Safe and Secure 2015!
Thanks to all CBRA blog readers for interesting feedback in 2014 – and all the best for year 2015! Below you find some blog plans for this year.
Thanks to all CBRA blog readers for interesting feedback in 2014 – and all the best for year 2015! Below you find some blog plans for this year.
Time-to-time security and quality management in global supply chains are considered to be of similar nature – but are they really?
Horizon2020 is the biggest EU Research and Innovation program ever, with €80 billion in funding. CBRA aims to play an active role in H2020.
News last week by the Transparency International on global corruption triggered CBRA´s blog topic to deal with B2G bribery in cross-border supply chains.
This is the first book review in CBRAs supply chain security blog, drilling into the complexities and challenges of global illicit trade.
We had an interesting Thursday-Friday of FP7-CORE project meetings in Athens, with philosophical discussions on “taxonomies on illegal activities in global supply chains”.
A smart move which will keep you up-to-date on latest and greatest in the myriad world of supply chain security and global trade facilitation.
Fabulous four days spent in Puebla, enjoying good quality conference presentations and panel discussions as well as great Mexican hospitality.
This week our research team members and collaborators were busy presenting research papers and discussing about new projects in Milan, Hamburg, Brussels and Puebla.
Time-to-time we receive the question: “How was CBRA born?”. The purpose of this blog entry is to shed light on the early days of our research institute, going back to key events during years 2001-2005.
Summary: This GAO report reviews the recent progress of the US air cargo security scheme. The Transportation Security Administration (TSA), the main agency responsible for the US air cargo security, has been working towards the implementation of the 100% screening requirements of the 9/11 Commission Act of 2007. So far TSA has set up a voluntary Certified Cargo Screening Program (CCSP) to allow trusted logistics operators to screen air cargo outside congested airports, launched a program for testing technologies for air cargo screening and expanding its program for approving explosive detection dog teams. The main obstacle in meeting the 100% screening requirement is that TSA has no reliable mechanism for verifying screening data from domestic foreign screening operators, which self-report the data. TSA also struggles in finding resources to employ as many transport security inspectors as it is required to oversee the Certified Cargo Screening Program. The report also points out that the current technologies that TSA has approved for cargo screening cannot screen large cargo units – pallets or unit loading devices (ULDs) – and this incapability reduces speed and cost-efficiency of air cargo screening. Overall, this GAO document provides a general outlook on state and challenges the US air cargo security regime, and therefore those CORE demonstrations that focus on the US-bound or US-origin air transport should consider the report as a key source material. The report is available for download at: www.gao.gov/assets/130/125678.pdf.
[s2If is_user_logged_in()]
Full review: This document is relevant for the CORE demonstrations that involve air transportation into or through or from the US. Especially the DHL demo, that concentrates on shipping of military aircraft parts from the US to Spain, is affected by the TSA’s programs and initiatives that the report analyses. The report is very concise and informative, so it might be beneficial to the CORE’s educational and training activities.
Cross-references:
Additional keywords: Air cargo security, 100% screening, Certified Cargo Screening Program (CCSP)
[/s2If]
Summary: The GAO report discusses actions the US Coast Guard and the Federal Bureau of Investigation (FBI) have taken to strengthen security of energy tankers and offshore energy infrastructure – that produces, transports, or receives oil and natural gas – from terrorist attacks. The report’s key recommendation is that the Coast Guard need to assess risks to all offshore facilities in the US territorial waters, to improve emergency response plans in case of oil spills and to design performance measures for emergency response activities. This GAO document focuses on a rather narrow field of critical infrastructure, the US maritime energy infrastructure, which is not in the CORE’s scope. The CORE’s risk cluster might consider useful the description how the Coast Guard has applied its Maritime Security Risk Analysis Model (MSRAM) to determine risk of the US maritime energy infrastructure. The report is available for download at: www.gao.gov/new.items/d11883t.pdf.
[s2If is_user_logged_in()]
Full review: This GAO document is not very relevant to CORE because of its topic (the US maritime energy infrastructure) that is not within the CORE’s scope. Even so, the risk cluster, the IT cluster and the demonstrations on maritime transport might consider useful of the insight this report offers on security risk assessment.
