Posts

Border Agency Cooperation, Part 1 of 3

“A beloved child has many names”, goes an old Finnish proverb. This saying applies quite well in the conblog-210116text of ´smart cooperation between multiple agencies when dealing with cross-border supply chains, goods movements and transports´. The World Customs Organization talks about Coordinated Border Management (CBM); the European Union about Integrated Border Management (IBM); the World Bank about Collaborative Border Management (CBM); and Organization for Security and Cooperation in Europe about Comprehensive Border Management (CBM). Cross-border Research Association is aligning with a fifth term: Border Agency Cooperation (BAC), a term used in the Trade Facilitation Agreement of the World Trade Organization. Despite minor differences in scope, priorities, underlying principles and philosophies among these five terms (and possibly even more), one can easily agree that the work carried out under any and all of them aims to coordinate activities across and within various border control agencies, for the benefit of both governmental agencies themselves as well as supply chain companies.

Our first blog on Border Agency Cooperation, BAC, provides an illustrative worst case example on how complex, slow and expensive a cross-border supply chain execution comes when no cooperation takes place between relevant government agencies, neither nationally nor internationally. The illustration is about meat export from Latin America (Country X) to the European Union (Country Y), with maritime transport in reefer containers.

A well-known beef producer in country X– also the first Authorized Economic Operator (AEO) beef producing company in the region – has just signed an annual contract with a beef importer and distributor in country Y. As this is the producer ‘s first export deal to the EU, the producer needs to ensure that all licenses and certificates are up to the EU standard. Organizing health certificates, certificates of origin, sanitary certificates, export licenses – and what have we – takes weeks and weeks of time. There is no communication or procedures in place between the various agencies and officials to facilitate the process, no coordinated company visits or audits, no sharing of information, and no mutual recognition of inspections.

When all documents are finally in place, and regular exports can start, the beef producer and it´s forwarding agent face the burden of filing export data to customs, to sanitary agencies, and to national security agencies – with somewhat similar datasets, but with no single-window filing opportunity. And when export controls and inspections take place – which happens often – there is no synchronization of inspection times between the different agencies. One agency might come to inspect the reefer container on Monday noon, second one on Wednesday morning, and third on Friday afternoon – another week lost in the beef supply chain lead-time.

Once the consignment is happily on board towards the EU, one continues to experience lost BAC opportunities: no data is passed from country X customs or sanitary agencies to their counterparties in country Y, to enable pre-arrival compliance control and risk assessment. In case of criminal suspicions – e.g. when supply chain insiders exploit beef shipments for cocaine smuggling – no intelligence is shared between police and customs, from country X to country Y. The option of joint law enforcement operations between country X and Y police and customs agencies has never been even considered. Even on national level, both in country X and Y, the agencies are not co-operating neither on risk profiling and targeting systems, nor during criminal investigations and prosecutions – what a waste of resources when it comes to catching and convicting the bad guys…

In the meanwhile, some ten days later, the ship arrives at a major sea port in country Y. For the importer, there is no option for single-window data filing; instead, import data must be transferred separately to all different agencies in country Y. As the customs administration in country Y has no Mutual Recognition Agreement (MRA) in place with country X customs – neither when it comes to AEO certificates nor when it comes to recognizing inspections carried out at export – it treats the import as a “medium to high risk” one, calling for physical inspections. And as the sanitary agency does not share any common resources with the customs administration – particularly no joint inspection facilities and equipment, including x-ray machines – and even the daily opening hours are different from the customs hours, the sanitary agency carries out their own inspections only two days after the customs intervention. And finally, improving the situation does not seem likely, as there are no joint public-private partnerships, and no export/import compliance training sessions or similar in place, neither in country Y nor in country X.

This concludes the first of three parts of our Border Agency Cooperation (BAC) blog. In Part 2 – to be published next week – we will present CBRA´s conceptual model (Hintsa J., Dec.2015) on BAC key actions and beneficiaries: which key actions to take in order to speed up the logistics chain, to save costs with all actors, to increase overall predictability, and to improve government agency performance e.g. in terms of number of seizures and convictions. In the BAC Blog Part 2, we plan to present some preliminary experiences and real-life results from FP7-project CORE. Please stay tuned!

Chemical Security in Istanbul

2015-12-15 09.02.08I had the most interesting week in Istanbul with the Iraqi government representatives, chemical sector companies and the US State Department Chemical Security Program, CSP.

