Posts

Nothing Found

Sorry, no posts matched your criteria

CORE-Observatory

C-TPAT Best Practices Catalog Addendum, 2009 (CORE1031)

Summary: This addendum document lists cargo security best practices with focus on prevention of weapons of mass effect, terrorists, and/or contraband from infiltrating into the international supply chain. Each best practice is linked to a specific business entity, such as a Manufacturing Company, a Highway Carrier, an Importer or a Foreign Consolidator but these may apply to other business types as well. The document is available at: https://www.cbp.gov/sites/default/files/documents/ctpat_bpa_2009_0.pdf (link tested on 3 March 2016)

[s2If is_user_logged_in()]

Full review: The best practices are outlined as follows:

Risk assessment: Programs are in place to enable the identification of the most vulnerable supply chain areas, to grade suppliers supply chain security criteria. Specific processes have been developed to manage the supplier’s products, software and services and internal monitoring systems to enhance the safety and security procedures.

Business partner requirements: Several security measures have been taken by entities. These include conducting supply chain security audits to ensure compliance of non-C-TPAT business partners; carrying out security audits of a foreign manufacturer; making security self-assessments, conducting onsite inspections to ensure freight security; shipping cargo only through accredited ports and steamship lines; monitoring compliance of manufacturing facilities; screening procurements to identify ineligible status of suppliers, and performing audits of business partners.

Conveyance/Container/Trailer Security: Examples of such security practices are: integrating special security features in the GPS (global positioning system); using laser beams to protect trailers; using colour codes for matching consignments; installing infrared sensors in docks to prevent unauthorized access; using special codes to identify correct shipments; documenting all seal changes for shipments in transit; ensuring delivery by authorized Company drivers; sealing containers; operating through C-TPAT carriers; using only “seaworthy” containers; installing in-transit temperature data sensors to ensure product quality; enclosing container storage area; conducting non-intrusive inspection prior to loading a vessel; establishing specific inspection points; using multiple security devices on each container; using automated container yards; instructing foreign suppliers to provide inspection checklists; using dock locking arms for container storage; installing motion sensors in a trailer; operating through contracted highway carriers and security services; documenting a seal destruction policy, and so forth.

Physical Access Controls: Some practices by Importers include establishing multiple security stations within the building; using metal detectors for employees; installing an electronic swipe card/ lock box systems for access control for sensitive documents; conducting electronic scanning of visitors’ drivers licenses; utilizing a third-party software system to manage key inventory; and providing panic buttons for company employees.

Physical Security: Several innovative solutions have been designed to ensure physical security, such as electronically closing gates and activating tire puncturing devices to prevent vehicle exits; using an electronic security information reporting system, installing invisible electronic fences; installing laser sensors; setting up optical light beams to detect intruders; fitting double locks on doors; Installing infrared sensors on fences; using body alarm functions for emergencies; appointing patrolling guards, using multiple glass meeting rooms; using multiple interior infrared security alarm beams to detect unauthorized access; and installing security guard view towers.

Personnel Security: An Importer requires business partners to provide a monthly master list of employees and immediately notify when their employees are hired or terminated, in order to ensure that only authorized business partner’s employees enter the manufacturing facilities.

Security Training/Threat Awareness/Outreach: Business entities have invested in a wide range of training programs. One such initiative is the four-tier C-TPAT training targeted for management and supervisors, shipping and receiving personnel, internal personnel dealing with contractors and hourly staff. Other businesses use different approaches, like establishing an online training portal;; offering general security training and of site-specific training for security guards; issuing security advisories; making regular security awareness assessments; establishing a situation matrix chart to address possible incidents; establishing a direct communication channel between the president of the company and employees; putting in place a toll free hotline for company personnel; conducting security drills and exercises; establishing a web-based security awareness training; documenting security incidents in a central database; and establishing a global communication system to contact all employees and contractors remotely.

Procedural Security: Instances of this type of security measures include a bio-thermal intrusion alarm system; a global SAP network to generate all written orders for import and export; automatic screening procedures of purchase orders for restricted parties; lock boxes for sensitive documentation; an automated loading module called the Automatic Truck Loading System (ATLS); a container seal number as the shipment tracking (invoice/bill of lading) number, and so forth.