Cross-references:
Additional keywords: Critical infrastructure protection (CIP), maritime security and security of supply
[/s2If]
Summary: The Department of Homeland Security (DHS) has granted almost 1.7 billion USD to port security through the Port Security Grant Program (PSGP). The program is administered by a component agency of DHS, Federal Emergency Management Agency (FEMA). This GAO reports highlights some problems that the grant program has encountered. The first issue is that the risk assessment the FEMA uses to assess risk levels and assign grants to different ports does not take into account how security improvements affect the vulnerability of the ports to terrorist attacks. The report recommends the FEMA to design a vulnerability index that accounts for security improvement and to coordinate with the Coast Guard to get access to the most accurate vulnerability and threat information. The second issue with the grant program is that much of the grant money does not get used and translate into practical port security projects. The GAO report proposes acceleration of the grant granting process with updated administrative procedures and with more administrative staff. Finally, this GAO report recommends the FEMA to develop performance metrics to assess its administration in relation to the Port Security Grant Program. The contents of this GAO report is not very relevant to CORE because no US seaports are partners in the project. The report is available for download at: www.gao.gov/assets/590/587142.pdf.
[s2If is_user_logged_in()]
Full review: This document has only a limited relevance for CORE because the consortium does not involve any US seaport operators. The demonstrations of WP9 and WP14 that cover shipping of goods from and into the US through local seaports might find it useful to learn about how US ports can apply for funds to improve the security. Otherwise, other demonstrations do not benefit much of this information. However, the CORE’s risk cluster can benefit from the rather detailed description of the risk analysis model in the report’s Appendix II.
Cross-references:
Additional keywords: Critical infrastructure protection (CIP), maritime security and security of supply, Port Security Grant Program (PSGP)
[/s2If]
Summary: The report reviews the US Customs and Border Protection’s (CPB) approach to risk assessment and targeting of maritime shipping containers. The report’s highlights that CPB does not have clear decision rules and reporting procedures to monitor percentage of containers that the risk assessment system flags high-risk and that get eventually examined. The source of this problem is that the CPB’s officials (targeters) may waive examination of the high-risk containers if the container (i) falls within a predetermined category (standard exception), or (ii) the targeters can articulate why the shipment should not be considered high risk. The targeting units have currently differing definitions of “standard exceptions” and differing views on what constitutes the “articulate reasons.” The GAO report recommends the CPB to clarify, harmonize and enforce the rules and the procedures for waiving the high-risk containers from examination. As for CORE, this report provides a detailed and recent outlook on the US maritime risk assessment and targeting scheme, and this information is going to support work of the CORE’s risk cluster and the demonstrations that involve shipping of sea containers into the US. The report is available for download at: www.gao.gov/assets/670/668098.pdf.
[s2If is_user_logged_in()]
Full review: This GAO reports contains crucial information about the US risk assessment and container targeting systems that benefit the CORE’s risk cluster. The report outlines principles, procedures, datasets and scanning methods that constitute the world’s most advanced risk assessment system for maritime shipping containers. The CORE’s IT cluster might also benefit from the report’s description of the CPB’s Automated Targeting System (ATS) that is used to compute risk scores for shipping containers and flag the ones with the highest score as high-risk. Regarding the CORE demonstrations, the GM demon (WP19) must comply with data requirements (24-hour rule and the “10+2” rule) that enable the US risk assessment and targeting system. Also the demos involving customs controls, especially WP11.2 and WP10.1, may learn something from the ways how the US border control authorities are assessing risk levels of incoming containers.
Cross-references:
Additional keywords: Security Filing and Additional Carrier Requirements (known as the 10+2 rule), 24-hour rule, risk assessment
[/s2If]
Summary: This report presents and discuses findings of a survey on stakeholders’ satisfaction to the US Transportation Security Administration’s security-related activities and to the way the TSA disseminates information about its activities. The survey’s scope is the overall US transportation system, covering aviation, rail, and highway modalities and transport of passengers and freight. Given the broad scope and the US-centricity of the survey, this report is not very relevant for CORE. The education and training cluster could anyhow learn how security-related user satisfaction surveys are done and how to establish a mechanism for collecting regular user feedback. The report is available for download at: http://gao.gov/assets/670/664350.pdf.
[s2If is_user_logged_in()]
Full review: The scope of the report is very broad and the information about cargo security is limited, so the CORE project cannot much benefit from this report. However, the project’s educational and training cluster might use the report’s information to design ways administer end-user surveys: what questions to ask, which stakeholders to survey and how to report the findings. Some demonstrations adopt some of the report’s ideas and methods to collect high-quality user requirements.
Additional keywords: Transportation security, aviation security
[/s2If]
Summary: The report provides a comprehensive review of progress and challenges of various port security activities and programs the Department of Homeland Security (DHS) has carried out since 9/11. In essence, the report is a summary and an update of a number of more detailed GAO reports on maritime supply chain security. The report states that needs to strengthen further its efforts on maritime domain awareness through intensified communication among maritime stakeholders. Regarding the US domestic port security, the report recommends DHS to reassess its Port Security Grant Program (PSGP) that allows ports to request funds for security projects and to improve quality of vulnerability assessment in US ports. The report also urges DHS to overcome challenges of risk-based targeting and scanning of US-bound shipping containers. The findings and recommendations of this report help CORE consortium understand the current state of the US maritime security regime. This understanding benefits particularly the demonstrations of WP9 and WP14. Also educational and training as well as risk clusters of CORE may find the report’s information useful. The report is available for download at: www.gao.gov/assets/670/663784.pdf.