Security in the chemical supply chain is a major challenge for government agencies and chemical supply chain companies across the globe, including those in the Middle-East and North African (MENA) region. Theft, diversion, trafficking, export violations, counterfeit chemicals, sabotage and terrorism – among other criminal threats – keep the agencies and companies constantly on their toes when considering how to best tackle the vulnerabilities and threats in their respective chemical supply chains.

This was my second time to join as an external expert in a Chemical Security Program (CSP) event in the MENA region. The first time was in Hurghada, Egypt, in March 2015 – thanks again to Professor Andrew Thomas, the Chief Editor of the Journal of Transportation Security, for hooking me up with CRDF Global and the US State Department on this. Now the four day event targeted for the relevant Iraqi government agencies as well as the Iraqi chemical sector companies was held in Istanbul, Turkey, on 14-17 December 2015.

We had a fully packed agenda: Day 1 consisted of several introductory and state-of-play speeches by the workshop facilitators and by Iraqi experts, the latter group sharing key governmental, industry and academic perspectives to the chemical security progress in Iraq.  Day 2 started with a case study presentation on “Post-2001 supply chain security developments at Dow Chemicals”, followed by private-public partnership considerations in chemical supply chain security. During the afternoon of day 2, two more presentations were given on potential threats to materials of interest, as well as on site-physical security. Day 3 started with presentations on international transport of dangerous goods and security rules, followed later by presentations on export control and border security issues, as well as risk assessment methodological aspects.

Interactive sessions, group exercises and other discussions were vivid throughout the four days. On day 1, the main interactive session was about government-industry coordination. On day 2, the focus shifted to identifying key players in Iraqi chemical supply chain security, as well as exploring private sector specific chemical security issues. On day 3, a major interactive session took place to recognize existing vulnerabilities and threats in the chemical supply chain, as well as to identify appropriate countermeasures and other possible means of improvement. And finally, on day 4, a draft table of content for a potential “Iraqi chemical supply chain security master plan and implementation roadmap” was produced in a highly interactive manner, followed ultimately by drafting some actual planning content in areas including chemical transport security and raising security awareness.

The actual workshop outcomes and possible follow-up actions will be worked upon later by the organizing team and some key participants. In the meanwhile, I want to express my warmest thanks for this opportunity and great on-site collaboration in Istanbul to: Ms. Shawn Garcia from the U.S. Department of State, Chemical Security Program (DOS/CSP); Ms. Pelin Kavak and Mr. Nidal Abu Sammour from CRDF Global, US / Jordan; and Dr. Caner Zanbak and Mr. Mustafa Bagan from the Turkish Chemical Manufacturers Association (TCMA). Hope to meet you again in 2016 in Iraq, Algeria and possibly other locations in the MENA region!

 

Cheers, Juha Hintsa

P.S. We also tested two CBRA frameworks / models – CBRA SCS15/16, and CBRA-BAC-Actions and beneficiaries – with the audience during the Istanbul week. Both of them were well perceived, and will be topics for CBRA Blog during the coming couple of months. (SCS = Supply Chain Security, and BAC = Border Agency Cooperation).

PPS. Last but not least I would like to thank Ms. Antonella Di Fazio of Telespazio, Italy, and FP7-project CORE, for excellent inputs on transport of dangerous goods, traceability and monitoring solutions, demonstrators, and practical experiences.

CORE Information Observatory

cbra_blog_post_040116Please visit FP7-CORE Information Observatory . If you find it useful for your work, please consider registering to become a regular CORE Observatory user and to receive the CBRA Monthly Newsletter!

On behalf of the whole CBRA-team – Sangeeta, Susana, Susan, Phan Hien, Toni, Vladlen, Duayner, Perttu, Matti, Ari-Pekka, Ninoslav, Peter, Andrew, Harri x 2, and David x 2 (https://www.cross-border.org/team/ ) – I would like to wish you the best of success for the year 2016, in your professional as well as private life. In the context of global supply chains, we are ready to work with you towards faster and more predictable global logistics, naturally combined with low crime rates and with high compliance rates. One great tool to support such “common industry-government-academia global supply chain mission” is our new media platform – the recently launched FP7-CORE Information Observatory, which you can find at: https://www.cross-border.org/core-observatory/core-observatory-full-list/