Information Technology (IT) Security: Such security practices include a biometric fingerprint door lock; a remote data backup center; a retina scanning system for access to the computer system; requiring supervisory approval to copy data; use of electronic password protected purchase orders; establishing a daily “e-test” for employees to access computers, and so forth.

CORE1031

[/s2If]

CEN Supply Chain Security — Good Practice Guide for Small and Medium Sized Operators, 2012 (CORE1030)

Summary: This is a guidance document for small and medium sized enterprises, SMEs. on how to apply a supply chain security approach to their operations in order to mitigate the risk of criminal activities. It gives an overview of the main crime types occurring in the supply chain along with some countermeasures, as well as the supply chain security initiatives, and the compliance requirements thereof. The document is available for purchase e.g. at:   http://shop.bsigroup.com/ProductDetail/?pid=000000000030258778  (link tested on 3 March 2016)

[s2If is_user_logged_in()]

Full review: The recommended supply chain strategy rests on a six-step approach. The first step is to define a context for the supply chain, crime prevention and security management activities taking into consideration the security sensitiveness, the geography and transport modes, and the main stakeholders involved in the supply chain operation. The second step is to make a threat and vulnerability analysis with regard to terrorist and other criminal threats in the supply chain. The main criteria included are the gaps existing in enhanced security, the high-risk crime types, and the potential consequences of crime occurrences. The third step covers the regulatory framework, the major aspects being the regulations and programs required for successful business operations, expectations of customers and suppliers, requirements laid down by insurance providers, and relevant government authorities. The fourth step refers to an overall security plan, taking into account the physical security, data security, human resources security (including selection, training, and exit procedures), business partner security (including selection, and auditing), and process control and monitoring of deviations. The fifth step involves implementing into practice concrete security measures, investment in technologies, procurement of services, in-house solutions and so forth. The final step is to monitor and measure the security performance and take appropriate corrective actions.

Five supply chain crime types have been elucidated in this guide. These include:  Property theft (cargo theft, intellectual property breaches); targeted damage (terrorism, sabotage); cross-border duty and tax fraud; illegitimate transporting, exporting and/or importing (smuggling of prohibited and restricted goods, people smuggling); and crime facilitation (document forgery, bogus companies, cybercrime). For each crime type, the main focus should be on the issue (main features and typical sectors/products involved), scope of the problem and actions to mitigate risks.

This guidebook has chosen eight security initiatives for illustration purposes. It explains the context of each initiative, whom it is meant for, and some basic requirements and the implications. These are as follows:

  • Import Control System (ICS) in the EU (a systems tool meant for the lodging and processing of Entry Summary Declarations, and for the exchange of messages across national customs agencies, economic operators and the European Commission).
  • Export Control System (ECS) in the EU (introduces EU procedures to computerize and control indirect exports and to implement the EU safety and security regulations);
  • Maritime Security Legislation, International Ship and Port Facility Security (ISPS) Code in the EU (International regulations to ensure the security of maritime transportation are being issued by the International Maritime Organization, IMO, in the International Ship and Port Facility Security Code);
  • Aviation Security Legislation, Air Cargo Supply Chains in the EU (three categories of aviation security legislation exist in the EU- Framework regulation, supplementing regulations, and implementing regulations-all targeted towards civil aviation security).
  • European Union Authorized Economic Operator, EU AEO (operators involved in international trade of goods certified as complying with WCO or equivalent supply chain security standards);
  • Regulated agent, Known consignor and Account consignor in the EU (Specific “trusted trader” status existing in the European air cargo supply chains);
  • ISO 28000 Series of Standards on Supply Chain Security Management Systems (address potential security issues at all stages of the supply process, e.g. terrorism, fraud and piracy);
  • Transported Asset Protection Association (TAPA) in Europe (fighting cargo crime using real-time intelligence and the latest preventative measures).

