C-TPAT Minimum Security Requirements Importers

Similar documents
Importers: C-TPAT Minimum Security Requirements

C-TPAT Minimum Security Criteria

C-TPAT Partner Application for Importers Instructions

Security Procedure - Participation / Certification in Foreign Customs Administrations Supply Chain Security Programs

Minimum-Security Criteria for C-TPAT Foreign Manufacturers

Foreign Manufacturer Eligibility Requirements

C-TPAT Security Guidelines for Air Freight Consolidators, Ocean Transportation Intermediaries and Non-Vessel Operating Common Carriers (NVOCC)

C-TPAT Security Standards. Importers

TRUSTED TRADER APPLICATION (C-TPAT AND ISA)

Xerox Supplier Security Requirements

Please complete the questionnaire and fax it to

Air Carrier Eligibility Requirements

A Message for Brokers Letter And Security Guidelines for Brokers

Customs -Trade Partnership Against Terrorism (C-TPAT) Vendor Participation Overview

Milestone AV Technologies TECHNICAL SPECIFICATION

C-TPAT Security Criteria. Sea Carriers

C-TPAT Security Questionnaire PASS FAIL 1

WILSONS LEATHER POLICY ACKNOWLEDGEMENT 2008

Rail Carrier Minimum-Security Criteria

C-TPAT Expectations for

C-TPAT Expectations for Agents, Vendors & Manufacturers

CTPAT Security Requirements for Import Suppliers

Lowe s Corporate Cargo Security Guidelines for Manufacturing and Warehouse Facilities

Foreign Factory Profile

Supply Chain Questionnaire Business Partners

C-TPAT Information for Foreign Manufacturers & Suppliers

C-TPAT Audit Report. General Overview of the Audit s findings. Overall Score (result) Audit Findings & Corrective Action

Milliken and Company CTPAT Security Profile. Guidelines and Procedures for maintaining compliance with the CTPAT minimum security requirements

CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM

Menard, Inc. ( Menard, Inc. ) C-TPAT Protocols for Suppliers

C-TPAT Questionnaire. Type of Partner

C-TPAT Requirements. Dated: July 1 st, Valued Suppliers. C-TPAT Security Recommendations and Requirements

IMPORTER SECURITY RECOMMENDATIONS CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM (C-TPAT)

Colony Brands, Inc. Supply Chain Security Profile Customs-Trade Partnership Against Terrorism Service Provider Questionnaire

ABSTACT 2016 GENERAL SECURITY GUIDELINES AND OPERATIONAL PROCEDURES

Frequently Asked Questions Regarding Minimum Security Criteria for Importers 03/25/2005

Security Model. Jointly implement a security model within each segment of the supply chain Production Transportation Importation Distribution

Tenneco is a participant in the Customs-Trade Partnership Against Terrorism (C-TPAT). In the US,

BV Security Assessment (Based on C-TPAT SCS Best Practice, US Customs and Border Protection) (1-day Assessment)

SUPPLY CHAIN SECURITY PROGRAMS. Customs-Trade Partnership Against Terrorism. Partners In Protection

Supply Chain Security Guidelines

SECTION 1: TRADER INFORMATION

Proactive Approaches. To Minimize. Supply Chain Security. Breaches in the Rail, Air, Ocean and Land Environment

Pakistan Supply Chain Security (PSCS) Code

TRAILER/CONTAINER SECURITY

Supply Chain Security Container Inspection and Seal Application

FOOD DEFENCE SELF-ASSESSMENT CHECKLIST GRAIN HANDLING FACILITIES

TAPA FSR 2009 Kraków 4th June 2009 Leszek Sitkowski LRQA Poland

ACCO Brands Corporation. Global Social Responsibility Policy

Global Security Verification Report

Retail Food Establishment. Self-Assessment Checklist. for. Food Defense

Text Slide. Container and Seal Inspection Workshop

Global Security Verification Report

SEAL INTEGRITY PROGRAMME APPENDIX TO ANNEX I FRAMEWORK OF STANDARDS TO SECURE AND FACILITATE GLOBAL TRADE

Guidance Notes FSR 2014

TEXAS LOTTERY COMMISSION

Global Security Verification Report

Integrated Compliance Manual for Vendors and Factories

Food Defense Supplier Guidelines

Global Security Verification Report

Text Slide. Container and Seal Inspection Workshop

DEVELOPING A FOOD DEFENSE PLAN A GUIDE

Food Defense and Emergency Response Security Guidelines. Keep America's Food Safe

AM Retail Group, Inc. C-TPAT EVALUATION

Integrated Compliance Manual for Vendors and Factories

2011 TAPA FSR Scoring Matrix FOR USE WITH TAPA BUYER AUDIT FORM 2011

The factory must establish in writing the persons who are authorized to complete and/or sign shipping documents.

