Secure container transport: challenges & barriers in the complete stakeholder chain

Size: px
Start display at page:

Download "Secure container transport: challenges & barriers in the complete stakeholder chain"

Transcription

1 Secure container transport: challenges & barriers in the complete stakeholder chain Theodoros Theodoropoulos (SEAbility Ltd) 1 st Training Workshop 19 November 2014, Valencia, Spain

2 Overview Introduction The container transport chain Threat assessment Container security measures Wrap-up and conclusions

3 Introduction Transport authorities face several criminal and terrorist related challenges theft of goods and vehicles Fraud Potential misuse by terrorists illegal immigration Drugs

4 Introduction These threats cause Daily problems to authorities Impacts on the transport sector s ability To ensure the efficient flow of goods within the national and international marketplace

5 Introduction Multiple types of containers exist Maritime aviation and Swap Bodies for road-rail Focus will be made on maritime! Why?

6 Introduction Because essential component of global trade highly efficient relatively safe and reliable means of global goods transport across modes Maritime shipping containers are the most numerous container types involved in international trade truly intermodal in that they are carried by maritime, inland waterway, road and rail operators They are everywhere!

7 Introduction Security measures must be designed in a fashion so that costs of higher security can be recovered, at least partially, through greater efficiencies in the supply chain Improved security and integrity of the transport chain can reduce the danger of tampering and direct costs of theft losses automated customs inspection with timely transmission of accurate information can improve efficiency of customs control and lower direct costs of customs clearance

8 Overview Introduction The container transport chain Threat assessment Container security measures Wrap-up and conclusions

9 The container transport chain Difficulty with respect to security Container transport space is fragmented complex interactions among a great multitude of actors, industries, regulatory agencies, modes, operating systems, liability regimes, legal frameworks These actors are coordinated with respect to efficiency. HOWEVER trade-focused evolution of the container transport system has led to the existence of a number of security vulnerabilities that might be exploited

10 The container transport chain Container types Dry box tank containers for gaseous or liquid cargoes open frame containers for transporting odd-sized consignments soft-top containers reefers

11 The container transport chain Vulnerabilities per type Full tank containers: Not easily scanned, difficult to visually check, can contain harmful substances, dispersal platforms for chemical/biological agents Reefers: insulated walls and refrigeration equipment can be used to disguise explosive devices open-top containers are vulnerable to un-authorised access via the tarpaulin covering the top.

12 The container transport chain World traffic

13 The container transport chain If there are security concerns relating to the use of maritime shipping containers, it is because these have become so tremendously popular and ubiquitous in the world trading system!

14 The container transport chain The container transport chain, in aggregate, is a massive integrating network millions of shippers thousands of intermediaries to organizing and carrying goods hundreds of ports dozens of maritime carriers Visibility and transparency decreases at each step out of the port

15 The container transport chain No central system to co-ordinate security functions Each actor responsible of deploying security measures Even if security measures are deployed at each actor s level, this does not guarantee Compatibility of information management systems Coordinated regulatory frameworks clear security continuity protocols

16 The container transport chain Large presence of small and medium enterprises operating within the system especially at its outer bounds. It is not so much the size per se of shippers, forwarders, intermediaries and carriers (especially road carriers) that is cited as a vulnerability, but rather their limited resources and motivation to bolster security measures

17 The container transport chain Where to intervene in the container transport chain to secure it? Traditionally at the core of the system: large intermediaries, major carriers and natural chokepoints. However a wider umbrella of actors must be included in order to establish an auditable trail of existing security measures Add new measures if required

18 The container transport chain: actors Analysis of the actors and flows is required in order to enable the creation of an enhanced security framework. Each actor should participate in the creation of the security framework. Also collaboration mechanisms should be setup

19 The container transport chain: actors Seller-buyer Initiate containerized moves Seller could be the shipper shippers and buyers have detailed knowledge of the transaction leading to the shipment of the container Shippers usually are the only actor in the chain with detailed firsthand knowledge of the goods placed into a container Shippers are usually smes must be included in the security framework relative lack of resources available, and/or motivation, to implement security measures must be taken into account

20 The container transport chain: actors Freight forwarders visibility over the entire container transport chain are also characterized by a significant number of SMEs that may not be in a position to implement cumbersome or costly security measures Transport operators significant number of transport operators in the container transport chain are SMEs the first mile and last mile are the most vulnerable as carriage is often undertaken by small entrepreneurs unable and/or unwilling to implement effective security measures.

21 The container transport chain: actors Transport authorities responsible for vehicles, drivers and operators (and their facilities Custom authorities responsible for the contents of the container Port/terminal operators world s top 20 ports handled 48% of all port container moves in 2002, and the top 40, nearly 63%. Maritime carriers Transport chain concentrator

22 The container transport chain: physical flow The physical movement of the container and its contents from place to place and from mode to mode Important to know: how it has travelled, where it can be found and whether its integrity has been compromised The risk of a security breach at any one of its links (modes), compromise the security of the entire chain

23 The container transport chain: physical flow Security concerns related to the physical flow originating shipper has a critical role to play in the container security by generating a clear, accurate and complete inventory of the physical contents of the container Proper site security, stuffing procedures and oversight of the stuffing process are necessary for this important link in the chain to be secure

24 The container transport chain: physical flows Containers are most vulnerable to being tampered with when they are at rest and least vulnerable when they are in motion Especially at nodes of the network where the container is handled and/or stored (Land side border crossings) Containers travelling via certain modes are more vulnerable than others. Road carriage less safe in contrast to maritime

25 Training workshop, Sevilla -06/11/2013

26 The container transport chain: information flows Generating, receiving and processing information related to the container transport the examination and cross-examination of these flows that can reveal discrepancies indicating terrorist and/ or criminal involvement Big amount of data + non uniform handling (paper, mails, proprietary interfaces) makes cross referencing difficult