CORE Observatory gives you 10-20 regular reviews and updates per month on supply chain security and trade facilitation policies, regulations, standards, good practices, roadmaps, research papers etc. – for the benefit of FP7-CORE partners, and beyond. Our primary focus is currently on European Union and its main trading partners – global expansion is possible later, depending on user needs and priorities. Each CORE Observatory entry has a title and a summary, visible to every user. At the end of the summary we provide a URL for the source document, whenever an electronic version is available in public domain. Starting 1 January 2016, the title and summary are also translated to Spanish. New languages (e.g. French, Arabic or Russian) may be offered later in 2016 depending on user preferences. The full review text is available only for the registered users, who will also receive the CBRA Monthly Newsletter, tailored to their personal information needs and interests. The CORE Observatory entries are listed in chronological order, the latest entry appearing on the top of the list. Any user – registered or not – can search CORE Observatory entries either via pre-defined keywords and tags (most common ones listed on the right side of the web page), or via free text search.

Again, Happy New Year 2016 everyone – and looking forward to having many new visitors at the FP7-CORE Information Observatory!

Yours, Juha

Interviews

Nothing Found

Sorry, no posts matched your criteria

CORE-Observatory

CASSANDRA compendium. Standards in supply chain management (Ch. 9)

Summary: Chapter 9 of the CASSANDRA compendium lists and discusses various standards that set the context for international supply chain management. The chapter focuses especially on management standards (e.g., ISO28000), technical standards (e.g., RFID, electronic seals and barcodes), standards for exchange of information among supply chain stakeholders (e.g., UN/EDIFACT and XML messaging), and customs security standards (especially the World Customs Organisations’ SAFE Framework of Standards). GS1 Global Visibility Framework and other industry standards are included in the discussion, as well. The chapter points out that because a large variety of standards are already available, the challenge is not a lack of standardisation but the lack of harmonisation between different standards. The section also concludes that even if the diversity of standards was harmonised, the next step would be to ensure that the standards would be consistently implemented in different contexts.

[s2If is_user_logged_in()]

Full review: The chapter focuses on listing different standards that affect the modern supply chain management. There not much details to be reported in this section. However, especially people working with CORE work package 6 “SCS Reference Framework and Standards” should read the brief listing and general discussion of standards and standardisation. Other chapters of the CASSANDRA compendium provide complementary information about standardisation in the field of supply chain management (e.g., Ch. 5 & 6).

Reference

Hintsa, J. and Uronen, K. (Eds.) (2012), “Common assessment and analysis of risk in global supply chains “, Compendium of FP7-project CASSANDRA, Chapter 9

CORE2007

[/s2If]

CASSANDRA compendium. Private sector perspectives on risk management (Ch. 5) and crime prevention and security management in supply chains (Ch. 6)

Summary: Chapters 5 & 6 of the CASSANDRA compendium provide a general overview on supply chain security risk management from the private sector perspective. Explaining the essentials of supply chain risk management, Chapter 5 introduces commonly used risk management models and tools (e.g., risk matrices and risk registers), discusses various classifications of supply chain risks, and elaborates current trends of risks and risk management in the supply chain context. Chapter 6 focuses on specific challenges of supply chain security risks – the risks that arise from intentional, man-made criminal activities such as terrorism, theft, trafficking, and sabotage. The chapter explains a few early classifications of supply chain security risks (e.g., motive-based typology and taxonomies based on private sector perspectives). Following the classifications of security risks, the chapter puts forth a few models for managing security risks in the supply chain context (e.g., the 8-layer model for supply chain security management). The chapter concludes with a detailed case study on security management of an international security company and a comparison of supply chain security management and the total quality management (TQM) management philosophy. The CASSANDRA compendium is available for download: www.cassandra-project.eu. Review by Toni Männistö (CBRA)

[s2If is_user_logged_in()]

Full review: Previous observatory entries have already shown the relevance of the CASSANDRA compendium to the community of supply chain management professionals. The compendium’s chapters 5 & 6 give a brief summary of risk management and security risk management in the context of international supply chains. The contents of the chapters are relevant and useful for people involved in FP7 CORE project, especially for those involved in work packages 3 (Multi-method Threat and Vulnerability Analysis Suite) and 4 (SC Situational Awareness Tools & Maps).

Chapter 5 elaborates a set of common supply chain risk management tools. The model of Waters (2007) summarises rather obvious three steps of the risk management process: identifying risks, analysing risks and responding to risks. The model proposes, for example, that managers can identify supply chain risks through analysis of past events, collection of opinions, and through operational analysis. The model also calls for managerial attention to prerequisites of successful risk management – mutual trust, cooperation and information exchange among relevant stakeholders involved in supply chain management – and highlights importance of continuous monitoring and controlling the risk management process. The chapter concludes with the four classic approaches to risk management: risk avoidance, risk reduction, risk transfer (e.g., insurance and contractual agreements), and acceptance. The classifications of supply chain risks include typologies focusing on risk sources (natural hazards operational failure and terrorism), risk consequences (e.g., risk to operations, risk to reputation and risk to profits), and objects of vulnerability (e.g., information, materials, personnel and financial flows).