FACTORY COMPLIANCE. NEW VENDOR MANUAL

Security Innovations to Adapt to Emerging Threats

Supply Chain Security: Boeing's C-TPAT Program (Customs-Trade Partnership Against Terrorism) & Commercial Invoices

CBP Daily Operations

Physical Security Assessment Form

C-TPAT Best Practices. Wayne Kornmann Director, Long Beach C-TPAT Field Office

Table of Contents. Introduction Features for 2015 Implementation Suggestions C-TPAT Project Plan and Organizer Formatting Instructions

BIOSECURITY IN THE DAIRY PLANT IDFA's Guidance Document for the Dairy Industry

CONVEYANCE INSPECTION PROCEDURES AND SEALING PROCESS. ADAPTED FROM United Global Security: The Challenge Ahead

Air Cargo & Air Supply Chain Security : Perspective From Integrators

IMPORTER ASSESSMENT PROGRAM FOR FOREIGN VENDORS

Welcome Presenter s Name June 17,

Appendix 2 Authorized Economic Operators (AEO) Self-assessment questionnaire

ICMI International Cyanide Management Code Summary Audit Report. Intermarine, LLC - Industrial Terminals Initial Certification Audit

Supply Chain Security Management Systems The ISO Link

Template Document for the Interim Final Rule 33 CFR

Guidance Document. Meeting Requirements as a Registered Food Importer. A guidance document issued by the Ministry for Primary Industries

Customs Trade Partnership Against Terrorism (C-TPAT) International Supply Chain Security Risk Assessment Frequently Asked Questions

IMPLEMENTING GUIDANCE FOR LICENSEES THAT POSSESS RADIOACTIVE MATERIAL QUANTITIES OF CONCERN

Customs-Trade Partnership Against Terrorism

This application process is for the New Modernized Drive Clean Program that uses the new OBD II and/or TSI, and Heavy Duty test equipment.

Tandy Leather Factory Supplier Code of Conduct

Frustrated by C-TPAT? You're Not Alone

NORDSTROM factories are required to perform a seven-point inspection process designed to verify the physical integrity of the container.

Inventory Controls for Water and Sanitary Sewer Line Repairs

ICC Guidelines for Cross-Border Traders in Goods

CUSTOMS-NOTES. December 13, Important Trade Security Measures

Hamilton Port Authority Security Guidelines

APPENDIX 4-D PROCEDURES FOR ENTERING VAULT STORAGE AREAS OF SENSITIVE STOCKPILE MATERIALS

CORP Appendix A CORPORATE POLICY. Attachments: Related Documents/Legislation: Revenue Administrative Policy

CHAPTER 5 INFORMATION TECHNOLOGY SERVICES CONTROLS

Australian Trusted Trader

FOR OFFICIAL USE ONLY

Transcription:

Customs and Border Protection, U.S. Department of Homeland Security C-TPAT Minimum Security Requirements Importers Released March, 2005 Prepared by Prep4Audit, LLC Version 2: August, 2014 www.prep4audit.com