[s2If is_user_logged_in()]
Full review: This GAO document summarizes the US maritime supply chain security and provides useful information for the CORE project across its work packages. This information most obviously benefits WP9 and WP14 that involve US-bound maritime trade lanes. However, also the CORE’s risk cluster can find useful insight in the report, for example about challenges and opportunities of risk-based container targeting and screening approaches. This summary GAO document caters the needs of state-of-the-art work packages and the CORE’s educational and training cluster that aims to produce relevant and up-to-date material about supply chain security for a variety of stakeholders.
Cross-references:
Additional keywords: Maritime security, Port Security Grant Program (PSGP), risk-based controls, targeting, container scanning
[/s2If]
Summary: This report is a summary of previous GAO reports on US maritime supply chain security and border controls. The report focuses on progress and challenges in four main areas of the Department of Homeland Security’s (DHS) activity on the maritime security. The report highlights that DHS and its component Coast Guard agency could improve its maritime domain awareness through increased information sharing and more advanced vessel-tracking systems. The Customs and Border Protection (CBP) in turn could step up its role in securing US-bound container traffic by conducting more frequent risk assessment audits in key foreign ports that ship cargo into the US and by fostering more close relationship with foreign authorities. The GAO report also recommends the Coast Guard to rethink its maritime surveillance, interdiction and security operations because current protection and support is not adequate in high priority locations. The report also calls for more collaboration and coordination among maritime authorities, port operators and ocean carriers. Finally, the report encourages the DHS to develop performance metrics and data collection procedures the agency uses to assess and monitor its maritime security programs and activities. This report gives a recent update on the US maritime security activities that might be helpful for CORE demonstrations and clusters. The report is available for download at: www.gao.gov/assets/660/659087.pdf.
[s2If is_user_logged_in()]
Full review: This summary GAO documents provides detailed background material about the US maritime security programs. This information is very relevant for the CORE demonstrations WP9 and WP14 that involve shipping cargo from and into the US. The information this document offers also help the CORE’s risk and IT clusters to learn lessons from the US approach to risk-based maritime security and security-related IT integration.
Cross-references:
Additional keywords: Maritime security, maritime surveillance, risk-based controls, targeting, container scanning
[/s2If]
Summary: This GAO report explains how the US government agencies have fought sea piracy around the Horn of Africa and at the Gulf of Guinea since 2010. The report also describes the current state of sea piracy threats in these two areas, and it urges US government agencies to reconsider their resource allocations, strategies and tactics related to the counterpiracy efforts. The report points out that the number of annual piracy incidents at the Gulf of Guinea has surpassed the yearly incidents off the Horn of Africa. This shift in pirate attacks prompt changes in the US counterpiracy operations. However, as the report points out, the US government agencies responsible for the counterpiracy activities have not recently conducted reassessments of their actions, despite the changing conditions. The report therefore recommends the US government agencies to re-evaluate the counterpiracy efforts, especially at the Gulf of Guinea that is becoming the most important hotspot of the international sea piracy. This GAO report provides information about modern sea piracy from which CORE’s maritime demonstrations might benefit. The report is available for download at: www.gao.gov/assets/670/664268.pdf.
[s2If is_user_logged_in()]
Full review: This GAO report delivers a comprehensive analysis of the current state of sea piracy at the two African hotspots and the US government’s counterpiracy efforts. This information benefits those CORE demonstrations that involve maritime shipping. The detailed description of the US counterpiracy efforts might also inspire the risk cluster to find effective and efficient risk-based solutions to protect maritime logistics and transport from sea piracy.
Cross-references:
Additional keywords: Maritime security, sea piracy
[/s2If]
Summary: TAPA TACSS – Air Cargo Security Standards (TACSS) is a certifiable security program for the air cargo industry to close down, as much as possible, all risks for high value freight whilst being handled and transported on the ground. Available to General Public at the TAPA Website, this standard is hyperlinked here: https://www.tapaemea.com
[s2If is_user_logged_in()]
Full review: The Transported Asset Protection Association (TAPA) is a self-funded industry group comprising of manufacturers, shippers, logistics providers and law enforcement agencies that share the objective to eliminate loss of product by criminal act. The theft of high value, high risk products moving in supply chains in Europe costs businesses in excess of € 8.2 billion a year.
