Nothing Found
Sorry, no posts matched your criteria
Sorry, no posts matched your criteria
Summary: Chapter 8 of the CASSANDRA compendium reviews current and future technologies that help managers to improve visibility and security over global end-to-end supply chains. The supply chain visibility technologies, in essence, provide logistics managers with a variety of information – shipment data, performance metrics, inventory levels, production / delivery schedules and sales forecast, for example – in or close to real time. The chapter’s review on supply chain security technologies focus mainly on security sensors (e.g., motion detectors), container seals, biometric user authentication devices (e.g., fingerprints), and non-intrusive inspection equipment (e.g., X-ray screening stations). The section also elaborates modern ways for sharing information among stakeholders that are concerned about security of the supply chain. The CASSANDRA compendium is available for download: www.cassandra-project.eu. Review by Toni Männistö (CBRA)
[s2If is_user_logged_in()]
Full review: Chapter 8 includes some interesting details and insights about modern visibility and security technologies, many of which are relevant especially for CORE demonstrations but also for other work packages such as WP2 (SCS controls), WP7 (CORE Connectivity Infrastructure and Solutions Development Environment) and WP8 (CORE Ecosystem).
Many large logistics operators have developed own supply chain visibility systems to coordinate and organise logistics operations. A large logistics service provider, Kühne+Nagel uses its KN login visibility system that allows the company to optimise its complex global operations in terms of speed, time-certainty, security and cost-efficiency and many other relevant metrics. DHL, a German-based international express courier and logistics company, uses its LOGIS software for its operations. Previous EU projects have also developed visibility systems, for example Smart CM SICIS (Shared Intermodal Container Information System).
These visibility systems enable fast response to most operational contingencies that are about cause deviations from original plans. For instance, if a shipper got instant information about a stolen container, a new delivery could be quickly arranged and the consignee could be informed as soon as possible about the reshipment. Moreover, the visibility systems often interface ITC systems of other key stakeholders in the international supply chains. Customs, for example, receive advance cargo information (ACI) automatically from these systems.
The second part of the chapter 8 focuses exclusively on security technologies. The review starts with description of security sensors that are designed to detect tampering, unplanned detours, and other suspicious events in the supply chain. The modern sensor technologies sense at least changes in lighting, acceleration, location (geo-fencing functionality), motion and CO2 levels (used, e.g., to detect stowaways inside shipping containers). The chapter introduces modern user authentication technologies (e.g., fingerprints, face, retina, hand geometry and other unique biometric characteristics). Some information is provided regarding non-intrusive screening solutions that are often considered to be necessary for fast and secure screening operations. The rest of the chapter discusses various technical and institutional solutions for exchanging security-relevant information among supply chain operators and relevant government agencies. Especially interoperability of ICT systems seems to be crucial for effective security efforts in the global supply chains. The CASSANDRA compendium is available for download: www.cassandra-project.eu. Review by Toni Männistö (CBRA)
Reference
Hintsa, J. and Uronen, K. (Eds.) (2012), “Common assessment and analysis of risk in global supply chains “, Compendium of FP7-project CASSANDRA, Chapter 8
[/s2If]
Summary: Chapters 5 & 6 of the CASSANDRA compendium provide a general overview on supply chain security risk management from the private sector perspective. Explaining the essentials of supply chain risk management, Chapter 5 introduces commonly used risk management models and tools (e.g., risk matrices and risk registers), discusses various classifications of supply chain risks, and elaborates current trends of risks and risk management in the supply chain context. Chapter 6 focuses on specific challenges of supply chain security risks – the risks that arise from intentional, man-made criminal activities such as terrorism, theft, trafficking, and sabotage. The chapter explains a few early classifications of supply chain security risks (e.g., motive-based typology and taxonomies based on private sector perspectives). Following the classifications of security risks, the chapter puts forth a few models for managing security risks in the supply chain context (e.g., the 8-layer model for supply chain security management). The chapter concludes with a detailed case study on security management of an international security company and a comparison of supply chain security management and the total quality management (TQM) management philosophy. The CASSANDRA compendium is available for download: www.cassandra-project.eu. Review by Toni Männistö (CBRA)
[s2If is_user_logged_in()]
Full review: Previous observatory entries have already shown the relevance of the CASSANDRA compendium to the community of supply chain management professionals. The compendium’s chapters 5 & 6 give a brief summary of risk management and security risk management in the context of international supply chains. The contents of the chapters are relevant and useful for people involved in FP7 CORE project, especially for those involved in work packages 3 (Multi-method Threat and Vulnerability Analysis Suite) and 4 (SC Situational Awareness Tools & Maps).
