Posts

Three new Senior Experts

We have the pleasure to announce that the following three top experts in illicit trade and maritime security have recently joined the CBRA’s Consulting Team, as Senior Consultants: Ms. Vittoria Luda di Cortemiglia, Mr. Michael Ellis and Mr. Lars W Lorenzen. We work closely with them in monitoring new calls and preparing project proposals – and, once new projects are funded, they play a key role in executing the actual research, consulting and training work. In the meanwhile, each one of them carries out other “non-CBRA professional activities”. In today’s CBRA Blog we introduce all the three of them, by sharing their short bios below. Please do not hesitate to contact us in case you see interesting joint project opportunities in the future! Have a great weekend everyone, Juha.

Ms. Vittoria Luda di Cortemiglia, Senior Consultant, Illicit Trade and Human Trafficking, Italy

Ms. Luda di Cortemiglia is a senior researcher and consultant with extensive experience on various criminal justice and supply chain security issues at international level. Experience specifically includes applied research and analysis as well as project management and training for professionals, in the field of illicit trafficking and supply chain security, including trafficking in persons, trafficking in counterfeit products, illicit trade in precious metals, illegal waste trade and eco-crimes, cybercrime and misuse of technologies. After graduating in Law at the University of Turin, Italy, 1999, Ms. Luda di Cortemiglia obtained a Master degree in International Relationships and Diplomacy at St. John’s University, New York, USA, in 2001, joining the United Nations in October 2001. Until September 2016 she has coordinated the programs and activities of the Emerging Crimes Unit at the United Nations Interregional Crime and Justice Research Institute (UNICRI). She has acted as UNICRI Focal Point for the United Nations Crime Prevention and Criminal Justice Programme Network (PNI), and from 2009 until 2016 she represented UNICRI within the United Nations Inter-Agency Coordination Group against Human Trafficking (UN-ICAT).

Mr. Michael Ellis, Senior Consultant, Illicit Trade in Global Supply Chains, United Kingdom

Mr. Ellis has nearly 40 years of experience in law enforcement, coming from an operational policing background. He served with the London Metropolitan Police fighting against serious international and organised crime for 20 years, He was then engaged in the corporate security function in multinational firms, dealing with anti-counterfeit and illicit trade issues on a global basis for a further 16 years. Michael was with Universal Music, with IFPI, the music industry’s trade association, and with Beiersdorf. Most recently he was the Assistant Director of Police Services at INTERPOL and the Head of the INTERPOL Program on Traffic in Illicit Goods and Counterfeit. Michael was responsible for managing and coordinating INTERPOL’s global strategy to fight against this criminal activity, and he lead the police organisations international efforts in this area. Michael has a Master’s degree in Social Science, where he specifically researched the extensive links between organised crime and illicit trade and counterfeiting. Michael joined CBRAs consulting team on 1 October, 2016, as a Senior Consultant. He will be involved in various projects related to illicit trade and counterfeit goods in global supply chains.

Mr. Lars W Lorenzen, Senior Consultant, Maritime and Port Security, Denmark

Mr. Lorenzen has had a career with the Maersk Group spanning 37 years within a number of business units, notably within container transportation in the broadest sense. His particular knowledge and expertise covers the operational, equipment management, security, safety, standardization and regulatory sphere. He has been leading the Maersk Group work in obtaining and maintaining US C-TPAT and EU AEO-F supply chain security certifications and validations since the inception of both initiatives, while engaging with customers in shaping their profiles. As part of his security tasks, Lars has built and maintained a security response programme for the Maersk Line organisation, being also the focal point and first responder to security breaches. For a period, he was a member of the WCO PSCG (World Customs Organization Private Sector Consultative Group). During the past 20+ years he has been an appointed national expert in standardization work, mainly within ISO TC104 and TC204, including leadership of working groups – while heading the Danish delegation. Lars has served as a civil expert to NATO and other military initiatives by appointment of the Danish Government for the past 12 years, providing commercial views and factual information relating to logistics, and in the course of this participated in developing and conducting table top and other exercises.

blog-191116-2

New survey on European postal security

PostEurop and Cross-border Research Association have launched a new online survey on postal security management to promote further development and implementation of best security practices in the postal sector. The survey is part of the ongoing SAFEPOST project that the European Commission is co-funding under the Seventh Framework Programme (FP7). SAFEPOST project going to finish in the end of July after four years of work towards higher postal security in the European Union.

The survey studies the current state of postal security management among PostEurop members, 52 postal operators in 49 European countries. The goal is to collect responses mainly from security and safety managers of the PostEurop members, but also postal expert familiar with sorting and distribution processes are welcome to provide their inputs. The first part of the survey focuses on security implementation and security performance, and the second part studies postal managers’ expectations and concerns regarding the following six main SAFEPOST innovations:

Common Postal Security Space:

SAFEPOST has created an online platform for sharing security-related information between postal operators. This Common Postal Security Space provides a digital track record of security controls and related evidence (for example X-ray images) that a postal parcel has encountered over its journey, and facilitates an easy and controlled way to exchange information both with other operators as well as the authorities.

D-tube drug screening station:

SAFEPOST has demonstrated a new screening solution, D-tube, that can be fully integrated into the sorting process. The D-Tube’s prototype detects illegal substances, such as narcotics and explosives, at high accuracy.

Explosive detection system:

SAFEPOST has demonstrated a Raman spectroscopy screening device for detecting trace amounts of explosives and explosive precursors on the outside of postal items. The device is designed to be seamlessly integrated, at the same level as X-ray machines already used today, in the sorting process and detect the explosive threats at a high accuracy and at a low false alarm rate (≈ 1 %).

Image recognition system:

SAFEPOST has developed an Image Recognition solution that photographs five visible sides of a postal parcel at one or more locations in the postal network. The solution compares these images to detect signs of tampering or damage (≈ 92% detection rate). The current solution functions properly when the conveyor belt moves no faster than 0.5 m/s.

Radiological screening:

SAFEPOST has demonstrated detection of radiation in moving parcels, that can be fully integrated into the sorting process. The current version of the detector is able to detect any harmful level of radiation, and identify the radioactive isotope, and when possible to consider effects of possible attempts of hiding the radioactivity with lead or other shielding material by detecting neutron radiation.

Security standard and certificate:

SAFEPOST project is working towards a new European security standard for the postal operators that would give recommendations about use of security inspection technologies, exchange of security-related information, cyber security, and key security performance indicators. This standard would pave the road towards a voluntary security certification program that would help the postal operators to show their commitment to security.

This survey research is expected to produce interesting new insights about postal security activities and security performance among the PostEurop members. If the response rate is high, the survey findings will set a basis for pan-European benchmarking of security activities. The findings would also contribute to smart policy making, legislation, and standardisation in the field of postal security.

Finally, depending on the response rate, CBRA is going to publish an academic journal paper based on the results. Building on solid theory on supply chain security risk management, the journal paper would provide new empirical about how supply chain security implementation is associated operational and security performance. We expect that collaborative security measures improve both on-time delivery performance (a proxy for operational performance) and supply chain security performance simultaneously. Collaborative security measures include survey items such as “we coordinate security activities with our business customers” and “we exchange customs declaration information with customs authorities electronically [for example, ITMATT or CUSITM messages]”. Another hypothesis is that, on the one hand, non-collaborative security contributes to supply chain security performance but decrease on-time delivery performance on the other hand. Examples of such non-collaborative measures include “we use tamper-evident mail bags to transport high-value postal items” and “We perform security controls also on non-airmail items to detect explosives.” The figure below summarises the theory and hypotheses of the research paper.

blog1506161

Figure 1 Theoretical framework of the SAFEPOST survey paper

The survey findings will be presented in the final SAFEPOST meeting in Madrid 5-6 July 2016. After the meeting, we hope that we can expand the scope of the survey to cover the rest of the world, as well. The next step would be to contact representatives of the Universal Postal Union (UPU) and coordinate distribution of the survey into the organisations’ 192 member countries.