CORE1030

[/s2If]

SUPPLY CHAIN SECURITY – U.S. Customs and Border Protection Has Enhanced Its Partnership with Import Trade Sectors, but Challenges Remain in Verifying Security Practices, GAO, April 2008 (CORE1011)

Summary: The GAO report discusses the progress the Customs and Border Protection (CPB), a component agency of the US Department of Homeland Security (DHS), has made since 2015 with its flagship business-private supply chain security program Customs-Trade Partnership Against Terrorism (C-TPAT). The report focuses on three main areas of the C-TPAT’s management and governance: (1) awarding benefits for the C-TPAT compliant companies, (2) validating the member companies’ security compliance and (3) addressing CBP’s staffing challenges that the increasing popularity of the C-TPAT program brings. The report recommends CPB to improve its C-TPAT validation processes and instruments and to establish performance criteria for assessing the program’s impact on supply chain security and trade facilitation. The C-TPAT program and this GAO report contain useful information for the CORE’s demonstrations that import goods into the US. Also the CORE’s risk cluster can learn about opportunities and challenges a voluntary, risk-based supply chain security entails. The report is available at http://www.gao.gov/assets/280/274773.pdf.

[s2If is_user_logged_in()]

Full review: This report contains information that is particularly useful for two CORE demonstrators that cover US imports. The first WP9 demonstration is about shipping automobile parts from the EU to the US via the port of Bremerhaven. In this demo, the General Motors (GM) is the importer. Because GM holds a C-TPAT certificate, most of the information this report offers about the status and challenges of the C-TPAT program must be of interest for the company and for its CORE demonstration. The same applies to the WP14 demonstration “FALACUS” that is about importing ceramic tiles from Italy to the US via the Port of La Spezia. The demonstration has to deal with the C-TPAT program, and therefore the demo partners’ might benefit from studying this GAO report. In addition to the demonstrations, this report might support the work of the CORE’s risk cluster because the document discusses in detail challenges and possibilities of a voluntary, risk-based supply chain security program, which builds on business-government collaboration.

Cross-references:

Supply Chain Security: Examinations of High-Risk Cargo at Foreign Seaports Have Increased, but Improved Data Collection and Performance Measures Are Needed. GAO-08-187. Washington, D.C.: January 25, 2008.

Maritime Security: The SAFE Port Act and Efforts to Secure Our Nation’s Seaports. GAO-08-86T. Washington, D.C.: October 4, 2007.

Maritime Security: Observations on Selected Aspects of the SAFE Port Act. GAO-07-754T. Washington, D.C.: April 26, 2007.

Combating Nuclear Smuggling: Additional Actions Needed to Ensure Adequate Testing of Next Generation Radiation Detection Equipment. GAO-07-1247T. Washington, D.C.: September 18, 2007.

Cargo Container Inspections: Preliminary Observations on the Status of Efforts to Improve the Automated Targeting System. GAO-06-591T. Washington, D.C.: March 30, 2006.

Additional keywords: Border security, customs-trade partnership against terrorism (C-TPAT), supply chain security, counter-terrorism

CORE1011

[/s2If]

SUPPLY CHAIN SECURITY – Examinations of High- Risk Cargo at Foreign Seaports Have Increased, but Improved Data Collection and Performance Measures Are Needed, GAO, January 2008 (CORE1010)

Summary: This report reviews the progress that the US Customs and Border Protection (CBP) has made with the Container Security Initiative (CSI) – a program for screening US-bound high-risk shipping containers in foreign ports with X-ray and radiation detection solutions – since the latest 2005 GAO review. The report discusses how the CBP’s CSI efforts have (1) contributed to the long-term, strategic planning on the US supply chain security, (2) strengthened CSI activities worldwide and (3) established means to evaluate performance of the CSI activities. The report recommends CBP to develop its data collection practices that are related to the CSI team performance and the host government’s inspections of the US-bound containers. This report provides relevant information for CORE demonstrations that deal with US-bound maritime logistics and commerce. Also the risk cluster might benefit from the descriptions of the US risk-based supply chain security scheme – Automated Targeting System (AST), 24-hour rule and the importer security filing 10+2 – that the report elaborates in detail. The report is available at http://www.gao.gov/new.items/d08187.pdf.