Our Acknowledgement of the Rights of Others and Our Disclaimers With the exception of governmental providers of guidelines, check-lists and standards, most providers have some copyright specifications on their guidelines, check-lists and/or standards. The form sets we provide do not contain any content of a guidelines, check-lists and standards except for the requirements themselves. In other words the full content of any specific guidelines, check-lists and/or standards is not reproduced. It should be noted that a significant number of requirements that address any particular issue (e.g. the use of seals, perimeter security, facility cleanliness, data security) are contained within a variety of guidelines, check-lists and/or standards and are worded in similar (or exact) manners. Any purchaser of our forms should review the statements of the provider. If an organization has already purchased a particular standard, as we have, then that organization already has the right to use the requirement statements, if such right is in fact required. We have: 1) reformatted and/or reworded certain requirements for purposes of clarity; and, 2) separated multiple requirements as stated within a single paragraph and/or multiple requirements as stated within a single sentence into single statement requirements that allow for operational responses. We have made every effort to properly restate requirements and avoid typographical and grammatical errors. You must assume responsibility to ensure your responses are responsive to the intent of the original statements. We are not affiliated with any provider of any guideline, check-list or standard or with any certified body licensed to audit the guideline, check-list or standard. We are not, nor will we become, licensed to perform audits. We receive no fees of any sort from any provider, seller, auditor, or any other party related to the sale of our forms. Terms of Use of Free PDF You Accept and Will Honor We offer this Free PDF version of our editable Word file of requirement statements. You may make as many copies as you wish. Your use indicates your acceptance of these terms. You agree that you will NOT convert this free PDF into Excel or any other modifiable format your use indicates your acceptance of these terms. We will enforce our copyrights. Recognized industry standards suggest/require you to modify its requirement to reflect your business model. You therefor need to add requirements, delete requirements, and modify requirements. We offer, for sale, forms allowing you to do modify this PDF form. www.prep4audit.com 1 Customs and Border Protection, U.S. Department of Homeland Security

Customs and Border Protection, U.S. Department of Homeland Security C-TPAT Minimum Security Requirements Importers Released March, 2005 2 Customs and Border Protection, U.S. Department of Homeland Security

Importers 1.0.0 C-TPAT SECURITY CRITERIA OVERVIEW... 5 1.1.0 DEFINITIONS... 5 1.2.0 C-TPAT ACKNOWLEDGEMENTS... 5 1.3.0 BASIC REQUIREMENTS... 5 2.0.0 BUSINESS PARTNER REQUIREMENT... 6 2.1.0 BUSINESS PARTNER SECURITY REQUIREMENTS: GENERAL STATEMENT... 6 2.2.0 BUSINESS PARTNER SECURITY PROCEDURES... 6 2.3.0 POINT OF ORIGIN... 6 2.4.0 PARTICIPATION AND/OR CERTIFICATION IN FOREIGN CUSTOMS ADMINISTRATIONS SUPPLY CHAIN SECURITY PROGRAMS... 7 2.5.0 OTHER INTERNAL CRITERIA FOR BUSINESS PARTNER SELECTION... 7 3.0.0 CONTAINER SECURITY... 8 3.1.0 CONTAINER SECURITY REQUIREMENT... 8 4.0.0 CONTAINER INSPECTION... 9 4.1.0 CONTAINER INSPECTION REQUIREMENTS: GENERAL STATEMENT... 9 4.2.0 CONTAINER INSPECTION REQUIREMENTS... 9 4.3.0 CONTAINER SEALS... 9 4.4.0 CONTAINER STORAGE... 9 5.0.0 PHYSICAL ACCESS CONTROLS... 10 5.1.0 PHYSICAL ACCESS SECURITY REQUIREMENTS: GENERAL STATEMENT... 10 5.2.0 EMPLOYEES... 10 5.3.0 VISITORS... 10 5.4.0 DELIVERIES (INCLUDING MAIL)... 10 5.5.0 CHALLENGING AND REMOVING UNAUTHORIZED PERSONS... 11 6.0.0 PERSONNEL SECURITY... 12 6.1.0 PERSONNEL SECURITY REQUIREMENTS: GENERAL STATEMENT... 12 6.2.0 PRE-EMPLOYMENT VERIFICATION... 12 6.3.0 BACKGROUND CHECKS AND INVESTIGATIONS... 12 6.4.0 PERSONNEL TERMINATION PROCEDURES... 12 7.0.0 PROCEDURAL SECURITY... 13 7.1.0 PROCEDURAL SECURITY REQUIREMENTS: GENERAL STATEMENT... 13 7.2.0 DOCUMENTATION PROCESSING... 13 7.3.0 MANIFESTING PROCEDURES... 13 7.4.0 SHIPPING AND RECEIVING... 13 7.5.0 CARGO DISCREPANCIES... 14 3 Customs and Border Protection, U.S. Department of Homeland Security