Chapter 5 elaborates a set of common supply chain risk management tools. The model of Waters (2007) summarises rather obvious three steps of the risk management process: identifying risks, analysing risks and responding to risks. The model proposes, for example, that managers can identify supply chain risks through analysis of past events, collection of opinions, and through operational analysis. The model also calls for managerial attention to prerequisites of successful risk management – mutual trust, cooperation and information exchange among relevant stakeholders involved in supply chain management – and highlights importance of continuous monitoring and controlling the risk management process. The chapter concludes with the four classic approaches to risk management: risk avoidance, risk reduction, risk transfer (e.g., insurance and contractual agreements), and acceptance. The classifications of supply chain risks include typologies focusing on risk sources (natural hazards operational failure and terrorism), risk consequences (e.g., risk to operations, risk to reputation and risk to profits), and objects of vulnerability (e.g., information, materials, personnel and financial flows).
The chapter on crime prevention and security management (Ch. 6) in supply chains provides a concise summary on supply chain security management from the private sector perspective. The chapter starts by describing some early classifications of supply chain security risks. A motive-based taxonomy classifies such risks into the three categories: economic crime (profit as motive), other crime types (ideological, emotional and other reasons as motive) and facilitating crime that covers activities that do not bring direct crime benefits but help committing other rewarding crime crimes later on. (e.g., document fraud, bribery and use of intimidation). The chapter’s next section elaborates ways to mitigate security risks in the global supply chains, highlighting the key ideas of the so-called 8-layer model for supply chain security management (the model incorporates multiple aspects of risk assessment, hands-on design and planning, implementation of a variety of technologies, procedures, and incentives as well as preparation for dealing with the consequences of supply chain crime). The chapter provides also a case study with an international tobacco company that runs high security risk supply chain operations. The section also contrasts, rather interestingly, principles of security management against the fundaments of the total quality management (TQM) management philosophy. The chapter continues with a brief review of regulations (e.g., EU customs security and aviation security regulations) and standards on supply chain security management (World Customs Organization’s SAFE framework of standards, and industry standards of the Transported Asset Protection Association).
Reference
Hintsa, J. and Uronen, K. (Eds.) (2012), “Common assessment and analysis of risk in global supply chains “, Compendium of FP7-project CASSANDRA, Chapters 5 & 6
[/s2If]
Summary: TAPA TACSS – Air Cargo Security Standards (TACSS) is a certifiable security program for the air cargo industry to close down, as much as possible, all risks for high value freight whilst being handled and transported on the ground. Available to General Public at the TAPA Website, this standard is hyperlinked here: https://www.tapaemea.com
[s2If is_user_logged_in()]
Full review: The Transported Asset Protection Association (TAPA) is a self-funded industry group comprising of manufacturers, shippers, logistics providers and law enforcement agencies that share the objective to eliminate loss of product by criminal act. The theft of high value, high risk products moving in supply chains in Europe costs businesses in excess of € 8.2 billion a year.
Although the focus of TAPA is to stop the unauthorized removal of items from the logistics chain, many of the methods used by criminals to achieve this are entirely relevant to the other security threats seen within the industry. E.g. unauthorized entry, deception techniques, tampering of shipments etc. TAPA has created a number of certifiable security standards:
The latter one, TACSS is a set of security standards designed specifically for Air Cargo Handling Facilities. It takes into account the mode of operation of such terminals often having open doors, and yet often operating inside a secure area within an airport, behind a fence. By providing comprehensive requirements and a certification scheme for the protection of air cargo whilst being transported on the ground, TAPA hopes to provide its own members and industry partners with viable options for improving and/or maintaining an effective air cargo security program.