 

EU logistics security – an interesting decade

I had a great pleasure to work intensively on the European surface transport security standardization efforts, some years ago – this CBRA Blog aims to summarize the main work done, and the key objectives achieved.

 

Couple of years after the US 9/11, 2001 terrorist attacks, the European Commission Directorate General of Transport and Energy, EC DG TREN, started to prepare a proposal for a regulation of the European Parliament and of the Council on enhancing cargo surface transport security. In the meanwhile, 9/11 was already triggering an avalanche of new customs, aviation and maritime supply chain security regulations, programs and standards, in the US, Europe and across the globe. But when it came specifically to surface transport security for road and rail cargo (and inland waterways, to that matter) in Europe, nothing was cooking before the DG TREN initiative “Secure Operator”, first announced in 2004. By 2006, the main goal of the EC proposal for a regulation on enhancing supply chain security (SCS) in the EU was shaped as to achieve greater protection of the European freight transport system against possible terrorist attacks. The specific objectives of the draft regulation were defined as: (i) to increase the level of security along the supply chain without impeding the free flow of trade; (ii) to establish a common framework for a systematic European approach without jeopardizing the common transport market and existing security measures; and (iii) to avoid unnecessary administrative procedures and burdens at European and national levels. In addition, the draft regulation related to the need to prevent a patchwork of various supply chain security standards and solutions across EU.

blog2105162However, it quickly became clear that there was no common sense of urgency in supply chain security regulations across EU Member States, particularly in the context of threat of terrorism to surface (cargo) transport. One was lacking a commitment towards an integrated approach, which would urge everybody to look at the holistic supply chain picture. The countries and especially stakeholder (or, lobby) organizations clearly focused on their specific interests on a part of the supply chain, thus appearing uncomfortable when trying to identify the “big picture”. Ultimately, the draft regulation was blocked in the European legislative process and finally officially withdrawn by the Commission, in 2010.

 

 

In the meanwhile, already in 2005, an expert group in supply chain security was formed under the umbrella of European Committee for Standardization (CEN) – and that’s when Cross-border Research Association started to play a role in the “EU land transport security regulations and standards play”, first as the rapporteur for the expert group, and later as the research party for the technical committee in supply chain security. The expert group was formed technically under the CEN working group “Protection and Security of the Citizen” (CEN/BT/WG161), and the (pre)standardization work was partly based on the Logistics Action Plan of the EC that indicated the need for standardization in the transport security domain for the whole logistic chain.

blog2105163Following the conclusions and recommendations by the expert group, the CEN Technical Committee in Supply Chain Security (CEN/TC 379) was established in 2008, producing ultimately three tangible outputs: Supply Chain Security Feasibility Study (in 2010); CEN Technical Report “Supply Chain Security — Good Practice Guide for Small and Medium Sized Operators” (in 2012, CEN/TR 16412:2012); and, a European Standard: Logistics – Specifications for reporting crime incidents (in 2013, EN 16352:2013-06). The first of the outcomes is available for free (ask by email:  cbra@cross-border.org ), and the latter two you can purchase e.g. from your national standardization institute web shop. All in all, great project experience behind us, couple of good publications, and many new contacts and even few friends for lifetime – thus, no regrets, and if asked, would become rapporteur and lead researcher on these important topics, again and again!

 

 

 

 

And finally, when it comes to the future of SCS regulation and standardization work in Europe – in particular in the land transport security sector (e.g. the LANDSEC expert group, Commission Decision 2012/286/EU): do not be shy in exploiting the tangible outcomes of a decade of our joint work, in particular the Euronorm EN 16352:2013-06, “Logistics: specifications for reporting crime incidents” – no reason to reinvent the wheel!

 

CBRA Blog by Dr. Juha Hintsa on 21.5.2016

 

Summarizing the main milestones of the surface transport security 2004-2014 regulatory and standardization process tracks:

A) Regulatory process -track was largely driven by the European Commission Directorate General for Transport and Energy (EC DG TREN), comprising of the following five sequential steps:
A1. Preparation of the Secure Operator legislation at EC DG TREN (2004-2006)
A2. Publication of the legislative proposal (EC, 2006a)
A3. Publication of an impact assessment study (EC, 2006b)
A4. Announcements and debates at European Parliament and Council (2006-2009)
A5. Withdrawal of the proposal by the Commission, (18.9.2010)

B) Standardization process -track – for which the European Committee for Standardization (CEN) was responsible – consisting of the following seven, chronologically ordered steps:
B1. Establishment of an Expert group in supply chain security, under CEN/BT/WG161, “Protection and Security of the Citizen” (2005)
B2. Publication of the final report of the Expert group, approved by CEN/BT/WG161 (14.11.2006)
B3. Establishment of the CEN Technical Committee in Supply Chain Security, CEN/TC 379 (2008)
B4. Publication of Supply Chain Security Feasibility Study (15.1.2010)
B5. Publication of the CEN Technical Report, CEN/TR 16412:2012 “Supply Chain Security — Good Practice Guide for Small and Medium Sized Operators” (2012)
B6. Publication of a European Standard: Logistics – Specifications for reporting crime incidents, EN 16352:2013-06 (2013)
B7. Closure of the CEN Technical Committee in Supply Chain Security, CEN/TC 379 (2014).

 

blog2105164

Main references / bibliography:

  • CEN (2013), “Logistics: specifications for reporting crime incidents”, EN 16352:2013-06
  • CEN (2012), “Supply chain security (SCS): Good practice guide for small and medium sized operators”, CEN/TR 16412:2012
  • CEN (2006), “Expert group: Supply chain security”, approved by CEN/BT/WG161, 14.1.2006
  • EC (2012), “Commission Staff Working Document on Transport Security”, SWD(2012), 143 final.
  • EC (2006a), COM(2006)79 final, 2006/0025(COD), COMMUNICATION FROM THE COMMISSION TO THE COUNCIL, THE EUROPEAN PARLIAMENT, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS on enhancing supply chain security Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on enhancing supply chain security, (SEC(2006)251)
  • EC (2006b), SEC(2006)251 COMMISSION STAFF WORKING DOCUMENT. Annex to the COMMUNICATION FROM THE COMMISSION TO THE COUNCIL, THE EUROPEAN PARLIAMENT, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS on enhancing supply chain security and Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on enhancing supply chain security – IMPACT ASSESSMENT – {COM(2006)79 final}
  • Hintsa, J., Ahokas, J., Männistö, T. and Sahlstedt, J. (2010), “CEN supply chain security (SCS) feasibility study”, CEN/TC 379 Supply Chain Security, Final report, 15.12010

 

 

FP7-CORE Education – Two new diagrams

Today’s CBRA Blog presents two new diagrams which have been recently designed and developed in the context of FP7-CORE Education and training work (Work package 19.1). The information visualized in the diagram is based on CBRA’s supply chain security research work since year 2001, particularly from the past 5-6 years.

