Posts

SIECA delegation visiting Europe in June 2015

I had a great pleasure to be the lead host for a 12 person SIECA delegation visit to Europe in June 2015. We spent two days in the Netherlands, one day in Belgium and two days in Switzerland in an action-packed tour, visiting several border areas, governmental offices and beyond.

The idea to organize a one-week customs and international trade visit tour to Europe first came when Mr. Roman Stoll from the Federal Customs Administration of Switzerland and I paid a four-day visit at the SIECA Secretariat in Guatemala City in March 2015. There we had several meetings and discussions on World Trade Organization´s Trade Facilitation Agreement, WTO TFA, implementation plans with the SIECA management – Ms. Carmen Gisela Vergara Mas and Mr. Javier Gutierrez; with Customs management and experts from all the six SIECA member countries; and with representatives of the Intra-American Development Bank. Some weeks after the Guatemala-visit, SIECA and IDB confirmed the willingness to come over to Europe, to learn about good practices in international trade, supply chain and border management in the Netherlands, Belgium and Switzerland. And after couple of hundreds of emails and phone calls – myself acting as the focal point in arranging the visit – we were ready to welcome the SIECA Delegation to Europe between Monday 1 June and Friday 5 June, 2015.

blog 22.03.20161Monday-Tuesday we had a full agenda in the Netherlands. Monday started by presentations on Dutch Customs in general, and Schiphol Customs in specific, focusing on risk management, coordinated border management, and the SmartGate solutions at the Schiphol Airport. This was followed by a roundtable discussion with representatives from the Dutch Ministries of Foreign Affairs and Economic Affairs, as well as with an expert from the air cargo industry. During Monday the SIECA delegation gained firsthand knowledge for example on One-Stop Shop (OSS) implementation steps in the Netherlands: Step 1. Information exchange; 2. Joint inspections; 3. Training specialists; 4. Joint risk analysis by both inspections and selection by Customs; and Step 5. One inspection inspects for the other. The program on Tuesday consisted of a tour in Port of Rotterdam, at the APM 2 Container terminal; as well as a visit to the Central command post of nuclear detection and an X-ray container scanner. In between we had a typical “Dutch sandwich” lunch, kindly offered by the hosts. The delegation enjoyed seeing the ultimate high level of automation at the new container terminal, as well as visiting a pragmatic “one stop inspection room”, where multiple border agencies work together inspecting containers flagged for manual inspections.

Wednesday was spent in Brussels, Belgium. In the morning, the trade representatives of the SIECA Delegation went to the European Commission, DG TRADE, for EU-SIECA related discussions. In the afternoon, most of the delegation visited the World Customs Organization, where the meeting started with discussions with the WCO Secretary General Dr. Kunio Mikuriya and the WCO Deputy Secretary General Mr. Sergio Mujica. This was followed by a presentation on WTO Trade Facilitation Agreement and the linked WCO Instruments, by Ms. Heike Barczyk, the Deputy Director of Compliance and Facilitation Directorate at the WCO. Lastly, we had a brief presentation and roundtable discussions on the European Flagship Supply Chain Security Research, Development and Demonstrations project called FP7-CORE. This discussion was joined by Mr. Nik Delmeire, the Secretary General of the European Shippers Council; Ms. Nicolette van der Jagt, the Secretary General of CLECAT, the European association for forwarding, transport, logistics and customs services; and myself, Dr. Juha Hintsa, Founder of the Cross-border Research Association. After the meeting at WCO, it was time to fly from Brussels to Basel, Switzerland.

blog 22.03.20162Thursday-Friday we had a packed program in Switzerland. Despite some “navigation challenges” with our three-car convoy, we arrived on time from Basel to Bern at the Directorate General of the Federal Customs Administration. We heard several interesting presentations focusing on performance mandate, tasks and strategy of Swiss Customs; on international affairs section and it’s relevant international cooperation program; on shifts from traditional revenue collection to environmental and incentive taxes; and on strategy and challenges regarding future customs clearance systems and platforms – all this by three top experts from Swiss Customs. I presented the outcomes of Swiss Customs and Cross-border Research Association -visit to SIECA in March 2015, suggesting some specific areas and priorities for future co-operation activities. Next, the Delegation visited the Federal Department of Foreign Affairs, where the discussions focused on Swiss foreign policy in Central America and bilateral cooperation Switzerland – Central America; as well as on political and economic regional integration in Central America. After a quick photo session on the Bundeshaus terrace facing over River Aare, our journey continued towards the Swiss Customs facilities at the Zurich Airport. Again, there were some “logistics challenges” on the way to Zurich, when one of our three cars suddenly lost all engine coolant – fortunately a gas station was close by, and a road service company (car + mechanic) happened to be there. At the Zurich Airport, the SIECA Delegation learned a lot of details about Swiss Customs operations with air cargo and passenger flows. And as the last agenda item, we met a cute black Labrador retriever, who together with his trainer showed how effortlessly he finds illicit goods hidden in air cargo boxes and pallets…

On Friday morning – last day of the journey – we had again an early wake-up call at our hotel in Basel. We were warmly welcomed by Swiss Customs Officers at the Basel/Weil- Motorway border-crossing point – the highest volume customs clearance point in Switzerland. First the hosts explained about facts and figures on Basel/Weil, topped with interesting information on customs risk management processes and IT-systems. Now we all know that on average 3500 trucks cross the Basel/Weil border per day, and that around 600 million CHF is collected annually as indirect taxes at that border crossing point. After that we took a rooftop view over the border area premises, discussing further Import/Export/Transit -procedures, as well as visited the Swiss Transito-Cabins / Checkpoints. From the motorway we drove to the Swiss Customs House at the Basel Port, visiting the famous tri-border-point between Switzerland, Germany and France. There the Delegation learned about the barge traffic on River Rhine – the same river we saw three days earlier at Port of Rotterdam. From the Basel Port, we drove again to Bern, this time to visit the State Secretariat for Economic Affairs, SECO. Lively discussions took place on the SECO rooftop meeting room on topics including EFTA – Central American FTA, as well as Bilateral Economic Relations Switzerland – Central America. And after lunch kindly offered by SECO, we headed towards Geneva for the final meeting of the week: World Economic Forum, WEF, where we all arrived just in time to learn about the organization and the key activities of WEF, including: the work of the WEF in Latin America, with updates from the Latin American Summit; and, the work of the WEF on trade and investment policy and implementation, including Policy Directions, Enabling Trade Index, Enabling Trade implementations. The United Nations Economic Commission for Europe, UNECE, was kind enough to explain about latest developments and trends in single window projects and implementations. And lastly, I shared briefly select work on trade facilitation and supply chain security research and education materials by the Cross-border Research Association and HEC University of Lausanne.  I highlighted the important developments taking place within the FP7-CORE project – referring naturally to our meeting two days earlier at the World Customs Organization.

This concludes the brief summary of the SIECA week in Europe, and now I would like to thank all the SIECA Delegation members for coming over and spending the five days with us, here on the old continent:

  • Costa Rica: Mr. Jhon Fonseca, Vice Minister Foreign Trade; and Mr. Luis Fernando Vasquez Castillo, Costa Rica Customs.
  • El Salvador: Mrs. Luz Estrella Rodriguez, Vice Minister Foreign Trade
  • Guatemala: María Luisa Flores Villagran, Vice Minister Foreign Trade; and Mrs. Maria Elisa Chang, Guatemala Customs.
  • Honduras: Jeronima Urbina, Director of Economic Integration
  • Nicaragua: Eddy Aldolfo Artola Garciá, Director Risk Management of Nicaragua Customs.
  • Panama: Melitón Arrocha. Minister Foreign Trade; Mrs. Diana Salazar, Vice Minister Foreign Trade; and Mr. José Gómez Núnez DG of Panama Customs.
  • SIECA Secretariat: Carmen Gisela Vergara Mas, Secretary General
  • Intra-American Development Bank: Mr. Jaime Granados

And last but not least, warmest thanks to all the local hosts: Dutch Customs Administration; Dutch Ministry of Foreign Affairs; Dutch Ministry of Economic Affairs; European Commission DG TRADE; World Customs Organization; Federal Customs Administration of Switzerland; Federal Department of Foreign Affairs of Switzerland; State Secretariat for Economic Affairs of Switzerland; and World Economic Forum.

