CASSANDRA compendium. Standards in supply chain management (Ch. 9)

Summary: Chapter 9 of the CASSANDRA compendium lists and discusses various standards that set the context for international supply chain management. The chapter focuses especially on management standards (e.g., ISO28000), technical standards (e.g., RFID, electronic seals and barcodes), standards for exchange of information among supply chain stakeholders (e.g., UN/EDIFACT and XML messaging), and customs security standards (especially the World Customs Organisations’ SAFE Framework of Standards). GS1 Global Visibility Framework and other industry standards are included in the discussion, as well. The chapter points out that because a large variety of standards are already available, the challenge is not a lack of standardisation but the lack of harmonisation between different standards. The section also concludes that even if the diversity of standards was harmonised, the next step would be to ensure that the standards would be consistently implemented in different contexts.

[s2If is_user_logged_in()]

Full review: The chapter focuses on listing different standards that affect the modern supply chain management. There not much details to be reported in this section. However, especially people working with CORE work package 6 “SCS Reference Framework and Standards” should read the brief listing and general discussion of standards and standardisation. Other chapters of the CASSANDRA compendium provide complementary information about standardisation in the field of supply chain management (e.g., Ch. 5 & 6).

Reference

Hintsa, J. and Uronen, K. (Eds.) (2012), “Common assessment and analysis of risk in global supply chains “, Compendium of FP7-project CASSANDRA, Chapter 9

CORE2007

[/s2If]

CASSANDRA compendium. Technologies for supply chain visibility and security (Ch. 8)

Summary: Chapter 8 of the CASSANDRA compendium reviews current and future technologies that help managers to improve visibility and security over global end-to-end supply chains. The supply chain visibility technologies, in essence, provide logistics managers with a variety of information – shipment data, performance metrics, inventory levels, production / delivery schedules and sales forecast, for example – in or close to real time. The chapter’s review on supply chain security technologies focus mainly on security sensors (e.g., motion detectors), container seals, biometric user authentication devices (e.g., fingerprints), and non-intrusive inspection equipment (e.g., X-ray screening stations). The section also elaborates modern ways for sharing information among stakeholders that are concerned about security of the supply chain. The CASSANDRA compendium is available for download: www.cassandra-project.eu. Review by Toni Männistö (CBRA)

[s2If is_user_logged_in()]

Full review: Chapter 8 includes some interesting details and insights about modern visibility and security technologies, many of which are relevant especially for CORE demonstrations but also for other work packages such as WP2 (SCS controls), WP7 (CORE Connectivity Infrastructure and Solutions Development Environment) and WP8 (CORE Ecosystem).

Many large logistics operators have developed own supply chain visibility systems to coordinate and organise logistics operations. A large logistics service provider, Kühne+Nagel uses its KN login visibility system that allows the company to optimise its complex global operations in terms of speed, time-certainty, security and cost-efficiency and many other relevant metrics. DHL, a German-based international express courier and logistics company, uses its LOGIS software for its operations. Previous EU projects have also developed visibility systems, for example Smart CM SICIS (Shared Intermodal Container Information System).

These visibility systems enable fast response to most operational contingencies that are about cause deviations from original plans. For instance, if a shipper got instant information about a stolen container, a new delivery could be quickly arranged and the consignee could be informed as soon as possible about the reshipment. Moreover, the visibility systems often interface ITC systems of other key stakeholders in the international supply chains. Customs, for example, receive advance cargo information (ACI) automatically from these systems.