[s2If is_user_logged_in()]

Full review: This GAO report elaborates the status and challenges of the US Container Security Initiative, but it also provides a comprehensive outlook on the US maritime supply chain security. This information is likely to be relevant for the CORE’s demonstrations (WP9 and WP14) that deal with US-bound container traffic. The report is a good reference document for those CORE work packages that seek to describe the state-of-the-art of the global supply chain and that are producing relevant training material on supply chain security. The CORE’s risk and IT clusters benefit from the information the report offers on risk-based security solutions that use advance cargo information to calculate risk scores for US-bound shipments by the aid of automatic risk assessment algorithms.

Cross-references:

  • Preventing Nuclear Smuggling: DOE Has Made Limited Progress in Installing Radiation Detection Equipment at Highest Priority Foreign Seaports. GAO-05-375. Washington, D.C.: March 31, 2005.
  • Homeland Security: Process for Reporting Lessons Learned from Seaport Exercises Needs Further Attention. GAO-05-170. Washington, D.C.: January 14, 2005.
  • Port Security: Better Planning Needed to Develop and Operate Maritime Worker Identification Card Program. GAO-05-106. Washington, D.C.: December 10, 2004.
  • Maritime Security: Substantial Work Remains to Translate New Planning Requirements into Effective Port Security. GAO-04-838. Washington, D.C.: June 30, 2004.
  • Homeland Security: Summary of Challenges Faced in Targeting Oceangoing Cargo Containers for Inspection. GAO-04-557T. Washington, D.C.: March 31, 2004.
  • Container Security: Expansion of Key Customs Programs Will Require Greater Attention to Critical Success Factors. GAO-03-770. Washington, D.C.: July 25, 2003.

Additional keywords: Container Security Initiative (CSI), counter-terrorism, homeland security, maritime supply chain security

CORE1010

[/s2If]

SUPPLY CHAIN SECURITY – CBP Works with International Entities to Promote Global Customs Security Standards and Initiatives, but Challenges Remain, GAO, August 2008 (CORE1009)

Summary: This report discusses how the US Customs and Border Protection (CBP) has (1) contributed to international supply chain security standards and (2) promoted mutual recognition in the customs security area and (3) how the agency expects to implement the 100% scanning requirement of the containerized US-bound maritime cargo. The report provides a detailed outlook on the US customs supply chain security scheme, and it highlights challenges and problems that the US government faces in promoting its supply chain security strategy internationally. The development and the implementation of the World Customs Organization’s (WCO) SAFE Framework of Standards, a suite of best practices on customs security, is a central theme throughout this GAO report. Because of its broad scope, the customs-related supply chain security, this document contains information that is likely to be useful for all CORE work packages, and especially for those that involve customs administrations. The report is available at http://www.gao.gov/assets/280/279730.pdf.

[s2If is_user_logged_in()]

Full review: This document provides a detailed outlook on customs-centric supply chain security from the US government’s perspective. This unique view on the customs security is going to be useful for the CORE’s early work packages that seek to describe the state-of-the-art of the global supply chain security. The information is also useful for the CORE demonstrations, in which customs administrations are involved. In particular, the demonstrations (WP9 and WP14) that are about US-bound trade and logistics benefit from the detailed description of the customs security initiatives that the US government has introduced since the 9/11 tragedy.

Cross-references:

  • Supply Chain Security: Challenges to Scanning 100 Percent of U.S.-Bound Cargo Containers. GAO-08-533T. Washington, D.C.: June 12, 2008.
  • Supply Chain Security: Examinations of High-Risk Cargo at Foreign Seaports Have Increased, but Improved Data Collection and Performance Measures Are Needed. GAO-08-187. Washington, D.C.: January 25, 2008.
  • Maritime Security: The SAFE Port Act: Status and Implementation One Year Later. GAO-08-126T. Washington, D.C.: October 30, 2007.
  • Maritime Security: One Year Later: A Progress Report on the SAFE Port Act. GAO-08-171T. Washington, D.C.: October 16, 2007.
  • Maritime Security: The SAFE Port Act and Efforts to Secure Our Nation’s Seaports. GAO-08-86T. Washington, D.C.: October 4, 2007.
  • Combating Nuclear Smuggling: Additional Actions Needed to Ensure Adequate Testing of Next Generation Radiation Detection Equipment. GAO-07-1247T. Washington, D.C.: September 18, 2007.
  • Maritime Security: Observations on Selected Aspects of the SAFE Port Act. GAO-07-754T. April 26, 2007.
  • Customs Revenue: Customs and Border Protection Needs to Improve Workforce Planning and Accountability. GAO-07-529. Washington, D.C.: April 12, 2007.
  • Cargo Container Inspections: Preliminary Observations on the Status of Efforts to Improve the Automated Targeting System. GAO-06-591T. Washington, D.C.: March 30, 2006.
  • Combating Nuclear Smuggling: Efforts to Deploy Radiation Detection Equipment in the United States and in Other Countries. GAO-05-840T. Washington, D.C.: June 21, 2005.
  • Container Security: A Flexible Staffing Model and Minimum Equipment Requirements Would Improve Overseas Targeting and Inspection Efforts. GAO-05-557. Washington, D.C.: April 26, 2005.