27 The container transport chain: information flows Security relevant highlights Security-relevant information generated early on in the commercial contracting and documentary credit cycles is not used by Customs. Early access to this information could facilitate and otherwise improve Customs security screening of container When looking at the entire container transport chain lack of messaging interoperability is still the rule and not the exception. Especially when considering the outer bounds of the system

28 Overview Introduction The container transport chain Threat assessment Container security measures Wrap-up and conclusions

29 Threat assessment Containers have been misused in order to smuggle drugs, contraband goods and even people Criminals have found ways in response to authority vigilance Will they use the container transport system be used in order to deliver a CBRN weapon?. Difficult to answer An assessment must be made in order to analyze such a scenario

30 Threat assessment: Methodology The threat assessment analysis must take the following into consideration Type of the threat Vulnerabilities of the system Criticality Risk Such an assessment is essential when considering measures that are costly and trade-unfriendly measures

31 Threat assessment: Risk Example: Would the container system be used as a delivery vehicle for a weapon of mass destruction? No evidence that it has happened. Considerable evidence that terrorists and rogue states have used shipping containers in support of their actions. Therefore it they used it as a delivery mechanism that would probably mean the end of using it for other supportive actions as the counter-measures would likely shut off all other possibilities Moreover would they choose the container transport system instead of other means?

32 Threat assessment: Type Use the container transport to deliver a CBRN weapon or to purchase the components needed for developing weapons? As mentioned previously most likely the second Relative programs include the US Second Line of Defence

33 Threat assessment: Vulnerabilities

34 Overview Introduction The container transport chain Threat assessment Container security measures Wrap-up and conclusions

35 Container security measures: Overall Scan or otherwise physically confirm the contents of the container Measures seeking to ensure the physical integrity of the container. Measures aimed at ensuring the security of the container environment Measures seeking to track and trace the container in the supply chain. Measures centred on the provision, and use of, information related to the shipment.

36 Container security measures: assessment

37 Container security measures: scanning Scanning: Theoretically a two step process Screening: Assessment of the need for scanning on the basis of available information Scanning: Physical act of inspecting the container contents

38 Container security measures Screening methodology Establish security criteria for identifying high-risk containers based on advance information. Pre-screen containers at the earliest possible point. Use technology to quickly pre-screen high-risk containers. Develop secure and smart containers. Send officials to foreign countries to perform the screening

39 Training workshop, Sevilla -06/11/2013

40 Container security measures Scanning cnt d Non-Intrusive Inspection (NII) devices such as X-ray scanners Physical inspection if image quality is not sufficient Sophisticated SW or experienced personnel is required in order to identify chemical, biological, radioactive or nuclear materials. Instrumentation and equipment costs but could be combined with the effort to avoid smuggling and increase tax collection

41 Container security measures: container integrity Container integrity Indicative mechanical seals Secured mechanical seals Mechanical seals: high-security seals Electronic seals Smart and safe containers

42 Container security measures: secure environment Securing the container environment Usually considered from the inland and away from port environment unsecured rail yards road stops shipping/loading interchange terminal facilities

43 Container security measures: secure environment Border crossings variable QoS Lack of or insufficient computer equipment Inadequate x-ray verification capacity. Poor co-ordination among authorities responsible for the border verifications. Lack of respect for the TIR procedures Insufficient number of customs personnel Unethical corrupt behaviour

44 Container security measures: secure environment Securing the container environment measures: intermodal facilities should be physically secured to minimise the risks ofunauthorised access Employment of technologies such as smart cards as access control cards, biometric authentication, CCTV cameras, etc Re evaluation of security in road transport

45 Container security measures: tracking Container tracking Collaboration for carrier-industry/government tracking Real time data are great but right time data are better Aggregated information such as: a container was late arriving at a checkpoint and know who the last carrier was and how they may be contacted Take advantage of technology Low cost GNSS devices are emerging

46 Container security measures: intelligence Trading document and process visibility

47 Container security measures: intelligence Trading document and process visibility the party responsible for generating security-relevant data provides that data to Customs when the data is first generated incorporate and/or communicate proprietary information to the principal agency in charge of screening containerized consignments

48 Conclusion Transport authorities must address weak links of the container transport chain More specific threat assessments involving Transport authorities needed Security measures must be adapted to the threat Policy levers at the disposal of Transport authorities Guiding principles to secure the container transport chain Specific recommendations to inland Transport and Maritime authorities

49 Thank You Theodoros Theodoropoulos (SEAbility Ltd) 3 rd Training Workshop 19 November 2014, Valencia, Spain

Security platforms for logistics operations in MED ports

Security platforms for logistics operations in MED ports Security platforms for logistics operations in MED ports Theodoros Theodoropoulos (SEAbility Ltd) 3rd Inte-Transit Training 19 November 2014, Valencia, Spain Overview Introduction-Legal framework Port

More information

3.5 Advanced Inspection Technologies (AIT)

3.5 Advanced Inspection Technologies (AIT) 3.5 Advanced Inspection Technologies (AIT) Before inspection technologies can be further discussed, a baseline definition must be established for the three types of inspections that are commonly used when

More information

Proactive Approaches. To Minimize. Supply Chain Security. Breaches in the Rail, Air, Ocean and Land Environment

Proactive Approaches. To Minimize. Supply Chain Security. Breaches in the Rail, Air, Ocean and Land Environment Proactive Approaches To Minimize Supply Chain Security Breaches in the Rail, Air, Ocean and Land Environment Top Eight Rail Principles Track and monitor pulls on a 24 hour basis to determine location and

More information

SEAL INTEGRITY PROGRAMME APPENDIX TO ANNEX I FRAMEWORK OF STANDARDS TO SECURE AND FACILITATE GLOBAL TRADE

SEAL INTEGRITY PROGRAMME APPENDIX TO ANNEX I FRAMEWORK OF STANDARDS TO SECURE AND FACILITATE GLOBAL TRADE SEAL INTEGRITY PROGRAMME APPENDIX TO ANNEX I FRAMEWORK OF STANDARDS TO SECURE AND FACILITATE GLOBAL TRADE APPENDIX TO ANNEX 1 SEAL INTEGRITY PROGRAMME FOR SECURE CONTAINER SHIPMENTS INTRODUCTION Importance