The second part of the chapter 8 focuses exclusively on security technologies. The review starts with description of security sensors that are designed to detect tampering, unplanned detours, and other suspicious events in the supply chain. The modern sensor technologies sense at least changes in lighting, acceleration, location (geo-fencing functionality), motion and CO2 levels (used, e.g., to detect stowaways inside shipping containers). The chapter introduces modern user authentication technologies (e.g., fingerprints, face, retina, hand geometry and other unique biometric characteristics). Some information is provided regarding non-intrusive screening solutions that are often considered to be necessary for fast and secure screening operations. The rest of the chapter discusses various technical and institutional solutions for exchanging security-relevant information among supply chain operators and relevant government agencies. Especially interoperability of ICT systems seems to be crucial for effective security efforts in the global supply chains. The CASSANDRA compendium is available for download: www.cassandra-project.eu. Review by Toni Männistö (CBRA)

Reference

Hintsa, J. and Uronen, K. (Eds.) (2012), “Common assessment and analysis of risk in global supply chains “, Compendium of FP7-project CASSANDRA, Chapter 8

CORE2007

[/s2If]

CASSANDRA compendium. Private sector perspectives on risk management (Ch. 5) and crime prevention and security management in supply chains (Ch. 6)

Summary: Chapters 5 & 6 of the CASSANDRA compendium provide a general overview on supply chain security risk management from the private sector perspective. Explaining the essentials of supply chain risk management, Chapter 5 introduces commonly used risk management models and tools (e.g., risk matrices and risk registers), discusses various classifications of supply chain risks, and elaborates current trends of risks and risk management in the supply chain context. Chapter 6 focuses on specific challenges of supply chain security risks – the risks that arise from intentional, man-made criminal activities such as terrorism, theft, trafficking, and sabotage. The chapter explains a few early classifications of supply chain security risks (e.g., motive-based typology and taxonomies based on private sector perspectives). Following the classifications of security risks, the chapter puts forth a few models for managing security risks in the supply chain context (e.g., the 8-layer model for supply chain security management). The chapter concludes with a detailed case study on security management of an international security company and a comparison of supply chain security management and the total quality management (TQM) management philosophy. The CASSANDRA compendium is available for download: www.cassandra-project.eu. Review by Toni Männistö (CBRA)

[s2If is_user_logged_in()]

Full review: Previous observatory entries have already shown the relevance of the CASSANDRA compendium to the community of supply chain management professionals. The compendium’s chapters 5 & 6 give a brief summary of risk management and security risk management in the context of international supply chains. The contents of the chapters are relevant and useful for people involved in FP7 CORE project, especially for those involved in work packages 3 (Multi-method Threat and Vulnerability Analysis Suite) and 4 (SC Situational Awareness Tools & Maps).

Chapter 5 elaborates a set of common supply chain risk management tools. The model of Waters (2007) summarises rather obvious three steps of the risk management process: identifying risks, analysing risks and responding to risks. The model proposes, for example, that managers can identify supply chain risks through analysis of past events, collection of opinions, and through operational analysis. The model also calls for managerial attention to prerequisites of successful risk management – mutual trust, cooperation and information exchange among relevant stakeholders involved in supply chain management – and highlights importance of continuous monitoring and controlling the risk management process. The chapter concludes with the four classic approaches to risk management: risk avoidance, risk reduction, risk transfer (e.g., insurance and contractual agreements), and acceptance. The classifications of supply chain risks include typologies focusing on risk sources (natural hazards operational failure and terrorism), risk consequences (e.g., risk to operations, risk to reputation and risk to profits), and objects of vulnerability (e.g., information, materials, personnel and financial flows).

The chapter on crime prevention and security management (Ch. 6) in supply chains provides a concise summary on supply chain security management from the private sector perspective. The chapter starts by describing some early classifications of supply chain security risks. A motive-based taxonomy classifies such risks into the three categories: economic crime (profit as motive), other crime types (ideological, emotional and other reasons as motive) and facilitating crime that covers activities that do not bring direct crime benefits but help committing other rewarding crime crimes later on. (e.g., document fraud, bribery and use of intimidation). The chapter’s next section elaborates ways to mitigate security risks in the global supply chains, highlighting the key ideas of the so-called 8-layer model for supply chain security management (the model incorporates multiple aspects of risk assessment, hands-on design and planning, implementation of a variety of technologies, procedures, and incentives as well as preparation for dealing with the consequences of supply chain crime). The chapter provides also a case study with an international tobacco company that runs high security risk supply chain operations. The section also contrasts, rather interestingly, principles of security management against the fundaments of the total quality management (TQM) management philosophy. The chapter continues with a brief review of regulations (e.g., EU customs security and aviation security regulations) and standards on supply chain security management (World Customs Organization’s SAFE framework of standards, and industry standards of the Transported Asset Protection Association).