The chapter on crime prevention and security management (Ch. 6) in supply chains provides a concise summary on supply chain security management from the private sector perspective. The chapter starts by describing some early classifications of supply chain security risks. A motive-based taxonomy classifies such risks into the three categories: economic crime (profit as motive), other crime types (ideological, emotional and other reasons as motive) and facilitating crime that covers activities that do not bring direct crime benefits but help committing other rewarding crime crimes later on. (e.g., document fraud, bribery and use of intimidation). The chapter’s next section elaborates ways to mitigate security risks in the global supply chains, highlighting the key ideas of the so-called 8-layer model for supply chain security management (the model incorporates multiple aspects of risk assessment, hands-on design and planning, implementation of a variety of technologies, procedures, and incentives as well as preparation for dealing with the consequences of supply chain crime). The chapter provides also a case study with an international tobacco company that runs high security risk supply chain operations. The section also contrasts, rather interestingly, principles of security management against the fundaments of the total quality management (TQM) management philosophy. The chapter continues with a brief review of regulations (e.g., EU customs security and aviation security regulations) and standards on supply chain security management (World Customs Organization’s SAFE framework of standards, and industry standards of the Transported Asset Protection Association).

Reference

Hintsa, J. and Uronen, K. (Eds.) (2012), “Common assessment and analysis of risk in global supply chains “, Compendium of FP7-project CASSANDRA, Chapters 5 & 6

CORE2007

[/s2If]

MARITIME SECURITY – DHS Progress and Challenges in Key Areas of Port Security, GAO, July 2010 (CORE1064)

Summary: This GAO report analyses the progress the US Department of Homeland Security (DHS) has made in maritime supply chain security over the past five to ten years. The report raises problems that the DHS and its component agencies – the Coast Guard and the Customs and Border Protection (CBP) – have encountered regarding improvement of risk management, reduction of the vulnerability to threats of small vessels, implementation of security assessment in foreign ports, and the overall progress in supply chain security.  The report states that so far the Coast Guard has carried out risk assessments, but their results do not allow effective comparison and prioritization of risks across ports. The Coast guard has also identified points of vulnerability related to waterside attacks by small vessels, reached out to the general public to encourage recreational sailors to report anomalies, started tracking of small vessel, tested equipment to screen small vessels for nuclear material and conducted security maneuvers such as vessel escorts. Nevertheless, resource constraints and technical problems prevent the Coast Guard to protect the US coastline and maritime infrastructure from small-vessel threats effectively. Moreover, the Coast Guard has been assessing security in foreign ports, but the lack of the agency’s resources and certain countries’ reluctance to collaborate with the US authorities have slowed down the global security assessment. Finally, as for the general supply chain security, the DHS has been running the Secure Freight Initiative (SFI) in foreign ports to test the feasibility of the 100% scanning of US-bound shipping containers with non-intrusive inspection (NII) technologies and radiation detection equipment. The findings of the SFI pilots indicate that the 100% scanning is not a feasible policy because it would disrupt port logistics, damage international trade and raise healthy concerns, among other things. The report is available for download at: www.gao.gov/assets/660/659087.pdf.

[s2If is_user_logged_in()]

Full review: This GAO review concentrates on the US maritime supply chain security. The document provides important information for people who are working for the CORE demonstrations of WP1 and WP14 because these demos involve maritime transportation into and from the US mainland. Those demonstrations that test tracking & tracking solutions might benefit from the document’s update on small-vessel identification and tracking systems.

Cross-references:

  • Coast Guard: Deployable Operations Group Achieving Organizational Benefits, but Challenges Remain. GAO-10-433R. Washington, D.C.: April 7, 2010.
  • Supply Chain Security: Feasibility and Cost-Benefit Analysis Would Assist DHS and Congress in Assessing and Implementing the Requirement to Scan 100 Percent of U.S.-Bound Containers. GAO-10-12. Washington, D.C.: October 30, 2009.
  • Maritime Security: The SAFE Port Act: Status and Implementation One Year Later. GAO-08-126T. Washington, D.C.: October 30, 2007.
  • Maritime Security: Vessel Tracking Systems Provide Key Information, but the Need for Duplicate Data Should Be Reviewed. GAO-09-337. Washington, D.C.: March 17, 2009.
  • Supply Chain Security: Challenges to Scanning 100 Percent of U.S.-Bound Cargo Containers. GAO-08-533T. Washington, D.C., June 12, 2008.