More information

By Dimitrios Tsamboulas National Technical University of Athens (NTUA)

By Dimitrios Tsamboulas National Technical University of Athens (NTUA) Inland Transport Security Discussion Forum OSCE-UNECE Roundtable 13 December 2011, Vienna, Austria By Dimitrios Tsamboulas National Technical University of Athens (NTUA) Timely and important topic Growing

More information

Customs and the use of technology to secure global supply chain

Customs and the use of technology to secure global supply chain Customs and the use of technology to secure global supply chain European Commission Directorate General for Wil van Heeswijk Unit B2 Risk management and Security 1 Facts & Figures 119.000 control officers

More information

Security of the supply chain Specific focus on air transportation. Interest of industrial platforms

Security of the supply chain Specific focus on air transportation. Interest of industrial platforms Security of the supply chain Specific focus on air transportation Interest of industrial platforms November 9 th, 2006 Presentation to the EURITRACK workshop Page 1 Cargo Flows & process (Stakeholders)

More information

Air Cargo & Air Supply Chain Security : Perspective From Integrators

Air Cargo & Air Supply Chain Security : Perspective From Integrators Air Cargo & Air Supply Chain Security : Perspective From Integrators Introduction The September 11 terrorist attacks in the US in 2001 has changed the whole concept of Aviation Security and has affected

More information

Utmaningar och transportskydd i framtida transportsystem. Sören Jägerhök och Åsa Waern

Utmaningar och transportskydd i framtida transportsystem. Sören Jägerhök och Åsa Waern Utmaningar och transportskydd i framtida transportsystem Sören Jägerhök och Åsa Waern Supply Chain Security Supply chain security refers to efforts to enhance the security of the supply chain, the transport

More information

CURRENT SECURITY ENVIRONMENT

CURRENT SECURITY ENVIRONMENT Border Crossings Muhammad Anwar, CMILT Chief Executive Custom Syndicate (International Logistics Solutions Providers) Lahore-Pakistan www.customsyndicate.com OBJECTIVES To provide a better understanding

More information

Intelligent logistics from the entrepreneurial perspective

Intelligent logistics from the entrepreneurial perspective Intelligent logistics from the entrepreneurial perspective Marc Huybrechts, President CLECAT International Maritime Congress, Szczecin, Poland 13 June 2013 Agenda CLECAT Our role Globalisation and trade

More information

Global Trade Digitization

Global Trade Digitization Global Trade Digitization Overview of offering May 2018 The cost, size, and complexity of the world s trading ecosystems continue to grow More than $16 trillion in goods are shipped across international

More information

Maritime Security Council. AfrICANDO Security for Africa s Road & Rail Transportation Infrastructure

Maritime Security Council. AfrICANDO Security for Africa s Road & Rail Transportation Infrastructure Maritime Security Council L AfrICANDO 2010 Security for Africa s Road & Rail Transportation Infrastructure DoubleTree Grand Hotel Biscayne Bay Miami, Florida September 28, 1010 Presentation Objective This

More information

LogiC n. Our Partners LEAN SECURE RELIABLE. and LOGISTIC ULMAR CONNECTIVITY. To Get More Visit: for. SMEs

LogiC n. Our Partners LEAN SECURE RELIABLE. and LOGISTIC ULMAR CONNECTIVITY. To Get More Visit: for. SMEs Our Partners I m p r o v e d i n f o r m a t i o n h a n d l i n g a n d / o r d a t a e x c h a n g e w i t h m o r e e ffi c i e n t c a r g o h a n d l i n g a n d p r o c e s s i n g. LEAN SECURE and

More information

TRADELENS OVERVIEW MARTIN HAGELSTROM BLOCKCHAIN LEADER IBM LATIN

TRADELENS OVERVIEW MARTIN HAGELSTROM BLOCKCHAIN LEADER IBM LATIN TRADELENS OVERVIEW MARTIN HAGELSTROM BLOCKCHAIN LEADER IBM LATIN AMERICA @MHAGELSTROM 24-Aug-18 2 IBM AND MAERSK HAVE LAUNCHED TRADELENS An open and neutral supply chain platform poised to transform the

More information

Supply Chain Security Management Systems The ISO Link

Supply Chain Security Management Systems The ISO Link Supply Chain Security Management Systems The ISO 28000 Link Topics Security threats, risks and vulnerabilities Impact on Business Initiatives in the Region. ISO 28000 Family of Standards Who s got ISO28000

More information

Rail Carrier Minimum-Security Criteria

Rail Carrier Minimum-Security Criteria Rail Carrier Minimum-Security Criteria (08/28/2006) Rail carriers must conduct a comprehensive assessment of their security practices based upon the following C-TPAT minimum-security criteria. Recognizing

More information

Secure and Transparent Cargo Supply Chain: Enabling Chain-of-Custody with Economical and Privacy Respecting Biometrics, and Blockchain Technology

Secure and Transparent Cargo Supply Chain: Enabling Chain-of-Custody with Economical and Privacy Respecting Biometrics, and Blockchain Technology Secure and Transparent Cargo Supply Chain: Enabling Chain-of-Custody with Economical and Privacy Respecting Biometrics, and Blockchain Technology 1 Project Team Profile PI: Larry Shi, University of Houston

More information

AAPA. Terminal and Container Cargo Security. Mark Tierney Senior Director Security and Compliance Maersk Inc

AAPA. Terminal and Container Cargo Security. Mark Tierney Senior Director Security and Compliance Maersk Inc AAPA Terminal and Container Cargo Security Mark Tierney Senior Director Security and Compliance Maersk Inc A.P. Moller is committed to show constant care and to prevent breaches of security associated

More information

European Union Customs approach towards the use of modern technologies

European Union Customs approach towards the use of modern technologies European Union Customs approach towards the use of modern technologies Wil van Heeswijk Directorate General for Taxation and Customs Union Risk management and Security unit 1 My topics for today 1. 1.