Reference

Hintsa, J. and Uronen, K. (Eds.) (2012), “Common assessment and analysis of risk in global supply chains “, Compendium of FP7-project CASSANDRA, Chapters 5 & 6

CORE2007

[/s2If]

MARITIME SECURITY – Vessel Tracking Systems Provide Key Information, but the Need for Duplicate Data Should Be Reviewed, GAO, March 2009 (CORE1065)

Summary: The US government considers identification and tracking of vessels at the US coastal areas, inland waterways and ports important for protecting the US homeland and economy from maritime terrorism. The US coastal guards use a range of identification and tracking solutions to detect any anomalies in maritime traffic that might suggest terrorist activity, such as transportation of weapons of mass destruction, use of explosive-laden boats as weapons, smuggling of weapons, drugs, people or other contraband. This GAO report reviews the US Coast Guards’ current and future solutions for monitoring the maritime traffic: long-range identification and tracking system (LRIT), long-range automatic identification system (AIS) and various radar and camera systems. The report elaborates strengths and weaknesses of these identification and tracking solutions and proposes a roadmap for further strengthening of the US coastal security. The future advancements should pay particular attention to tracking of small and non-commercial vessels and to reconsider ways to collect and analyze data that is relevant for coastal surveillance.  Offering background information about vessel-level tracking and tracing of maritime cargo movements, the report is a relevant source document for those CORE demonstrations that involve shipping of containers from, through and into the US. The report is available for download at: www.gao.gov/new.items/d09337.pdf.

[s2If is_user_logged_in()]

Full review: CORE demonstrations of WP9 and WP14 benefit from the background information this GAO document offers on identification and tracking of vessels because these two demos involve US seaports and shipping at the US territorial waters. Also the CORE’s risk and IT clusters might find the information of this GAO document useful. The information that the identification and tracking provide allow the coastal guards to assess risk-levels of individual vessel movements and decide when it is reasonable to intervene and check anomalies. The vessel tracking and identification involves also a great deal of IT integration because it currently involves many technical components and synthetizes data collected from many different sources.

Cross-references:

  • Maritime Security: Information Sharing Efforts Are Improving. GAO-06-933T. Washington, D.C.: July 10, 2006.
  • Maritime Security: Public Safety Consequences of a Terrorist Attack on a Tanker Carrying Liquefied Natural Gas Need Clarification. GAO-07-316. Washington, D.C.: February 22, 2007.
  • Maritime Security: Coast Guard Inspections Identify and Correct Facility Deficiencies, but More Analysis Needed of Program’s Staffing, Practices, and Data. GAO-08-12. Washington, D.C.: February 14, 2008.

Additional keywords: Maritime security, long-range identification and tracking system (LRIT), long-range automatic identification system (AIS), track & trace

 

CORE1065

[/s2If]

SUPPLY CHAIN SECURITY – CBP Needs to Enhance Its Guidance and Oversight of High-Risk Maritime Cargo Shipments, GAO, January 2015 (CORE1059)

Summary: The report reviews the US Customs and Border Protection’s (CPB) approach to risk assessment and targeting of maritime shipping containers. The report’s highlights that CPB does not have clear decision rules and reporting procedures to monitor percentage of containers that the risk assessment system flags high-risk and that get eventually examined. The source of this problem is that the CPB’s officials (targeters) may waive examination of the high-risk containers if the container (i) falls within a predetermined category (standard exception), or (ii) the targeters can articulate why the shipment should not be considered high risk. The targeting units have currently differing definitions of “standard exceptions” and differing views on what constitutes the “articulate reasons.” The GAO report recommends the CPB to clarify, harmonize and enforce the rules and the procedures for waiving the high-risk containers from examination. As for CORE, this report provides a detailed and recent outlook on the US maritime risk assessment and targeting scheme, and this information is going to support work of the CORE’s risk cluster and the demonstrations that involve shipping of sea containers into the US. The report is available for download at: www.gao.gov/assets/670/668098.pdf.

