Enhancing security through efficiency focus- Insights from a multiple stakeholder pilot implementation (Sternberg et al. 2012)

Summary

Efficiency and security are said to be opposing goals of logistics operations: when security goes up, efficiency decreases, and vice versa. Yet, it is suggested that information technologies could improve efficiency and security simultaneously. Sternberg et al. (2012) investigate this hypothesis: whether and to what extent increased attention to efficiency results in improved security in carrier operations in a seaport context. In a longitudinal case study, they research carrier operations in connection with port terminals carrying out Roll-in Roll-out (RoRo) operations on trailers at the port of Gothenburg. They find that investments in new ICT solutions, in fact, remove some of the barriers to higher efficiency and improve security against cargo theft and terrorism. In particular, they report that ICT investments increased efficiency in terms of reduced waiting times and increased ability to plan port operations (pre-arrival notification) and fast positioning of trailers in a port. The new ICT solutions also increased security in terms of more secure document handling (decreases the risk that sensitive information falls into the hands of criminals), better anomaly detection (helps customs identify trailers that are most likely tampered in-transit) and increased visibility. The abstract is available at: http://onlinelibrary.wiley.com.

Review by Toni Männistö (CBRA) based on his doctoral thesis.

[s2If is_user_logged_in()]

Full review

This article is relevant for CORE demonstrations that focus on sea port operations (WP10-11 and WP13-15 and WP17). The research shows how a ‘common information sharing platform’ – an electronic and highly automated communication network among LSPs, carriers, ferry operators, port operators and authorities – increases logistics efficiency and security performance simultaneously. The main components of this platform include information sharing through a common information area, real-time geographical position of truck and trailer, identification technology in truck, RFID tags on transport units and RFID readers mounted on terminals, electronic manifest, and electronic container seals. More specifically, Sternberg et al. (2012) observed that adoption of a set of IT-enabled SCS solutions eliminated logistics efficiency and security issues simultaneously:

  • Real-time geo-positioning of trucks and trailers enabled the port operator to allocate a vacant spot for a trailer prior to its arrival, which reduced the waiting time at the port entrance. The real-time information enabled also customs to detect anomalies in shipping schedules and routings that would imply a heightened risk of smuggling.
  • RFID-based identification of drivers, trucks, and trailers automated and accelerated the access formalities at the port entrance and increased reliability of driver authentication.
  • Digitalization of cargo manifests eliminated the time-consuming manual document handling and reduced the risk of unauthorised access to confidential information.
  • E-seals enabled customs officers to identify intact containers and spare them from time- consuming inspections.

Reference

Sternberg, H., Nyquist, C., & Nilsson, F. (2012). Enhancing Security Through Efficiency Focus—  Insights from a Multiple Stakeholder Pilot Implementation. Journal of Business Logistics, 33(1), 64-73.

[/s2If]

CASSANDRA compendium. Standards in supply chain management (Ch. 9)

Summary: Chapter 9 of the CASSANDRA compendium lists and discusses various standards that set the context for international supply chain management. The chapter focuses especially on management standards (e.g., ISO28000), technical standards (e.g., RFID, electronic seals and barcodes), standards for exchange of information among supply chain stakeholders (e.g., UN/EDIFACT and XML messaging), and customs security standards (especially the World Customs Organisations’ SAFE Framework of Standards). GS1 Global Visibility Framework and other industry standards are included in the discussion, as well. The chapter points out that because a large variety of standards are already available, the challenge is not a lack of standardisation but the lack of harmonisation between different standards. The section also concludes that even if the diversity of standards was harmonised, the next step would be to ensure that the standards would be consistently implemented in different contexts.

[s2If is_user_logged_in()]

Full review: The chapter focuses on listing different standards that affect the modern supply chain management. There not much details to be reported in this section. However, especially people working with CORE work package 6 “SCS Reference Framework and Standards” should read the brief listing and general discussion of standards and standardisation. Other chapters of the CASSANDRA compendium provide complementary information about standardisation in the field of supply chain management (e.g., Ch. 5 & 6).