More information

Best practices of digital technology application in transport facilitation and logistics

Best practices of digital technology application in transport facilitation and logistics 교통물류연구사업중간평가 2016.05.19 Regional Conference for Logistics Service Providers Best practices of digital technology application in transport facilitation and logistics Busan, ROK, 21. June. 2018. Kerri Ahn

More information

MARITIME COMMERCE SECURITY PLAN FOR THE NATIONAL STRATEGY FOR MARITIME SECURITY

MARITIME COMMERCE SECURITY PLAN FOR THE NATIONAL STRATEGY FOR MARITIME SECURITY MARITIME COMMERCE SECURITY PLAN FOR THE NATIONAL STRATEGY FOR MARITIME SECURITY OCTOBER 2005 FOREWORD By signing National Security Presidential Directive 41/Homeland Security Presidential Directive 13

More information

Security for dangerous goods

Security for dangerous goods RiR 2008: 29 Summary Security for dangerous goods Summary According to the Swedish Emergency Management Agency, acts of terrorism involving chemical, biological or radioactive substances constitute one

More information

A guide to incoterms 2011

A guide to incoterms 2011 A guide to incoterms 2011 What is an incoterm? Sales term incorporated within the contract of sale It impacts on the contract of carriage Inco terms identify the obligations placed on the parties to the

More information

Jens Froese Technische Universität Hamburg-Harburg. Harburg. Bangkok 27 th October Container Security TUHH TUHH. Maritime Logistics

Jens Froese Technische Universität Hamburg-Harburg. Harburg. Bangkok 27 th October Container Security TUHH TUHH. Maritime Logistics Jens Froese Technische Universität Hamburg-Harburg Harburg Bangkok 1 Shipping Threats 2 Shipping Threats Challenges to container security include attacks to truck drivers illegal immigration illegal transport

More information

Open global trade digitization platform

Open global trade digitization platform Open global trade digitization platform Overview of offering January 2018 On January 16, IBM and Maersk announced plans to form a join venture to improve global trade and digitize supply chains (Subject

More information

Foreign Manufacturer Eligibility Requirements

Foreign Manufacturer Eligibility Requirements Foreign Manufacturer Eligibility Requirements (04/07/2008) To be eligible for C-TPAT, the Foreign Manufacturer must meet the following eligibility requirements: 1. Be an active Manufacturer incorporated

More information

Customs-Trade Partnership Against Terrorism

Customs-Trade Partnership Against Terrorism Customs-Trade Partnership Against Terrorism (C-TPAT) 2 CBP Presence... Over 30,000 uniformed officers protecting over 96,000 miles of U.S. Borders. 18,000 CBP Officers 12,000 Border Patrol Agents On a

More information

A Message for Brokers Letter And Security Guidelines for Brokers

A Message for Brokers Letter And Security Guidelines for Brokers A Message for Brokers Letter And Security Guidelines for Brokers Kingchem LLC is a participant in the Customs-Trade Partnership Against Terrorism (C-TPAT). C-TPAT is a voluntary joint government-business

More information

Global Trade Digitization

Global Trade Digitization IPCSA Annual Conference November 207 Henrik Hvid Jensen, Maersk Line Product Manager Document subject to frequent revisions Border related costs are higher than transport costs for international trade

More information

The port as an enabler of the smart grid. Theodoros Theodoropoulos (SEAbility Ltd) Inte-Transit Training 19 November 2014, Valencia, Spain

The port as an enabler of the smart grid. Theodoros Theodoropoulos (SEAbility Ltd) Inte-Transit Training 19 November 2014, Valencia, Spain The port as an enabler of the smart grid Theodoros Theodoropoulos (SEAbility Ltd) Inte-Transit Training 19 November 2014, Valencia, Spain Overview Introduction Smart grid The port as a smart grid enabler

More information

Automation and Blockchain: A New Freight Distribution Paradigm for the Shipping Industry?

Automation and Blockchain: A New Freight Distribution Paradigm for the Shipping Industry? Annual Conference of the Shipping Federation of Canada, Montreal (Canada), May 22, 2018. Automation and Blockchain: A New Freight Distribution Paradigm for the Shipping Industry? Dr. Jean-Paul Rodrigue

More information

Minimum-Security Criteria for C-TPAT Foreign Manufacturers

Minimum-Security Criteria for C-TPAT Foreign Manufacturers Minimum-Security Criteria for C-TPAT Foreign Manufacturers These minimum security criteria are fundamentally designed to be the building blocks for foreign manufacturers to institute effective security

More information

Customs Trade Partnership Against Terrorism An Introduction

Customs Trade Partnership Against Terrorism An Introduction Customs Trade Partnership Against Terrorism An Introduction WHO WE ARE Securing the Borders of the United States while simultaneously facilitating the flow of legitimate trade & travel It s a challenging

More information

C-TPAT Security Guidelines for Air Freight Consolidators, Ocean Transportation Intermediaries and Non-Vessel Operating Common Carriers (NVOCC)

C-TPAT Security Guidelines for Air Freight Consolidators, Ocean Transportation Intermediaries and Non-Vessel Operating Common Carriers (NVOCC) C-TPAT Security Guidelines for Air Freight Consolidators, Ocean Transportation Intermediaries and Non-Vessel Operating Common Carriers (NVOCC) (04/24/2006) C-TPAT Qualifications for Air Freight Consolidators,

More information

Blockchain dal commercio globale alle PMI

Blockchain dal commercio globale alle PMI Blockchain dal commercio globale alle PMI Carlo Ferrarini IBM Blockchain Architect carlo_ferrarini@it.ibm.com @CarFerrarini 1 On January 16, IBM and Maersk announced plans to form a join venture to improve

