetrators from smuggling weapons into the U.S. The model assumes the customs or Border agency aims at minimizing the expected damages and cost of inspections while perpetrators are simultaneously trying to maximize their rewards. The used parameters are number of attackers, estimated damages, the cost of inspecting a container, the cost of a smuggling attempt, the cost of retaliation and the probability of detecting weapons. Retaliation cost describes the cost incurred e.g. due to dismantling the attacker’s network.  Cost of a smuggling attempt are the costs of acquiring, developing or manufacturing the weapons, and any logistical costs required to smuggle them into the U.S.  It is assumed the government agency announces publicly the inspection level and set of retaliation policies. Retaliation policy must pose a credible threat that means the governmental agency would retaliate even if that were not economically justified.

The study has four main limitations. First, the paper does not describe under what conditions the model works well or poorly. The quality of strategic and tactical intelligence, the efficiency of criminal investigation and prosecution processes, the extent of inter-agency cooperation and information sharing, the degree of private sector involvement and successfulness of awareness campaigns on retaliation policies are probably factors that influence on the model and its parameters. Second, the study does not provide numerical estimates to the parameters such as detection rates and cost of retaliation. Third, it is very unlikely that weapons of mass destructions are transported in containers into the U.S., what makes it difficult to assess the usefulness of the model in real life cases. Forth, costs of retaliation are not calculated and published by law enforcement agencies, thus criminals cannot make decision based on financial risks.

Despite of these limitations the CORE project can adapt the game theory and benefit from the paper. Traditionally law enforcement agencies highlight the number of seizures, arrests and successful prosecutions to measure operations and their impacts. The presented model brings two interesting components, a cost of crime attempt and a cost of retaliation. If criminal activities are financed and managed based on the same principles like legal ones, expected losses due to seizures of illicit goods or drugs are very likely calculated in the criminal business models. Consequently, making criminal business unprofitable is key to stop criminal activities. The approach enables to model the dynamic between costs and rewards from viewpoints of both law enforcement and criminal actors. In the other words, the model makes possible to study two dimensions in the Innovation Agenda, societal costs and friction costs caused by implemented security measures.

Reference: Bier, Vicki M. & Haphuriwat, N. (2011). Analytical method to identify the number of containers to inspect at U.S. ports to deter terrorist attacks. Annals of Operations Research, 187(1), 137–158.

 

CORE1204

[/s2If]

Progress in combating cigarette smuggling: controlling the supply chain (CORE1203)

Summary: The paper presents cases how government agencies have reduced illicit tobacco trade by making the industry liable for controlling their supply chains. Tobacco companies were required to monitor the movement of lawfully manufactured tobacco products in their supply chains, and even retrospectively track the route taken when products were seized due to suspected excise fraud. According the paper illicit trade was substantially reduced, if manufacturers stopped delivering lawfully manufactured tobacco products in amounts that exceeded the tobacco market in the countries with lower excise duties. The criminal market dried out due to unavailability of illicit tobacco products that had been smuggled to the countries of higher excise duties by organized criminal groups. The document can be viewed at: http://tobaccocontrol.bmj.com.

[s2If is_user_logged_in()]

Full review: The paper focuses on excise fraud and organized smuggling of originally legally produced tobacco products to the United Kingdom, Spain and Italy. Based on internal company documents and court judgments the authors summarize evidence how the tobacco industry was involved directly and indirectly in the large-scale excise fraud. First, the companies delivered intentionally large quantities of tobacco products to the countries of low excise tax rates and uncontrolled distribution network. Then organized criminal groups shipped the purchased tobacco products illegally through their smuggling networks into the countries of higher excise duties.

The cutting off the tobacco supply to the illicit market is the key to intervene in large-scale organized tobacco smuggling. According the article by means of legislative and punitive interventions tobacco industry was forced to implement new export polices and practices. Tobacco companies invested in tracking and tracing systems that helped to identify points where shipped tobacco products diverted from the legal supply chain to the illicit markets. The companies implemented security processes in order to clearly identify they business partners and ensure business partners had no criminal records. Government agencies increased information sharing and inter-agency cooperation on a national and international level.  The interventions led to a substantial fall in customs seizures and a rise in legal sales.