Some background information on the first diagram of crime types in global supply chains has been presented before for example in CBRA’s Blog of 13 October 2014 – Crime taxonomies from Athens. In the center of this diagram we list the crime types – including document fraud and cybercrime – which in the supply chain criminal context are performed in order to succeed with the actual economic or ideological crime, e.g. cargo theft or terrorism.

The left area of the circle lists four examples of crime types, which typically are of primary concern for supply chain companies: cargo theft, sabotage, parallel trade and product specification fraud. With such crime types it is commonly up to the companies to prevent, to detect and to react – of course, law enforcement agencies can be called for any time there is reasonable suspicion of such activities (and naturally in certain cases the government agencies may even be the first ones to detect and react, e.g. in case of armed robberies and truck hijackings).

The right area of the circle deals with supply chain incidents where the authorities typically focus on prevention, detection and reaction: fraud in indirect border taxes; trafficking / violations in cross-border restrictions and prohibitions; human trafficking; and exploitation of illicit labor. From supply chain perspective one can characterize them as “a priori non-disruptive illegal activities – only if / after authorities detect the violations, the supply chain is disrupted and the involved supply chain companies can get in trouble”.

Lastly, on the bottom area of the circle, we list four supply chain crime areas where the prevention typically is in strong interest of both supply chain companies and governmental agencies – and, the detection and (instant) reaction varies on case-by-case basis: counterfeiting, sales channel violations, sea piracy and terrorism. Counterfeiting hits revenues on both sides of the equation, and, with many products can also be health damaging or even lethal. Not having proper sales licenses, and/or selling to unauthorized buyers – for example cigarettes and alcohol, dual use and strategic goods etc. – can again harm both the involved companies and the society as a whole. And of course, sea pirates hijacking cargo ships; bombs exploding and bringing planes down; and terrorists attacking critical supply chain infrastructures, all are in the best interest of both companies and government agencies to prevent, to detect, and to react – in the fastest and most effective possible manner.

blog10.03.161

The second new educational diagram below depicts the negative socio-economic impact areas – six in total – caused by twelve typical smuggling and trafficking activities. The data behind it has been presented before e.g. in CBRA’s Blog of 14 January 2015 – Socio-economic damages. Inside the square we present the six societal impact areas – the larger the area, the more links there are between the trafficking activities and the negative impacts. As an example of a “big area”, seven different types of trafficking typically lead into increasing market place distortions and/or unfair competition. In the other extreme, only trafficking in stolen cultural products leads to losses in cultural heritage.

blog10.03.162

That’s all for the CBRA Blog today – please let us know if you see this type of visualization as beneficial when teaching and learning about the big picture of supply chain security!  Thanks, Juha Hintsa ( email: cbra@cross-border.org )

Chemical Security in Istanbul

2015-12-15 09.02.08I had the most interesting week in Istanbul with the Iraqi government representatives, chemical sector companies and the US State Department Chemical Security Program, CSP.

Security in the chemical supply chain is a major challenge for government agencies and chemical supply chain companies across the globe, including those in the Middle-East and North African (MENA) region. Theft, diversion, trafficking, export violations, counterfeit chemicals, sabotage and terrorism – among other criminal threats – keep the agencies and companies constantly on their toes when considering how to best tackle the vulnerabilities and threats in their respective chemical supply chains.

This was my second time to join as an external expert in a Chemical Security Program (CSP) event in the MENA region. The first time was in Hurghada, Egypt, in March 2015 – thanks again to Professor Andrew Thomas, the Chief Editor of the Journal of Transportation Security, for hooking me up with CRDF Global and the US State Department on this. Now the four day event targeted for the relevant Iraqi government agencies as well as the Iraqi chemical sector companies was held in Istanbul, Turkey, on 14-17 December 2015.

We had a fully packed agenda: Day 1 consisted of several introductory and state-of-play speeches by the workshop facilitators and by Iraqi experts, the latter group sharing key governmental, industry and academic perspectives to the chemical security progress in Iraq.  Day 2 started with a case study presentation on “Post-2001 supply chain security developments at Dow Chemicals”, followed by private-public partnership considerations in chemical supply chain security. During the afternoon of day 2, two more presentations were given on potential threats to materials of interest, as well as on site-physical security. Day 3 started with presentations on international transport of dangerous goods and security rules, followed later by presentations on export control and border security issues, as well as risk assessment methodological aspects.

Interactive sessions, group exercises and other discussions were vivid throughout the four days. On day 1, the main interactive session was about government-industry coordination. On day 2, the focus shifted to identifying key players in Iraqi chemical supply chain security, as well as exploring private sector specific chemical security issues. On day 3, a major interactive session took place to recognize existing vulnerabilities and threats in the chemical supply chain, as well as to identify appropriate countermeasures and other possible means of improvement. And finally, on day 4, a draft table of content for a potential “Iraqi chemical supply chain security master plan and implementation roadmap” was produced in a highly interactive manner, followed ultimately by drafting some actual planning content in areas including chemical transport security and raising security awareness.

The actual workshop outcomes and possible follow-up actions will be worked upon later by the organizing team and some key participants. In the meanwhile, I want to express my warmest thanks for this opportunity and great on-site collaboration in Istanbul to: Ms. Shawn Garcia from the U.S. Department of State, Chemical Security Program (DOS/CSP); Ms. Pelin Kavak and Mr. Nidal Abu Sammour from CRDF Global, US / Jordan; and Dr. Caner Zanbak and Mr. Mustafa Bagan from the Turkish Chemical Manufacturers Association (TCMA). Hope to meet you again in 2016 in Iraq, Algeria and possibly other locations in the MENA region!

 

Cheers, Juha Hintsa

P.S. We also tested two CBRA frameworks / models – CBRA SCS15/16, and CBRA-BAC-Actions and beneficiaries – with the audience during the Istanbul week. Both of them were well perceived, and will be topics for CBRA Blog during the coming couple of months. (SCS = Supply Chain Security, and BAC = Border Agency Cooperation).

PPS. Last but not least I would like to thank Ms. Antonella Di Fazio of Telespazio, Italy, and FP7-project CORE, for excellent inputs on transport of dangerous goods, traceability and monitoring solutions, demonstrators, and practical experiences.

CORE-Observatory

Towards Trusted Trade-lanes (CORE1207)

Summary: The paper explores the concept of trusted trade-lane. In trusted trade-lanes operators implement an internal control system that makes possible to detect, handle and report dubious events in a way that meet requirements of customs agencies. Writers identify three essential characteristics of trusted trade-lanes: single partners are considered reliable and trustworthy, collaboration is based on long-term partnerships powered by viable business opportunities and managed by a clear decision-making mechanism, and control systems ensures integrity of traded goods and transferred data. In addition, the paper presents three alternative scenarios how the trusted partnerships can be designed in cross-border trade. The paper can be viewed here: https://pure.uvt.nl.

[s2If is_user_logged_in()]

Full review: The paper present recent developments in designing forms of partnerships that make possible to manage, predict and reconstruct supply chain operations and events. Customs agencies can use the control system to complete law enforcement and administrative tasks in a way they can reduce or even refrain from physical inspections and checks. The trading partners that have adopted the common control system and expanded it to the needs of regulatory bodies form trusted trade-lanes. Writers identify three essential characteristics of a trusted trade-lane. First, all partners operate transparently, reliable and trustworthy in their business relationships.  Second, partners are committed in long-term collaboration that gives all partners opportunities to succeed. The government structure has clear decision making mechanisms and selected legal representative. Third, partners must implement and manage a control system that ensures integrity of transported goods and transformed data within the partners and to the authorities.