There are two levels to the Standard. Level 1 & Level 2, with 1 being the higher level of security, and the decision of which Level to certify against is decided by risk assessment which takes into account the geographical location of the facility and crime levels in the area. Certification is by Independent Validator against a checklist and valid for 2 years.
Detailed analysis of relevance for CORE: The CORE implementation objectives, which specify what will be done and how to reach the vision, are all subject to the Policies, Regulations, and Standards that exist within the Security Domain of the Global Supply Chain. Among all Work Packages of the project, some are directly impacted by the project, while others are solely primarily or secondarily contributed. Among these Work Packages, the CORE demonstrators will validate the applicability and benefits of the CORE approach in representative operating scenarios characteristic of the global supply chain. They will specifically show the way towards a Global Secure Supply Chain. The overriding goal is to demonstrate substantial gains in security and facilitation covering every major facet of the supply chain security sector.
The following Work Packages are directly impacted by the TACSS initiative:
The following Work Packages are primarily affected by TAPA TACSS, as airfreight is part of global supply chain:
The TACSS Initiative could also help with the following Work Packages, with the following secondary effects:
CORE Impact anticipation: CORE seeks to give consolidated solutions and develop the resilience, optimization and interoperability of the global supply chain, including Port, Container, Post, Truck, Rail, Maritime and Air. Air freight is thence a part of the global vision of CORE. TAPA TACCS contributes thence directly to CORE vision. Impact?
Cross-references: Air Cargo World on TAPA TACSS and air cargo crimes: www.aircargoworld.com
Full citation: TAPA EMEA Website, TACSS Page, accessed 23 September 2014: https://www.tapaemea.com
[/s2If]
Summary: As a response to the increasing security concerns surrounding goods transport by road, the IRU Membership has been providing information on safe and secure truck parking areas to road hauliers and truck drivers for more than two decades. Since the early 1990s, this information was disseminated in the form of a printed handbook. In 2007 the online website was launched. In 2013 a smartphone app was launched. Currently initiatives are taken to encourage the use of TRANSPark globally. It does not have much documentation available, except promotional fliers and the website and the app themselves. Available to the General Public at: http://www.iru.org and through the Android and iPhone TRANSPark app, which can be downloaded from the stores. Overall relevance to CORE is high, as truck transports constantly risk being attacked by organised crime with the aim to either steal fuel, cargo or potentially even to use a truck for terrorist purposes. Therefore, ensuring that trucks are parked at safe and secure truck parking areas is essential for drivers, road hauliers, shippers and other stakeholders involved in supply chain security.
[s2If is_user_logged_in()]
Full review: The current strengths include: Bringing information on safe and secure truck parking areas to drivers and road hauliers; Offering a driver-haulier-shipper-enforcement social network, enabling info sharing on latest road cargo related security threats; and providing flexible platform with expected future expansions to further ensure information sharing between key road haulage actors. Future opportunity is: Using this established communication channel for two-way information sharing with truck drivers, road hauliers, shippers and enforcement. And future threat is: The success of this community, as any other, depends strongly on the uptake by users.
Detailed analysis and relevance for CORE: The CORE implementation objectives depend on securing every element of the supply chain, and ensuring swift information sharing between different actors. TRANSPark could be relevant to following Work Packages:
CORE Impact anticipation: CORE could have a strong impact on future developments of the TRANSPark webservice and the app. The service is constantly evolving and is looking for new ways to improve security of the road haulage for drivers, hauliers, and other relevant stakeholders.
App and video:
Available to General Public at: http://www.iru.org and through the Android and iPhone TRANSPark app, which can be downloaded from the stores.