More information

John F. Fevelo Chief Operating Officer. Metro One Loss Prevention Service Group, Inc. 900 South Ave. Staten Island, N.Y

John F. Fevelo Chief Operating Officer. Metro One Loss Prevention Service Group, Inc. 900 South Ave. Staten Island, N.Y John F. Fevelo Chief Operating Officer Metro One Loss Prevention Services Group, Inc. 900 South Ave. Staten Island, N.Y. 10314 718-370-6778 Speech Outline Delivered to the Transportation and Logistics

More information

Security Model. Jointly implement a security model within each segment of the supply chain Production Transportation Importation Distribution

Security Model. Jointly implement a security model within each segment of the supply chain Production Transportation Importation Distribution C-TPAT Membership Importers Brokers / Forwarders / Consolidators Carriers (Air, Sea, Rail, Truck) Port Authorities / Terminal Operators Foreign Manufacturers (Mexico and Canada) WHAT REALLY HAPPENS Security

More information

INTEGRATING PORTS OF THE FUTURE IN SUPPLY CHAINS: NEW PLATFORMS OF SYNERGY

INTEGRATING PORTS OF THE FUTURE IN SUPPLY CHAINS: NEW PLATFORMS OF SYNERGY INTEGRATING PORTS OF THE FUTURE IN SUPPLY CHAINS: NEW PLATFORMS OF SYNERGY Georgia Aifadopoulou Research Director Hellenic Institute of Transport HIT Centre of Research & Technology Hellas CERTH Presentation

More information

Introduction to Homeland Security

Introduction to Homeland Security Introduction to Homeland Security Chapter 5 Safety & Security: Borders and Transportation Border Control The borders of any country are strategically important because of the critical role they play in

More information

ICAO WCO JOINT WORKSHOP AIR CARGO SECURITY AND FACILITATION

ICAO WCO JOINT WORKSHOP AIR CARGO SECURITY AND FACILITATION ICAO WCO JOINT WORKSHOP AIR CARGO SECURITY AND FACILITATION 1 MODULE 4 SECURE SUPPLY CHAIN CUSTOMS AND AVSEC PERSPECTIVES 2 Module Objective Introduce concept of customs supply and secure supply chains

More information

Singapore Customs Secure Trade Partnership. Supply Chain Security

Singapore Customs Secure Trade Partnership. Supply Chain Security Singapore Customs Secure Trade Partnership Supply Chain Security Globalization and free trade will continue to be the impetus for the phenomenal growth in cargo containers transshipment that constitutes

More information

access to the world s markets. The National Conference of State Legislatures (NCSL) recognizes

access to the world s markets. The National Conference of State Legislatures (NCSL) recognizes 1 2 3 TITLE: COMMITTEE: TYPE: WATERWAYS AND PORTS TRANSPORTATION EXISTING POLICY SET TO EXPIRE 4 5 6 7 8 9 10 11 12 The U.S. system of waterways and ports provides substantial benefits to the nation by

More information

Supply Chain Security: Boeing's C-TPAT Program (Customs-Trade Partnership Against Terrorism) & Commercial Invoices

Supply Chain Security: Boeing's C-TPAT Program (Customs-Trade Partnership Against Terrorism) & Commercial Invoices Supply Chain Security: Boeing's C-TPAT Program (Customs-Trade Partnership Against Terrorism) & Commercial Invoices Ken Konigsmark & Val Parker Global Supplier Conference September 16, 2004 2 Workshop Purpose

More information

X-RAY SECURITY SCREENING SYSTEMS

X-RAY SECURITY SCREENING SYSTEMS 0418-SA23112018 X-RAY SECURITY SCREENING SYSTEMS security.adanisystems.com info@adanisystems.com PEOPLE SCREENING With continual development of our products ADANI reserves the right to make changes to

More information

LEADERS THOUGHT. More importantly, these logistics thought leaders can give you guidance when considering improvements to your business processes.

LEADERS THOUGHT. More importantly, these logistics thought leaders can give you guidance when considering improvements to your business processes. Sponsored Editorial One key step to finding answers to any logistics problem is knowing the right questions to ask. Inbound Logistics assembled a team of supply chain leaders and asked for their perspectives

More information

Discussion Paper presented at: UNECE-OSCE Roundtable on Inland Transport Security, Vienna, Austria,

Discussion Paper presented at: UNECE-OSCE Roundtable on Inland Transport Security, Vienna, Austria, Customs Perspectives on Detection of Deliberate Regulatory Violations in Global Supply Chains - the Role of Information and Data in Risk Identification Discussion Paper presented at: UNECE-OSCE Roundtable

More information

Barriers to Global Trade Through Marine Ports Country Reports

Barriers to Global Trade Through Marine Ports Country Reports Barriers to Global Trade Through Marine Ports Country Reports University of Southern California Marshall School of Business Busan, Korea November 15, 2005 China Key Findings Measures in place to inspect

More information

SECURITY OF RADIOACTIVE MATERIAL IN TRANSPORT

SECURITY OF RADIOACTIVE MATERIAL IN TRANSPORT IAEA NUCLEAR SECURITY SERIES NO. XX NST0 DRAFT, January 01 STEP : Submission to MS for comment Interface Document: NSGC, RASSC, TRANSSC 1 1 1 SECURITY OF RADIOACTIVE MATERIAL IN TRANSPORT (REVISION OF

More information

Air Carrier Eligibility Requirements

Air Carrier Eligibility Requirements Air Carrier Eligibility Requirements (04/07/2008) To be eligible for C-TPAT, the Air Carrier must the meet the following eligibility requirements: 1. Active Air Carrier transporting cargo shipments to

More information

Session 3: TRADE FACILITATION AGREEMENTS AND e-commerce. Pashupati N. Pandey World Customs Organization