The writers design three alternatives how partnerships can evolve into trusted trade-lanes. First, a focal company can act as a supply chain orchestrator and provider technical infrastructure for use of trading partners and logistics operators. The focal company lodges customs declarations and risk information to customs administrations on behalf of the trusted trade-lane partners. In the second alternative, a service provider manages a peer-to-peer information platform that supply chain operators use to communicate between each other and with customs agencies. Data on the platform is reused for both commercial and regulatory purposes (piggy packing). Partners can join and leave the platform as they see appropriate. The platform uses open standards and database management systems. Third, a service provider offers additional ‘assurance’ services for legally independent companies of a specific industrial area. The service provider acts as a trusted trader and defines common rules and requirements for the membership.

The paper demonstrates preliminary results in the CORE project. The project partners adapt trusted trade-lane concept in their own concrete business and logistics processes as well as in their information systems. The models and scenarios are further amended and developed during the project.

Reference: Hulstijn, J., Hofman, W., Zomer, G., & Tan, Y-H. (2016). Towards trusted trade-lanes. In H. J. Scholl, O. Glassey, M. Janssen, & E. (Eds.), Proceedings of the 15th IFIP E-Government conference (EGOV 2016): Electronic Government. (pp. 299-311). (Lecture Notes in Computer Science; Vol. 9820). Guimaraes, Portugal: Springer International Publishing.

 

CORE1207

[/s2If]

Integrating carrier selection with supplier selection decisions to improve supply chain security (CORE1206)

Summary: The paper describes a collaborative decision making process that makes possible to select optimal combination of suppliers and carriers that meet both business operational and security requirements. Security information is quantified in order to create a pool of qualified suppliers and logistics providers. Quantification enables to incorporate security with other business criteria such as price, delivery and quality into an optimization model. Logistics and purchasing managers can use the model to analyze the tradeoff between these criteria. The paper can be viewed here: http://onlinelibrary.wiley.com.

[s2If is_user_logged_in()]

Full review: Different managers typically carry out security assessments and selections for logistics providers and suppliers separately. The study presents a mechanism for quantifying and measuring supply chain security that justifies removing of suppliers and carriers from further consideration if they fail to meet the minimum required security performance. In the next phase security is incorporated into an optimization model that minimize procurement and quality costs caused by late and rejected deliveries. The optimization model allows selecting a combination of suppliers and logistics providers that best suits their individual situation defined by risks and operational requirements. The study demonstrates how the tradeoff between security and cost can be assessed parallel in a way that the process leads to the better solutions than if assessed separately.

The paper presents a dynamic optimization tool that can be considered both revolutionary and easy to implement in practice. There are security-rating systems that set minimum requirements for suppliers and carriers such as TAPA Facility Security and Trucking Requirements that enable to create a pool of qualified service providers for transportation of high-value goods. However, several manufacturing and logistics companies are outside the TAPA system, because the goods produced and transported are not prone to thefts and hold-ups. For them it is a matter of internal management coordination when choosing suppliers and carriers and willingness to carry out necessary steps to minimize the cost of providing a secure supply chain. It is also a strategic decision, if company aims at minimizing internal costs by managing suppliers and carriers by contracts or operation management principles. Several international companies have chosen the first option by selecting one or two main service providers instead of issuing regularly quotations for materials and transportation services. The paper proves it is more a question of company practices to select suppliers and carries than minimizing internal management costs.

The paper brings very interesting viewpoint to the CORE project. The CORE project focus on managing risks and unexpected events through additional sensors and information systems. However, commercialization and selling of the CORE technologies and data management platforms requires understanding procurement processes in private and public organizations.  The presented model embeds security into the selection process of suppliers and carriers. It is essential the CORE project can identify decision-making moments that give opportunity to introduce new technologies and practices and improve collaboration in supply chain network. Only collaboration between logistics managers and purchasing managers as well as among buyers, suppliers, and carriers can result in improved supply chain security performance in the whole network.

Reference: Meixell, M. J., & Norbis, M. (2012). Integrating carrier selection with supplier selection decisions to improve supply chain security. International Transactions in Operational Research, 19(5), 711–732.

 

CORE1206

[/s2If]

Assessing the drivers of change for cross-border supply chains (CORE1205)

Summary: This paper explores the main global change drivers and how they impact on international supply chain management in the next two decades. The Delhi method is adapted to structure communication, to produce well-grounded opinions and counter-arguments, and to find consensus among selected experts. The results highlight efficient networking and business-to-business and business-to-government collaboration as core supply chain management competences. The paper can be viewed here: http://www.emeraldinsight.com.

[s2If is_user_logged_in()]

Full review: The study aims at identifying the main change drivers that make companies to prioritize specific indicators and metrics in order to manage their operations. The experts concluded to the following eight key drivers: internet and e-commerce, new technologies for managing movements of goods and materials, versatility of customer demands, continuing chase after low cost labor in manufacturing, tighter security regulations, emerging role of ethics in corporate decision-making, increasing security and environmental concerns, and fluctuation of energy prices. Delivery performance and perfect order fulfillment will be the most important supply chain management indicators and metrics in the future. Customers will demand more tailored products to meet their individual needs what forces companies to manage material flows with an increasing number of stock keeping units.

While companies are required to offer wide product portfolio, they are also expected to have tools to manage harmful events and risks in their supply chain network. Unforeseen threats such as natural disasters, epidemics and customs inspections must be considered when structuring supply chain networks and selecting partners in the future. Consequently, companies must share more supply chain risk related information between business and governmental actors almost in real-time.  Automated data management with streamlined system interfaces between customs and companies will be the key for real time information sharing and networking. Current data exchange and compliance initiatives have already created a foundation for automation and faster flow of customs clearance documents. In addition, better relationship management between trade operators and customs are highlighted in the study.

The CORE concepts, technologies and services are very well aligned with findings in the study. Trusted trade lanes, system based approach and data pipelines reduce need for customs inspections at international borders. Visibility tools create an integrated solution to share information and collaborate between government agencies and privates supply chain stakeholders. Over 40 experts representing customs agencies, manufacturing companies, logistics operators, technology providers and insurance sector took part in the study. The study provides good arguments that help readers to sell supply chain security initiatives, technologies and services for both private and governmental operators.

Reference: Hameri, A.-P., & Hintsa, J. (2009). Assessing the drivers of change for cross-border supply chains. International Journal of Physical Distribution & Logistics Management, 39(9), 741–761.

 

CORE1205

[/s2If]

The effect of supply chain security management on security performance in container shipping operations, 2012 (CORE1201)

Summary: The study creates a supply chain security framework that can be adapted on assessing how security management measures affect on safety and customs clearance performance in container shipping firms. Security management interventions are clustered in four categories: facility and cargo management, accident prevention and processing, information management, and partner relationship management. Findings indicated that container shipping firms that mainly focus on facility and cargo management and less on partner relationship management are generally more dissatisfied with their company’s customs clearance performance than companies that prioritize partnerships with governmental and commercial companies. The governmental agencies and commercial actors can employ supply chain security management framework, its attributes and dimensions in order to assess the supply chain security performance of container shipping firms.  The reviewed document is available at: http://dx.doi.org.