Additional keywords: Mutual recognition, regulatory harmonization, 100% scanning legislation, SAFE framework of standards, World Customs Organizations, Authorized Economic Operators (AEO) programs, Customs-Trade Partnership against Terrorism

CORE1009

[/s2If]

MARITIME SECURITY – DHS Could Benefit from Tracking Progress in Implementing the Small Vessel Security Strategy, GAO, October 2013 (CORE1016)

Summary: This GAO report reviews current activities the Department of Homeland Security, its component agencies and its stakeholders are doing to protect the US-centric seaborne trade and logistics from threats arising from small vessels. The report argues that the small vessels pose two “great threats” to the US maritime system: (1) explosive-laden small vessels can be used to ram into maritime structures or (2) the small vessels can be used as vehicles for transporting tools, weapons and tools for terrorism into the US. The GAO report highlights that DHS has its Small Vessel Security Strategy (SVSS), but the organization is not monitoring the progress its component agencies are doing in meeting its objectives. This report focuses mainly on security initiatives that affect navigation of small vessels at the US territorial waters and ports and operations of the US coastal guards and customs. Although US-based maritime logistics operations benefit from the increased security the small vessel security initiatives likely bring, they can continue their business as usual. Therefore, the CORE’s early work packages can use this report’s information to define the context of the global supply chain security, the CORE demonstrations do not need much attention to the small vessel security initiatives or this GAO report. The report is available at: http://gao.gov/assets/660/658703.pdf

[s2If is_user_logged_in()]

Full review: This report provides interesting background information about the US government’s efforts to secure their domestic maritime logistics and transportation from the threat of small vessels that navigate largely anonymously and unregulated. The document might be useful for the CORE early work packages that describe the context of the global supply chain security. It is however unlikely that the demonstrators would need to pay much attention to the US small vessel security initiatives because the legal requirements of the initiatives do not affect the operations of large commercial vessels, which carry most of the world’s seaborne cargo. Of course the small vessel security initiatives also affect the way the component agencies of DHS operate, but because CORE does not involve these agencies directly, in CORE, there is no need to put much effort on understanding technicalities of the small vessel security initiatives. Finally, the CORE’s clusters on education and training as well as risk management might anyhow consider the information of this GAO report relevant.

Cross-references:

  • Critical Infrastructure Protection: An Implementation Strategy Could Advance DHS’s Coordination of Resilience Efforts across Ports and Other Infrastructure. GAO-13-11. Washington, D.C.: October 25, 2012.
  • Supply Chain Security: CBP Needs to Conduct Regular Assessments of Its Cargo Targeting System. GAO-13-9. Washington, D.C.: October 25, 2012.
  • Maritime Security: Progress Made but Further Actions Needed to Secure the Maritime Energy Supply. GAO-11-883T. Washington, D.C.: August 24, 2011.
  • Supply Chain Security: Feasibility and Cost-Benefit Analysis Would Assist DHS and Congress in Assessing and Implementing the Requirement to Scan 100 Percent of U.S.-Bound Containers. GAO-10-12. Washington, D.C.: October 30, 2009.