CORE project can learn two things in the article. First, the global scope and multifaceted nature of the illicit tobacco trade requires visibility over shipment processes and efficient collaboration between governmental agencies and private sector. Second, the study implies risk to investigations and punitive damages made tobacco companies to pay attention in which markets their products finally end up. In other words, enforceable measures not voluntary agreements made industry liable for controlling their end-to-end supply chain and reduce societal risk.

Reference: Lara Joossens, L., & Raw, M. (2008). Progress in combating cigarette smuggling: controlling the supply chain. Tobacco Control, 17(6), 399–404.

 

CORE1203

[/s2If]

The effect of supply chain security management on security performance in container shipping operations, 2012 (CORE1201)

Summary: The study creates a supply chain security framework that can be adapted on assessing how security management measures affect on safety and customs clearance performance in container shipping firms. Security management interventions are clustered in four categories: facility and cargo management, accident prevention and processing, information management, and partner relationship management. Findings indicated that container shipping firms that mainly focus on facility and cargo management and less on partner relationship management are generally more dissatisfied with their company’s customs clearance performance than companies that prioritize partnerships with governmental and commercial companies. The governmental agencies and commercial actors can employ supply chain security management framework, its attributes and dimensions in order to assess the supply chain security performance of container shipping firms.  The reviewed document is available at: http://dx.doi.org.

[s2If is_user_logged_in()]

Full review:  Several authors have clustered supply chain security measures into different categories, but only few authors have provided statistical models to test how well these categories can be used to assess benefits of security measures. The study establishes four security categories/dimensions: facility and cargo management, accident prevention and processing, information management, and partner relationship management. The results imply that partner relationship management is positively related to customs clearance performance. Further, information management and partner relationship management are positively related to safety performance. However, facility and cargo management and accident prevention and processing were not found to have substantial positive impacts on security performance what is controversial to many safety studies. Improved access control, material handling, information processing and reporting of anomalies are clearly factors that are positively related to safety performance based on several work place safety studies. The difference is probably due to questions that defined safety performance: the study addressed accidents and property damages while safety studies measure often near misses and their reporting.

The FP7 CORE project utilizes key performance Indicators (KPIs) to assess and monitor organization’s performance at the operational level. Two CORE KPI’s measure address safety and customs clearance performance, consequently the supply chain security framework can well be adapted on the CORE context. Improved access control, cargo handling, shipping information processing and reporting of anomalies can be measured by using the construct for ‘facility and cargo management’. CORE Training and education can be embedded into the factor ‘accident prevention and processing’ that captures documenting and disseminating of security information. ‘Partner relationship management’ can be tested as a mediating factor that controls how strongly implemented CORE interventions influence on organizational performance indicators in specific demonstrations. Customs agencies can consider using four dimensions of supply chain security as criteria for assessing security performance in container shipping firms. Finally the dimensions and attributes of the framework provide a tool to analyse qualitative data in the project where getting reliable quantitative data is challenging.

Reference: Ching‐Chiao Yang, Hsiao‐Hsuan Wei, “The effect of supply chain security management on security performance in container shipping operations”, Supply Chain Management: An International Journal, Vol. 18 Iss: 1, pp.74 – 85

 

CORE1201

[/s2If]

MARITIME SECURITY – DHS Progress and Challenges in Key Areas of Port Security, GAO, July 2010 (CORE1064)