Reference

Hintsa, J. and Uronen, K. (Eds.) (2012), “Common assessment and analysis of risk in global supply chains “, Compendium of FP7-project CASSANDRA, Chapter 9

CORE2007

[/s2If]

CASSANDRA compendium. Technologies for supply chain visibility and security (Ch. 8)

Summary: Chapter 8 of the CASSANDRA compendium reviews current and future technologies that help managers to improve visibility and security over global end-to-end supply chains. The supply chain visibility technologies, in essence, provide logistics managers with a variety of information – shipment data, performance metrics, inventory levels, production / delivery schedules and sales forecast, for example – in or close to real time. The chapter’s review on supply chain security technologies focus mainly on security sensors (e.g., motion detectors), container seals, biometric user authentication devices (e.g., fingerprints), and non-intrusive inspection equipment (e.g., X-ray screening stations). The section also elaborates modern ways for sharing information among stakeholders that are concerned about security of the supply chain. The CASSANDRA compendium is available for download: www.cassandra-project.eu. Review by Toni Männistö (CBRA)

[s2If is_user_logged_in()]

Full review: Chapter 8 includes some interesting details and insights about modern visibility and security technologies, many of which are relevant especially for CORE demonstrations but also for other work packages such as WP2 (SCS controls), WP7 (CORE Connectivity Infrastructure and Solutions Development Environment) and WP8 (CORE Ecosystem).

Many large logistics operators have developed own supply chain visibility systems to coordinate and organise logistics operations. A large logistics service provider, Kühne+Nagel uses its KN login visibility system that allows the company to optimise its complex global operations in terms of speed, time-certainty, security and cost-efficiency and many other relevant metrics. DHL, a German-based international express courier and logistics company, uses its LOGIS software for its operations. Previous EU projects have also developed visibility systems, for example Smart CM SICIS (Shared Intermodal Container Information System).

These visibility systems enable fast response to most operational contingencies that are about cause deviations from original plans. For instance, if a shipper got instant information about a stolen container, a new delivery could be quickly arranged and the consignee could be informed as soon as possible about the reshipment. Moreover, the visibility systems often interface ITC systems of other key stakeholders in the international supply chains. Customs, for example, receive advance cargo information (ACI) automatically from these systems.

The second part of the chapter 8 focuses exclusively on security technologies. The review starts with description of security sensors that are designed to detect tampering, unplanned detours, and other suspicious events in the supply chain. The modern sensor technologies sense at least changes in lighting, acceleration, location (geo-fencing functionality), motion and CO2 levels (used, e.g., to detect stowaways inside shipping containers). The chapter introduces modern user authentication technologies (e.g., fingerprints, face, retina, hand geometry and other unique biometric characteristics). Some information is provided regarding non-intrusive screening solutions that are often considered to be necessary for fast and secure screening operations. The rest of the chapter discusses various technical and institutional solutions for exchanging security-relevant information among supply chain operators and relevant government agencies. Especially interoperability of ICT systems seems to be crucial for effective security efforts in the global supply chains. The CASSANDRA compendium is available for download: www.cassandra-project.eu. Review by Toni Männistö (CBRA)

Reference

Hintsa, J. and Uronen, K. (Eds.) (2012), “Common assessment and analysis of risk in global supply chains “, Compendium of FP7-project CASSANDRA, Chapter 8

CORE2007

[/s2If]

MARITIME SECURITY – DHS Progress and Challenges in Key Areas of Port Security, GAO, July 2010 (CORE1064)