Additional keywords: Maritime security, supply chain security, 100% scanning and track & trace

 

CORE1064

[/s2If]

MARITIME SECURITY – Progress Made, but further actions needed to secure the maritime energy supply, GAO, August 2011 (CORE1061)

Summary: The GAO report discusses actions the US Coast Guard and the Federal Bureau of Investigation (FBI) have taken to strengthen security of energy tankers and offshore energy infrastructure – that produces, transports, or receives oil and natural gas – from terrorist attacks. The report’s key recommendation is that the Coast Guard need to assess risks to all offshore facilities in the US territorial waters, to improve emergency response plans in case of oil spills and to design performance measures for emergency response activities. This GAO document focuses on a rather narrow field of critical infrastructure, the US maritime energy infrastructure, which is not in the CORE’s scope. The CORE’s risk cluster might consider useful the description how the Coast Guard has applied its Maritime Security Risk Analysis Model (MSRAM) to determine risk of the US maritime energy infrastructure. The report is available for download at: www.gao.gov/new.items/d11883t.pdf.

[s2If is_user_logged_in()]

Full review: This GAO document is not very relevant to CORE because of its topic (the US maritime energy infrastructure) that is not within the CORE’s scope. Even so, the risk cluster, the IT cluster and the demonstrations on maritime transport might consider useful of the insight this report offers on security risk assessment.

Cross-references:

  • Maritime Security: Actions Needed to Assess and Update Plan And Enhance Collaboration among Partners Involved in Countering Piracy off the Horn of Africa. GAO-10-856. Washington, D.C.: September 24, 2010.
  • Critical Infrastructure Protection: Update to National Infrastructure Protection Plan Includes Increased Emphasis on Risk Management and Resilience. GAO-10-296. Washington, D.C.: March 5, 2010.
  • Quadrennial Homeland Security Review: 2010 Reports Addressed Many Required Elements, but Budget Planning Not Yet Completed. GAO-11-153R. Washington, D.C.: December 16, 2010.

Additional keywords: Critical infrastructure protection (CIP), maritime security and security of supply

 

CORE1061

[/s2If]

 

SUPPLY CHAIN SECURITY – CBP Needs to Enhance Its Guidance and Oversight of High-Risk Maritime Cargo Shipments, GAO, January 2015 (CORE1059)

Summary: The report reviews the US Customs and Border Protection’s (CPB) approach to risk assessment and targeting of maritime shipping containers. The report’s highlights that CPB does not have clear decision rules and reporting procedures to monitor percentage of containers that the risk assessment system flags high-risk and that get eventually examined. The source of this problem is that the CPB’s officials (targeters) may waive examination of the high-risk containers if the container (i) falls within a predetermined category (standard exception), or (ii) the targeters can articulate why the shipment should not be considered high risk. The targeting units have currently differing definitions of “standard exceptions” and differing views on what constitutes the “articulate reasons.” The GAO report recommends the CPB to clarify, harmonize and enforce the rules and the procedures for waiving the high-risk containers from examination. As for CORE, this report provides a detailed and recent outlook on the US maritime risk assessment and targeting scheme, and this information is going to support work of the CORE’s risk cluster and the demonstrations that involve shipping of sea containers into the US. The report is available for download at: www.gao.gov/assets/670/668098.pdf.

[s2If is_user_logged_in()]

Full review: This GAO reports contains crucial information about the US risk assessment and container targeting systems that benefit the CORE’s risk cluster. The report outlines principles, procedures, datasets and scanning methods that constitute the world’s most advanced risk assessment system for maritime shipping containers. The CORE’s IT cluster might also benefit from the report’s description of the CPB’s Automated Targeting System (ATS) that is used to compute risk scores for shipping containers and flag the ones with the highest score as high-risk. Regarding the CORE demonstrations, the GM demon (WP19) must comply with data requirements (24-hour rule and the “10+2” rule) that enable the US risk assessment and targeting system. Also the demos involving customs controls, especially WP11.2 and WP10.1, may learn something from the ways how the US border control authorities are assessing risk levels of incoming containers.