Summary: This GAO report analyses the progress the US Department of Homeland Security (DHS) has made in maritime supply chain security over the past five to ten years. The report raises problems that the DHS and its component agencies – the Coast Guard and the Customs and Border Protection (CBP) – have encountered regarding improvement of risk management, reduction of the vulnerability to threats of small vessels, implementation of security assessment in foreign ports, and the overall progress in supply chain security.  The report states that so far the Coast Guard has carried out risk assessments, but their results do not allow effective comparison and prioritization of risks across ports. The Coast guard has also identified points of vulnerability related to waterside attacks by small vessels, reached out to the general public to encourage recreational sailors to report anomalies, started tracking of small vessel, tested equipment to screen small vessels for nuclear material and conducted security maneuvers such as vessel escorts. Nevertheless, resource constraints and technical problems prevent the Coast Guard to protect the US coastline and maritime infrastructure from small-vessel threats effectively. Moreover, the Coast Guard has been assessing security in foreign ports, but the lack of the agency’s resources and certain countries’ reluctance to collaborate with the US authorities have slowed down the global security assessment. Finally, as for the general supply chain security, the DHS has been running the Secure Freight Initiative (SFI) in foreign ports to test the feasibility of the 100% scanning of US-bound shipping containers with non-intrusive inspection (NII) technologies and radiation detection equipment. The findings of the SFI pilots indicate that the 100% scanning is not a feasible policy because it would disrupt port logistics, damage international trade and raise healthy concerns, among other things. The report is available for download at: www.gao.gov/assets/660/659087.pdf.

[s2If is_user_logged_in()]

Full review: This GAO review concentrates on the US maritime supply chain security. The document provides important information for people who are working for the CORE demonstrations of WP1 and WP14 because these demos involve maritime transportation into and from the US mainland. Those demonstrations that test tracking & tracking solutions might benefit from the document’s update on small-vessel identification and tracking systems.

Cross-references:

  • Coast Guard: Deployable Operations Group Achieving Organizational Benefits, but Challenges Remain. GAO-10-433R. Washington, D.C.: April 7, 2010.
  • Supply Chain Security: Feasibility and Cost-Benefit Analysis Would Assist DHS and Congress in Assessing and Implementing the Requirement to Scan 100 Percent of U.S.-Bound Containers. GAO-10-12. Washington, D.C.: October 30, 2009.
  • Maritime Security: The SAFE Port Act: Status and Implementation One Year Later. GAO-08-126T. Washington, D.C.: October 30, 2007.
  • Maritime Security: Vessel Tracking Systems Provide Key Information, but the Need for Duplicate Data Should Be Reviewed. GAO-09-337. Washington, D.C.: March 17, 2009.
  • Supply Chain Security: Challenges to Scanning 100 Percent of U.S.-Bound Cargo Containers. GAO-08-533T. Washington, D.C., June 12, 2008.

Additional keywords: Maritime security, supply chain security, 100% scanning and track & trace

 

CORE1064

[/s2If]

MARITIME SECURITY – Progress Made, but further actions needed to secure the maritime energy supply, GAO, August 2011 (CORE1061)

Summary: The GAO report discusses actions the US Coast Guard and the Federal Bureau of Investigation (FBI) have taken to strengthen security of energy tankers and offshore energy infrastructure – that produces, transports, or receives oil and natural gas – from terrorist attacks. The report’s key recommendation is that the Coast Guard need to assess risks to all offshore facilities in the US territorial waters, to improve emergency response plans in case of oil spills and to design performance measures for emergency response activities. This GAO document focuses on a rather narrow field of critical infrastructure, the US maritime energy infrastructure, which is not in the CORE’s scope. The CORE’s risk cluster might consider useful the description how the Coast Guard has applied its Maritime Security Risk Analysis Model (MSRAM) to determine risk of the US maritime energy infrastructure. The report is available for download at: www.gao.gov/new.items/d11883t.pdf.

[s2If is_user_logged_in()]

Full review: This GAO document is not very relevant to CORE because of its topic (the US maritime energy infrastructure) that is not within the CORE’s scope. Even so, the risk cluster, the IT cluster and the demonstrations on maritime transport might consider useful of the insight this report offers on security risk assessment.