Session 3: TRADE FACILITATION AGREEMENTS AND e-commerce. Pashupati N. Pandey World Customs Organization Session 3: TRADE FACILITATION AGREEMENTS AND e-commerce - Managing Data from e-commerce Industry for goods clearance at the border Pashupati N. Pandey World Customs Organization e-mail: pn.pandey@wcoomd.org

More information

Lowe s Corporate Cargo Security Guidelines for Manufacturing and Warehouse Facilities

Lowe s Corporate Cargo Security Guidelines for Manufacturing and Warehouse Facilities Lowe s Corporate Cargo Security Guidelines for Manufacturing and Warehouse Facilities Objective The purpose of this procedure is to ensure that LG Sourcing and its manufacturers and suppliers are in compliance

More information

Security Procedure - Participation / Certification in Foreign Customs Administrations Supply Chain Security Programs

Security Procedure - Participation / Certification in Foreign Customs Administrations Supply Chain Security Programs Customs-Trade Partnership Against Terrorism (C-TPAT) Minimum-Security Criteria Importers Importers must conduct a comprehensive assessment of their international supply chains, based upon the following

More information

TRADE FACILITATION IN MEXICO

TRADE FACILITATION IN MEXICO TRADE FACILITATION IN MEXICO November 2004 1 Trade Facts Mexico s trade growth within the different FTA s has been significant, becoming, on the last 10 years, one of the most dynamic, countries at a worldwide

More information

Air Cargo Systems Based on ICAO Standards that Balance Security and Trade Facilitation

Air Cargo Systems Based on ICAO Standards that Balance Security and Trade Facilitation 2005/STAR/006 Aviation Security Panel 1 Air Cargo Systems Based on ICAO Standards that Balance Security and Trade Facilitation Submitted by: ICAO Third Conference on Secure Trade in the APEC Region Incheon,

More information

Module Descriptions Computer-Based Training (CBT) Programme

Module Descriptions Computer-Based Training (CBT) Programme Module Descriptions Computer-Based Training (CBT) Programme MODULE NUMBER NAME DESCRIPTION 1 GENERAL COURSES This category includes general modules. These modules are meant for all students. Please note

More information

Maritime Security in Logistics From Japanese Shippers point of View

Maritime Security in Logistics From Japanese Shippers point of View Maritime Security in Logistics From Japanese Shippers point of View Koji Hashimoto JMC (Japan Machinery Center for Trade and Investment) September 29 th, 2011 1 Production Network (A representative case

More information

APPENDIX I Questionnaire for Pilot Study Stage I Section 1: Customs Clearance Issues and Challenges Yes/No Remarks, if any

APPENDIX I Questionnaire for Pilot Study Stage I Section 1: Customs Clearance Issues and Challenges Yes/No Remarks, if any APPENDIX I Questionnaire for Pilot Study Please identify the issues and challenges in context of outbound logistics activities of Indian Apparel Exports. Stage I Section 1: Customs Clearance Issues and

More information

ICT and e-learning in Intermodal Transport

ICT and e-learning in Intermodal Transport 1 International Project Forum Croatian - Montenegrin bilateral cooperation program in the field of science and technology ICT and e-learning in Intermodal Transport 12th October 2011, Zagreb Ivan Grgurević,

More information

Radioactive Material Transport Security. Ann-Margret Eriksson Eklund IAEA Office of Nuclear Security

Radioactive Material Transport Security. Ann-Margret Eriksson Eklund IAEA Office of Nuclear Security Radioactive Material Transport Security Ann-Margret Eriksson Eklund IAEA Office of Nuclear Security Background Focus has been on Safety The rising threat of terrorism and sabotage is now recognized and

More information

Asia-Pacific Trade Facilitation Forum: Setting the Regional Agenda

Asia-Pacific Trade Facilitation Forum: Setting the Regional Agenda Asia-Pacific Trade Facilitation Forum: Setting the Regional Agenda 25-26 November 2009 Managing Risk and Supply Chain Security: Experience and lessons learned from Pakistan Javaid Mansoor Executive Secretary

More information

SECURITY X-RAY SCREENING SYSTEMS

SECURITY X-RAY SCREENING SYSTEMS 0423-SA03012019 SECURITY X-RAY SCREENING SYSTEMS security.adanisystems.com info@adanisystems.com PEOPLE SCREENING With continual development of our products ADANI reserves the right to make changes to

More information

The Role of the South Carolina State Port Authority Police Dept. August 2009

The Role of the South Carolina State Port Authority Police Dept. August 2009 The Role of the South Carolina State Port Authority Police Dept August 2009 We provide security for $60B in cargo annually More than 30 Ocean Carriers have vessels that carry cargo between Charleston and

More information

Safety & Security. Introduction. Chemical transportation. Chemical transportation risk management. Resources. Chemical Transportation

Safety & Security. Introduction. Chemical transportation. Chemical transportation risk management. Resources. Chemical Transportation Introduction Chemical Transportation Safety & Security Chemical transportation Safety risks Security risks Chemical transportation risk management SAND No. 2011-0547C Sandia is a multi-program laboratory

More information

E Commerce. Solverminds Solutions & Technologies Pvt. Ltd.

E Commerce. Solverminds Solutions & Technologies Pvt. Ltd. E Commerce Solverminds Solutions & Technologies Pvt. Ltd. 1. Introduction In businesses around the world, e-commerce logistics represents the latest big driver of change in global business strategies.