8.0.0 SECURITY TRAINING AND THREAT AWARENESS... 15 8.1.0 THREAT AWARENESS... 15 8.2.0 SECURITY TRAINING... 15 8.3.0 EMPLOYEE INCENTIVES... 15 9.0.0 PHYSICAL SECURITY... 16 9.1.0 PHYSICAL SECURITY REQUIREMENTS: GENERAL STATEMENT... 16 9.2.0 FENCING... 16 9.3.0 GATES AND GATE HOUSES... 16 9.4.0 PARKING... 16 9.5.0 BUILDING STRUCTURE... 16 9.6.0 LOCKING DEVICES AND KEY CONTROLS... 17 9.7.0 LIGHTING... 17 9.8.0 ALARM SYSTEMS AND VIDEO SURVEILLANCE CAMERAS... 17 10.0.0 INFORMATION TECHNOLOGY SECURITY... 18 10.1.0 PASSWORD PROTECTION... 18 10.2.0 ACCOUNTABILITY... 18 4 Customs and Border Protection, U.S. Department of Homeland Security

Importers: C-TPAT Minimum Security Requirements 1.0.0 C-TPAT Security Criteria Overview 1.1.0 Definitions 1.1.1 The supply chain for C-TPAT purposes is defined from point of origin (manufacturer, supplier, or vendor) through to point of distribution; it recognizes the diverse business models C-TPAT members employ. 1.2.0 C-TPAT Acknowledgements 1.2.1 The C-TPAT program recognizes the complexity of international supply chains and security practices, and endorses the application and implementation of security measures based upon risk. 1.2.2 The C-TPAT program allows for flexibility and the customization of security plans based on the member s business model. 1.3.0 Basic Requirements 1.3.1 Importers must conduct a comprehensive assessment of their international supply chains based upon C-TPAT security criteria. 1.3.2 Where an Importer outsources or contracts elements of their supply chain, such as a foreign facility, conveyance, domestic warehouse, or other elements, the Importer must work with these Business Partners to ensure that pertinent security measures are in place and adhered to throughout their supply chain. 1.3.3 Appropriate security measures, based upon risk, must be implemented and maintained throughout the Importer s supply chains. 5 Customs and Border Protection, U.S. Department of Homeland Security

2.0.0 Business Partner Requirement 2.1.0 Business Partner Security Requirements: General statement 2.1.1 Importers must have written and verifiable processes for the selection of Business Partners including manufacturers, product suppliers and vendors. 2.2.0 Business Partner Security Procedures 2.2.1 For those Business Partners eligible for C-TPAT certification (carriers, ports, terminals, brokers, consolidators, etc.) the Importer must have documentation (e.g., C-TPAT certificate, SVI number, etc.) indicating whether these Business Partners are or are not C-TPAT certified. 2.2.2 For those Business Partners not eligible for C-TPAT certification, Importers must require their Business Partners to demonstrate that they are meeting C-TPAT security criteria via either: written/electronic confirmation (e.g., contractual obligations; via a letter from a senior Business Partner/Officer attesting to compliance; a written statement from the Business Partner demonstrating their compliance with C-TPAT security criteria or an equivalent WCO accredited security program administered by a foreign customs authority; or, by providing a completed Importer security questionnaire). 2.2.3 Based upon a documented risk assessment process, non-c-tpat eligible Business Partners must be subject to verification of compliance with C-TPAT security criteria by the Importer. 2.3.0 Point of Origin 2.3.1 Importers must ensure Business Partners develop security processes and procedures consistent with the C-TPAT security criteria to enhance the integrity of the shipment at point of origin. 2.3.2 Periodic reviews of Business Partners processes and facilities should be conducted based on risk, and should maintain the security standards required by the Importer. 6 Customs and Border Protection, U.S. Department of Homeland Security

2.4.0 Participation and/or Certification in Foreign Customs Administrations Supply Chain Security Programs 2.4.1 Current or prospective Business Partners who have obtained a certification in a supply chain security program being administered by foreign Customs Administrations should be required to indicate their status of participation to the Importer. 2.5.0 Other Internal Criteria for Business Partner Selection 2.5.1 Internal requirements, such as financial soundness, capability of meeting contractual security requirements, and the ability to identify and correct security deficiencies as needed, should be addressed by the Importer. 2.5.2 Internal requirements should be assessed against a risk-based process as determined by an internal management team. 7 Customs and Border Protection, U.S. Department of Homeland Security