[s2If is_user_logged_in()]

Full review:  Several authors have clustered supply chain security measures into different categories, but only few authors have provided statistical models to test how well these categories can be used to assess benefits of security measures. The study establishes four security categories/dimensions: facility and cargo management, accident prevention and processing, information management, and partner relationship management. The results imply that partner relationship management is positively related to customs clearance performance. Further, information management and partner relationship management are positively related to safety performance. However, facility and cargo management and accident prevention and processing were not found to have substantial positive impacts on security performance what is controversial to many safety studies. Improved access control, material handling, information processing and reporting of anomalies are clearly factors that are positively related to safety performance based on several work place safety studies. The difference is probably due to questions that defined safety performance: the study addressed accidents and property damages while safety studies measure often near misses and their reporting.

The FP7 CORE project utilizes key performance Indicators (KPIs) to assess and monitor organization’s performance at the operational level. Two CORE KPI’s measure address safety and customs clearance performance, consequently the supply chain security framework can well be adapted on the CORE context. Improved access control, cargo handling, shipping information processing and reporting of anomalies can be measured by using the construct for ‘facility and cargo management’. CORE Training and education can be embedded into the factor ‘accident prevention and processing’ that captures documenting and disseminating of security information. ‘Partner relationship management’ can be tested as a mediating factor that controls how strongly implemented CORE interventions influence on organizational performance indicators in specific demonstrations. Customs agencies can consider using four dimensions of supply chain security as criteria for assessing security performance in container shipping firms. Finally the dimensions and attributes of the framework provide a tool to analyse qualitative data in the project where getting reliable quantitative data is challenging.

Reference: Ching‐Chiao Yang, Hsiao‐Hsuan Wei, “The effect of supply chain security management on security performance in container shipping operations”, Supply Chain Management: An International Journal, Vol. 18 Iss: 1, pp.74 – 85

 

CORE1201

[/s2If]

Supply chain security culture: measure development and validation, 2009 (CORE1200)

Summary: Supply chain security culture (SCSC) is as an overall organizational philosophy embracing norms and values that keep employees vigilant when performing supply chain security practices. The article presents a scale that makes possible to gauge supply chain security culture and its correlation to organization’s ability to respond to unexpected disruptions. Employees are asked to assess two topics: security strategy of the company and impacts of significant supply chain breech to business operations. According the study improved supply chain security culture makes company more resilient against major disruptions. This research helps executives to justify their expenditures on security efforts. The reviewed document can be purchased here: http://dx.doi.org.

[s2If is_user_logged_in()]

Full review: Researchers have stressed the importance of having an organizational culture that highlights proactivity and vigilance toward supply chain security breaches. In security-focused supply chain management environment workers are empowered to detected and handle supply chain security threats without seeking formal permission from supervisors and managers. Company security strategy gives specific attention how SCS concepts are embedded into firm processes and procedures. Alignment with organizational culture and business or corporate-level strategies is believed to result in enhanced organizational performance. In addition, organization culture encompasses supply chain continuity management. The paper presents a scale for measuring supply chain security culture defined as the overall organizational philosophy that creates supply chain security as a priority among its employees through embracing and projecting norms and values to support secure activities and to be vigilant with security efforts.

The study makes possible to assess how implemented FP7-CORE security technologies, tools and practices influence on supply chain resilience based on the perception of company managers and employees. The article gives also guidelines how to develop survey forms and protocols in order to assess the influence of implemented security measures on other KPIs such as supply chain visibility and reliability. The survey tools based on perceived operational and organizational changes complete toolbox to measure impacts of introduced security interventions.

Reference: Zachary Williams, Nicole Ponder, Chad W. Autry, “Supply chain security culture: measure development and validation”, The International Journal of Logistics Management, Vol. 20 Iss: 2, pp.243 – 260

 

CORE1200

[/s2If]

Enhancing security through efficiency focus- Insights from a multiple stakeholder pilot implementation (Sternberg et al. 2012)

Summary

Efficiency and security are said to be opposing goals of logistics operations: when security goes up, efficiency decreases, and vice versa. Yet, it is suggested that information technologies could improve efficiency and security simultaneously. Sternberg et al. (2012) investigate this hypothesis: whether and to what extent increased attention to efficiency results in improved security in carrier operations in a seaport context. In a longitudinal case study, they research carrier operations in connection with port terminals carrying out Roll-in Roll-out (RoRo) operations on trailers at the port of Gothenburg. They find that investments in new ICT solutions, in fact, remove some of the barriers to higher efficiency and improve security against cargo theft and terrorism. In particular, they report that ICT investments increased efficiency in terms of reduced waiting times and increased ability to plan port operations (pre-arrival notification) and fast positioning of trailers in a port. The new ICT solutions also increased security in terms of more secure document handling (decreases the risk that sensitive information falls into the hands of criminals), better anomaly detection (helps customs identify trailers that are most likely tampered in-transit) and increased visibility. The abstract is available at: http://onlinelibrary.wiley.com.

Review by Toni Männistö (CBRA) based on his doctoral thesis.

[s2If is_user_logged_in()]

Full review

This article is relevant for CORE demonstrations that focus on sea port operations (WP10-11 and WP13-15 and WP17). The research shows how a ‘common information sharing platform’ – an electronic and highly automated communication network among LSPs, carriers, ferry operators, port operators and authorities – increases logistics efficiency and security performance simultaneously. The main components of this platform include information sharing through a common information area, real-time geographical position of truck and trailer, identification technology in truck, RFID tags on transport units and RFID readers mounted on terminals, electronic manifest, and electronic container seals. More specifically, Sternberg et al. (2012) observed that adoption of a set of IT-enabled SCS solutions eliminated logistics efficiency and security issues simultaneously:

  • Real-time geo-positioning of trucks and trailers enabled the port operator to allocate a vacant spot for a trailer prior to its arrival, which reduced the waiting time at the port entrance. The real-time information enabled also customs to detect anomalies in shipping schedules and routings that would imply a heightened risk of smuggling.
  • RFID-based identification of drivers, trucks, and trailers automated and accelerated the access formalities at the port entrance and increased reliability of driver authentication.
  • Digitalization of cargo manifests eliminated the time-consuming manual document handling and reduced the risk of unauthorised access to confidential information.
  • E-seals enabled customs officers to identify intact containers and spare them from time- consuming inspections.

Reference

Sternberg, H., Nyquist, C., & Nilsson, F. (2012). Enhancing Security Through Efficiency Focus—  Insights from a Multiple Stakeholder Pilot Implementation. Journal of Business Logistics, 33(1), 64-73.

[/s2If]

Global supply chain design considerations: Mitigating product safety and security risks (Speier et al. 2011)

Summary

There is a broad consensus among supply chain professionals that supply chain disruptions are very bad for business: supply chain glitches commonly lower operational performance and reduce shareholder value. Regardless of this, there is surprisingly little research on supply chain design strategies that have the highest potential to mitigate the risk of disruptions. Based on interviews with 75 US-based managers, an industry survey and a case study, Speier et al. (2011) identify types of SCS strategies and examine how contextual factors influence business managers to select a set of SCS design strategies. They argue that the depth and breadth of security initiatives depend mainly on top management mindfulness, operational complexity, product risk and coupling. The abstract is available at: http://www.sciencedirect.com.

Review by Toni Männistö (CBRA) based on his doctoral thesis.