CBRA Blog by Juha Hintsa

blog 22.03.20163PS. If your country / region would be interested on a similar European field visit, please contact us – we could organize the practical details for the next delegation, possibly every 1-2 years (of course the actual hosts need to agree to the visit in the first place, that goes without saying…). And one final note: next time a bus and a professional driver need to be rented, please!

 

FP7-CORE Education – Two new diagrams

Today’s CBRA Blog presents two new diagrams which have been recently designed and developed in the context of FP7-CORE Education and training work (Work package 19.1). The information visualized in the diagram is based on CBRA’s supply chain security research work since year 2001, particularly from the past 5-6 years.

Some background information on the first diagram of crime types in global supply chains has been presented before for example in CBRA’s Blog of 13 October 2014 – Crime taxonomies from Athens. In the center of this diagram we list the crime types – including document fraud and cybercrime – which in the supply chain criminal context are performed in order to succeed with the actual economic or ideological crime, e.g. cargo theft or terrorism.

The left area of the circle lists four examples of crime types, which typically are of primary concern for supply chain companies: cargo theft, sabotage, parallel trade and product specification fraud. With such crime types it is commonly up to the companies to prevent, to detect and to react – of course, law enforcement agencies can be called for any time there is reasonable suspicion of such activities (and naturally in certain cases the government agencies may even be the first ones to detect and react, e.g. in case of armed robberies and truck hijackings).

The right area of the circle deals with supply chain incidents where the authorities typically focus on prevention, detection and reaction: fraud in indirect border taxes; trafficking / violations in cross-border restrictions and prohibitions; human trafficking; and exploitation of illicit labor. From supply chain perspective one can characterize them as “a priori non-disruptive illegal activities – only if / after authorities detect the violations, the supply chain is disrupted and the involved supply chain companies can get in trouble”.

Lastly, on the bottom area of the circle, we list four supply chain crime areas where the prevention typically is in strong interest of both supply chain companies and governmental agencies – and, the detection and (instant) reaction varies on case-by-case basis: counterfeiting, sales channel violations, sea piracy and terrorism. Counterfeiting hits revenues on both sides of the equation, and, with many products can also be health damaging or even lethal. Not having proper sales licenses, and/or selling to unauthorized buyers – for example cigarettes and alcohol, dual use and strategic goods etc. – can again harm both the involved companies and the society as a whole. And of course, sea pirates hijacking cargo ships; bombs exploding and bringing planes down; and terrorists attacking critical supply chain infrastructures, all are in the best interest of both companies and government agencies to prevent, to detect, and to react – in the fastest and most effective possible manner.

blog10.03.161

The second new educational diagram below depicts the negative socio-economic impact areas – six in total – caused by twelve typical smuggling and trafficking activities. The data behind it has been presented before e.g. in CBRA’s Blog of 14 January 2015 – Socio-economic damages. Inside the square we present the six societal impact areas – the larger the area, the more links there are between the trafficking activities and the negative impacts. As an example of a “big area”, seven different types of trafficking typically lead into increasing market place distortions and/or unfair competition. In the other extreme, only trafficking in stolen cultural products leads to losses in cultural heritage.

blog10.03.162

That’s all for the CBRA Blog today – please let us know if you see this type of visualization as beneficial when teaching and learning about the big picture of supply chain security!  Thanks, Juha Hintsa ( email: cbra@cross-border.org )

Revisiting the Yemen bomb plot of 2010

blog_070316This CBRA blog revisits the Yemen bomb plot from 2010, the most decisive turning point in modern air cargo security. More than five years after the events, this blog discusses the plot’s implications to the contemporary air cargo security and outlines CBRA’s recommendations for future security work. Parts of this blog text have already been published in the doctoral thesis of CBRA researcher Toni Männistö.

Two explosive devices aboard passenger planes: The series of events, that we call the Yemen bomb plot, took place on 29 October in 2010. On that day, al-Qaeda terrorists almost destroyed two passenger airplanes with a pair of express courier parcels, each enclosing plastic explosives hidden inside a printer toner cartridge. The explosive parcels where sent to Chicago from the capital of Yemen, Sana’a, via two different express courier operators.

Both parcel bombs were eventually intercepted and defused, without fatalities or injuries. But before the interception, the bombs had already travelled onboard multiple air freighters and passenger planes. Many people flew that day with a fully functional explosive device under their seat! Though the parcels were addressed to Chicago, officials think that terrorists wanted to detonate the bombs mid-air, just before landing using cell phone timer alarms.

A Lockerbie-style mayhem was slightly avoided, largely thanks to a timely piece of intelligence. The bomb plot started to uncover when a suspected double agent tipped Saudi-Arabian intelligence that al-Qaeda terrorists had shipped two parcel bombs from Yemen to the US via the express courier service. The Saudi intelligence forwarded the tracking numbers of the suspected explosive devices to their US and German colleagues and told them to look for printer toner cartridges.

The first parcel was intercepted in Dubai, and the second one at the East Midlands airport, nearly 200 km to the northwest from London. In the UK, a bomb squad did not first recognize anything suspicious when they screened the suspected parcel. “It looked like a printer cartridge – there were no wires or anything,” one of CBRA’s contacts at World Customs Organization (WCO) recounts. “But of course, what the cartridge did contain was explosive that current technologies couldn’t detect.” Later laboratory tests revealed that each parcel contained 300 to 400 grams of PETN, military grade plastic explosive, wirings, and a detonator hidden inside a printer’s toner cartridge. The bombs were so meticulously concealed that they had not only passed the standard air cargo and safety screening but also the special screening of the bomb squad.

Aftermaths: The Yemen incident was rude reminder of the vulnerability of the air cargo logistics to terrorism. Sure, the day was saved by old-school, field intelligence work and prompt government response. But before interception, the first parcel travelled aboard three different flights: Sana’a – Dubai, Dubai – Cologne, and Cologne – East Midlands Airport. The second explosive parcel flew first from Sana’a to Doha and then to Dubai where it was intercepted.

In the immediate aftermaths of the events, aviation security authorities in the US and many European countries stopped accepting freight shipments from Yemen. Germany also cancelled all passenger flights from Yemen for more than two weeks. “As often happens in these situations,” the WCO’s air cargo specialist remarks, “the first reaction was stopping anything coming from this part of the world – any plane for any reason.” The new security rules changed the air cargo operations virtually overnight, seriously disrupting the air cargo and mail service. Delays were widespread and lengthy, but the worst aspect of the disruption was that no one knew when the new apparently transient security regime was to be revoked.

Eventually, once the precautionary stoppage was ended, new unprecedentedly stringent security requirements entered into force, disrupting the air cargo and mail service further. The US Transportation Security Administration, TSA, introduced the most stringent rules: any mail originating or transiting through Somalia or Yemen was banned, as well as printers or printer toner cartridges from high-risk locations. Moreover, parcels originating from any business partners had to be screened up to high-risk screening standards, piece by piece, if such shipment did not accompany a tendering statement, a document assuring that cargo comes from a known and trusted shipper. The new regime disrupted seriously international air cargo logistics, causing air cargo shippers worldwide to accumulate huge backlogs of US-bound shipments. Annoyed and surprised about the turn of events, the air cargo industry reacted to the US rules with a barrage of criticism, calling the measures superfluous and impractical. Over the following weeks, the reactive security rules were gradually relaxed to enable clearing of the backlog of US-bound air cargo.