Summary: This GAO report analyses the progress the US Department of Homeland Security (DHS) has made in maritime supply chain security over the past five to ten years. The report raises problems that the DHS and its component agencies – the Coast Guard and the Customs and Border Protection (CBP) – have encountered regarding improvement of risk management, reduction of the vulnerability to threats of small vessels, implementation of security assessment in foreign ports, and the overall progress in supply chain security.  The report states that so far the Coast Guard has carried out risk assessments, but their results do not allow effective comparison and prioritization of risks across ports. The Coast guard has also identified points of vulnerability related to waterside attacks by small vessels, reached out to the general public to encourage recreational sailors to report anomalies, started tracking of small vessel, tested equipment to screen small vessels for nuclear material and conducted security maneuvers such as vessel escorts. Nevertheless, resource constraints and technical problems prevent the Coast Guard to protect the US coastline and maritime infrastructure from small-vessel threats effectively. Moreover, the Coast Guard has been assessing security in foreign ports, but the lack of the agency’s resources and certain countries’ reluctance to collaborate with the US authorities have slowed down the global security assessment. Finally, as for the general supply chain security, the DHS has been running the Secure Freight Initiative (SFI) in foreign ports to test the feasibility of the 100% scanning of US-bound shipping containers with non-intrusive inspection (NII) technologies and radiation detection equipment. The findings of the SFI pilots indicate that the 100% scanning is not a feasible policy because it would disrupt port logistics, damage international trade and raise healthy concerns, among other things. The report is available for download at: www.gao.gov/assets/660/659087.pdf.

[s2If is_user_logged_in()]

Full review: This GAO review concentrates on the US maritime supply chain security. The document provides important information for people who are working for the CORE demonstrations of WP1 and WP14 because these demos involve maritime transportation into and from the US mainland. Those demonstrations that test tracking & tracking solutions might benefit from the document’s update on small-vessel identification and tracking systems.

Cross-references:

  • Coast Guard: Deployable Operations Group Achieving Organizational Benefits, but Challenges Remain. GAO-10-433R. Washington, D.C.: April 7, 2010.
  • Supply Chain Security: Feasibility and Cost-Benefit Analysis Would Assist DHS and Congress in Assessing and Implementing the Requirement to Scan 100 Percent of U.S.-Bound Containers. GAO-10-12. Washington, D.C.: October 30, 2009.
  • Maritime Security: The SAFE Port Act: Status and Implementation One Year Later. GAO-08-126T. Washington, D.C.: October 30, 2007.
  • Maritime Security: Vessel Tracking Systems Provide Key Information, but the Need for Duplicate Data Should Be Reviewed. GAO-09-337. Washington, D.C.: March 17, 2009.
  • Supply Chain Security: Challenges to Scanning 100 Percent of U.S.-Bound Cargo Containers. GAO-08-533T. Washington, D.C., June 12, 2008.

Additional keywords: Maritime security, supply chain security, 100% scanning and track & trace

 

CORE1064

[/s2If]

AVIATION SECURITY – Progress Made, but Challenges Persist in Meeting the Screening Mandate for Air Cargo, GAO, March 2011 (CORE1062)

Summary: This GAO report reviews the recent progress of the US air cargo security scheme. The Transportation Security Administration (TSA), the main agency responsible for the US air cargo security, has been working towards the implementation of the 100% screening requirements of the 9/11 Commission Act of 2007. So far TSA has set up a voluntary Certified Cargo Screening Program (CCSP) to allow trusted logistics operators to screen air cargo outside congested airports, launched a program for testing technologies for air cargo screening and expanding its program for approving explosive detection dog teams. The main obstacle in meeting the 100% screening requirement is that TSA has no reliable mechanism for verifying screening data from domestic foreign screening operators, which self-report the data. TSA also struggles in finding resources to employ as many transport security inspectors as it is required to oversee the Certified Cargo Screening Program. The report also points out that the current technologies that TSA has approved for cargo screening cannot screen large cargo units – pallets or unit loading devices (ULDs) – and this incapability reduces speed and cost-efficiency of air cargo screening. Overall, this GAO document provides a general outlook on state and challenges the US air cargo security regime, and therefore those CORE demonstrations that focus on the US-bound or US-origin air transport should consider the report as a key source material. The report is available for download at: www.gao.gov/assets/130/125678.pdf.

[s2If is_user_logged_in()]

Full review: This document is relevant for the CORE demonstrations that involve air transportation into or through or from the US. Especially the DHL demo, that concentrates on shipping of military aircraft parts from the US to Spain, is affected by the TSA’s programs and initiatives that the report analyses. The report is very concise and informative, so it might be beneficial to the CORE’s educational and training activities.