[s2If is_user_logged_in()]

Full review

The paper of Speier et al. (2011) is quite theoretical and it has therefore only a limited impact on CORE work. It is useful for people for the CORE demonstrators to be aware of various supply chain design strategies and factors that support their selection. All in all, the paper introduces an interesting table that shows what supply chain factors typically affect selection of certain supply chain design strategies (see table below). The paper also includes a useful discussion about the nature of supply chain security risks. The authors point out that supply chain security covers risks of contamination, damage and destruction of products or other supply chain assets, and that these risks may arise from intentional or unintentional activities.

coreobservatory300620162

Reference

Speier, C., Whipple, J. M., Closs, D. J., & Voss, M. D. (2011). Global supply chain design considerations: mitigating product safety and security risks. Journal of Operations Management, 29(7), 721-736.

[/s2If]

Controlling access to pick-up and delivery vans: the cost of alternative measures (Haelterman et al. 2012)

Summary

The situational crime prevention theory suggests that preventive security measures often backfire. For this reason, it is problematic that many managers do not have a holistic picture which kind of considerations should precede selection of implementation of security measures. A paper by Haelterman et al. (2012) tests the practical feasibility of a new management model that is designed to highlight the most promising preventive security measures given a set of preconditions and costs. The authors apply this model in the context of pick-up and delivery van operations at a Belgian branch of a major express courier company. Such transport operations are subject to risk of theft and terrorism, especially if unauthorized people managed break into pick-up and delivery vans. To test the management model, the authors collect views of of supply chain practitioners in two expert panels and through a survey. Their analysis covers a broad array of preventive security measures including key card, audible alarm, silent alarm + GPS, notification on vehicles, awareness training, no company logos, formal instructions / compliance checks & sanctioning, double drivers, over security escorts. The abstract is available at: http://link.springer.com.

Review by Toni Männistö (CBRA) based on his doctoral thesis.

[s2If is_user_logged_in()]

Full review

The research of Haelterman et al. (2012) sets a solid theoretical basis for practical supply chain security work. All CORE work packages that cover aspects of road transport benefit from the analysis of this research paper. The research shows that a set of preconditions influence outcomes of preventive security measures: availability (legal, infrastructure), practicability (perceived), required knowledge, required expertise, user awareness, user belief, use commitment (anticipated), and co-operation. Security measures also incur different kinds of costs: financial costs, ethical/social cost (labeling, distrust, civil liberties, inequalities), aesthetical cost. Finally, as the theory on situational crime prevention suggests, security measures may result into various reverse effects, including crime displacement (geographical, temporal, target, tactical, crime types), escalating effects (e.g., use of violence), creative adaptation, and enticement effects.

Reference

Haelterman, H., Callens, M., & Vander Beken, T. (2012). Controlling access to pick-up and delivery vans: the cost of alternative measures. European Journal on Criminal Policy and Research, 18(2), 163-182.

[/s2If]

The displacement effect in cargo theft (Ekwall 2009)

Summary

Cargo theft has always been a problem for shippers and logistics service providers. Even so, regardless of the persistent efforts to reduce cargo theft, crime continues to strive. This classic supply chain security paper by Daniel Ekwall analyzes and explains why cargo theft continues to occur in the transport network despite all implemented countermeasures. Focusing on Swedish transport and logistics facilities, the Ekwall’s research builds on interviews with six subject matter experts, survey with four terminal operators, and macro-statistics from TAPA (Transported Asset Protection Association). The paper finds some evidence on crime displacement in terms of method (modus operandi): cargo thieves target increasingly cargo in-transit because logistics facilities are nowadays better protected. However, displacement is likely to be partial in contrast to complete displacement. This means that absolute theft risk can be reduced. Download the abstract here: http://www.emeraldinsight.com.

Review by Toni Männistö (CBRA) based on his doctoral thesis.

[s2If is_user_logged_in()]

Full review

The Ekwall’s research gives an interesting overview on criminological theories underpinning supply chain security research. The theoretical outlook provides the foundation for the CORE work and all CORE work packages can therefore benefit from the analytical discussion and findings of this research paper. The main lesson is that criminals and terrorists are calculating antagonists who adapt their behavior in response to information on risks and rewards of crime opportunities. More specifically, Ekwall argues that professional cargo thieves seem to target increasingly “cargo on wheels” instead of warehoused goods. He explains this shift in the behavior with the fact that, facility security has improved relatively more than in-transit security over the past decade. However, he stresses that it is hard to establish a causal relationship between security interventions and changes in criminal behavior. He holds further that if displacement occurs, it is likely to be partial rather than complete.

Reference

Ekwall, D. (2009b). The displacement effect in cargo theft. International Journal of Physical Distribution & Logistics Management, 39(1), 47-62.

[/s2If]

Supply chain security orientation: conceptual development and a proposed framework (Autry and Bobbit 2008)

Summary

Even though supply chain security has become an increasingly important managerial domain, there is little understanding about what security aware firms are, what enables and drives security awareness, and what are the outcomes of supply chain security (SCS) orientation. Autry and Bobbit (2008) set out conceptualize, validate and operationalize the construct of SCS orientation. Based on 31 interviews with US-based managers, they conclude that SCS orientation comprises four general categories of security solutions: security preparation and planning, security-related partnerships, organizational adaptation and security-dedicated communications and technology. The authors write that these security solutions “could result in supply chain risk management-related efficiencies, such as decreased lead times to customers, greater product reliability, waste reduction, and increased delivery reliability, due to the lessened need for operations workers to perform security-related tasks such as redundant container checking, securing shipments, or other similar tasks.” The abstract is available at: http://www.emeraldinsight.com.

Review by Toni Männistö (CBRA) based on his doctoral thesis.

[s2If is_user_logged_in()]

Full review

The CORE demonstrators could a learn lesson from the research paper of Autry and Bobbit (2008) that organizational commitment to security plays a critical role in the fight against supply chain crime. Ideas and findings of the research paper also contribute to the development of the CORE educational and training material (WP19). The article shows that top management support, employee security attitudes, employee integrity/loyalty are key internal factors that strengthen the SCS orientation. External contributing factors include political political/legal factors/support, partner cooperation, and partner support. Strong SCS orientation is expected to translate into higher business performance, customer satisfaction and supply chain chain continuity.

Reference

Autry, C.W. & Bobbitt, L.M., 2008. Supply chain security orientation: conceptual development and a proposed framework. The International Journal of Logistics Management, 19(1), pp.42–64.

[/s2If]

Interviews

Interview with Mr. Boley, SC Johnson, Switzerland

17.11.2016: Today’s CBRA Interview with Mr. Bill Boley focuses on supply chain security management at SC Johnson

Hi Bill, and thanks for joining CBRA Interview, here at the TAPA EMEA Conference in Noordwijk, the Netherlands.

Good afternoon Juha, first I want to thank you and the CBRA team for all the great work you have done for the Supply Chain Security Community over the years. It seems that every time I attend an event CBRA is there…

We first met in 2008, and worked together on the World Bank Supply chain security guidebook, good ol’ times…. In your current job, which supply chain security standards and guidebooks your company follows?