Cross-references:

  • Supply Chain Security: CBP Needs to Conduct Regular Assessments of Its Cargo Targeting System. GAO-13-9. Washington, D.C.: October 25, 2012.
  • Maritime Security: Progress and Challenges in Key DHS Programs to Secure the Maritime Borders. GAO-14-196T. Washington, D.C.: November 19, 2013.
  • Supply Chain Security: Feasibility and Cost-Benefit Analysis Would Assist DHS and Congress in Assessing and Implementing the Requirement to Scan 100 Percent of U.S.-Bound Containers. GAO-10-12. Washington, D.C.: October 30, 2009.

Additional keywords: Security Filing and Additional Carrier Requirements (known as the 10+2 rule), 24-hour rule, risk assessment

 

CORE1059

[/s2If]

TRANSPORTATION SECURITY INFORMATION SHARING – Stakeholder Satisfaction Varies; TSA Could Take Additional Actions to Strengthen Efforts, GAO, June 2014 (CORE1020)

Summary: This report presents and discuses findings of a survey on stakeholders’ satisfaction to the US Transportation Security Administration’s security-related activities and to the way the TSA disseminates information about its activities. The survey’s scope is the overall US transportation system, covering aviation, rail, and highway modalities and transport of passengers and freight. Given the broad scope and the US-centricity of the survey, this report is not very relevant for CORE. The education and training cluster could anyhow learn how security-related user satisfaction surveys are done and how to establish a mechanism for collecting regular user feedback. The report is available for download at: http://gao.gov/assets/670/664350.pdf.

[s2If is_user_logged_in()]

Full review: The scope of the report is very broad and the information about cargo security is limited, so the CORE project cannot much benefit from this report. However, the project’s educational and training cluster might use the report’s information to design ways administer end-user surveys: what questions to ask, which stakeholders to survey and how to report the findings. Some demonstrations adopt some of the report’s ideas and methods to collect high-quality user requirements.

Additional keywords: Transportation security, aviation security

 

CORE1020

[/s2If]

MARITIME SECURITY – Progress and Challenges with Selected Port Security Programs, GAO, June 2014 (CORE1019)

Summary: The report provides a comprehensive review of progress and challenges of various port security activities and programs the Department of Homeland Security (DHS) has carried out since 9/11. In essence, the report is a summary and an update of a number of more detailed GAO reports on maritime supply chain security. The report states that needs to strengthen further its efforts on maritime domain awareness through intensified communication among maritime stakeholders. Regarding the US domestic port security, the report recommends DHS to reassess its Port Security Grant Program (PSGP) that allows ports to request funds for security projects and to improve quality of vulnerability assessment in US ports. The report also urges DHS to overcome challenges of risk-based targeting and scanning of US-bound shipping containers.  The findings and recommendations of this report help CORE consortium understand the current state of the US maritime security regime. This understanding benefits particularly the demonstrations of WP9 and WP14. Also educational and training as well as risk clusters of CORE may find the report’s information useful. The report is available for download at: www.gao.gov/assets/670/663784.pdf.

[s2If is_user_logged_in()]

Full review: This GAO document summarizes the US maritime supply chain security and provides useful information for the CORE project across its work packages. This information most obviously benefits WP9 and WP14 that involve US-bound maritime trade lanes. However, also the CORE’s risk cluster can find useful insight in the report, for example about challenges and opportunities of risk-based container targeting and screening approaches. This summary GAO document caters the needs of state-of-the-art work packages and the CORE’s educational and training cluster that aims to produce relevant and up-to-date material about supply chain security for a variety of stakeholders.

Cross-references:

  • Combating Nuclear Smuggling: Additional Actions Needed to Ensure Adequate Testing of Next Generation Radiation Detection Equipment. GAO-07-1247T. Washington, D.C.: September 18,
  • Supply Chain Security: CBP Has Made Progress in Assisting the Trade Industry in Implementing the New Importer Security Filing Requirements, but Some Challenges Remain. GAO-10-841. Washington, D.C.: September 10, 2010.
  • Supply Chain Security: CBP Needs to Conduct Regular Assessments of Its Cargo Targeting System, GAO-13-9. October 25, 2012.