Youtube video on TRANSPark: https://www.youtube.com
CORE 1041
[/s2If]
Summary: The Customs Convention on the International Transport of Goods under Cover of TIR Carnets (TIR Convention, 1975) constitutes the international legal framework for the TIR system. TIR is the only universal Customs transit system, today operational in 58 countries, that allows the goods to transit from a country of origin to a country of destination in sealed load compartments with Customs control recognition along the supply chain. This minimizes administrative and financial burdens, while Customs duties and taxes that may become due are covered by an international guarantee (covering more than USD 1 billion worth of international trade every day). In order to ensure the security of the TIR System, electronic controls run in parallel with the security elements already specified in the TIR Convention. TIR handbook can be found at: http://www.unece.org
[s2If is_user_logged_in()]
Full review: The TIR system is an international Customs transit system for goods. ‘TIR’ stands for Transports Internationaux Routiers (International Road Transport) and is an international harmonized system of Customs control that facilitates trade and transport whilst effectively protecting the revenue of each Country through which goods are carried. It is based on six essential principles and an electronic security and risk management control system composed of four tools:
Real-Time SafeTIR (RTS) allows customs officers to enhance their risk management procedures and comprises following three modules:
TIR Customs Portal is an online service developed by the IRU, which allows customs officers to:
ASKTIRweb makes it easier for TIR associations to manage the entire life-cycle of the TIR Carnets from the time of order and delivery from IRU until their return to the IRU and the subsequent administrative procedures such as claims and SafeTIR. ASKTIRweb is a mandatory TIR Carnet management system for all new TIR associations.
The TIR-EPD application is intended for submission of advance information on transported goods to Customs Authorities. Fully compliant with WCO SAFE Framework of Standards and with the national regulations of connected countries, TIR-EPD enables Customs Authorities to perform advance risk analysis. TIR Carnet Holders can send advance information free-of-charge simultaneously to the Customs Authorities of the countries according to their itineraries.
In order to ensure the security of the TIR System, electronic controls run in parallel with the security elements already specified in the TIR Convention.
The perceived strengths of the TIR-system include: Access to 58 TIR operational countries; Management of a low cost, high value guarantee; Intermodality; Security in the supply chain; Reduced delays and costs for the international transit of goods; and Trade facilitation – goods move across international borders with minimum interference. Future opportunities include: Increased trust with national Customs; Encouragement of international trade; and Economic benefits for supply chain actors and nations.
Detailed analysis and relevance for CORE:
Research and analysis: The TIR system is based on proven business-to-governments solutions and both CORE and the TIR system could benefit from an investigation and evaluation of the legal, technical and operational feasibility as well as the business benefits of integrating TIR data to the CORE ecosystem and CORE concepts and solutions such as “trusted trade lane”, “data pipeline”, “piggy-backing” for customs and “dashboards”.
Demonstrators: The use of TIR and its security and risk management electronic tools in the framework of CORE demonstrators can have four different types of advantages which meet CORE’s overarching objectives to optimize the security of global supply chain whilst maintaining or improving business performance:
CORE Impact anticipation: CORE can have an important impact on the TIR system by reinforcing its place as a global multimodal logistics and trade solution. The investigation and evaluation of the legal, technical and operational feasibility as well as the business benefits of using the existing features of the TIR system within the CORE ecosystem and opening cargo-related datasets can contribute to improving freight and logistics services provision and operations by shippers, LSPs, transport operators, ports and customs authorities. The efficiency and security upgrades will come by significantly reducing waiting times and administrative burden at borders and at the same time providing a more cost efficient way of improved supply chain visibility and traceability of cargo to the benefit of all private and public stakeholders.
Cross-references:
Application of the TIR Convention in the EU: Council Regulation (EEC) No 2913/92; Commission Regulation (EEC) No 2454/93 and Regulation (EU) No 952/2013 of the European Parliament and of the Council applicable as of 1 May 2016.