Cross-references:

  • GAO, Aviation Security: Federal Coordination for Responding to In-flight Security Threats Has Matured, but Procedures Can Be Strengthened, (Washington, D.C.: July 31, 2007).
  • GAO, Aviation Security: Transportation Security Administration May Face Resource and other Challenges in Developing a System to Screen All Cargo Transported on Passenger Aircraft
  • GAO, Aviation Security: Federal Efforts to Secure U.S.-Bound Air Cargo Are in the Early Stages and Could Be Strengthened, GAO-07-660 (Washington, D.C.: April 2007).
  • GAO, Aviation Security: Progress Made in Systematic Planning to Guide Key Investment Decisions, but More Work Remains, GAO-07-448T (Washington, D.C.: February 13, 2007).

Additional keywords: Air cargo security, 100% screening, Certified Cargo Screening Program (CCSP)

 

CORE1062

[/s2If]

SUPPLY CHAIN SECURITY – CBP Needs to Enhance Its Guidance and Oversight of High-Risk Maritime Cargo Shipments, GAO, January 2015 (CORE1059)

Summary: The report reviews the US Customs and Border Protection’s (CPB) approach to risk assessment and targeting of maritime shipping containers. The report’s highlights that CPB does not have clear decision rules and reporting procedures to monitor percentage of containers that the risk assessment system flags high-risk and that get eventually examined. The source of this problem is that the CPB’s officials (targeters) may waive examination of the high-risk containers if the container (i) falls within a predetermined category (standard exception), or (ii) the targeters can articulate why the shipment should not be considered high risk. The targeting units have currently differing definitions of “standard exceptions” and differing views on what constitutes the “articulate reasons.” The GAO report recommends the CPB to clarify, harmonize and enforce the rules and the procedures for waiving the high-risk containers from examination. As for CORE, this report provides a detailed and recent outlook on the US maritime risk assessment and targeting scheme, and this information is going to support work of the CORE’s risk cluster and the demonstrations that involve shipping of sea containers into the US. The report is available for download at: www.gao.gov/assets/670/668098.pdf.

[s2If is_user_logged_in()]

Full review: This GAO reports contains crucial information about the US risk assessment and container targeting systems that benefit the CORE’s risk cluster. The report outlines principles, procedures, datasets and scanning methods that constitute the world’s most advanced risk assessment system for maritime shipping containers. The CORE’s IT cluster might also benefit from the report’s description of the CPB’s Automated Targeting System (ATS) that is used to compute risk scores for shipping containers and flag the ones with the highest score as high-risk. Regarding the CORE demonstrations, the GM demon (WP19) must comply with data requirements (24-hour rule and the “10+2” rule) that enable the US risk assessment and targeting system. Also the demos involving customs controls, especially WP11.2 and WP10.1, may learn something from the ways how the US border control authorities are assessing risk levels of incoming containers.

Cross-references:

  • Supply Chain Security: CBP Needs to Conduct Regular Assessments of Its Cargo Targeting System. GAO-13-9. Washington, D.C.: October 25, 2012.
  • Maritime Security: Progress and Challenges in Key DHS Programs to Secure the Maritime Borders. GAO-14-196T. Washington, D.C.: November 19, 2013.
  • Supply Chain Security: Feasibility and Cost-Benefit Analysis Would Assist DHS and Congress in Assessing and Implementing the Requirement to Scan 100 Percent of U.S.-Bound Containers. GAO-10-12. Washington, D.C.: October 30, 2009.

Additional keywords: Security Filing and Additional Carrier Requirements (known as the 10+2 rule), 24-hour rule, risk assessment

 

CORE1059

[/s2If]

MARITIME SECURITY – Progress and Challenges with Selected Port Security Programs, GAO, June 2014 (CORE1019)

Summary: The report provides a comprehensive review of progress and challenges of various port security activities and programs the Department of Homeland Security (DHS) has carried out since 9/11. In essence, the report is a summary and an update of a number of more detailed GAO reports on maritime supply chain security. The report states that needs to strengthen further its efforts on maritime domain awareness through intensified communication among maritime stakeholders. Regarding the US domestic port security, the report recommends DHS to reassess its Port Security Grant Program (PSGP) that allows ports to request funds for security projects and to improve quality of vulnerability assessment in US ports. The report also urges DHS to overcome challenges of risk-based targeting and scanning of US-bound shipping containers.  The findings and recommendations of this report help CORE consortium understand the current state of the US maritime security regime. This understanding benefits particularly the demonstrations of WP9 and WP14. Also educational and training as well as risk clusters of CORE may find the report’s information useful. The report is available for download at: www.gao.gov/assets/670/663784.pdf.