[s2If is_user_logged_in()]

Full review: This GAO reports contains crucial information about the US risk assessment and container targeting systems that benefit the CORE’s risk cluster. The report outlines principles, procedures, datasets and scanning methods that constitute the world’s most advanced risk assessment system for maritime shipping containers. The CORE’s IT cluster might also benefit from the report’s description of the CPB’s Automated Targeting System (ATS) that is used to compute risk scores for shipping containers and flag the ones with the highest score as high-risk. Regarding the CORE demonstrations, the GM demon (WP19) must comply with data requirements (24-hour rule and the “10+2” rule) that enable the US risk assessment and targeting system. Also the demos involving customs controls, especially WP11.2 and WP10.1, may learn something from the ways how the US border control authorities are assessing risk levels of incoming containers.

Cross-references:

  • Supply Chain Security: CBP Needs to Conduct Regular Assessments of Its Cargo Targeting System. GAO-13-9. Washington, D.C.: October 25, 2012.
  • Maritime Security: Progress and Challenges in Key DHS Programs to Secure the Maritime Borders. GAO-14-196T. Washington, D.C.: November 19, 2013.
  • Supply Chain Security: Feasibility and Cost-Benefit Analysis Would Assist DHS and Congress in Assessing and Implementing the Requirement to Scan 100 Percent of U.S.-Bound Containers. GAO-10-12. Washington, D.C.: October 30, 2009.

Additional keywords: Security Filing and Additional Carrier Requirements (known as the 10+2 rule), 24-hour rule, risk assessment

 

CORE1059

[/s2If]

MARITIME SECURITY – Progress and Challenges in Key DHS Programs to Secure the Maritime Borders, GAO, November 2013 (CORE1018)

Summary: This report is a summary of previous GAO reports on US maritime supply chain security and border controls. The report focuses on progress and challenges in four main areas of the Department of Homeland Security’s (DHS) activity on the maritime security. The report highlights that DHS and its component Coast Guard agency could improve its maritime domain awareness through increased information sharing and more advanced vessel-tracking systems. The Customs and Border Protection (CBP) in turn could step up its role in securing US-bound container traffic by conducting more frequent risk assessment audits in key foreign ports that ship cargo into the US and by fostering more close relationship with foreign authorities. The GAO report also recommends the Coast Guard to rethink its maritime surveillance, interdiction and security operations because current protection and support is not adequate in high priority locations. The report also calls for more collaboration and coordination among maritime authorities, port operators and ocean carriers. Finally, the report encourages the DHS to develop performance metrics and data collection procedures the agency uses to assess and monitor its maritime security programs and activities. This report gives a recent update on the US maritime security activities that might be helpful for CORE demonstrations and clusters. The report is available for download at: www.gao.gov/assets/660/659087.pdf.

[s2If is_user_logged_in()]

Full review: This summary GAO documents provides detailed background material about the US maritime security programs. This information is very relevant for the CORE demonstrations WP9 and WP14 that involve shipping cargo from and into the US. The information this document offers also help the CORE’s risk and IT clusters to learn lessons from the US approach to risk-based maritime security and security-related IT integration.

Cross-references:

  • Maritime Security: Ferry Security Measures Have Been Implemented, but Evaluating Existing Studies Could Further Enhance Security. GAO-11-207. Washington, D.C.: December 3, 2010.
  • Supply Chain Security: DHS Could Improve Cargo Security by Periodically Assessing Risks from Foreign Ports. GAO-13-764. Washington, D.C.: September 16, 2013.