Additional keywords: Maritime security, Port Security Grant Program (PSGP), risk-based controls, targeting, container scanning

 

CORE1019

[/s2If]

MARITIME SECURITY – Progress and Challenges in Key DHS Programs to Secure the Maritime Borders, GAO, November 2013 (CORE1018)

Summary: This report is a summary of previous GAO reports on US maritime supply chain security and border controls. The report focuses on progress and challenges in four main areas of the Department of Homeland Security’s (DHS) activity on the maritime security. The report highlights that DHS and its component Coast Guard agency could improve its maritime domain awareness through increased information sharing and more advanced vessel-tracking systems. The Customs and Border Protection (CBP) in turn could step up its role in securing US-bound container traffic by conducting more frequent risk assessment audits in key foreign ports that ship cargo into the US and by fostering more close relationship with foreign authorities. The GAO report also recommends the Coast Guard to rethink its maritime surveillance, interdiction and security operations because current protection and support is not adequate in high priority locations. The report also calls for more collaboration and coordination among maritime authorities, port operators and ocean carriers. Finally, the report encourages the DHS to develop performance metrics and data collection procedures the agency uses to assess and monitor its maritime security programs and activities. This report gives a recent update on the US maritime security activities that might be helpful for CORE demonstrations and clusters. The report is available for download at: www.gao.gov/assets/660/659087.pdf.

[s2If is_user_logged_in()]

Full review: This summary GAO documents provides detailed background material about the US maritime security programs. This information is very relevant for the CORE demonstrations WP9 and WP14 that involve shipping cargo from and into the US. The information this document offers also help the CORE’s risk and IT clusters to learn lessons from the US approach to risk-based maritime security and security-related IT integration.

Cross-references:

  • Maritime Security: Ferry Security Measures Have Been Implemented, but Evaluating Existing Studies Could Further Enhance Security. GAO-11-207. Washington, D.C.: December 3, 2010.
  • Supply Chain Security: DHS Could Improve Cargo Security by Periodically Assessing Risks from Foreign Ports. GAO-13-764. Washington, D.C.: September 16, 2013.

Additional keywords: Maritime security, maritime surveillance, risk-based controls, targeting, container scanning

 

CORE1018

[/s2If]

 

MARITIME SECURITY – Ongoing U.S. Counterpiracy Efforts Would Benefit From Agency Assessments, GAO, June 2014 (CORE1017)

Summary: This GAO report explains how the US government agencies have fought sea piracy around the Horn of Africa and at the Gulf of Guinea since 2010. The report also describes the current state of sea piracy threats in these two areas, and it urges US government agencies to reconsider their resource allocations, strategies and tactics related to the counterpiracy efforts. The report points out that the number of annual piracy incidents at the Gulf of Guinea has surpassed the yearly incidents off the Horn of Africa. This shift in pirate attacks prompt changes in the US counterpiracy operations. However, as the report points out, the US government agencies responsible for the counterpiracy activities have not recently conducted reassessments of their actions, despite the changing conditions. The report therefore recommends the US government agencies to re-evaluate the counterpiracy efforts, especially at the Gulf of Guinea that is becoming the most important hotspot of the international sea piracy. This GAO report provides information about modern sea piracy from which CORE’s maritime demonstrations might benefit. The report is available for download at: www.gao.gov/assets/670/664268.pdf.

[s2If is_user_logged_in()]

Full review: This GAO report delivers a comprehensive analysis of the current state of sea piracy at the two African hotspots and the US government’s counterpiracy efforts. This information benefits those CORE demonstrations that involve maritime shipping. The detailed description of the US counterpiracy efforts might also inspire the risk cluster to find effective and efficient risk-based solutions to protect maritime logistics and transport from sea piracy.

Cross-references:

  • Maritime Security: Federal Efforts Needed to Address Challenges in Preventing and Responding to Terrorist Attacks on Energy Commodity Tankers. GAO-08-141. Washington, D.C.: December 10, 2007.
  • Maritime Security: Actions Needed to Assess and Update Plan and Enhance Collaboration among Partners Involved in Countering Piracy off the Horn of Africa. GAO-10-856. Washington, D.C.: September 24, 2010.

Additional keywords: Maritime security, sea piracy

 

CORE1017 

[/s2If]

 

Review of TAPA TACSS – Air Cargo Security Standards, 2012 (CORE1045)

Summary: TAPA TACSS – Air Cargo Security Standards (TACSS) is a certifiable security program for the air cargo industry to close down, as much as possible, all risks for high value freight whilst being handled and transported on the ground. Available to General Public at the TAPA Website, this standard is hyperlinked here: https://www.tapaemea.com

[s2If is_user_logged_in()]

Full review: The Transported Asset Protection Association (TAPA) is a self-funded industry group comprising of manufacturers, shippers, logistics providers and law enforcement agencies that share the objective to eliminate loss of product by criminal act. The theft of high value, high risk products moving in supply chains in Europe costs businesses in excess of € 8.2 billion a year.