[s2If is_user_logged_in()]

Full review: This GAO document summarizes the US maritime supply chain security and provides useful information for the CORE project across its work packages. This information most obviously benefits WP9 and WP14 that involve US-bound maritime trade lanes. However, also the CORE’s risk cluster can find useful insight in the report, for example about challenges and opportunities of risk-based container targeting and screening approaches. This summary GAO document caters the needs of state-of-the-art work packages and the CORE’s educational and training cluster that aims to produce relevant and up-to-date material about supply chain security for a variety of stakeholders.

Cross-references:

  • Combating Nuclear Smuggling: Additional Actions Needed to Ensure Adequate Testing of Next Generation Radiation Detection Equipment. GAO-07-1247T. Washington, D.C.: September 18,
  • Supply Chain Security: CBP Has Made Progress in Assisting the Trade Industry in Implementing the New Importer Security Filing Requirements, but Some Challenges Remain. GAO-10-841. Washington, D.C.: September 10, 2010.
  • Supply Chain Security: CBP Needs to Conduct Regular Assessments of Its Cargo Targeting System, GAO-13-9. October 25, 2012.

Additional keywords: Maritime security, Port Security Grant Program (PSGP), risk-based controls, targeting, container scanning

 

CORE1019

[/s2If]

MARITIME SECURITY – Progress and Challenges in Key DHS Programs to Secure the Maritime Borders, GAO, November 2013 (CORE1018)

Summary: This report is a summary of previous GAO reports on US maritime supply chain security and border controls. The report focuses on progress and challenges in four main areas of the Department of Homeland Security’s (DHS) activity on the maritime security. The report highlights that DHS and its component Coast Guard agency could improve its maritime domain awareness through increased information sharing and more advanced vessel-tracking systems. The Customs and Border Protection (CBP) in turn could step up its role in securing US-bound container traffic by conducting more frequent risk assessment audits in key foreign ports that ship cargo into the US and by fostering more close relationship with foreign authorities. The GAO report also recommends the Coast Guard to rethink its maritime surveillance, interdiction and security operations because current protection and support is not adequate in high priority locations. The report also calls for more collaboration and coordination among maritime authorities, port operators and ocean carriers. Finally, the report encourages the DHS to develop performance metrics and data collection procedures the agency uses to assess and monitor its maritime security programs and activities. This report gives a recent update on the US maritime security activities that might be helpful for CORE demonstrations and clusters. The report is available for download at: www.gao.gov/assets/660/659087.pdf.

[s2If is_user_logged_in()]

Full review: This summary GAO documents provides detailed background material about the US maritime security programs. This information is very relevant for the CORE demonstrations WP9 and WP14 that involve shipping cargo from and into the US. The information this document offers also help the CORE’s risk and IT clusters to learn lessons from the US approach to risk-based maritime security and security-related IT integration.

Cross-references:

  • Maritime Security: Ferry Security Measures Have Been Implemented, but Evaluating Existing Studies Could Further Enhance Security. GAO-11-207. Washington, D.C.: December 3, 2010.
  • Supply Chain Security: DHS Could Improve Cargo Security by Periodically Assessing Risks from Foreign Ports. GAO-13-764. Washington, D.C.: September 16, 2013.