In the long term, the Yemen events put air cargo security into a spotlight, securing political commitment and spurring further reforms for years to come. The International Civil Aviation Organization, ICAO, for example, included advanced security, concepts such as the “secure supply chain” principle, the concept of high-risk cargo and mail, and the consignment security declaration, CSD, into the new edition of the Annex 17 of the Chicago Convention. Also the European Union expanded the EU air cargo regime to cover airlines operating into the EU aviation security area – EU-28 plus Switzerland, Norway and Iceland – from third country airports. The amendment also specified criteria for identifying and screening high-risk cargo and mail, known as HRCM.

CBRA considerations for future air cargo security: The modern air cargo security has taken major leaps since the Yemen incident, but the work towards higher air cargo security still continues. The CBRA research team considers that, like in any other area of supply chains, it is crucial both to facilitate cross-border logistics and to ensure adequate security. This classic dilemma of striking the balance between trade facilitation and supply chain security is not easy to solve, but we believe that there are some promising ways to promote logistics-friendly air cargo security.

Governments should normally consult the air cargo industry before introducing new security rules. New security rules should avoid reducing speed, on-time reliability, or cost-efficiency of the air cargo service. There are often ways to integrate new security requirements seamlessly into the sequence of day-to-day logistics activities, but this requires close government-business coordination.

One promising way forward is to improve capabilities of pre-loading risk assessment, so that the riskiest air cargo shipments can be identified early on and subjected to a more stringent screening. Many projects on this matter are under way, most notably the Air Cargo Advance Screening (ACAS) in the US and Pre-loading Consignment Information for Secure Entry
 (PRECISE) in the European Union. The CBRA team applauds these efforts of advancing risk assessment and reminds of the importance of proactive updating of risk-scoring algorithms.

EU’s decision of forcing flights from third countries into EU to comply with EU’s air cargo security regime makes also good sense. It is reasonable to secure air cargo up to an adequate standard sooner rather than later, preferably before the first flight. More global capacity building – especially training and funds for modern screening equipment – are needed in developing countries. Also, auditing activities in third countries would benefit from further resources.

Harmonization and mutual recognition is another key theme for years to come. In the EU, civil aviation and customs authorities might find some synergies if they harmonized their respective Known Consignor (KC) and Authorized Economic Operator (AEO) programs. Air cargo companies would also benefit if types and performance requirements of screening methods would be uniform across the members of the European Union.

Bibliography:

BBC, Q&A: Air freight bomb plot, 2 November 2010

European Commission, Regulation 173/2012, amending 185/2010

International Civil Aviation Organization, Chicago convention, Annex 17, 9th edition

Koolloos M.F.J., Männistö T., van der Jagt O.C., Jezierska M.M., Hintsa J., Kähäri P. and Tsikolenko V. (2015), Security Screening for the Air Express Cargo Industry, Final Report, Brussels, Belgium.

Männistö, T., 2015. Mitigating Crime and Security Risks in the International Logistics Network: the Case of Swiss Post. Doctoral thesis, École Polytechnique Fédérale de Lausanne (EPFL).

CBRA Blog by Dr. Toni Männistö

CORE Information Observatory

cbra_blog_post_040116Please visit FP7-CORE Information Observatory . If you find it useful for your work, please consider registering to become a regular CORE Observatory user and to receive the CBRA Monthly Newsletter!

On behalf of the whole CBRA-team – Sangeeta, Susana, Susan, Phan Hien, Toni, Vladlen, Duayner, Perttu, Matti, Ari-Pekka, Ninoslav, Peter, Andrew, Harri x 2, and David x 2 (https://www.cross-border.org/team/ ) – I would like to wish you the best of success for the year 2016, in your professional as well as private life. In the context of global supply chains, we are ready to work with you towards faster and more predictable global logistics, naturally combined with low crime rates and with high compliance rates. One great tool to support such “common industry-government-academia global supply chain mission” is our new media platform – the recently launched FP7-CORE Information Observatory, which you can find at: https://www.cross-border.org/core-observatory/core-observatory-full-list/

CORE Observatory gives you 10-20 regular reviews and updates per month on supply chain security and trade facilitation policies, regulations, standards, good practices, roadmaps, research papers etc. – for the benefit of FP7-CORE partners, and beyond. Our primary focus is currently on European Union and its main trading partners – global expansion is possible later, depending on user needs and priorities. Each CORE Observatory entry has a title and a summary, visible to every user. At the end of the summary we provide a URL for the source document, whenever an electronic version is available in public domain. Starting 1 January 2016, the title and summary are also translated to Spanish. New languages (e.g. French, Arabic or Russian) may be offered later in 2016 depending on user preferences. The full review text is available only for the registered users, who will also receive the CBRA Monthly Newsletter, tailored to their personal information needs and interests. The CORE Observatory entries are listed in chronological order, the latest entry appearing on the top of the list. Any user – registered or not – can search CORE Observatory entries either via pre-defined keywords and tags (most common ones listed on the right side of the web page), or via free text search.

Again, Happy New Year 2016 everyone – and looking forward to having many new visitors at the FP7-CORE Information Observatory!

Yours, Juha

CORE-Observatory

Using business complexity to handle supply chain risk: Dealing with borders of cargo liability (CORE1209)

Summary: The dominant part of the academic literature on supply chain management assumes that decisions are based on objectivity, determinism and rational choices. They consider seldom complexity of the networks and casting defects that are due to deviating organizational structures and information systems. In order to manage complex risks companies may be willing to make decisions that reduce their own risks at the expense of other supply chain partners. That is an old maid game. The paper presents two cases, where logistics actors confine one-sided own liabilities instead of reducing risks in the whole network. The paper can be viewed here: http://www.intechopen.com.

[s2If is_user_logged_in()]

Full review: Rational reasoning and responsibilities stated in agreements and contracts are assumed to create baseline for decisions in supply chain management. If contracts do not give clear answers, we assume partners can be brought into a fair and impartial agreement.  In general, cooperation and information sharing are seen to produce long-term benefits for all stakeholders. These assumptions hide situations where logistics partners are prone to make opportunistic and subjective decisions.

In real life managers must be able to dynamically adapt logistics processes to unexpected harmful events, last-minute changes and rearrangements with very limited information about the situation and consequences of their decisions. One-sided simplifications are natural responses to reduce responsibilities of the company. The paper presents two cases where logistics risks are transferred at the expense of other supply chain partners. In the first case logistic company implements a camera surveillance system in own warehouses in order protect the company against inappropriate security claims (e.g. due to damages during transportation). In the second case a leading wholesaler creates strict rules how suppliers are allowed to deliver shipments in warehouses and how the wholesaler penalizes non-compliant deliveries. In both cases risk transferring strategy leads old maid game, not to mitigation of overall supply chain risks. The strategies may even increase risk and reduce motivation to collaborate in the supply chain network.

The paper illuminates possible unexpected and unwanted outcomes in the CORE project. Simplifications and narrow approaches are known to reduce supply chain resilience. First, they may lead to the loss of crucial information. Second, partners may be prone to pay more attention to own tasks and less to interdependencies with other partners. The CORE work packages that produce only technological solutions to meet minimum legislative data sharing requirements are vulnerable to the risk. The same vulnerability concerns organizational designs, where a focal company acts as a supply chain orchestrator and defines one-sided technical specifications for other trading partners. The comprehensive approach would increase visibility in the whole end-to-end supply chain and increase motivation for collaboration between partners.