More information

Efficiency and Sustainability in Multi-Modal Supply Chains. Jean-Paul Rodrigue Dept. of Global Studies & Geography, Hofstra University, New York, USA

Efficiency and Sustainability in Multi-Modal Supply Chains. Jean-Paul Rodrigue Dept. of Global Studies & Geography, Hofstra University, New York, USA ITF/OECD Roundtable on Balancing efficiency and resilience in management of multimodal and sustainable supply chains, April 2018 12-13, Paris (France) Efficiency and Sustainability in Multi-Modal Supply

More information

"SAFETY IN THE SEA PORTS

SAFETY IN THE SEA PORTS "SAFETY IN THE SEA PORTS Paper prepared for 22 nd Engineers International Conference At Intercontinental Hotel, Nairobi, Kenya. From 13 th - 15 TH May, 2015. MS. MARYAM MOHAMED KIDERE KENYA PORTS AUTHORITY

More information

Standards in a Digital World

Standards in a Digital World Standards in a Digital World 19 April 2019 Geneva, Palais des Nations vission http://www.unece.org/cefact UN Centre for Trade Facilitation and Electronic Business s mission is to improve the ability of

More information

E Commerce. Solverminds Solutions & Technologies Pvt. Ltd.

E Commerce. Solverminds Solutions & Technologies Pvt. Ltd. E Commerce Solverminds Solutions & Technologies Pvt. Ltd. 1. Introduction In businesses around the world, e-commerce logistics represents the latest big driver of change in global business strategies.

More information

Private IMDG - Receival and Delivery Procedures Adelaide Container Terminal

Private IMDG - Receival and Delivery Procedures Adelaide Container Terminal IMDG - Receival and Delivery Procedures Adelaide Container Terminal This document reproduces in part (less than 10%) AS 3846 1998 and is produced exclusively for in house usage. No commercial benefit or

More information

DOWNLOAD PDF REPORT REQUIRED FOR SEPARATE FREIGHT SHIPMENTS 79 62

DOWNLOAD PDF REPORT REQUIRED FOR SEPARATE FREIGHT SHIPMENTS 79 62 Chapter 1 : Tracking, Track Parcels, Packages, Shipments DHL Express Tracking For sea freight carried in FCX arrangements involving multiple suppliers a separate cargo report will be required in respect

More information

C-TPAT Minimum Security Criteria

C-TPAT Minimum Security Criteria C-TPAT Minimum Security Criteria C-TPAT Security Criteria for Importers Importers must conduct a comprehensive assessment of their international supply chains based upon the following C-TPAT security criteria.

More information

Open Global Trade Digitization Platform

Open Global Trade Digitization Platform Open Global Trade Digitization Platform G20 Global Trade Infrastructure Connectivity Alliance 25th January 2018: OECD Conference Centre, Paris January 2018 OVERVIEW should be construed in any way as a

More information

C-TPAT Minimum Security Requirements Importers

C-TPAT Minimum Security Requirements Importers Customs and Border Protection, U.S. Department of Homeland Security C-TPAT Minimum Security Requirements Importers Released March, 2005 Prepared by Prep4Audit, LLC Version 2: August, 2014 www.prep4audit.com

More information

INCOTERMS 2010 STANDARD TRADE DEFINITIONS USED IN ITERNATIONAL FREIGHT TRANSACTIONS

INCOTERMS 2010 STANDARD TRADE DEFINITIONS USED IN ITERNATIONAL FREIGHT TRANSACTIONS IMNEX FREIGHT FORWARDING & LOGISTICS INCOTERMS 2010 STANDARD TRADE DEFINITIONS USED IN ITERNATIONAL FREIGHT TRANSACTIONS IMNEX CUSTOMS CLEARANCE SOLUTIONS RUSSIA / DDP SHIPMENTS RUSSIA IMNEX INTERNATIONAL

More information

TOGETHER WE ARE THE SGS SCANNER SERVICES

TOGETHER WE ARE THE SGS SCANNER SERVICES TOGETHER WE ARE THE SGS SCANNER SERVICES Thanks to more than ten years of experience in scanner operations, SGS has developed a large team of skilled experts. This team of experts in various areas became

More information

Soft Infrastructure measures

Soft Infrastructure measures Soft Infrastructure measures Dr. Andrea Campagna Centre for Transport and Logistics Sapienza - University of Rome Outline Soft infrastructure for Green Corridors Problems to overcome Requirements from

More information

AMERICAN ASSOCIATION OF PORT AUTHORITIES Talking Points on Requiring 100% Container Scanning at Overseas Ports Updated: August 23, 2010

AMERICAN ASSOCIATION OF PORT AUTHORITIES Talking Points on Requiring 100% Container Scanning at Overseas Ports Updated: August 23, 2010 AMERICAN ASSOCIATION OF PORT AUTHORITIES Talking Points on Requiring 100% Container Scanning at Overseas Ports Updated: August 23, 2010 At a Glance Security is one of our top priorities. AAPA and its members

More information

The Port Logistic Hub: a well structured system

The Port Logistic Hub: a well structured system -1- The The Port Port Loistic Logistic Hub Hub The Port Logistic Hub: a well structured system For the plurality of jurisdictions responsible for regulating an area of prime economic importance to the

More information

Importers: C-TPAT Minimum Security Requirements

Importers: C-TPAT Minimum Security Requirements Customs and Border Protection, U.S. Department of Homeland Security C-TPAT Minimum Security Requirements Importers Released March, 2005 Restatement and Document Preparation by Prep4Audit, LLC 1 of 16 Suggested

More information

HAZMAT Identification, Control, and Emergency Response: The Fundamental Weakness in the System

HAZMAT Identification, Control, and Emergency Response: The Fundamental Weakness in the System HAZMAT Identification, Control, and Emergency Response: The Fundamental Weakness in the System The Security and Public Health Risks Today we see more and more catastrophic accidents involving hazardous

More information

CROSS-BORDER E-COMMERCE

CROSS-BORDER E-COMMERCE WCO CROSS-BORDER E-COMMERCE FRAMEWORK OF STANDARDS World Customs Organization (June 2018) Cross-Border E-Commerce Framework of Standards Foreword by Secretary General of the World Customs Organization