Cross-references:

  • Maritime Security: Actions Needed to Assess and Update Plan And Enhance Collaboration among Partners Involved in Countering Piracy off the Horn of Africa. GAO-10-856. Washington, D.C.: September 24, 2010.
  • Critical Infrastructure Protection: Update to National Infrastructure Protection Plan Includes Increased Emphasis on Risk Management and Resilience. GAO-10-296. Washington, D.C.: March 5, 2010.
  • Quadrennial Homeland Security Review: 2010 Reports Addressed Many Required Elements, but Budget Planning Not Yet Completed. GAO-11-153R. Washington, D.C.: December 16, 2010.

Additional keywords: Critical infrastructure protection (CIP), maritime security and security of supply

 

CORE1061

[/s2If]

 

SUPPLY CHAIN SECURITY – CBP Needs to Enhance Its Guidance and Oversight of High-Risk Maritime Cargo Shipments, GAO, January 2015 (CORE1059)

Summary: The report reviews the US Customs and Border Protection’s (CPB) approach to risk assessment and targeting of maritime shipping containers. The report’s highlights that CPB does not have clear decision rules and reporting procedures to monitor percentage of containers that the risk assessment system flags high-risk and that get eventually examined. The source of this problem is that the CPB’s officials (targeters) may waive examination of the high-risk containers if the container (i) falls within a predetermined category (standard exception), or (ii) the targeters can articulate why the shipment should not be considered high risk. The targeting units have currently differing definitions of “standard exceptions” and differing views on what constitutes the “articulate reasons.” The GAO report recommends the CPB to clarify, harmonize and enforce the rules and the procedures for waiving the high-risk containers from examination. As for CORE, this report provides a detailed and recent outlook on the US maritime risk assessment and targeting scheme, and this information is going to support work of the CORE’s risk cluster and the demonstrations that involve shipping of sea containers into the US. The report is available for download at: www.gao.gov/assets/670/668098.pdf.

[s2If is_user_logged_in()]

Full review: This GAO reports contains crucial information about the US risk assessment and container targeting systems that benefit the CORE’s risk cluster. The report outlines principles, procedures, datasets and scanning methods that constitute the world’s most advanced risk assessment system for maritime shipping containers. The CORE’s IT cluster might also benefit from the report’s description of the CPB’s Automated Targeting System (ATS) that is used to compute risk scores for shipping containers and flag the ones with the highest score as high-risk. Regarding the CORE demonstrations, the GM demon (WP19) must comply with data requirements (24-hour rule and the “10+2” rule) that enable the US risk assessment and targeting system. Also the demos involving customs controls, especially WP11.2 and WP10.1, may learn something from the ways how the US border control authorities are assessing risk levels of incoming containers.

Cross-references:

  • Supply Chain Security: CBP Needs to Conduct Regular Assessments of Its Cargo Targeting System. GAO-13-9. Washington, D.C.: October 25, 2012.
  • Maritime Security: Progress and Challenges in Key DHS Programs to Secure the Maritime Borders. GAO-14-196T. Washington, D.C.: November 19, 2013.
  • Supply Chain Security: Feasibility and Cost-Benefit Analysis Would Assist DHS and Congress in Assessing and Implementing the Requirement to Scan 100 Percent of U.S.-Bound Containers. GAO-10-12. Washington, D.C.: October 30, 2009.

Additional keywords: Security Filing and Additional Carrier Requirements (known as the 10+2 rule), 24-hour rule, risk assessment

 

CORE1059

[/s2If]

MARITIME SECURITY – Progress and Challenges with Selected Port Security Programs, GAO, June 2014 (CORE1019)

Summary: The report provides a comprehensive review of progress and challenges of various port security activities and programs the Department of Homeland Security (DHS) has carried out since 9/11. In essence, the report is a summary and an update of a number of more detailed GAO reports on maritime supply chain security. The report states that needs to strengthen further its efforts on maritime domain awareness through intensified communication among maritime stakeholders. Regarding the US domestic port security, the report recommends DHS to reassess its Port Security Grant Program (PSGP) that allows ports to request funds for security projects and to improve quality of vulnerability assessment in US ports. The report also urges DHS to overcome challenges of risk-based targeting and scanning of US-bound shipping containers.  The findings and recommendations of this report help CORE consortium understand the current state of the US maritime security regime. This understanding benefits particularly the demonstrations of WP9 and WP14. Also educational and training as well as risk clusters of CORE may find the report’s information useful. The report is available for download at: www.gao.gov/assets/670/663784.pdf.