Although the focus of TAPA is to stop the unauthorized removal of items from the logistics chain, many of the methods used by criminals to achieve this are entirely relevant to the other security threats seen within the industry. E.g. unauthorized entry, deception techniques, tampering of shipments etc.  TAPA has created a number of certifiable security standards:

  • FSR (Freight Security Requirements)
  • TSR (Trucking Security Requirements)
  • PSR (Parking Security Requirements)
  • TACSS (TAPA Air Cargo Security Standards)

The latter one, TACSS is a set of security standards designed specifically for Air Cargo Handling Facilities. It takes into account the mode of operation of such terminals often having open doors, and yet often operating inside a secure area within an airport, behind a fence. By providing comprehensive requirements and a certification scheme for the protection of air cargo whilst being transported on the ground, TAPA hopes to provide its own members and industry partners with viable options for improving and/or maintaining an effective air cargo security program.

There are two levels to the Standard. Level 1 & Level 2, with 1 being the higher level of security, and the decision of which Level to certify against is decided by risk assessment which takes into account the geographical location of the facility and crime levels in the area. Certification is by Independent Validator against a checklist and valid for 2 years.

Detailed analysis of relevance for CORE: The CORE implementation objectives, which specify what will be done and how to reach the vision, are all subject to the Policies, Regulations, and Standards that exist within the Security Domain of the Global Supply Chain. Among all Work Packages of the project, some are directly impacted by the project, while others are solely primarily or secondarily contributed. Among these Work Packages, the CORE demonstrators will validate the applicability and benefits of the CORE approach in representative operating scenarios characteristic of the global supply chain. They will specifically show the way towards a Global Secure Supply Chain. The overriding goal is to demonstrate substantial gains in security and facilitation covering every major facet of the supply chain security sector.

The following Work Packages are directly impacted by the TACSS initiative:

  • WP7: CORE Connectivity Infrastructure and Solutions Development Environment – provide an integrated set of tools for developing solutions for the Demonstrators in line with SCSRF utilizing results from reference projects particularly e-Freight and ICargo.
  • WP12: Demonstrator Schiphol – apply global data pipeline concept to air cargo supply chains, managing air freight specific trade compliance requirements, and offering supply chain visibility in dashboards. Trade lanes with e.g. Africa, involving multiple inspection authorities.
  • WP17: DHL Demonstrator – managing airfreight trade compliance requirements EU-US in the context of fast supplying of parts. In this demonstrator, TAPA TACSS and mutual recognition with the US will become evident.

The following Work Packages are primarily affected by TAPA TACSS, as airfreight is part of global supply chain:

  • WP14: Demonstrator FALACUS – FastLAne through CUStoms – implement an extensive supply chain of ceramics products along international corridors between Italy and USA.
  • WP15: Decathlon Demonstrator – operational and security related Key Performance Indicators (KPIs) within the CORE framework will be applied to monitor the overall level of security within the supply chain for different supply chain actors Taiwan to retail shop destinations across Europe implementation of this new transit modality and the impact it would have on the overall performance of the supply chain.
  • WP19: Stakeholder Engagement – Knowledge Diffusion and Sustainable Development – Specify and apply an inclusive Stakeholder Engagement Strategy emphasizing international co-operation to promote harmonization of regulations, and to support further development and implementation of international standards.

The TACSS Initiative could also help with the following Work Packages, with the following secondary effects:

  • WP3: Multi-method Threat and Vulnerability Analysis (MTVA) Suite
  • WP4: SC Situational Awareness Tools & Maps
  • WP5: Real-time Lean Agile Resilient Green Optimized (LARG+O) SC
  • WP16: ENI Demonstrator
  • WP22: Analysis and Testing of a Secure Hybrid Composite Container

CORE Impact anticipation: CORE seeks to give consolidated solutions and develop the resilience, optimization and interoperability of the global supply chain, including Port, Container, Post, Truck, Rail, Maritime and Air. Air freight is thence a part of the global vision of CORE. TAPA TACCS contributes thence directly to CORE vision. Impact?

Cross-references: Air Cargo World on TAPA TACSS and air cargo crimes: www.aircargoworld.com

Full citation: TAPA EMEA Website, TACSS Page, accessed 23 September 2014: https://www.tapaemea.com

 

CORE1045

[/s2If]