CORE1016

Additional keywords: Maritime security, small vessel security, terrorism, smuggling

[/s2If]

Border Posts, Checkpoints, and Intra-African Trade: Challenges and Solutions. Barka, H., B., 2012 (CORE2009)

Summary

Pan-African economic integration has progressed over past years, producing a broad range of regional trade agreements and economic communities that seek to harmonise policies, develop common infrastructure and remove barriers to intra-African trade. Against expectations, however, this increased integration has not translated into strong economic growth in Africa. This article discusses how sub-Saharan countries can overcome trade barriers that undermine the African economic integration. The article’s focus is on border posts and customs procedures that play a key role in facilitating cross-border traffic.

According to the article, the problems of international trade in Africa are largely explained by inadequate infrastructure that creates congestion and limits connectivity, delays that stem from complex and manual customs procedures, corruption and by illicit trade. One-stop-border-posts are a promising approach to streamline customs procedures and curb corruption. The joint border post may bring trade facilitation benefits as significant as costly investments on roads, ports, bridges and other transport infrastructure. The articles highlights the Chirundu One-Stop Border Post between Zambia and Zimbabwe as a successful case of border agency cooperation. Previous Observatory review (CORE2008, 20 January 2016) describes the Chirundu border crossing in more detail.

The paper concludes by suggesting One-Stop-Border-Post as a promising way towards higher trade facilitation and African integration. To organise one-stop-border-post, the first thing to do is to analyse roles and procedures of different border control agencies. The task of high-level governance is to define how responsibilities across the various border control agencies are harmonised, coordinated and delegated. Metrics and statistics should underpin the design, as numerical data into traffic flows and clearance times are likely to reveal the major bottlenecks in the cross-border traffic. Finally, the article proposes extended exchange of information and data across government agencies, domestically and internationally. The article is available at http://www.afdb.org/fileadmin/uploads/afdb/Documents/Publications/INTRA%20AFRICAN%20TRADE_INTRA%20AFRICAN%20TRADE.pdf

Review by Toni Männistö (CBRA)

[s2If is_user_logged_in()]

Full review

The discussion on one-stop-border-posts in the African context is closely related to the CORE project and its many work packages. Especially the WP12, the demonstrator Schipol, that deals with imports of fresh cut flowers from Kenya to the Netherlands, benefits from the insights into African bureaucratic practices at many African borders. The demonstrator should consider the set of recommendations for higher border agency cooperation that the article proposes. Besides the demonstrators, the article provides a concise and informative outlook on international in Africa. At least CORE’s WP19, should consider the African perspective on cross-border trade when developing training material.

Reference

Barka, H., B., 2012. Border Posts, Checkpoints, and Intra-African Trade: Challenges and Solutions. African Development Bank

CORE2009

[/s2If]

AVIATION SECURITY – Transportation Security Administration Has Strengthened Planning to Guide Investments in Key Aviation Security Programs, but More Work Remains, GAO 2008 (CORE1067)

Summary: This GAO report discusses the impact of the 26 billion USD that the Transportation Security Administration (TSA) has spent on aviation security since 2004. The report focuses especially on the current status and the future challenges of passenger screening, air cargo security and passenger watch-list matching program known as Secure Flight. The air cargo security discussion is the report’s most relevant section from the CORE’s viewpoint. The information in the report, that has been published as early as July 2008, is anyhow largely outdated: it discusses challenges that TSA and the air cargo community need to overcome before starting the 100% screening of air cargo that flies on board passenger planes, a legal requirement that become into force in August 2010 and that was set by the Implementing Recommendation of the 9/11 Commission Act of 2007 (aka the 9/11 Act). The report also recommended strengthening the security of US-bound foreign air cargo (into the US from the rest of the world), to bring it on a par with outbound air cargo security (from the US to rest of the world). More recent regulations and initiatives have corrected this weakness in the US air cargo security: today, third country air carriers must screen cargo up to US standards (or national standards if the country of origin and the US recognize each other’s air cargo regimes) before loading cargo on US-bound planes. The source document is available at: http://www.gao.gov/products/GAO-08-1024T.