3.0.0 Container Security 3.1.0 Container Security Requirement 3.1.1 Container integrity must be maintained to protect against the introduction of unauthorized material and/or persons. 3.1.2 At point of stuffing, procedures must be in place to properly seal and maintain the integrity of the shipping containers. 3.1.3 A high security seal must be affixed to all loaded containers bound for the U.S. 3.1.4 All seals must meet or exceed the current PAS ISO 17712 standards for high security seals. 8 Customs and Border Protection, U.S. Department of Homeland Security

4.0.0 Container Inspection 4.1.0 Container Inspection Requirements: General Statement 4.1.1 Procedures must be in place to verify the physical integrity of the container structure prior to stuffing, to include the reliability of the locking mechanisms of the doors. 4.2.0 Container Inspection Requirements 4.2.2 A seven-point inspection process is recommended for all containers: front wall; left side; right side; floor; ceiling/roof; inside/outside doors; and, outside/undercarriage. 4.3.0 Container Seals 4.3.1 Written procedures must stipulate how seals are to be controlled and affixed to loaded containers. 4.3.2 The procedures will include procedures for recognizing and reporting compromised seals and/or containers to US Customs and Border Protection, or the appropriate foreign authority. 4.3.3 Only designated employees should distribute container seals for integrity purposes. 4.4.0 Container Storage 4.4.1 Containers must be stored in a secure area to prevent unauthorized access and/or manipulation. 4.4.2 Procedures must be in place for reporting and neutralizing unauthorized entry into containers or container storage areas. 9 Customs and Border Protection, U.S. Department of Homeland Security

5.0.0 Physical Access Controls 5.1.0 Physical Access Security Requirements: General Statement 5.1.1 Access controls prevent unauthorized entry to facilities, maintain control of employees and visitors, and protect company assets. Access controls must include the positive identification of all employees, visitors, and vendors at all points of entry. 5.2.0 Employees 5.2.1 An employee identification system must be in place for positive identification and access control purposes. 5.2.2 Employees should only be given access to those secure areas needed for the performance of their duties. 5.2.3 Company management or security personnel must adequately control the issuance and removal of employee, visitor and vendor identification badges. 5.2.4 Procedures for the issuance, removal and changing of access devices (e.g. keys, key cards, etc.) must be documented. 5.3.0 Visitors 5.3.1 Visitors must present photo identification for documentation purposes upon arrival. 5.3.2 Visitors should be escorted and visibly display temporary identification. 5.4.0 Deliveries (including mail) 5.4.1 Proper vendor ID and/or photo identification must be presented for documentation purposes upon arrival by all vendors. 5.4.2 Arriving packages and mail should be periodically screened before being disseminated. 10 Customs and Border Protection, U.S. Department of Homeland Security

5.5.0 Challenging and Removing Unauthorized Persons 5.5.1 Procedures must be in place to identify, challenge and address unauthorized/unidentified persons. 11 Customs and Border Protection, U.S. Department of Homeland Security

6.0.0 Personnel Security 6.1.0 Personnel Security Requirements: General Statement 6.1.1 Processes must be in place to screen prospective employees and to periodically check current employees. 6.2.0 Pre-Employment Verification 6.2.1 Application information, such as employment history and references, must be verified prior to employment. 6.3.0 Background Checks and Investigations 6.3.1 Consistent with foreign, federal, state, and local regulations, background checks and investigations should be conducted for prospective employees. 6.3.2 Once employed, periodic checks and reinvestigations should be performed based on cause, and/or the sensitivity of the employee s position. 6.4.0 Personnel Termination Procedures 6.4.1 Companies must have procedures in place to remove identification, facility, and system access for terminated employees. 12 Customs and Border Protection, U.S. Department of Homeland Security