More information

Main areas of UNECE transport facilitation

Main areas of UNECE transport facilitation UNITED NATIONS ECONOMIC COMMISSION FOR EUROPE Selected UNECE legal instruments for the facilitation of international transport Jaromir Cekota Transport Division, UNECE, Geneva Workshop Enhancing National

More information

CBP Daily Operations

CBP Daily Operations Our Mission Detect and prevent terrorists and terrorist weapons from entering the United States, while facilitating the orderly and efficient flow of legitimate trade and people at and through our Nation

More information

GUIDELINES FOR STRENGTHENING CONTROL OF CONTAINERS

GUIDELINES FOR STRENGTHENING CONTROL OF CONTAINERS INTER-AMERICAN DRUG ABUSE CONTROL COMMISSION CICAD Secretariat for Multidimensional Security GUIDELINES FOR STRENGTHENING CONTROL OF CONTAINERS Viña del Mar, Chile I. Introduction The international maritime

More information

New INCOTERMS effective January 1, 2011

New INCOTERMS effective January 1, 2011 New INCOTERMS effective January 1, 2011 The International Chamber of Commerce (ICC ) has published revisions to its International Commercial Terms, also known as INCOTERMS, that take effect on January

More information

Transform Milwaukee. Section 8 Freight Transportation and Logistics. Summary Findings

Transform Milwaukee. Section 8 Freight Transportation and Logistics. Summary Findings Transform Milwaukee Section 8 Freight Transportation and Logistics Summary Findings Freight Originating in the Milwaukee CSA 2011 Estimates to 2040 Projections Mode 1000 s of Tons in 2011 1000 s of Tons

More information

Frequently asked questions. REGDOC , Security of Nuclear Substances: Sealed Sources

Frequently asked questions. REGDOC , Security of Nuclear Substances: Sealed Sources Frequently asked questions REGDOC-2.12.3, Security of Nuclear Substances: Sealed Sources May 2016 Part I: General questions Q1. Why did the Canadian Nuclear Safety Commission publish REGDOC- 2.12.3? Q2.

More information

UN/CEFACT United Nations Centre for Trade Facilitation and Electronic Business

UN/CEFACT United Nations Centre for Trade Facilitation and Electronic Business UN/CEFACT United Nations Centre for Trade Facilitation and Electronic Business ICAO Air Cargo Development Forum (IACD) Session 4: Improving Air Cargo Connectivity and Supply Chain Zhengzhou, China, 7 September

More information

Please complete the questionnaire and fax it to

Please complete the questionnaire and fax it to Partners in Protection / C-TPAT Supply Chain Security Questionnaire Dear: Supply Trade Partner As you are aware there have been several changes in the transportation industry over the past few years. One

More information

EXW EX WORKS (... named place) FCA. FREE CARRIER (... named place)

EXW EX WORKS (... named place) FCA. FREE CARRIER (... named place) EXW EX WORKS (... named place) "Ex works" means that the seller delivers when he places the goods at the disposal of the buyer at the seller s premises or another named place (i.e. works, factory, warehouse,

More information

UNESCAP Recommendations and Tools for Transport Facilitation Measures

UNESCAP Recommendations and Tools for Transport Facilitation Measures Regional Conference on Strengthening Transport Connectivity and Trade Facilitation in South and South-West Asia Lahore, Pakistan, 9-10 December 2013 UNESCAP Recommendations and Tools for Transport Facilitation

More information

PILLARS OF THE SECURE SUPPLY CHAIN. b) the secure movement and transfer of consignments from one entity to another; and

PILLARS OF THE SECURE SUPPLY CHAIN. b) the secure movement and transfer of consignments from one entity to another; and Page 1 of 20 PILLARS OF THE SECURE SUPPLY CHAIN Overview 1.1 Harmonized and commonly agreed security controls throughout the supply chain are essential to ensure that air cargo and mail are subjected to

More information

SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department

SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department SAND No. 2012-1606C S 0 606C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy s National Nuclear Security Administration

More information

Barriers to Global Maritime Trade

Barriers to Global Maritime Trade to Global Maritime Business Perspectives on and Frictions in the Pacific Rim University of Southern California Marshall School of Business Busan, Korea November 15, 2005 Exponential growth initiates potential

More information

The logic of the Incoterms 2010 rules

The logic of the Incoterms 2010 rules The logic of the Incoterms 2010 rules The eleven rules are divided into two main groups Rules for any transport mode Ex Works EXW Free Carrier FCA Carriage Paid To CPT Carriage & Insurance Paid to CIP

More information

IV. IMPROVEMENT OF CROSS-BORDER TRANSPORT BY RAIL TRANSPORT

IV. IMPROVEMENT OF CROSS-BORDER TRANSPORT BY RAIL TRANSPORT 48 IV. IMPROVEMENT OF CROSS-BORDER TRANSPORT BY RAIL TRANSPORT The region is characterized by long distances within and across countries. This is particularly challenging for landlocked countries which

More information

Effective Cargo and Vehicle Inspection and Enhanced. Border Security: Mexico SAT Accelerated Cargo Inspection Initiative.

Effective Cargo and Vehicle Inspection and Enhanced. Border Security: Mexico SAT Accelerated Cargo Inspection Initiative. Effective Cargo and Vehicle Inspection and Enhanced An OSI Systems Company Border Security: Mexico SAT Accelerated Cargo Inspection Initiative An initiative by Mexico s tax administration service, Servicio

More information

Problem 03 More Than One Modes

Problem 03 More Than One Modes E216 Distribution and Transportation Problem 03 More Than One Modes Multimodal Transport Roles of Freight Forwarder Containerization in Intermodal Transport Intermodal Handling Equipment Multimodal Transport

More information

SUPPLY CHAIN SECURITY

SUPPLY CHAIN SECURITY SUPPLY CHAIN SECURITY An Introduction to the Supply Chain Security Guide of The World Bank Marc H. Juhel Sector Manager, Transport The World Bank November 2009 World Bank Supply Security Guide 2009 1 Introduction

More information