[s2If is_user_logged_in()]

Full review: This GAO report provides useful background information about the US air cargo security regime. This information is going to be useful for the CORE demonstration 17.1 that is about time-critical express shipping of military aircraft parts from the US to Spain. In the demonstration, the express operator DHL ships the parts by plane, and thus compliance with the US air cargo security requirements is one of the key themes of this demo. Also WP 1 might use this GAO report to describe evolution of the US air cargo regime over the years. But though this analysis would be interesting, it is not going to be the essential content in the deliverable of the WP1.

 Cross-references:

  • GAO, Aviation Security: Federal Coordination for Responding to In-flight Security Threats Has Matured, but Procedures Can Be Strengthened, (Washington, D.C.: July 31, 2007).
  • G_A_O_, Aviation Security: Transportation Security Administration May Face Resource and other Challenges in Developing a System to Screen All Cargo Transported on Passenger Aircraft
  • GAO, Aviation Security: Federal Efforts to Secure U.S.-Bound Air Cargo Are in the Early Stages and Could Be Strengthened, GAO-07-660 (Washington, D.C.: April 2007).
  • GAO, Aviation Security: Progress Made in Systematic Planning to Guide Key Investment Decisions, but More Work Remains, GAO-07-448T (Washington, D.C.: February 13, 2007).

Full citation:

U.S. Government Accountability Office (GAO), 2008. Aviation Security – Transportation Security Administration Has Strengthened Planning to Guide Investments in Key Aviation Security Programs.

CORE1067

Additional keywords: Air cargo security, Certified Cargo Screening Program (CCSP)

[/s2If]

SUPPLY CHAIN SECURITY: Feasibility and Cost-Benefit Analysis Would Assist DHS and Congress in Assessing and Implementing the Requirement to Scan 100 Percent of U.S.-Bound Containers, GAO (October 2009, CORE1066)

Summary: The document provides a comprehensive outlook on the past and recent US initiatives on container security. The report focuses on the challenges that prevent global implementation of the 100% scanning of US-bound containers in foreign ports with both non-intrusive inspection (NII) technologies and radiation detection devices, as mandated by the SAFE Port Act and the 9/11 Acts. The 100% scanning is believed to deter and detect terrorist attempts of smuggling weapons of mass destruction (WMD) into the United States inside a cargo container. The reports dates back to late 2009, so the description of the current state of the US container security it provides is not necessarily no longer accurate. The report anticipates that the implementation of the 100% scanning requirement will be delayed due to various problems that were identified during the precursory Secure Freight Initiative (SFI) pilots. These problems are related mainly to port logistics (routing of containers through scanning sites), employee safety (radiation of screening equipment) and technical constraints (equipment failures and poor quality of scanning images). Today, we know that the US authorities have deferred the implementation already twice, first to 2014 and for the second time until 2016. Altogether, this GAO report describes in detail the challenges of the 100% scanning law and elaborates some ongoing alternative risk-based approaches to container security: (1) the strategic trade lane strategy that aims to establish 100% scanning only in high terrorist risk foreign sea ports and (2) the “10 + 2” data requirements that importers and ocean carriers must submit to the US Customs and Border Protection (CBP) prior to a container is loaded aboard a US-bound vessel so that the US authorities can calculate more precise risk for each shipping container. This report includes relevant information for all the CORE’s demonstrations that involve US-bound maritime transportation. The source document is available at: http://www.gao.gov/products/GAO-10-12.

[s2If is_user_logged_in()]

Full review: The GAO document provides interesting insights on the evolution of the US container security regulations over the years. This is useful supportive information for CORE demonstrations that involve maritime shipping of containers into the US. The GM demonstration of the WP9 for example covers exports of automobile parts from the EU into the US by transatlantic ocean transport. If the US Congress does not repeal or defer the 100% scanning requirement, the port of Felixstove that participates in the demonstration, need to start scanning also all GM’s US-bound containers. Likewise, the FALACUS demo (WP14), which is about shipping of ceramic tiles from Italy to the US, must take into consideration the possible effects of the 100% scanning requirement. This demonstration is particularly interesting from the 100% scanning requirement standpoint because some ceramic tiles are naturally radioactive, and thus they tend to trigger false alarms in the radiation controls. Also the P&G demonstrator in the WP17, that focuses on shipping of consumer goods into the US, the possible impact of the 100% scanning regulation.