Here at SC Johnson we actually first strive to meet the guidelines laid out in the WCO SAFE Framework of Standards. This is important for us as a global player, global citizen and manufacturer with many supply chains, to do our part in assisting Customs and Law Enforcement Agencies making the Global Supply Chain more safe and secure. At the same time, safe and secure supply chains support the overall optimisation and predictability, helping us to meet the customer and consumer demands. This is why we pursue the various AEO schemes already in place around the world, be it C-TPAT, EU AEO, or Kenyan AEO – in other words, we strive to certify so Customs can focus on the unknowns…  At the warehouse level we have adapted the TAPA FSR standard as the “SCJ standard”. As a global company with many different nationalities, languages and moving parts both upstream and downstream a universal standard written for the practitioners is a key for us. It is also a requirement for our service providers and the transporters moving our product. Soon we will start to give preferential consideration to those service providers who have the TAPA TSR certification, as part of the contract award process.

What about information on actual threats and risks with your global supply chain – which sources you use for that? 

As you are well aware, we are facing many threats around the world: stowaways, weapons and drug smuggling, hijackings, cyber threats particularly with the Internet of Things, and counterfeiting, just to name a few…  At SC Johnson we are fortunate to have a buy-in from our C-Suite on the importance of Supply Chain Security programmes and tools we have been implementing. We have established a Global Security Operations Centre at our World Headquarters and, our Product Supply, Logistics, and Procurement Leaders around the world are very proactive on the topic of supply chain security.  SCJ has actually built an own network of information providers such as BSI, IJet, OSAC, and of course Law Enforcement Agencies, as well as select Customs regimes. The TAPA IIS system, FreightWatch International, and yes, even CBRA, also feed into our information portal. Getting involved at every level to develop a community of interest on supply chain security is a key. As they say, it takes a network to defeat a network.

interview-171116-2

Can you share any stories on how these supply chain security standards and risk information have helped you to do your job as a SC Johnson supply chain security manager better?

Yes absolutely, most recently we fell victim to two separate events. One was facility related while the other was on transport. We conducted an analysis on how our mitigation measures failed, and it became evident that we lacked timely, accurate and relevant information to change our measure to adapt to the latest Modus Operandi of the criminal networks. Delivery times to our facilities, pick-ups, chain of custody, liaison with local Law Enforcement and audits of our service providers have been instrumental. In fact, just last week local Law Enforcement in Nigeria was able to interdict and recover a high value shipment, thanks to our close communication and cooperation with the Government of Nigeria.

Yesterday I briefed you about our on-going TAPA study titled “Total Cost of Cargo Theft (TCCT)”… Would your company be interested to join the study?

SC Johnson would be very receptive to taking part of this study. First, as we have suffered Supply chain losses there is a misunderstanding on what is covered by insurance or not. And, second, if we can then place a more precise value or declaration on what those stolen finished goods will cost outside of the retail value, that would be great. Loss of customers or at least their confidence in a non-delivery, recovering our full costs of production, investigative costs, etc. are just some of the cascading effects and costs we encounter.

Great news, thanks a lot Bill, for both the interview and for agreeing to join the TCCT-study! Juha.

interview-171116-3

Interview with Ms. Sarma on the US CSP-program

28.6.2016: Today’s CBRA Interview with Ms. Dace Sarma from CRDF Global focuses on the U.S. Department of State’s Chemical Security Program

 

Hi Dace, and thanks for joining CBRA Interview. Can you please tell first a bit of your background and what you do today?

I work at CRDF Global, an independent nonprofit organization that promotes international scientific and technical collaboration through grants, technical resources, training and services. At CRDF Global, I work in partnership with the U.S. Department of State’s Chemical Security Program, CSP in short, on programming collaborating with government, security, academic, and industrial communities around the world to strengthen their ability to thwart chemical attacks. Prior to working with CSP, I supported and implemented the Department of State’s Office of Weapons of Mass Destruction and Terrorism, WMDT in short, projects within the scope of CRDF Global support for the WMDT.

 

Thanks for sharing that. Can you explain more about CRDF Global and the Chemical Security Program, CSP, by the US State Department?

CSP works with a number of implementing partners, including CRDF Global, to promote chemical security through sponsorship of projects designed to identify and address chemical security vulnerabilities and prevent chemical attacks.

CSP collaborates with diverse stakeholders, including partner governments, subject matter experts, and international organizations, to enhance chemical security through capacity building workshops, and trainings.

 

I had the pleasure to join twice the CRDF Global workshops in 2015: first to Hurghada, Egypt, in March 2015, and second to Istanbul, Turkey, in December 2015. The former workshop was targeted for the Egyptian government and chemical industry, and the latter one for the Iraqi government and chemical industry. Extremely interesting 3-4 days in both workshops, with great audiences and co-speakers / co-facilitators. In both workshops I gave presentations e.g. on FP7-project CORE / dangerous goods tracking, and on Dow Chemical supply chain security – thanks again to Ms. Antonella Di Fazio of Telespazio and Dr. Toni Mannisto of CBRA for co-producing these presentations. What is the current status of CSP regarding these countries today, if I may ask?

Thank you again for your participation in these workshops, Juha. We all appreciated you sharing your experience in chemical supply chain and transportation security.

We have continued work with our partners in Egypt on chemical supply chain security. CRDF Global, the Federation of Egyptian Industries’ Environmental Compliance Office (FEI-ECO) and the Federation of Egyptian Industries’ Chamber of Chemical Industries (CCI) held an event in December, also sponsored by CSP, which convened 170 government, industry and academia representatives from Egypt’s chemical sector to highlight Egypt’s achievements in securing the chemical supply chain and identify further steps required to secure their chemicals in transit.  FEI-ECO and CCI are also working to provide technical guidance and support for Egyptian chemical companies to adopt Responsible Care®, an international voluntary chemical management initiative developed by the chemical industry to help chemical companies operate safely, securely and profitably.

In Iraq, CRDF Global and CSP have continued to work closely with a variety of partners from across the chemical and security communities. Most recently in April, with sponsorship from CSP, CRDF Global implemented the 1st National Chemical and Biological Security Coordination Conference in Baghdad. The conference convened Iraqi government, security, industrial, and academic sectors to discuss national efforts, interagency coordination, and best practices to counter chemical and biological proliferation in Iraq.

 

Any plans in 2016 to organize similar workshops in the MENA region?

We will continue to work with our international partners, including in the MENA region, in 2016. As the world becomes more connected, we will continue to focus on securing the chemical supply chain.  Many of our partners have also identified chemical ground transportation security as an area of particular interest.  We look forward to working with technical experts like CBRA and leaders from chemical communities worldwide to enhance global chemical security.

 

Thanks a lot Dace for this interview – and hope to meet you soon again, at one the upcoming missions / workshops! Juha

Interview with Mr. Thorsten Neumann on TAPA EMEA

21.6.2016: Today’s CBRA Interview is with Mr. Thorsten Neumann, from TAPA EMEA and Microsoft.

Hey Thorsten, can you first tell a bit about yourself and what you do?

Hey Juha, thanks for the opportunity to give an interview for the CBRA. First of all, my name is Thorsten Neumann, and I’m the chair of the Transport Assets Protection Association TAPA Europe, Middle East and Africa. I’m leading the board of directors in EMEA and I am the representative in the TAPA Worldwide Council. Furthermore, I’m the director for channel security management at Microsoft within the ANTIPIRACY services department, and I’m leading all our risk management-related Original Equipment Manufacturer (OEM) and Volume Licensing (VL) efforts inside our company. I’m in charge of business resilience, as well.

Can you tell more on TAPA EMEA: What are your main activities in the field of supply chain security?