Reference: D. Ekwall, F. Nilsson, 2008 “Using business complexity to handle supply chain risk: Dealing with borders of cargo liability”. In proceedings of Nofoma 2008, Helsinki

 

CORE1209

[/s2If]

Managing the Unexpected – Sustained Performance in a Complex World (CORE1208)

Summary: The book highlights characteristics of organizations that are capable to improve efficiency and manage their risk in challenging operative environments. According to the writers these high reliable organizations pay especially attention to small failures, real-time operations, alternative pathways to keep going and mobilization of expertise. The book presents how quality and continuous improvement philosophy eroded in manufacturing company causing a recall of 10 million vehicles and how they recovered from the crisis. The book can be purchased here www.wiley.com.

[s2If is_user_logged_in()]

Full review: Logistics networks are prone to disruptions and inefficiencies due to inconsistencies in organizational structures and cultures, human nature to searching simplified answers to complex problems and lack of collective commitment and competence necessary to sustain performance under trying conditions. The book describes characteristics of mindful organizations that are capable to perform reliably in complex environment. These organizations have unique culture, capabilities for self-design, networks build on expertise, hybrid structures with special attention to redundancy and continuity, special training and routines to maintain situational awareness, mind-sets to make sense out of emerging patterns, relational strategies to adapt to local environment and efficient information processing.

The CORE project aims at utilizing real-time data in order to increase visibility over movements of shipments. This is expected to improve abilities to re-plan resources if required due to detected risks or unexpected disruptions. The paper give advises how to create an infrastructure that supports sense making, continuous organizing and adaptive management in complex environment. The infrastructure make possible to convert observations of anomalies into explicit event types, categories, routines, instructions and roles. During the process abstract management concepts get refined organization specific meanings. However, sense making, continuous organizing and adaptive management prerequisite honesty and transparency in reporting and willingness to base actions on them. Besides, observations must be integrated into reports without underestimating or belittling observations that have no immediate explanations. The book can be used as user manual how organization can make most use of new data in order to respond earlier and adapt to unexpected situations.

The CORE project itself is a complex project comprising over 60 partners, 22 work packages and hundreds of interrelated tasks. The CORE management pays special attention to ensure sustained performance. First, consortium members work with concepts that enable them to cluster observations from real-time case and identify emerging patterns (sustained awareness). Second, partners have a variety of technological and operational expertise from academic, governmental and private sector. Respectful interaction and heedful interrelating support creation of shared understanding in non-obvious cases and their explanations (sustained surfacing). Third, ambiguity is implicitly or even explicitly acknowledged and accepted to be part of the project. However, ambiguity does not stop the work. It is an active part of problem solving (sustained organizing). Forth, when the CORE demonstrations progress, new details and nuances are discovered. Concepts and case studies are continuously updated (sustained updating). Fifth, tasks and problems are ambiguous, that creates often discomfort among partners. That creates a strong propensity to simplify problems and find or even create traditional solutions. CORE Management team avoids making rigid decisions, but they give directions, which by definition are dynamic, open to improvement, self-correcting, responsive and transparently reasoned (sustained agency). Sixth, human beings tend to simplify their interpretations and underestimate how much crucial information is then lost. In addition, we tend to pay more attention to own tasks and less to interconnected tasks of other partners. CORE partners are experienced to align tasks in a way that they maximize common good (sustained variety). Seventh, the CORE project highlight continuing adaption that reduces need to make radical changes. The CORE management team encourages partners to update their conceptions through paying closer attention to demonstrations. Bsides, management team facilitates respectful interaction through workshops.

Reference: Weick, Karl E. & Sutcliffe, Kathleen M. (2015). Managing the Unexpected: Sustained Performance in Complex World. 3rd Edition.

[/s2If]

Supply chain security culture: measure development and validation, 2009 (CORE1200)

Summary: Supply chain security culture (SCSC) is as an overall organizational philosophy embracing norms and values that keep employees vigilant when performing supply chain security practices. The article presents a scale that makes possible to gauge supply chain security culture and its correlation to organization’s ability to respond to unexpected disruptions. Employees are asked to assess two topics: security strategy of the company and impacts of significant supply chain breech to business operations. According the study improved supply chain security culture makes company more resilient against major disruptions. This research helps executives to justify their expenditures on security efforts. The reviewed document can be purchased here: http://dx.doi.org.

[s2If is_user_logged_in()]

Full review: Researchers have stressed the importance of having an organizational culture that highlights proactivity and vigilance toward supply chain security breaches. In security-focused supply chain management environment workers are empowered to detected and handle supply chain security threats without seeking formal permission from supervisors and managers. Company security strategy gives specific attention how SCS concepts are embedded into firm processes and procedures. Alignment with organizational culture and business or corporate-level strategies is believed to result in enhanced organizational performance. In addition, organization culture encompasses supply chain continuity management. The paper presents a scale for measuring supply chain security culture defined as the overall organizational philosophy that creates supply chain security as a priority among its employees through embracing and projecting norms and values to support secure activities and to be vigilant with security efforts.

The study makes possible to assess how implemented FP7-CORE security technologies, tools and practices influence on supply chain resilience based on the perception of company managers and employees. The article gives also guidelines how to develop survey forms and protocols in order to assess the influence of implemented security measures on other KPIs such as supply chain visibility and reliability. The survey tools based on perceived operational and organizational changes complete toolbox to measure impacts of introduced security interventions.

Reference: Zachary Williams, Nicole Ponder, Chad W. Autry, “Supply chain security culture: measure development and validation”, The International Journal of Logistics Management, Vol. 20 Iss: 2, pp.243 – 260

 

CORE1200

[/s2If]

CASSANDRA compendium. Standards in supply chain management (Ch. 9)

Summary: Chapter 9 of the CASSANDRA compendium lists and discusses various standards that set the context for international supply chain management. The chapter focuses especially on management standards (e.g., ISO28000), technical standards (e.g., RFID, electronic seals and barcodes), standards for exchange of information among supply chain stakeholders (e.g., UN/EDIFACT and XML messaging), and customs security standards (especially the World Customs Organisations’ SAFE Framework of Standards). GS1 Global Visibility Framework and other industry standards are included in the discussion, as well. The chapter points out that because a large variety of standards are already available, the challenge is not a lack of standardisation but the lack of harmonisation between different standards. The section also concludes that even if the diversity of standards was harmonised, the next step would be to ensure that the standards would be consistently implemented in different contexts.

[s2If is_user_logged_in()]

Full review: The chapter focuses on listing different standards that affect the modern supply chain management. There not much details to be reported in this section. However, especially people working with CORE work package 6 “SCS Reference Framework and Standards” should read the brief listing and general discussion of standards and standardisation. Other chapters of the CASSANDRA compendium provide complementary information about standardisation in the field of supply chain management (e.g., Ch. 5 & 6).