[s2If is_user_logged_in()]

Full review: This GAO document summarizes the US maritime supply chain security and provides useful information for the CORE project across its work packages. This information most obviously benefits WP9 and WP14 that involve US-bound maritime trade lanes. However, also the CORE’s risk cluster can find useful insight in the report, for example about challenges and opportunities of risk-based container targeting and screening approaches. This summary GAO document caters the needs of state-of-the-art work packages and the CORE’s educational and training cluster that aims to produce relevant and up-to-date material about supply chain security for a variety of stakeholders.

Cross-references:

  • Combating Nuclear Smuggling: Additional Actions Needed to Ensure Adequate Testing of Next Generation Radiation Detection Equipment. GAO-07-1247T. Washington, D.C.: September 18,
  • Supply Chain Security: CBP Has Made Progress in Assisting the Trade Industry in Implementing the New Importer Security Filing Requirements, but Some Challenges Remain. GAO-10-841. Washington, D.C.: September 10, 2010.
  • Supply Chain Security: CBP Needs to Conduct Regular Assessments of Its Cargo Targeting System, GAO-13-9. October 25, 2012.

Additional keywords: Maritime security, Port Security Grant Program (PSGP), risk-based controls, targeting, container scanning

 

CORE1019

[/s2If]

MARITIME SECURITY – Progress and Challenges in Key DHS Programs to Secure the Maritime Borders, GAO, November 2013 (CORE1018)

Summary: This report is a summary of previous GAO reports on US maritime supply chain security and border controls. The report focuses on progress and challenges in four main areas of the Department of Homeland Security’s (DHS) activity on the maritime security. The report highlights that DHS and its component Coast Guard agency could improve its maritime domain awareness through increased information sharing and more advanced vessel-tracking systems. The Customs and Border Protection (CBP) in turn could step up its role in securing US-bound container traffic by conducting more frequent risk assessment audits in key foreign ports that ship cargo into the US and by fostering more close relationship with foreign authorities. The GAO report also recommends the Coast Guard to rethink its maritime surveillance, interdiction and security operations because current protection and support is not adequate in high priority locations. The report also calls for more collaboration and coordination among maritime authorities, port operators and ocean carriers. Finally, the report encourages the DHS to develop performance metrics and data collection procedures the agency uses to assess and monitor its maritime security programs and activities. This report gives a recent update on the US maritime security activities that might be helpful for CORE demonstrations and clusters. The report is available for download at: www.gao.gov/assets/660/659087.pdf.

[s2If is_user_logged_in()]

Full review: This summary GAO documents provides detailed background material about the US maritime security programs. This information is very relevant for the CORE demonstrations WP9 and WP14 that involve shipping cargo from and into the US. The information this document offers also help the CORE’s risk and IT clusters to learn lessons from the US approach to risk-based maritime security and security-related IT integration.

Cross-references:

  • Maritime Security: Ferry Security Measures Have Been Implemented, but Evaluating Existing Studies Could Further Enhance Security. GAO-11-207. Washington, D.C.: December 3, 2010.
  • Supply Chain Security: DHS Could Improve Cargo Security by Periodically Assessing Risks from Foreign Ports. GAO-13-764. Washington, D.C.: September 16, 2013.

Additional keywords: Maritime security, maritime surveillance, risk-based controls, targeting, container scanning

 

CORE1018

[/s2If]

 

Hold on, before blaming it on the OGAs!