Additional keywords: Maritime security, maritime surveillance, risk-based controls, targeting, container scanning

 

CORE1018

[/s2If]

 

Review of the TIR Convention and its accompanying Security and Risk Management electronic tools, 2013 (CORE1040)

Summary: The Customs Convention on the International Transport of Goods under Cover of TIR Carnets (TIR Convention, 1975) constitutes the international legal framework for the TIR system. TIR is the only universal Customs transit system, today operational in 58 countries, that allows the goods to transit from a country of origin to a country of destination in sealed load compartments with Customs control recognition along the supply chain. This minimizes administrative and financial burdens, while Customs duties and taxes that may become due are covered by an international guarantee (covering more than USD 1 billion worth of international trade every day). In order to ensure the security of the TIR System, electronic controls run in parallel with the security elements already specified in the TIR Convention. TIR handbook can be found at: http://www.unece.org

[s2If is_user_logged_in()]

Full review: The TIR system is an international Customs transit system for goods. ‘TIR’ stands for Transports Internationaux Routiers (International Road Transport) and is an international harmonized system of Customs control that facilitates trade and transport whilst effectively protecting the revenue of each Country through which goods are carried. It is based on six essential principles and an electronic security and risk management control system composed of four tools:

  • Secure vehicles or containers: Goods are carried in sealed vehicles or containers which are approved for use by Customs and re-approved every two years.
  • International chain of guarantee: Duties and taxes due in case of irregularity are secured by an international guarantee chain throughout the journey.
  • TIR Carnet: The goods are accompanied by the TIR Carnet: a harmonized control document accepted by the Customs authorities of the countries of departure, transit and destination.
  • Mutual recognition of Customs controls: Control measures taken in the country of departure are accepted by countries of transit and destination.
  • Controlled access: Access to the TIR system for national issuing and guaranteeing Associations is given by the competent national authorities, and for transport operators, by the national Customs authorities and the national Association.
  • SafeTIR: An electronic control system for TIR Carnets that provides traceability and risk management, as described in Annex 10 to the TIR Convention.

Real-Time SafeTIR (RTS) allows customs officers to enhance their risk management procedures and comprises following three modules:

  • SafeTIR data transmission module: Once a TIR operation is terminated, RTS automatically sends a SafeTIR message to the IRU.
  • TCHQ: TIR Carnet Query Module allows any customs office to obtain immediate information on the status of the Carnet for the prompt detection of any possible irregularities.
  • SafeTIR Reconciliation Automation module: automates the SafeTIR data reconciliation procedure.

TIR Customs Portal is an online service developed by the IRU, which allows customs officers to:

  • obtain immediate information on the status of the TIR Carnet for the prompt detection of any possible irregularities; and
  • transmit SafeTIR data on the termination of the TIR operation.

ASKTIRweb makes it easier for TIR associations to manage the entire life-cycle of the TIR Carnets from the time of order and delivery from IRU until their return to the IRU and the subsequent administrative procedures such as claims and SafeTIR. ASKTIRweb is a mandatory TIR Carnet management system for all new TIR associations.

The TIR-EPD application is intended for submission of advance information on transported goods to Customs Authorities. Fully compliant with WCO SAFE Framework of Standards and with the national regulations of connected countries, TIR-EPD enables Customs Authorities to perform advance risk analysis. TIR Carnet Holders can send advance information free-of-charge simultaneously to the Customs Authorities of the countries according to their itineraries.

In order to ensure the security of the TIR System, electronic controls run in parallel with the security elements already specified in the TIR Convention.

The perceived strengths of the TIR-system include: Access to 58 TIR operational countries; Management of a low cost, high value guarantee; Intermodality; Security in the supply chain; Reduced delays and costs for the international transit of goods; and Trade facilitation – goods move across international borders with minimum interference. Future opportunities include: Increased trust with national Customs; Encouragement of international trade; and Economic benefits for supply chain actors and nations.

Detailed analysis and relevance for CORE:

Research and analysis: The TIR system is based on proven business-to-governments solutions and both CORE and the TIR system could benefit from an investigation and evaluation of the legal, technical and operational feasibility as well as the business benefits of integrating TIR data to the CORE ecosystem and CORE concepts and solutions such as “trusted trade lane”, “data pipeline”, “piggy-backing” for customs and “dashboards”.