Since TAPA was founded in 1997 in the US by four major global manufacturing companies, the organization has transformed into a completely new business model. And what we mainly do is, that we connect the dots within the end-to-end supply chain security world. In TAPA EMEA, we have people who are experts in various technologies, industries and countries. If you take a look what we’ve achieved in the last ten to twenty years, you can see that our security certification model has been very successful. It is today one of the most important pillars within the TAPA organization globally. The certification program covers mainly the Freight Security Requirements (FSR) and the Truck Security Requirements (TSR). We are now also working on new Parking Security Requirements (PSR). We also offer a lot of other services and systems, like the Incident Information Service (IIS) that provide tremendous benefits to our members. TAPA is involved in regulatory affairs, as well: we are interacting with the European Commission, the United Nations, the World Customs Organization and other great institutions – they all see us as the leading industry association fighting cargo theft in the global supply chain.

How would you describe both the benefits and challenges of conducting industry-academia research in the field of supply chain security?

Considering the ongoing TAPA-CBRA work, I think increased transparency and the opportunity to identify and fix the weakest security links in the supply chain are the main benefits. I do strongly believe in proactive partnerships with research experts who are capable of identifying and analysing return on investment linked to the great work we are doing as an association. I trust on CBRA’s professional skills and their outstanding network. I’m convinced that, with inputs from TAPA members, CBRA will build the most robust model possible for estimating the total cost of cargo theft. From the study point of view, I’m looking forward to work with you guys.

Can you elaborate a bit on the “Total Cost of Cargo Theft” study background and the expected outcomes of it?

In the first kick-off phase, we try to estimate the total cost of cargo theft in all three TAPA regions – EMEA, Americas and APAC. This study gives us a unique, global overview on the total cost of cargo theft and estimates on various cost components that account for the total cost. I’m proud to work together with CBRA, the Borås University in Sweden and Texas A&M in the US. The plan is also to engage the Singapore Institute for Materials Management (SIMM) in the study.

The background and motive of this study is the following: we are operating in a very competitive business environment, and therefore security managers need to justify and explain budget that they spend on cargo security. With this study, we could underline how dramatic impact cargo theft has not only on company profits but also on the entire economy of a country. If you take a look on what is happening right now for example in Germany, Italy, Netherlands, France, but also in South Africa, Brazil, Malaysia and so forth, you realize the seriousness of modern cargo crime. The study would give us the analytical background and results we need to sell what we do also to the government, to our own companies, to the CEO, CFO, but also of course the WCO, as one of the driving factors of fight against criminals within the supply chain.

Thanks a lot for this interview, Thorsten! By the way, HEC University of Lausanne Executive MBA students learn every spring about the latest & greatest in supply chain security management, including from “TAPA activists” like our buddy Gilad…. Maybe next year you could also join as a guest lecturer at the UNIL eMBA class?

I would be really happy and proud to be a guest lecturer at your university. This fits quite nicely my current activities as I’m already running lectures at the University in Bremen. Count me in and see you in the class room next year. Thanks!

Mr. Mike Ellis, INTERPOL, on illicit trade and counterfeiting

Today’s CBRA Interview is with Mr. Mike Ellis who is the Assistant Director of Illicit Trade and Anti-counterfeit Sub-crime Directorate at INTERPOL, Lyon, France.

Hi Mike, can you first tell a bit who are you and what you do?

I am the Assistant Director for Police Services at INTERPOL, based in Lyon France.  INTERPOL is the world’s largest international police organization. Our role is to assist law enforcement agencies in our 190 member countries to combat all forms of transnational crime. We work to help police across the world meet the growing challenges of crime in the 21st century by providing a high-tech infrastructure of technical and operational support. Our services include targeted training, expert investigative support, specialized databases and secure police communications channels. I am responsible for the coordination of all activities related to illicit trade, smuggling of illicit goods and counterfeiting for the organization and police forces within our 190 member countries.  I lead a team of expert officers who are engaged in training, capacity building, and operational support who operate along with my analytical support who manage risk awareness and intelligence handling.

interview111

From your perspective, how bad is the current situation with counterfeit and other illicit trade in global supply chains? Can one for example see links between illicit trade and transnational organized crime groups; or, even terrorist organizations?

For many years the clear link has been established between the trafficking of illicit goods and transnational organized crime. Criminal organizations are attracted by the lucrative profits involved in trading counterfeit or fake goods, or in trading legitimate goods through illicit channels. The criminals involved manufacture and trade illicit goods on a regional and increasingly global scale.  It is well documented that they use the profits to fund other criminal activities such as drug trafficking and people smuggling, and for investment into funding subversive political groups.  Selling fake or counterfeit products is one aspect of illicit trade, as is selling genuine goods on the black market to avoid paying taxes. By avoiding regulatory controls, the criminals behind these activities peddle dangerous and illicit goods with a complete disregard for the health and safety of consumers. The phenomenon has grown to an unprecedented level, posing tremendous risks to society and the global economy. Counterfeiting harms businesses which produce and sell legitimate products, governments lose tax revenue from products manufactured or sold on the black market, and consumers are at risk from substandard products.

By the way, we met first time about one year ago in Lyon at an INTERPOL workshop linked to FP7-Project CORE. One of the main objectives of CORE-project is to develop leading edge education and training materials on supply chain security – for the benefit of law enforcement agencies, supply chain practitioners, and academics alike. Can you share your views about law enforcement – academia – industry cooperation in education material development, as well as in the broader field of supply chain security management?

One of our principle functions is capacity building and training.  At INTERPOL we recognize that capacity building brings with it raised identification of the impact of illicit cross-border trade and counterfeiting and all our new operations, or established operations in new regions, are preceded by a capacity building workshop.  The public domain is represented by police, customs, border control officials, and prosecutors, as well as representatives from various regulatory bodies including trading standards.  In addition, INTERPOL TIGC, the Trafficking in Illicit Goods and Counterfeiting program which I am heading, has developed a Mentoring Program which aims to increase cross-border, cross-industry law enforcement operational interventions by: strengthening capacity to deal with all types of cross-border trafficking in illicit and counterfeit products. We have also developed an online International Intellectual Property Crime Investigator’s College and have built already a robust network of over 10.000 law enforcement officers, and partner stakeholders with specialist knowledge and skillset.  This online training course provides specialist knowledge on transnational organized crime.  It is aimed at all law enforcement officials, regulatory authorities and private sector investigators who are committed in the fight against illicit trade and intellectual property crime.   We aim to provide crime professionals with specialist awareness and learning on the subject of transnational organized intellectual property, IP, crime, and illicit trade, by delivery of leading-edge training that meets international standards and allows crime investigators from any discipline to quickly identify other certified investigators.  Through this learning platform we also facilitate cooperation between the public and private sectors in the fight against IP crime, and ensure all public and private sector crime investigators have a common understanding of the problems facing them, while being aware of each other’s competencies and roles.  We seek to promote knowledge on what intervention strategies and tactics work, in order that all stakeholders are better able to work together in partnership in enforcement operations.

Thank you Mike for this highly interesting interview. It complements well our previous interviews on similar themes – with non-law enforcement experts including Mr. David Hamon and Mr. Tony Barone. CBRA and the whole FP7-CORE consortium, around 70 partners in total, wishes to continue the great cooperation in research and education material development with INTERPOL, throughout the CORE-project, until April 2018 – and beyond!  Juha.