Reference

Hintsa, J. and Uronen, K. (Eds.) (2012), “Common assessment and analysis of risk in global supply chains “, Compendium of FP7-project CASSANDRA, Chapter 9

CORE2007

[/s2If]

CASSANDRA compendium. Private sector perspectives on risk management (Ch. 5) and crime prevention and security management in supply chains (Ch. 6)

Summary: Chapters 5 & 6 of the CASSANDRA compendium provide a general overview on supply chain security risk management from the private sector perspective. Explaining the essentials of supply chain risk management, Chapter 5 introduces commonly used risk management models and tools (e.g., risk matrices and risk registers), discusses various classifications of supply chain risks, and elaborates current trends of risks and risk management in the supply chain context. Chapter 6 focuses on specific challenges of supply chain security risks – the risks that arise from intentional, man-made criminal activities such as terrorism, theft, trafficking, and sabotage. The chapter explains a few early classifications of supply chain security risks (e.g., motive-based typology and taxonomies based on private sector perspectives). Following the classifications of security risks, the chapter puts forth a few models for managing security risks in the supply chain context (e.g., the 8-layer model for supply chain security management). The chapter concludes with a detailed case study on security management of an international security company and a comparison of supply chain security management and the total quality management (TQM) management philosophy. The CASSANDRA compendium is available for download: www.cassandra-project.eu. Review by Toni Männistö (CBRA)

[s2If is_user_logged_in()]

Full review: Previous observatory entries have already shown the relevance of the CASSANDRA compendium to the community of supply chain management professionals. The compendium’s chapters 5 & 6 give a brief summary of risk management and security risk management in the context of international supply chains. The contents of the chapters are relevant and useful for people involved in FP7 CORE project, especially for those involved in work packages 3 (Multi-method Threat and Vulnerability Analysis Suite) and 4 (SC Situational Awareness Tools & Maps).

Chapter 5 elaborates a set of common supply chain risk management tools. The model of Waters (2007) summarises rather obvious three steps of the risk management process: identifying risks, analysing risks and responding to risks. The model proposes, for example, that managers can identify supply chain risks through analysis of past events, collection of opinions, and through operational analysis. The model also calls for managerial attention to prerequisites of successful risk management – mutual trust, cooperation and information exchange among relevant stakeholders involved in supply chain management – and highlights importance of continuous monitoring and controlling the risk management process. The chapter concludes with the four classic approaches to risk management: risk avoidance, risk reduction, risk transfer (e.g., insurance and contractual agreements), and acceptance. The classifications of supply chain risks include typologies focusing on risk sources (natural hazards operational failure and terrorism), risk consequences (e.g., risk to operations, risk to reputation and risk to profits), and objects of vulnerability (e.g., information, materials, personnel and financial flows).

The chapter on crime prevention and security management (Ch. 6) in supply chains provides a concise summary on supply chain security management from the private sector perspective. The chapter starts by describing some early classifications of supply chain security risks. A motive-based taxonomy classifies such risks into the three categories: economic crime (profit as motive), other crime types (ideological, emotional and other reasons as motive) and facilitating crime that covers activities that do not bring direct crime benefits but help committing other rewarding crime crimes later on. (e.g., document fraud, bribery and use of intimidation). The chapter’s next section elaborates ways to mitigate security risks in the global supply chains, highlighting the key ideas of the so-called 8-layer model for supply chain security management (the model incorporates multiple aspects of risk assessment, hands-on design and planning, implementation of a variety of technologies, procedures, and incentives as well as preparation for dealing with the consequences of supply chain crime). The chapter provides also a case study with an international tobacco company that runs high security risk supply chain operations. The section also contrasts, rather interestingly, principles of security management against the fundaments of the total quality management (TQM) management philosophy. The chapter continues with a brief review of regulations (e.g., EU customs security and aviation security regulations) and standards on supply chain security management (World Customs Organization’s SAFE framework of standards, and industry standards of the Transported Asset Protection Association).

Reference

Hintsa, J. and Uronen, K. (Eds.) (2012), “Common assessment and analysis of risk in global supply chains “, Compendium of FP7-project CASSANDRA, Chapters 5 & 6

CORE2007

[/s2If]

C-TPAT Program Benefits Reference Guide, 2014 (CORE1032)

Summary: This guidebook outlines the key elements and benefits of the Customs-Trade Partnership Against Terrorism (C-TPAT) program that is designed to secure global supply chains and to improve United States border security. Document is available at: https://www.cbp.gov/sites/default/files/documents/C-TPAT%20Program%20Benefits%20Guide.pdf (link tested on 3 March 2016)

[s2If is_user_logged_in()]

Full review: C-TPAT partners receive a wide range of benefits listed below:

  • C-TPAT Partners are examined at a considerably lower rate than non-C-TPAT Partners.
  • C-TPAT certified/validated highway carrier Partners are granted expedited border crossing privileges. C-TPAT Partners at many Canada/Mexico land border ports of entry have access to Free and Secure Trade (FAST) Lanes.
  • Some categories of C-TPAT importer Partners are exempt from stratified exams.
  • C-TPAT shipments subject to examination are moved ahead of any non-C-TPAT shipments, to the extent possible.
  • In the event of a significant disruption/delay in cargo processing operations, actions are taken to maintain communication and coordination with C-TPAT Partners for business resumption.
  • C-TPAT Partners’ trade compliance issues are given priority over those issues related to non-C-TPAT Partners.
  • Each C-TPAT Partner is assigned a Supply Chain Security Specialist (SCSS) who coordinates between the C-TPAT Partner and the US Customs and Border Protection agency (CBP). The Specialist also assists the Partner with supply chain security issues.
  • Partners have access to the C-TPAT’s automated Portal system, to communicate with CBP and exchange program related information in a secure manner.
  • C-TPAT Partners are eligible to attend C-TPAT events like the annual Conference and other training seminars organized by the program.
  • C-TPAT importer Partners are eligible to participate in the Importer Self-Assessment (ISA) Program.
  • The Penalty Mitigation benefit is granted to sea carriers for late submission of data required under the Importer Security Filing requirements.
  • C-TPAT members are eligible to participate in other U.S. Government pilot programs, such as the Food and Drug Administration’s Secure Supply Chain program.

In addition, some benefits are associated with Mutual Recognition Arrangements (MRAs) when two customs authorities formally acknowledge the security requirements or standards of one program, as being equivalent to the other program. Some of the resulting benefits to the trade community are illustrated below:

  • C-TPAT importer Partners that also conduct export operations and Partners of the foreign Customs Administration programs (manufacturers and exporters of record) are granted a reduction in their overall cargo risk score, implying fewer examinations at export and import ports.
  • A C-TPAT validation for an overseas partner is not required if an MRA is in place because CBP recognizes the status of the Partner in the foreign partnership program.
  • Companies covered by MRAs need only to comply with a common set of security requirements, avoiding the hassle of following multiple sets of requirements from one partnership program to another.
  • MRAs lead to more transparency in international commerce. Mutual exchange of information between these partners facilitates trade across Mutual Recognition Partner nations.

CORE1032

[/s2If]

C-TPAT Best Practices Catalog Addendum, 2009 (CORE1031)

Summary: This addendum document lists cargo security best practices with focus on prevention of weapons of mass effect, terrorists, and/or contraband from infiltrating into the international supply chain. Each best practice is linked to a specific business entity, such as a Manufacturing Company, a Highway Carrier, an Importer or a Foreign Consolidator but these may apply to other business types as well. The document is available at: https://www.cbp.gov/sites/default/files/documents/ctpat_bpa_2009_0.pdf (link tested on 3 March 2016)

[s2If is_user_logged_in()]

Full review: The best practices are outlined as follows:

Risk assessment: Programs are in place to enable the identification of the most vulnerable supply chain areas, to grade suppliers supply chain security criteria. Specific processes have been developed to manage the supplier’s products, software and services and internal monitoring systems to enhance the safety and security procedures.

Business partner requirements: Several security measures have been taken by entities. These include conducting supply chain security audits to ensure compliance of non-C-TPAT business partners; carrying out security audits of a foreign manufacturer; making security self-assessments, conducting onsite inspections to ensure freight security; shipping cargo only through accredited ports and steamship lines; monitoring compliance of manufacturing facilities; screening procurements to identify ineligible status of suppliers, and performing audits of business partners.