It is common since many years already that the global customs community is pointing their “blaming finger” to other government agencies – OGAs – when it comes to identifying root causes behind too long cargo release times at sea ports and other border crossing points, high costs for importers and exporters to conduct international trade, and so forth. Now, without denying this as a plausible scenario, the CBRA research team proposes to take one step backwards, by first building a solid framework for analyzing and deeply understanding what is actually happening at the borders with Customs and all the other agencies, before rushing to conclusions on “who is to be blamed for poor / expensive cross-border performance…”. Therefore – for both educational purposes (FP7-CORE, work package 19.1) and for analytical purposes (Border Agency Cooperation study with the Organization of Islamic Cooperation, OIC), we have produced the following “universal border control task list” – naturally understanding that a perfect single universal list cannot exist. The list is first exploited during April-May 2016 in the OIC Embassy survey (here in Switzerland), to explore who is responsible for specific cross-border controls in various OIC member countries, and to what extent customs is performing tasks on behalf of other (border) agencies. Later, we plan to use the this as a “de-facto border agency control check-list” in our future studies, across the globe.

Again, the first step before analyzing which agencies to blame, is all about understanding what are the typical cross-border control tasks all about, considering all three task categories:

  • Border control tasks which typically cover all commodities;
  • Border control tasks which typically focus on specific commodities; and
  • Other border agency control areas.

 

Now, lets go through all three of them, starting with the first one, and followed by the other two:

Border control tasks which typically cover all commodities:

  • Calculation and collection of indirect border taxes:
    • customs duties
    • sales / value added taxes
    • excise taxes
  • Calculation and collection of other import/ transit/ export fees and taxes (e.g. environmental fee at export)
  • Compilation of trade statistics

Border control tasks which typically focus on specific commodities:

  • Control of import quota restricted products
  • Calculation and granting of export subsidies
  • Control of product safety / conformity of goods / trading standards (please separate agencies per product category, if necessary)
  • Control of food, drinks, cigarettes, pharmaceuticals (including for general health and safety purposes)
  • Control of energy related materials / products (e.g. oil and coal, could be for export taxation purposes etc.)
  • Enforcement of intellectual property rights / fight against copyright infringements / anti-counterfeit
  • Control of plant diseases, pests and extraneous species (i.e., phytosanitary controls)
  • Animal quarantine and controls (i.e. veterinary controls, including pet controls)
  • Control of any biohazards (including deliberate ones)
  • Control of CITES protected species (i.e. endangered fauna and flora)
  • Control of natural resources under license requirements, harvesting quotas etc. (including specific fish, wood, minerals, diamonds etc.)
  • Control of cultural artifacts (stolen / looted, and/or illicitly traded)
  • Control of any stolen goods (including vehicles, machinery, cargo etc.)
  • Fight against drugs / illicit narcotics trafficking (including pre-cursors)
  • Control of waste flows (including those in the Basel Convention on transboundary movements)
  • Control of dual use / strategic goods
  • Control of dangerous goods / hazardous materials
  • Control of explosives and weapons:
    • explosives (including pre-cursors)
    • small arms and light weapons
    • defense / war materials
  • Control of nuclear and radioactive materials

Other border agency control areas:

  • Conveyance / cargo transport security and safety controls:
    • for maritime, including sea ports
    • for aviation, including airports
    • other modes: road, rail, inland waterways etc.
  • Traveler, crew and immigration controls:
    • visa and passport controls
    • trafficking of human beings and people smuggling
    • asylum seekers
    • passenger cars and vehicles in terms of temporary admission
  • Control of weight of cargo (including for road safety purposes)
  • Cash controls (cash smuggling and counterfeit currency)
  • Cyber security (customs and supply chain IT systems, critical infrastructure IT etc.)

 blog-270416-2

 

Dear CBRA Blog and CBRA Monthly readers: we kindly invite your inputs to make the list more comprehensive / better in the future, so please send us an email with your ideas, to cbra@cross-border.org . And thanks already now to the multiple experts from national Customs administrations and international organizations for your valuable help so far– it has been great working with you on all these studies, keeping them as pragmatic as possible… (detailed acknowledgements will be published later). And it goes without saying that soon we will start looking on the next-step aspects on customs versus other government agencies, in the context cross-border supply chain costs and delays – please stay tuned for more!