Youtube video on TIR: https://www.youtube.com
[/s2If]
Summary: The fourth and seventh chapters of the CASSANDRA compendium elaborate on the roles of government agencies in international logistics and supply chain security (SCS). A broad range of government actors – customs, police agencies, border guards and many others – play a crucial role in enforcing and facilitating cross-border traffic through the global supply chains. These government agencies are critical stakeholders to be involved in the development, design and implementation of the two central CASSANRA concepts: the end-to-end data pipeline and the risk-based approach to cargo inspections and company audits. The CASSANDRA compendium highlights that there are important differences in the national laws and regulations, even within the European Union, that complicate international government collaboration. The differences in the legal framework and organisational cultures must be taken into account when designing new SCS solutions in the CASSANDRA and other projects. The CASSANDRA compendium is available for download: www.cassandra-project.eu. Review by Toni Männistö (CBRA)
[s2If is_user_logged_in()]
Full review: The CASSANDRA compendium describes how the role of government agencies in the cross-border supply chain operations is changing. The trading community and high-level policy-makers are strongly advocating trade facilitation, to make international commerce faster, more cost-efficient and less cumbersome. To address the demand for trade facilitation, many border control agencies are adopting risk-based approaches for controlling cross-border trade and travel. They exploit information increasingly to identify and target high-risk cross-border movements while facilitating low-risk traffic. To further lowering administrative hurdles to the cross-border trade, many government agencies are eliminating duplicative and redundant reporting requirements and building modern ICT systems to enable fast and reliable digital exchange of data and information.
Many law enforcement agencies are also facing budget cuts and increasing work loads, which forces them to look for new ways to increase productivity. Increased collaboration among border control agencies has been proposed as a solution for boosting productivity. The efforts towards further coordinated border management (CBM) are clearly manifested as joint-border control posts, regional single window systems (an online interface enabling trading companies, customs and other border control agencies to exchange trade-related information) and mutual recognition agreements (MRA) that harmonize customs and security related regulatory requirements across jurisdictions.
Reference: Hintsa, J. and Uronen, K. (Eds.) (2012), “Common assessment and analysis of risk in global supply chains “, Compendium of FP7-project CASSANDRA, Chapters 4 & 7
[/s2If]
Summary: In a recent study, a joint CBRA-INTERPOL research team investigates what kind of training material would help law enforcement agencies to fight crime in the context of global supply chains. The team conducted a pilot survey at the LE TrainNet Meeting (Networking Meeting of the Law Enforcement training institutions) which took place in Baku, Azerbaijan, 28- 29 April 2015. Findings of the pilot survey will be used to launch a large EU-wide survey on law enforcement agencies’ training needs regarding supply chain security. The survey findings also guide production of new training and educational material that the FP7 CORE is currently producing. The reviewed document is available for download here: https://hicl.org. Review by Toni Männistö (CBRA)
[s2If is_user_logged_in()]
Full review: The article concludes that law enforcement agencies generally recognise supply chain security training as a worthwhile investment for their organisations. In partuclar, the law enforcement agencies call for new supply chain related training material especially regarding narcotics and drug precursor trafficking, corruption financial crimes and tax evasion, trafficking in human beings, trafficking in counterfeit goods, terrorism and cybercrime. They advocate increasing use of modern training techniques and tools, such as e-learning, case-based teaching, and role-playing exercises.
Other findings show that law enforcement agencies consider it very useful to develop new training and educational material that would help them to enable and encourage multi-agency collaboration, for example data sharing between police agencies and customs. The survey respondents also expressed their interest in new training material that would focus on human factors of transnational crime (e.g., motives and underlying social dynamics) and intelligence-led policing.
It is important to notice that only 16 people responded to the Baku pilot survey. The response rate was 23.2%, given there were 69 delegates registered for the LEA TrainNet meeting. The relatively low number of respondents and the relatively low response rate indicate that there is a definite need for a larger EU-wide follow-up survey.
Reference: Hintsa, J., Ahokas, J., Gallagher, R., and Männistö, T., (2015), ”Supply Chain Security: Survey on Law Enforcement Agencies’ Training Needs”, Proceedings of the Hamburg International Conference of Logistics (HICL), September 24-25, 2015, Hamburg.