Conveyance/Container/Trailer Security: Examples of such security practices are: integrating special security features in the GPS (global positioning system); using laser beams to protect trailers; using colour codes for matching consignments; installing infrared sensors in docks to prevent unauthorized access; using special codes to identify correct shipments; documenting all seal changes for shipments in transit; ensuring delivery by authorized Company drivers; sealing containers; operating through C-TPAT carriers; using only “seaworthy” containers; installing in-transit temperature data sensors to ensure product quality; enclosing container storage area; conducting non-intrusive inspection prior to loading a vessel; establishing specific inspection points; using multiple security devices on each container; using automated container yards; instructing foreign suppliers to provide inspection checklists; using dock locking arms for container storage; installing motion sensors in a trailer; operating through contracted highway carriers and security services; documenting a seal destruction policy, and so forth.

Physical Access Controls: Some practices by Importers include establishing multiple security stations within the building; using metal detectors for employees; installing an electronic swipe card/ lock box systems for access control for sensitive documents; conducting electronic scanning of visitors’ drivers licenses; utilizing a third-party software system to manage key inventory; and providing panic buttons for company employees.

Physical Security: Several innovative solutions have been designed to ensure physical security, such as electronically closing gates and activating tire puncturing devices to prevent vehicle exits; using an electronic security information reporting system, installing invisible electronic fences; installing laser sensors; setting up optical light beams to detect intruders; fitting double locks on doors; Installing infrared sensors on fences; using body alarm functions for emergencies; appointing patrolling guards, using multiple glass meeting rooms; using multiple interior infrared security alarm beams to detect unauthorized access; and installing security guard view towers.

Personnel Security: An Importer requires business partners to provide a monthly master list of employees and immediately notify when their employees are hired or terminated, in order to ensure that only authorized business partner’s employees enter the manufacturing facilities.

Security Training/Threat Awareness/Outreach: Business entities have invested in a wide range of training programs. One such initiative is the four-tier C-TPAT training targeted for management and supervisors, shipping and receiving personnel, internal personnel dealing with contractors and hourly staff. Other businesses use different approaches, like establishing an online training portal;; offering general security training and of site-specific training for security guards; issuing security advisories; making regular security awareness assessments; establishing a situation matrix chart to address possible incidents; establishing a direct communication channel between the president of the company and employees; putting in place a toll free hotline for company personnel; conducting security drills and exercises; establishing a web-based security awareness training; documenting security incidents in a central database; and establishing a global communication system to contact all employees and contractors remotely.

Procedural Security: Instances of this type of security measures include a bio-thermal intrusion alarm system; a global SAP network to generate all written orders for import and export; automatic screening procedures of purchase orders for restricted parties; lock boxes for sensitive documentation; an automated loading module called the Automatic Truck Loading System (ATLS); a container seal number as the shipment tracking (invoice/bill of lading) number, and so forth.

Information Technology (IT) Security: Such security practices include a biometric fingerprint door lock; a remote data backup center; a retina scanning system for access to the computer system; requiring supervisory approval to copy data; use of electronic password protected purchase orders; establishing a daily “e-test” for employees to access computers, and so forth.

CORE1031

[/s2If]

CEN Supply Chain Security — Good Practice Guide for Small and Medium Sized Operators, 2012 (CORE1030)

Summary: This is a guidance document for small and medium sized enterprises, SMEs. on how to apply a supply chain security approach to their operations in order to mitigate the risk of criminal activities. It gives an overview of the main crime types occurring in the supply chain along with some countermeasures, as well as the supply chain security initiatives, and the compliance requirements thereof. The document is available for purchase e.g. at:   http://shop.bsigroup.com/ProductDetail/?pid=000000000030258778  (link tested on 3 March 2016)

[s2If is_user_logged_in()]

Full review: The recommended supply chain strategy rests on a six-step approach. The first step is to define a context for the supply chain, crime prevention and security management activities taking into consideration the security sensitiveness, the geography and transport modes, and the main stakeholders involved in the supply chain operation. The second step is to make a threat and vulnerability analysis with regard to terrorist and other criminal threats in the supply chain. The main criteria included are the gaps existing in enhanced security, the high-risk crime types, and the potential consequences of crime occurrences. The third step covers the regulatory framework, the major aspects being the regulations and programs required for successful business operations, expectations of customers and suppliers, requirements laid down by insurance providers, and relevant government authorities. The fourth step refers to an overall security plan, taking into account the physical security, data security, human resources security (including selection, training, and exit procedures), business partner security (including selection, and auditing), and process control and monitoring of deviations. The fifth step involves implementing into practice concrete security measures, investment in technologies, procurement of services, in-house solutions and so forth. The final step is to monitor and measure the security performance and take appropriate corrective actions.

Five supply chain crime types have been elucidated in this guide. These include:  Property theft (cargo theft, intellectual property breaches); targeted damage (terrorism, sabotage); cross-border duty and tax fraud; illegitimate transporting, exporting and/or importing (smuggling of prohibited and restricted goods, people smuggling); and crime facilitation (document forgery, bogus companies, cybercrime). For each crime type, the main focus should be on the issue (main features and typical sectors/products involved), scope of the problem and actions to mitigate risks.

This guidebook has chosen eight security initiatives for illustration purposes. It explains the context of each initiative, whom it is meant for, and some basic requirements and the implications. These are as follows:

  • Import Control System (ICS) in the EU (a systems tool meant for the lodging and processing of Entry Summary Declarations, and for the exchange of messages across national customs agencies, economic operators and the European Commission).
  • Export Control System (ECS) in the EU (introduces EU procedures to computerize and control indirect exports and to implement the EU safety and security regulations);
  • Maritime Security Legislation, International Ship and Port Facility Security (ISPS) Code in the EU (International regulations to ensure the security of maritime transportation are being issued by the International Maritime Organization, IMO, in the International Ship and Port Facility Security Code);
  • Aviation Security Legislation, Air Cargo Supply Chains in the EU (three categories of aviation security legislation exist in the EU- Framework regulation, supplementing regulations, and implementing regulations-all targeted towards civil aviation security).
  • European Union Authorized Economic Operator, EU AEO (operators involved in international trade of goods certified as complying with WCO or equivalent supply chain security standards);
  • Regulated agent, Known consignor and Account consignor in the EU (Specific “trusted trader” status existing in the European air cargo supply chains);
  • ISO 28000 Series of Standards on Supply Chain Security Management Systems (address potential security issues at all stages of the supply process, e.g. terrorism, fraud and piracy);
  • Transported Asset Protection Association (TAPA) in Europe (fighting cargo crime using real-time intelligence and the latest preventative measures).

CORE1030

[/s2If]

SUPPLY CHAIN SECURITY – Examinations of High- Risk Cargo at Foreign Seaports Have Increased, but Improved Data Collection and Performance Measures Are Needed, GAO, January 2008 (CORE1010)

Summary: This report reviews the progress that the US Customs and Border Protection (CBP) has made with the Container Security Initiative (CSI) – a program for screening US-bound high-risk shipping containers in foreign ports with X-ray and radiation detection solutions – since the latest 2005 GAO review. The report discusses how the CBP’s CSI efforts have (1) contributed to the long-term, strategic planning on the US supply chain security, (2) strengthened CSI activities worldwide and (3) established means to evaluate performance of the CSI activities. The report recommends CBP to develop its data collection practices that are related to the CSI team performance and the host government’s inspections of the US-bound containers. This report provides relevant information for CORE demonstrations that deal with US-bound maritime logistics and commerce. Also the risk cluster might benefit from the descriptions of the US risk-based supply chain security scheme – Automated Targeting System (AST), 24-hour rule and the importer security filing 10+2 – that the report elaborates in detail. The report is available at http://www.gao.gov/new.items/d08187.pdf.