7.0.0 Procedural Security 7.1.0 Procedural Security Requirements: General Statement 7.1.1 Security measures must be in place to ensure the integrity and security of processes relevant to the transportation, handling, and storage of cargo in the supply chain. 7.2.0 Documentation Processing 7.2.1 Procedures must be in place to ensure that all information used in the clearing of merchandise/cargo, is legible, complete, accurate, and protected against the exchange, loss or introduction of erroneous information. 7.2.2 Documentation control must include safeguarding computer access and information. 7.3.0 Manifesting Procedures 7.3.1 To help ensure the integrity of cargo received from abroad, procedures must be in place to ensure that information received from Business Partners is reported accurately and timely. 7.4.0 Shipping and Receiving 7.4.1 Arriving cargo should be reconciled against information on the cargo manifest. 7.4.2 Arriving cargo should be accurately described, and the weights, labels, marks and piece count indicated and verified. 7.4.3 Departing cargo should be verified against purchase or delivery orders. 7.4.4 Drivers delivering or receiving cargo must be positively identified before cargo is received or released. 13 Customs and Border Protection, U.S. Department of Homeland Security

7.5.0 Cargo Discrepancies 7.5.1 All shortages, overages, and other significant discrepancies or anomalies must be resolved and/or investigated appropriately. 7.5.2 If appropriate, Customs and/or other appropriate law enforcement agencies must be notified if illegal or suspicious activities are detected. 14 Customs and Border Protection, U.S. Department of Homeland Security

8.0.0 Security Training and Threat Awareness 8.1.0 Threat Awareness 8.1.1 A threat awareness program should be established and maintained by security personnel to recognize and foster awareness of the threat posed by drug smugglers and terrorists at each point in the supply chain. 8.1.2 Employees must be made aware of the procedures the Highway Carrier has in place to address a situation and how to report it. 8.1.3 Additional training should be provided to employees in the shipping and receiving areas, as well as those receiving and opening mail. 8.2.0 Security Training 8.2.1 Specific training should be offered to assist employees in maintaining cargo integrity, recognizing internal conspiracies, and protecting access controls. 8.3.0 Employee Incentives 8.3.1 Implemented programs should offer incentives for active employee participation. 15 Customs and Border Protection, U.S. Department of Homeland Security

9.0.0 Physical Security 9.1.0 Physical Security Requirements: General Statement 9.1.1 Cargo handling and storage facilities in domestic and foreign locations must have physical barriers and deterrents that guard against unauthorized access. Importers should incorporate the following C-TPAT physical security criteria throughout their supply chains as applicable. 9.2.0 Fencing 9.2.1 Perimeter fencing should enclose the areas around cargo handling and storage facilities. 9.2.2 Interior fencing within a cargo handling structure should be used to segregate domestic, international, high value, and hazardous cargo. 9.2.3 All fencing must be regularly inspected for integrity and damage. 9.3.0 Gates and Gate Houses 9.3.1 Gates through which vehicles and/or personnel enter or exit must be manned and/or monitored. 9.3.2 The number of gates should be kept to the minimum necessary for proper access and safety. 9.4.0 Parking 9.4.1 Private passenger vehicles should be prohibited from parking in or adjacent to cargo handling and storage areas. 9.5.0 Building Structure 9.5.1 Buildings must be constructed of materials that resist unlawful entry. 9.5.2 The integrity of structures must be maintained by periodic inspection and repair. 16 Customs and Border Protection, U.S. Department of Homeland Security

9.6.0 Locking Devices and Key Controls 9.6.1 All external and internal windows, gates and fences must be secured with locking devices. 9.6.2 Management or security personnel must control the issuance of all locks and keys. 9.7.0 Lighting 9.7.1 Adequate lighting must be provided inside and outside the facility at entrances and exits. 9.7.2 Adequate lighting must be provided inside and outside in cargo handling areas. 9.7.3 Adequate lighting must be provided inside and outside in storage areas. 9.7.4 Adequate lighting must be provided inside and outside along fence lines. 9.7.5 Adequate lighting must be provided inside and outside in parking areas. 9.8.0 Alarm Systems and Video Surveillance Cameras 9.8.1 Alarm systems and video surveillance cameras should be utilized to monitor premises and prevent unauthorized access to cargo handling and storage areas. 17 Customs and Border Protection, U.S. Department of Homeland Security

10.0.0 Information Technology Security 10.1.0 Password Protection 10.1.1 Automated systems must use individually assigned accounts that require a periodic change of password. 10.1.2 IT security policies, procedures and standards must be in place and provided to employees in the form of training. 10.2.0 Accountability 10.2.1 A system must be in place to identify the abuse of IT including improper access, tampering or the altering of business data. 10.2.2 All system violators must be subject to appropriate disciplinary actions for abuse. 18 Customs and Border Protection, U.S. Department of Homeland Security