Besides the demonstrations, the CORE’s risk cluster might benefit from the detailed analysis of the risk-based approaches to the US container security, such as the strategic trade lane strategy and the “10 + 2” data requirement. All demonstrations might benefit from lessons learnt how GAO has advises DHS and CBP to carry out cost-benefit analyses for the US container security programs (especially the Secure Freight Initiative).

Cross-references:

  • Combating Nuclear Smuggling: Efforts to Deploy Radiation Detection Equipment in the United States and in Other Countries. GAO-05-840T. Washington, D.C.: June 21, 2005.
  • Container Security: A Flexible Staffing Model and Minimum Equipment Requirements Would Improve Overseas Targeting and Inspection Efforts. GAO-05-557. Washington, D.C.: April 26, 2005.
  • Bakshi, N., Flynn, S. E., & Gans, N. (2011). Estimating the operational impact of container inspections at international ports. Management Science, 57(1), 1-.‐‑20.

Full citation:

U.S. Government Accountability Office (GAO), 2009. Supply Chain Security Feasibility and Cost-Benefit Analysis Would Assist DHS and Congress in Assessing and Implementing the Requirement to Scan 100 Percent of U.S.-Bound Containers.

CORE1066

Additional keywords: Ocean transportation, counter-terrorism, non-intrusive inspection

[/s2If]

Introduction to Supply Chain Management (CASSANDRA Compendium Chapter 2, CORE2007a)

Summary

The second chapter of the CASSANDRA compendium gives a general outlook on the theory and practice of modern supply chain management. Written in lay-man’s language, the text explains a broad range of strategies for managing supply chains, from lean management to agile and responsive logistics. The chapter also defines fundamental supply chain terminology and discusses current trends in the logistics, including synchromodality, use of 4PL logistics service providers, and green logistics. The chapter introduces several supply chain reference frameworks that illustrate a series of interdependent activities and stakeholders involved in the international transport of cargo. The CASSANDRA compendium is available for download here.

Review by Toni Männistö (CBRA)

[s2If is_user_logged_in()]

Full review

The compendium summarizes the SCOR and UN/CEFACT supply chain models, that may be the two most used logistics reference frameworks in the world. The document also discusses less known academic conceptual models that seek to simplify the complexity of supply chain management by categorizing and explaining management strategies, activities, stakeholders and their roles and responsibilities. The section on the future trends in logistics offers a great outlook on the most likely changes and driving forces in the logistics industry. The outlook suggests that for example synchromodality (increased flexibility in transport mode selection), green logistics (less emissions), use of 4PL logistics service providers (outsourced supply chain management), and continuously increasing ship and port sizes will reshape the cross-border logistics over the years. The document also explains key CASSANDRA concepts and their impacts on international supply chain management. For instance, the Data Pipeline, a pivotal CASSANDRA concept, seeks to enhance sharing of information across supply chain stakeholders, in particularly from business operators to customs and other border control authorities. Most importantly, the Data Pipeline would allow customs officers to access commercial information, that normally is exchanged only between buyers and sellers, early in the upstream supply chain at the consignment completion point (CCP). This accurate, early commercial information would enable the customs and other border control agencies to assess security and other risks of cargo early on.

All in all, the document provides a crash refresher course on basic and advanced logistics terminology that would be beneficial for many the CORE consortium, especially for those partners whose expertise is mainly outside the logistics industry. The CORE demonstrators benefit from descriptions of CASSANDRA innovations that support information exchange and improve visibility across the supply chain. The demos might choose to reuse some of these CASSANDRA innovations or their components. The CASSANDRA compendium also contains a great deal of material that could be reused for education and training purposes in CORE (WP19). Finally, the chapter concludes with recommendations that are relevant also for CORE. The chapter recommends, for example, that because of broad variety of international supply chains, CASSANDRA solutions should be adaptable for different contexts.

Reference

Hintsa, J. and Uronen, K. (Eds.) (2012), “Common assessment and analysis of risk in global supply chains “, Compendium of FP7-project CASSANDRA, Chapter 2

CORE2007

[/s2If]

Interviews

Nothing Found

Sorry, no posts matched your criteria