[s2If is_user_logged_in()]

Full review: This GAO report elaborates the status and challenges of the US Container Security Initiative, but it also provides a comprehensive outlook on the US maritime supply chain security. This information is likely to be relevant for the CORE’s demonstrations (WP9 and WP14) that deal with US-bound container traffic. The report is a good reference document for those CORE work packages that seek to describe the state-of-the-art of the global supply chain and that are producing relevant training material on supply chain security. The CORE’s risk and IT clusters benefit from the information the report offers on risk-based security solutions that use advance cargo information to calculate risk scores for US-bound shipments by the aid of automatic risk assessment algorithms.

Cross-references:

  • Preventing Nuclear Smuggling: DOE Has Made Limited Progress in Installing Radiation Detection Equipment at Highest Priority Foreign Seaports. GAO-05-375. Washington, D.C.: March 31, 2005.
  • Homeland Security: Process for Reporting Lessons Learned from Seaport Exercises Needs Further Attention. GAO-05-170. Washington, D.C.: January 14, 2005.
  • Port Security: Better Planning Needed to Develop and Operate Maritime Worker Identification Card Program. GAO-05-106. Washington, D.C.: December 10, 2004.
  • Maritime Security: Substantial Work Remains to Translate New Planning Requirements into Effective Port Security. GAO-04-838. Washington, D.C.: June 30, 2004.
  • Homeland Security: Summary of Challenges Faced in Targeting Oceangoing Cargo Containers for Inspection. GAO-04-557T. Washington, D.C.: March 31, 2004.
  • Container Security: Expansion of Key Customs Programs Will Require Greater Attention to Critical Success Factors. GAO-03-770. Washington, D.C.: July 25, 2003.

Additional keywords: Container Security Initiative (CSI), counter-terrorism, homeland security, maritime supply chain security

CORE1010

[/s2If]

MARITIME SECURITY – DHS Could Benefit from Tracking Progress in Implementing the Small Vessel Security Strategy, GAO, October 2013 (CORE1016)

Summary: This GAO report reviews current activities the Department of Homeland Security, its component agencies and its stakeholders are doing to protect the US-centric seaborne trade and logistics from threats arising from small vessels. The report argues that the small vessels pose two “great threats” to the US maritime system: (1) explosive-laden small vessels can be used to ram into maritime structures or (2) the small vessels can be used as vehicles for transporting tools, weapons and tools for terrorism into the US. The GAO report highlights that DHS has its Small Vessel Security Strategy (SVSS), but the organization is not monitoring the progress its component agencies are doing in meeting its objectives. This report focuses mainly on security initiatives that affect navigation of small vessels at the US territorial waters and ports and operations of the US coastal guards and customs. Although US-based maritime logistics operations benefit from the increased security the small vessel security initiatives likely bring, they can continue their business as usual. Therefore, the CORE’s early work packages can use this report’s information to define the context of the global supply chain security, the CORE demonstrations do not need much attention to the small vessel security initiatives or this GAO report. The report is available at: http://gao.gov/assets/660/658703.pdf

[s2If is_user_logged_in()]

Full review: This report provides interesting background information about the US government’s efforts to secure their domestic maritime logistics and transportation from the threat of small vessels that navigate largely anonymously and unregulated. The document might be useful for the CORE early work packages that describe the context of the global supply chain security. It is however unlikely that the demonstrators would need to pay much attention to the US small vessel security initiatives because the legal requirements of the initiatives do not affect the operations of large commercial vessels, which carry most of the world’s seaborne cargo. Of course the small vessel security initiatives also affect the way the component agencies of DHS operate, but because CORE does not involve these agencies directly, in CORE, there is no need to put much effort on understanding technicalities of the small vessel security initiatives. Finally, the CORE’s clusters on education and training as well as risk management might anyhow consider the information of this GAO report relevant.

Cross-references:

  • Critical Infrastructure Protection: An Implementation Strategy Could Advance DHS’s Coordination of Resilience Efforts across Ports and Other Infrastructure. GAO-13-11. Washington, D.C.: October 25, 2012.
  • Supply Chain Security: CBP Needs to Conduct Regular Assessments of Its Cargo Targeting System. GAO-13-9. Washington, D.C.: October 25, 2012.
  • Maritime Security: Progress Made but Further Actions Needed to Secure the Maritime Energy Supply. GAO-11-883T. Washington, D.C.: August 24, 2011.
  • Supply Chain Security: Feasibility and Cost-Benefit Analysis Would Assist DHS and Congress in Assessing and Implementing the Requirement to Scan 100 Percent of U.S.-Bound Containers. GAO-10-12. Washington, D.C.: October 30, 2009.

CORE1016

Additional keywords: Maritime security, small vessel security, terrorism, smuggling

[/s2If]

Interviews

Interview with Dr. Vittoria Luda di Cortemiglia

CBRA Interview with Dr. Vittoria Luda di Cortemiglia, Program Coordinator with the Emerging Crimes Unit at the United Nations Interregional Crime and Justice Research Institute, UNICRI, Torino, Italy.

Hi Vittoria, and thanks for joining a CBRA Interview – can you first tell a bit who are you and what you do?

I am the Programme Coordinator of the UNICRI Emerging Crimes Unit. Since joined the U.N. in 2001, I have been in charge of the coordination of a number of applied-research programmes in the field of illicit trafficking and emerging crimes, including environmental crimes, cybercrimes, counterfeiting, and organized crime in general.  I am UNICRI Focal Point for Strategic Approach to International Chemicals Management, SAICM, as well as UNICRI Focal Point within the UN Inter-Agency Coordination Group on Human Trafficking, ICAT.

Can you explain us bit more about UNICRI, including the governance model and the research areas?

UNICRI is a United Nations entity created by the Economic and Social Council of the United Nations, ECOSOC, in 1967 to assist Intergovernmental, Governmental and Non-Governmental Organizations in formulating and implementing improved policies in the field of criminal justice. The Institute is part of the United Nations Crime Prevention and Criminal Justice Program, which report annually through the UN Commission on Crime Prevention and Criminal Justice, CCPCJ, to the ECOSOC.

UNICRI is involved in research projects and capacity building activities in a broad number of areas, ranging from environmental crimes; human trafficking; trafficking in goods and products – including precious metals, pesticides, counterfeiting as well as chemicals, biological, radiological and nuclear risks; terrorism and foreign fighters; hate crimes and hate speech; cyber-security; urban security; violence against women; and, maritime piracy.

UNICRI, CBRA and other partners have just finished a 2-year FP7-project called CWIT, focusing on identifying and quantifying criminal and non-compliance problems and proposing solutions against illicit trade and logistics in electronic waste materials. What was the biggest thing you learned during the project, and which of our recommendations you find as most important when moving to the future?

The CWIT project has been a great experience from a personal as well as professional point of view, as gave me the possibility to work side by side with a number of wonderful professionals from the WEEE industry, enforcement agencies, international organisations, lawyers, academia and consultants specialised in supply chain security.

The objectives of the project were quite ambitious, as CWIT aimed at identifying the policy, regulatory, procedural and technical gaps as observed in today’s business environment, and at suggesting tangible improvements. The CWIT team produced set of recommendations to support the European Commission, law enforcement authorities and industry practitioners in countering the illegal trade of WEEE in and from Europe.