Demonstrators: The use of TIR and its security and risk management electronic tools in the framework of CORE demonstrators can have four different types of advantages which meet CORE’s overarching objectives to optimize the security of global supply chain whilst maintaining or improving business performance:

  • Compliance with customs requirements: customs duties attached to the goods guaranteed by the TIR guarantee chain.
  • Security of exchanges: transmission of safety and security data, in accordance with e.g. EU Customs legislation, to national customs before the arrival of the goods at borders.
  • Facilitation of international trade: mutual recognition of customs controls for all TIR countries and reduction of customs formalities at borders.
  • Visibility of data: use of TIR security and risk management electronic tools to check the status of TIR operations in real-time.

CORE Impact anticipation: CORE can have an important impact on the TIR system by reinforcing its place as a global multimodal logistics and trade solution. The investigation and evaluation of the legal, technical and operational feasibility as well as the business benefits of using the existing features of the TIR system within the CORE ecosystem and opening cargo-related datasets can contribute to improving freight and logistics services provision and operations by shippers, LSPs, transport operators, ports and customs authorities. The efficiency and security upgrades will come by significantly reducing waiting times and administrative burden at borders and at the same time providing a more cost efficient way of improved supply chain visibility and traceability of cargo to the benefit of all private and public stakeholders.

Cross-references:

Application of the TIR Convention in the EU: Council Regulation (EEC) No 2913/92; Commission Regulation (EEC) No 2454/93 and Regulation (EU) No 952/2013 of the European Parliament and of the Council applicable as of 1 May 2016.

Youtube video on TIR: https://www.youtube.com

 

CORE1040

[/s2If]

Draft SADC guidelines for Coordinated Border Management: A Practical Guide on Best Practices and Tools for Implementation, 2011 (CORE1115)

Summary: The 15 member states of the Southern African Development Community (SADC) are looking ways to ease the transition of their regional Free Trade Area towards a more integrated Customs Union where people and cargo would cross borders without excessive delays and administrative burden. The countries expect that the smoother cross-border traffic would contribute to the economic growth in the region. Central to the integration effort is coordinated border management, i.e., closer collaboration among various border control agencies, both nationally and internationally. The SADC guidelines provides a comprehensive catalogue and description of best practices of border agency cooperation and guidance how to implement them in the Southern-African context. Besides the guidelines, the document also features a comprehensive glossary of coordinated border management vocabulary. You can download the guidelines here: http://www.sadc.int. Review by Toni Männistö (CBRA)

[s2If is_user_logged_in()]

Full review: The guideline document suggests that coordinated border management depends on three levels of coordination: 1) intra-agency coordination within boundaries of one organization, 2) inter-agency cooperation between separate border control agencies or between the agencies and associated ministries and other policy-making bodies, and 3) international cooperation among border control agencies at both sides of a border or among governments at various supranational political forums.

The guideline document discusses in detail six key areas of coordinated border management. The most fundamental of the management areas is the legal and regulatory framework that defines a necessary legal basis for inter-agency and international cooperation and exchange of information. The second key management area is the institutional framework that is about governance and organizational structures underlying border control operations and high-level decision-making. The third management area concerns the procedures for cooperation at the borders. The fourth management area focuses on human resources and training, and the fifth on exchange of data, information, and intelligence. The sixth and the last management area is about providing infrastructure and equipment that supports other areas of coordinated border management.

Reference: Southern-African Development Community, 2011. “Draft SADC guidelines for Coordinated Border Management: A Practical Guide on Best Practices and Tools for Implementation”

 

CORE1115

[/s2If]

Governmental actors in supply chains & Governmental procedures, compliance and risk management – CASSANDRA Compendium Chapters 4 & 7, 2012 (CORE2007c)