[/s2If]
Summary: This is a guidance document for small and medium sized enterprises, SMEs. on how to apply a supply chain security approach to their operations in order to mitigate the risk of criminal activities. It gives an overview of the main crime types occurring in the supply chain along with some countermeasures, as well as the supply chain security initiatives, and the compliance requirements thereof. The document is available for purchase e.g. at: http://shop.bsigroup.com/ProductDetail/?pid=000000000030258778 (link tested on 3 March 2016)
[s2If is_user_logged_in()]
Full review: The recommended supply chain strategy rests on a six-step approach. The first step is to define a context for the supply chain, crime prevention and security management activities taking into consideration the security sensitiveness, the geography and transport modes, and the main stakeholders involved in the supply chain operation. The second step is to make a threat and vulnerability analysis with regard to terrorist and other criminal threats in the supply chain. The main criteria included are the gaps existing in enhanced security, the high-risk crime types, and the potential consequences of crime occurrences. The third step covers the regulatory framework, the major aspects being the regulations and programs required for successful business operations, expectations of customers and suppliers, requirements laid down by insurance providers, and relevant government authorities. The fourth step refers to an overall security plan, taking into account the physical security, data security, human resources security (including selection, training, and exit procedures), business partner security (including selection, and auditing), and process control and monitoring of deviations. The fifth step involves implementing into practice concrete security measures, investment in technologies, procurement of services, in-house solutions and so forth. The final step is to monitor and measure the security performance and take appropriate corrective actions.
Five supply chain crime types have been elucidated in this guide. These include: Property theft (cargo theft, intellectual property breaches); targeted damage (terrorism, sabotage); cross-border duty and tax fraud; illegitimate transporting, exporting and/or importing (smuggling of prohibited and restricted goods, people smuggling); and crime facilitation (document forgery, bogus companies, cybercrime). For each crime type, the main focus should be on the issue (main features and typical sectors/products involved), scope of the problem and actions to mitigate risks.
This guidebook has chosen eight security initiatives for illustration purposes. It explains the context of each initiative, whom it is meant for, and some basic requirements and the implications. These are as follows:
[/s2If]
Summary: This report reviews container security technologies that the Science and Technology (S&T) Directorate of the US Department of Homeland Security (DHS) has evaluated and tested between 2004 and 2009. These container security technologies aim to (1) detect and report unauthorized intrusions into the shipping containers and (2) to track the movement of the containers through the supply chain. As of 2009, DHS has funded and tested four different container security technologies. So far, none of the candidate technologies meet all desired functional requirements: main problems are high false alarm rates, low detection probability, and difficult installation and calibration. Besides the unsatisfactory test results, the report points out problems of conducting the phase II practical “trade lane” testing in the context of the maritime transport only. The report recommends to test the technologies “across all operational scenarios,” considering contextual differences across different modes of transport. Once the technologies would pass this extended trade lane testing, the DHS should (1) obtain support from the trade industry and international partners, (2) develop a concept of operations (CONOPS) for using the technology, and (3) certify the container security technologies for use. The source document is available at: http://www.gao.gov/products/GAO-10-887.
[s2If is_user_logged_in()]
Full review: This GAO document describes in detail the four container security technologies that DHS has tested since 2004, and one of these technologies happens to be the very same “composite security container” that the WP22 CORE demonstration studies. The report discusses in details the problems that the previous tests and pilots of container security technologies have encountered. Being aware of the past problems help the CORE demonstrations to avoid past mistakes. In addition to the WP22 demonstration, the other demonstrations that involve tracking & tracing of intermodal containers benefit from the information of this GAO report. For instance, the GM demonstration on maritime shipping of automobile parts from the EU to the US via the port of Bremerhaven (WP9) might use this GAO document to evaluate available technical solutions for tracking the shipping containers. The demonstrations in work packages 14-17 involve tracking and tracing and therefore may use the detailed analysis this GAO report offers on available container security technologies.
Cross-references:
Full citation:
U.S. Government Accountability Office (GAO), 2008. Supply Chain Security: DHS Should Test and Evaluate Container Security Technologies Consistent with All Identified Operational Scenarios to Ensure the Technologies Will Function as Intended.
Additional keywords: Container security, maritime logistics, container security device, tracking & tracing
[/s2If]
Summary: This review on reference projects, specifying reusable outputs, focuses FP7-SUPPORT project. The author of the review is Konstantinos Vasileiou, ILS. The original review documents can be found in CORE e-library with the coding CORE3007. More information on the project at: http://www.mypsms.com/default.aspx
Read more
Sorry, no posts matched your criteria
Cross-border Research Association
Chemin de la Cure 9
CH-1066 Epalinges
Switzerland
Phone: 41-76-5890967
Skype: CBRA_2014
Email: cbra@cross-border.org