Although the focus of TAPA is to stop the unauthorized removal of items from the logistics chain, many of the methods used by criminals to achieve this are entirely relevant to the other security threats seen within the industry. E.g. unauthorized entry, deception techniques, tampering of shipments etc. TAPA has created a number of certifiable security standards:
The latter one, TACSS is a set of security standards designed specifically for Air Cargo Handling Facilities. It takes into account the mode of operation of such terminals often having open doors, and yet often operating inside a secure area within an airport, behind a fence. By providing comprehensive requirements and a certification scheme for the protection of air cargo whilst being transported on the ground, TAPA hopes to provide its own members and industry partners with viable options for improving and/or maintaining an effective air cargo security program.
There are two levels to the Standard. Level 1 & Level 2, with 1 being the higher level of security, and the decision of which Level to certify against is decided by risk assessment which takes into account the geographical location of the facility and crime levels in the area. Certification is by Independent Validator against a checklist and valid for 2 years.
Detailed analysis of relevance for CORE: The CORE implementation objectives, which specify what will be done and how to reach the vision, are all subject to the Policies, Regulations, and Standards that exist within the Security Domain of the Global Supply Chain. Among all Work Packages of the project, some are directly impacted by the project, while others are solely primarily or secondarily contributed. Among these Work Packages, the CORE demonstrators will validate the applicability and benefits of the CORE approach in representative operating scenarios characteristic of the global supply chain. They will specifically show the way towards a Global Secure Supply Chain. The overriding goal is to demonstrate substantial gains in security and facilitation covering every major facet of the supply chain security sector.
The following Work Packages are directly impacted by the TACSS initiative:
The following Work Packages are primarily affected by TAPA TACSS, as airfreight is part of global supply chain:
The TACSS Initiative could also help with the following Work Packages, with the following secondary effects:
CORE Impact anticipation: CORE seeks to give consolidated solutions and develop the resilience, optimization and interoperability of the global supply chain, including Port, Container, Post, Truck, Rail, Maritime and Air. Air freight is thence a part of the global vision of CORE. TAPA TACCS contributes thence directly to CORE vision. Impact?
Cross-references: Air Cargo World on TAPA TACSS and air cargo crimes: www.aircargoworld.com
Full citation: TAPA EMEA Website, TACSS Page, accessed 23 September 2014: https://www.tapaemea.com
[/s2If]
Summary: As a response to the increasing security concerns surrounding goods transport by road, the IRU Membership has been providing information on safe and secure truck parking areas to road hauliers and truck drivers for more than two decades. Since the early 1990s, this information was disseminated in the form of a printed handbook. In 2007 the online website was launched. In 2013 a smartphone app was launched. Currently initiatives are taken to encourage the use of TRANSPark globally. It does not have much documentation available, except promotional fliers and the website and the app themselves. Available to the General Public at: http://www.iru.org and through the Android and iPhone TRANSPark app, which can be downloaded from the stores. Overall relevance to CORE is high, as truck transports constantly risk being attacked by organised crime with the aim to either steal fuel, cargo or potentially even to use a truck for terrorist purposes. Therefore, ensuring that trucks are parked at safe and secure truck parking areas is essential for drivers, road hauliers, shippers and other stakeholders involved in supply chain security.
[s2If is_user_logged_in()]
Full review: The current strengths include: Bringing information on safe and secure truck parking areas to drivers and road hauliers; Offering a driver-haulier-shipper-enforcement social network, enabling info sharing on latest road cargo related security threats; and providing flexible platform with expected future expansions to further ensure information sharing between key road haulage actors. Future opportunity is: Using this established communication channel for two-way information sharing with truck drivers, road hauliers, shippers and enforcement. And future threat is: The success of this community, as any other, depends strongly on the uptake by users.
Detailed analysis and relevance for CORE: The CORE implementation objectives depend on securing every element of the supply chain, and ensuring swift information sharing between different actors. TRANSPark could be relevant to following Work Packages:
CORE Impact anticipation: CORE could have a strong impact on future developments of the TRANSPark webservice and the app. The service is constantly evolving and is looking for new ways to improve security of the road haulage for drivers, hauliers, and other relevant stakeholders.
App and video:
Available to General Public at: http://www.iru.org and through the Android and iPhone TRANSPark app, which can be downloaded from the stores.
Youtube video on TRANSPark: https://www.youtube.com
CORE 1041
[/s2If]
Cross-border Research Association
Chemin de la Cure 9
CH-1066 Epalinges
Switzerland
Phone: 41-76-5890967
Skype: CBRA_2014
Email: cbra@cross-border.org