Summary: The fourth and seventh chapters of the CASSANDRA compendium elaborate on the roles of government agencies in international logistics and supply chain security (SCS). A broad range of government actors – customs, police agencies, border guards and many others – play a crucial role in enforcing and facilitating cross-border traffic through the global supply chains. These government agencies are critical stakeholders to be involved in the development, design and implementation of the two central CASSANRA concepts: the end-to-end data pipeline and the risk-based approach to cargo inspections and company audits. The CASSANDRA compendium highlights that there are important differences in the national laws and regulations, even within the European Union, that complicate international government collaboration. The differences in the legal framework and organisational cultures must be taken into account when designing new SCS solutions in the CASSANDRA and other projects. The CASSANDRA compendium is available for download: www.cassandra-project.eu. Review by Toni Männistö (CBRA)

[s2If is_user_logged_in()]

Full review: The CASSANDRA compendium describes how the role of government agencies in the cross-border supply chain operations is changing. The trading community and high-level policy-makers are strongly advocating trade facilitation, to make international commerce faster, more cost-efficient and less cumbersome. To address the demand for trade facilitation, many border control agencies are adopting risk-based approaches for controlling cross-border trade and travel. They exploit information increasingly to identify and target high-risk cross-border movements while facilitating low-risk traffic. To further lowering administrative hurdles to the cross-border trade, many government agencies are eliminating duplicative and redundant reporting requirements and building modern ICT systems to enable fast and reliable digital exchange of data and information.

Many law enforcement agencies are also facing budget cuts and increasing work loads, which forces them to look for new ways to increase productivity. Increased collaboration among border control agencies has been proposed as a solution for boosting productivity. The efforts towards further coordinated border management (CBM) are clearly manifested as joint-border control posts, regional single window systems (an online interface enabling trading companies, customs and other border control agencies to exchange trade-related information) and mutual recognition agreements (MRA) that harmonize customs and security related regulatory requirements across jurisdictions.

Reference: Hintsa, J. and Uronen, K. (Eds.) (2012), “Common assessment and analysis of risk in global supply chains “, Compendium of FP7-project CASSANDRA, Chapters 4 & 7

 

CORE2007

[/s2If]

Better Management of EU Borders through Cooperation, 2011 (CORE1114)

Summary: This report by the Center for the Study of Democracy investigates existing forms of cooperation between Border Guards and customs administrations in the European Union. The study highlights obstacles to cooperation and proposes solutions and best practices for overcoming them. The study finds that despite the common policy interest on border agency cooperation and the associated pan-European standardisation efforts, the individual Member states decide the extent and forms of customs-border guard co-operation on their own. As a result, the current state of border agency collaboration and potential for improvements differ substantially between the member states. The main differences arise from the institutional set-up (e.g., number and roles of border control agencies), powers and competencies of the border control agencies, and the legislative basis (especially legal differences in terms of privacy, data protection and confidentiality of trade information). Download the report here: http://ec.europa.eu. Review by Toni Männistö (CBRA)

[s2If is_user_logged_in()]

Full review: The study concludes with a large number of recommendations for the European Union, the member states, and for the customs and border guards. The European Union should generate political will to act upon remaining challenges of border agency cooperation by creating awareness through public debates, communications and impact assessments. The EU bodies should act mediators to reconcile institutional interests of different border control agencies. The EU could also commission pilot projects on border agency cooperation, encourage joint training and increase funding of related research and development activities. Also the mandate of Frontex could be expanded to cover customs cooperation.

The individual member states should, according to the report, also mediate negotiations between border control agencies to overcome possible conflicts of interest. The member states should also evaluate impacts of various forms of customs-border guard cooperation.

The border guards and customs administrations themselves should identify and exchange best practices for strengthening their mutual collaboration. The agencies, the report recommends, should take responsibility for the pilot projects and for evaluating outcomes of the different forms of cooperation. To further improve the cooperation across the entire EU customs union, the customs and border control agencies should use Frontex more as their platform to conduct joint operations at the EU’s external border.

Reference: Center for the Study of Democracy, (2011), “Better Management of EU Borders through Cooperation”, Study to Identify Best Practices on the Cooperation Between Border Guards and Customs Administrations Working at the External Borders of the EU

 

CORE1114

[/s2If]