Additional keywords: Maritime security, maritime surveillance, risk-based controls, targeting, container scanning

 

CORE1018

[/s2If]

 

Governmental actors in supply chains & Governmental procedures, compliance and risk management – CASSANDRA Compendium Chapters 4 & 7, 2012 (CORE2007c)

Summary: The fourth and seventh chapters of the CASSANDRA compendium elaborate on the roles of government agencies in international logistics and supply chain security (SCS). A broad range of government actors – customs, police agencies, border guards and many others – play a crucial role in enforcing and facilitating cross-border traffic through the global supply chains. These government agencies are critical stakeholders to be involved in the development, design and implementation of the two central CASSANRA concepts: the end-to-end data pipeline and the risk-based approach to cargo inspections and company audits. The CASSANDRA compendium highlights that there are important differences in the national laws and regulations, even within the European Union, that complicate international government collaboration. The differences in the legal framework and organisational cultures must be taken into account when designing new SCS solutions in the CASSANDRA and other projects. The CASSANDRA compendium is available for download: www.cassandra-project.eu. Review by Toni Männistö (CBRA)

[s2If is_user_logged_in()]

Full review: The CASSANDRA compendium describes how the role of government agencies in the cross-border supply chain operations is changing. The trading community and high-level policy-makers are strongly advocating trade facilitation, to make international commerce faster, more cost-efficient and less cumbersome. To address the demand for trade facilitation, many border control agencies are adopting risk-based approaches for controlling cross-border trade and travel. They exploit information increasingly to identify and target high-risk cross-border movements while facilitating low-risk traffic. To further lowering administrative hurdles to the cross-border trade, many government agencies are eliminating duplicative and redundant reporting requirements and building modern ICT systems to enable fast and reliable digital exchange of data and information.

Many law enforcement agencies are also facing budget cuts and increasing work loads, which forces them to look for new ways to increase productivity. Increased collaboration among border control agencies has been proposed as a solution for boosting productivity. The efforts towards further coordinated border management (CBM) are clearly manifested as joint-border control posts, regional single window systems (an online interface enabling trading companies, customs and other border control agencies to exchange trade-related information) and mutual recognition agreements (MRA) that harmonize customs and security related regulatory requirements across jurisdictions.

Reference: Hintsa, J. and Uronen, K. (Eds.) (2012), “Common assessment and analysis of risk in global supply chains “, Compendium of FP7-project CASSANDRA, Chapters 4 & 7

 

CORE2007

[/s2If]

A Decade of GAO’s Supply Chain Security Oversight, 2015 (CORE1113)

Summary: The US Government Accountability Office (GAO) is an independent government watchdog organization that has been publishing many reports on the US government’s supply chain security initiatives over the past ten years. This article reviews 25 most relevant GAO’s reports that discuss strengths, weaknesses and future challenges of the US policies and regulations on supply chain security. The review findings reveal interesting facts about similarities and differences of the US and the EU approaches to supply chain security. This comparison opens new venues for further Transatlantic benchmarking as well as harmonisation and mutual recognition of supply chain security programs. This review was conducted as part of European FP7-Project CORE.  The reviewed document is available for download here: https://hicl.org. Review by Toni Männistö (CBRA)

[s2If is_user_logged_in()]

Full review: The GAO reports suggest that the US administration has been struggling with effective performance monitoring and auditing of its supply chain security initiatives. The reports indicate that there is some confusion about costs of security initiatives for the government and for the business community. There is also a lack of common understanding about the actual benefits of many of these programs. The GAO reports also urge US government officials to adopt risk-based approach to supply chain security, for example to use information and intelligence to assess risk levels of specific shipments, people, trading companies, and other entities, and then employ security solutions that are commensurate to the risk level. The GAO reports also emphasize the importance of involving the industry in the process of defining new policies and regulations.

Altogether, the review team found that the GAO documents are not only highly relevant for SCS management and governance but also of high quality. The study concludes that it might be useful for the EU to establish a quality-assurance organization similar to the US GAO. This new EU body would oversee spending of the EU and its member states on supply chain security programs and projects and this way improve efficiency of such investments.

Reference: Männistö, T., and Hintsa J., (2015), “A Decade of GAO’s Supply Chain Security Oversight,” Proceedings of the Hamburg International Conference in Logistics (HICL), September 24-25, 2015, Hamburg

 

CORE1113

[/s2If]