With regards to the recommendations which I consider particularly important are the ones related to the necessity of establishing robust and uniform legal framework and relevant implementation. As mentioned in the final CWIT report, without a clear and comprehensive legislative base, enforcers and prosecutors are powerless to address illegal WEEE flows. At the very minimum, a clear and global definition of what constitutes WEEE is the basis for improving detection, inspection, and enforcement and sentencing rates related to illegal WEEE trade.

In parallel, harmonisation and enhancement of penalty system is needed to increase the effectiveness of the existing legal framework.  In fact, penalties for the illegal trade in e-waste vary greatly in terms of monetary fines and prison durations. Today, the participation in WEEE illegal activities does not appear risky to offenders due to the low probability of being prosecuted and sentenced. Even when successfully prosecuted, penalties foreseen in legislation and penalties applied in court decisions are typically very low. For these reasons, it is important to also enhance prosecuting and sentencing, so that WEEE trade and environmental crimes in general are not considered a low- priority/low sentenced area.

UNICRI kindly invited CBRA to Torino last October to join a 2-day workshop on “Illicit Pesticides, Organized Crime and Supply Chain Integrity”. Can you elaborate on this emerging supply chain crime area, including about the estimated size and the negative socio-economic consequences of the problem?

Illicit pesticides cover a wide variety of products, including obsolete pesticides, unauthorized imports, counterfeit or fake pesticides; re- or up-labelled pesticides and refilled containers. Estimates of the illicit pesticides penetration of the legal market range from 10 to 25% – both in the EU and at international level-, representing several billion annually (USD 6-10 billion at global level and USD 1.1 billion at European level).

Besides the evident risks for human safety and health and environmental risks, illicit pesticides also pose serious threats to the economies and security. The agricultural market is extremely important for a large number of countries and companies and might be jeopardize by the introduction of illicit pesticides which can deeply affect the local and national economies. The economic losses have multiple sources and victims and long-term consequences, in particular possible loss of harvest/crop, soil and water contamination affecting the cultivable lands, decrease in innovation, reputation challenges with a decrease of exports, etc. The penetration of the pesticides market by criminal actors, including organised crime groups attracted by high profits and low risk of detection, prosecution and sentencing is another worrying trend.

Do you foresee opportunities for future research projects in the field of illicit pesticides?

Many national and international actors are becoming more and more aware of the threats posed by illicit pesticides to the legal supply chain. The attention and awareness of the problem is increasing at international level. In particular, the World Customs Organisation and the Organisation for Economic Co-operation and Development are becoming increasingly active in the field and it would be interesting to establish joint actions so as to raise awareness, capacities and response to secure the legal supply chain of such products. Indeed, through this research, we realised that the issue of illicit pesticide is neither well acknowledged nor well-documented. Our study is one of the first detailing the mechanisms and trends in the trafficking of illicit pesticides, the involvement of criminal actors, networks and organised crime groups and related criminal activities, as well as identifying the risks for the supply chain and pesticide markets.

UNICRI is very interested in continue working with partners, including CBRA, on this issue. The report details a number of initiatives which UNICRI stands ready to launch supporting countries in addressing the challenges of illicit pesticides, in particular research, raising stakeholders’ awareness, training and technical assistance programmes, supporting in capacity building activities and reinforcing national and international cooperation.

Thanks Vittoria for this interview – and we are of course more than willing to join a project-team on this highly important illicit pesticides trade and supply chains -topic

Mr. Mike Ellis, INTERPOL, on illicit trade and counterfeiting

Today’s CBRA Interview is with Mr. Mike Ellis who is the Assistant Director of Illicit Trade and Anti-counterfeit Sub-crime Directorate at INTERPOL, Lyon, France.

Hi Mike, can you first tell a bit who are you and what you do?

I am the Assistant Director for Police Services at INTERPOL, based in Lyon France.  INTERPOL is the world’s largest international police organization. Our role is to assist law enforcement agencies in our 190 member countries to combat all forms of transnational crime. We work to help police across the world meet the growing challenges of crime in the 21st century by providing a high-tech infrastructure of technical and operational support. Our services include targeted training, expert investigative support, specialized databases and secure police communications channels. I am responsible for the coordination of all activities related to illicit trade, smuggling of illicit goods and counterfeiting for the organization and police forces within our 190 member countries.  I lead a team of expert officers who are engaged in training, capacity building, and operational support who operate along with my analytical support who manage risk awareness and intelligence handling.

interview111

From your perspective, how bad is the current situation with counterfeit and other illicit trade in global supply chains? Can one for example see links between illicit trade and transnational organized crime groups; or, even terrorist organizations?

For many years the clear link has been established between the trafficking of illicit goods and transnational organized crime. Criminal organizations are attracted by the lucrative profits involved in trading counterfeit or fake goods, or in trading legitimate goods through illicit channels. The criminals involved manufacture and trade illicit goods on a regional and increasingly global scale.  It is well documented that they use the profits to fund other criminal activities such as drug trafficking and people smuggling, and for investment into funding subversive political groups.  Selling fake or counterfeit products is one aspect of illicit trade, as is selling genuine goods on the black market to avoid paying taxes. By avoiding regulatory controls, the criminals behind these activities peddle dangerous and illicit goods with a complete disregard for the health and safety of consumers. The phenomenon has grown to an unprecedented level, posing tremendous risks to society and the global economy. Counterfeiting harms businesses which produce and sell legitimate products, governments lose tax revenue from products manufactured or sold on the black market, and consumers are at risk from substandard products.

By the way, we met first time about one year ago in Lyon at an INTERPOL workshop linked to FP7-Project CORE. One of the main objectives of CORE-project is to develop leading edge education and training materials on supply chain security – for the benefit of law enforcement agencies, supply chain practitioners, and academics alike. Can you share your views about law enforcement – academia – industry cooperation in education material development, as well as in the broader field of supply chain security management?

One of our principle functions is capacity building and training.  At INTERPOL we recognize that capacity building brings with it raised identification of the impact of illicit cross-border trade and counterfeiting and all our new operations, or established operations in new regions, are preceded by a capacity building workshop.  The public domain is represented by police, customs, border control officials, and prosecutors, as well as representatives from various regulatory bodies including trading standards.  In addition, INTERPOL TIGC, the Trafficking in Illicit Goods and Counterfeiting program which I am heading, has developed a Mentoring Program which aims to increase cross-border, cross-industry law enforcement operational interventions by: strengthening capacity to deal with all types of cross-border trafficking in illicit and counterfeit products. We have also developed an online International Intellectual Property Crime Investigator’s College and have built already a robust network of over 10.000 law enforcement officers, and partner stakeholders with specialist knowledge and skillset.  This online training course provides specialist knowledge on transnational organized crime.  It is aimed at all law enforcement officials, regulatory authorities and private sector investigators who are committed in the fight against illicit trade and intellectual property crime.   We aim to provide crime professionals with specialist awareness and learning on the subject of transnational organized intellectual property, IP, crime, and illicit trade, by delivery of leading-edge training that meets international standards and allows crime investigators from any discipline to quickly identify other certified investigators.  Through this learning platform we also facilitate cooperation between the public and private sectors in the fight against IP crime, and ensure all public and private sector crime investigators have a common understanding of the problems facing them, while being aware of each other’s competencies and roles.  We seek to promote knowledge on what intervention strategies and tactics work, in order that all stakeholders are better able to work together in partnership in enforcement operations.

Thank you Mike for this highly interesting interview. It complements well our previous interviews on similar themes – with non-law enforcement experts including Mr. David Hamon and Mr. Tony Barone. CBRA and the whole FP7-CORE consortium, around 70 partners in total, wishes to continue the great cooperation in research and education material development with INTERPOL, throughout the CORE-project, until April 2018 – and beyond!  Juha.