Proactive Approaches. To Minimize. Supply Chain Security. Breaches in the Rail, Air, Ocean and Land Environment

Similar documents
Air Carrier Eligibility Requirements

Rail Carrier Minimum-Security Criteria

Foreign Manufacturer Eligibility Requirements

C-TPAT Security Criteria. Sea Carriers

Security Procedure - Participation / Certification in Foreign Customs Administrations Supply Chain Security Programs

C-TPAT Security Guidelines for Air Freight Consolidators, Ocean Transportation Intermediaries and Non-Vessel Operating Common Carriers (NVOCC)

Minimum-Security Criteria for C-TPAT Foreign Manufacturers

Xerox Supplier Security Requirements

Security Model. Jointly implement a security model within each segment of the supply chain Production Transportation Importation Distribution

Lowe s Corporate Cargo Security Guidelines for Manufacturing and Warehouse Facilities

C-TPAT Partner Application for Importers Instructions

C-TPAT Minimum Security Criteria

Importers: C-TPAT Minimum Security Requirements

Please complete the questionnaire and fax it to

C-TPAT Security Standards. Importers

C-TPAT Minimum Security Requirements Importers

C-TPAT Questionnaire. Type of Partner

Customs-Trade Partnership Against Terrorism

Customs -Trade Partnership Against Terrorism (C-TPAT) Vendor Participation Overview

C-TPAT Best Practices. Wayne Kornmann Director, Long Beach C-TPAT Field Office

A Message for Brokers Letter And Security Guidelines for Brokers

ABSTACT 2016 GENERAL SECURITY GUIDELINES AND OPERATIONAL PROCEDURES

Supply Chain Security Container Inspection and Seal Application

CBP Daily Operations

C-TPAT Information for Foreign Manufacturers & Suppliers

Milestone AV Technologies TECHNICAL SPECIFICATION

Menard, Inc. ( Menard, Inc. ) C-TPAT Protocols for Suppliers

Frequently Asked Questions Regarding Minimum Security Criteria for Importers 03/25/2005

TRUSTED TRADER APPLICATION (C-TPAT AND ISA)

CTPAT Security Requirements for Import Suppliers

Colony Brands, Inc. Supply Chain Security Profile Customs-Trade Partnership Against Terrorism Service Provider Questionnaire

TRAILER/CONTAINER SECURITY

SEAL INTEGRITY PROGRAMME APPENDIX TO ANNEX I FRAMEWORK OF STANDARDS TO SECURE AND FACILITATE GLOBAL TRADE

C-TPAT Security Questionnaire PASS FAIL 1

CONVEYANCE INSPECTION PROCEDURES AND SEALING PROCESS. ADAPTED FROM United Global Security: The Challenge Ahead

Global Security Verification Report

Customs Trade Partnership Against Terrorism An Introduction

C-TPAT Expectations for

Text Slide. Container and Seal Inspection Workshop

Text Slide. Container and Seal Inspection Workshop

Milliken and Company CTPAT Security Profile. Guidelines and Procedures for maintaining compliance with the CTPAT minimum security requirements

C-TPAT Audit Report. General Overview of the Audit s findings. Overall Score (result) Audit Findings & Corrective Action

FERRIBY MARINE SHIP SECURITY ASSESSMENT AUDIT CHECKLIST

Food Defense Supplier Guidelines

Global Security Verification Report

Global Security Verification Report

Security Innovations to Adapt to Emerging Threats

Supply Chain Security Guidelines

Supply Chain Security IGTLC

Introduction to Homeland Security

Frustrated by C-TPAT? You're Not Alone

Supply Chain Security Management Systems The ISO Link

Guidance Notes FSR 2014

IMPORTER SECURITY RECOMMENDATIONS CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM (C-TPAT)

C-TPAT Requirements. Dated: July 1 st, Valued Suppliers. C-TPAT Security Recommendations and Requirements

Secure container transport: challenges & barriers in the complete stakeholder chain

Supply Chain Security: Boeing's C-TPAT Program (Customs-Trade Partnership Against Terrorism) & Commercial Invoices

Customs Trade Partnership Against Terrorism (C-TPAT) International Supply Chain Security Risk Assessment Frequently Asked Questions

C-TPAT Expectations for Agents, Vendors & Manufacturers

SUPPLY CHAIN SECURITY PROGRAMS. Customs-Trade Partnership Against Terrorism. Partners In Protection

AAPA. Terminal and Container Cargo Security. Mark Tierney Senior Director Security and Compliance Maersk Inc

HSA INTERNATIONAL, Dubai BROOKS ASIA

TEXAS LOTTERY COMMISSION

Food Defense and Emergency Response Security Guidelines. Keep America's Food Safe

BV Security Assessment (Based on C-TPAT SCS Best Practice, US Customs and Border Protection) (1-day Assessment)

Air Cargo & Air Supply Chain Security : Perspective From Integrators

Supply Chain Questionnaire Business Partners

SESSION V: Critical port security Issues Assuring cargo integrity prior to, during and post marine terminal operations

Pakistan Supply Chain Security (PSCS) Code

Global Security Verification Report

Retail Food Establishment. Self-Assessment Checklist. for. Food Defense

HAZMAT Identification, Control, and Emergency Response: The Fundamental Weakness in the System

Secure and Transparent Cargo Supply Chain: Enabling Chain-of-Custody with Economical and Privacy Respecting Biometrics, and Blockchain Technology

CONTAINER SECURITY. For example:

John F. Fevelo Chief Operating Officer. Metro One Loss Prevention Service Group, Inc. 900 South Ave. Staten Island, N.Y

WILSONS LEATHER POLICY ACKNOWLEDGEMENT 2008

California TRU Guidance

FOR OFFICIAL USE ONLY

In-Transit Container Security Enhancement

CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM

U.S. DOT SECURITY PLAN REQUIREMENTS FOR THE TRANSPORTATION OF PETROLEUM PRODUCTS

ICAO WCO JOINT WORKSHOP AIR CARGO SECURITY AND FACILITATION

3.5 Advanced Inspection Technologies (AIT)

TRADE FACILITATION IN MEXICO

NORDSTROM factories are required to perform a seven-point inspection process designed to verify the physical integrity of the container.

Customs Concerns for the Motor Carrier and Transportation Intermediary

DOWNLOAD PDF REPORT REQUIRED FOR SEPARATE FREIGHT SHIPMENTS 79 62

Comments in Response to Customs and Border Protection s Request for Information Regarding Smart and Secure Containers.

APPENDICES. Agricultural Calcium Ammonium Nitrate Security Code of Practice JANUARY 2019

October Import/Export Policy Supply Chain Security for Imports Standard Operating Procedure (SOP) Page 1 of 22.

The Sept. 11 terrorist strikes were a wake-up call to the

Air Cargo Systems Based on ICAO Standards that Balance Security and Trade Facilitation

Foreign Factory Profile

The Role of the South Carolina State Port Authority Police Dept. August 2009

Compliance or Enhance the Competitiveness? The Most Secure Port - HKG

IMPORTING & EXPORTING NEW DEVELOPMENTS IN OCEAN PRICING AND CUSTOMS SUPPLY CHAIN SECURITY By: Andrew M. Danas, Esq. Grove, Jaskiewicz and Cobert, LLP

WARNING: This record contains Sensitive Security Information that is controlled under 49 CFR parts 15 and No part of this record may be

Welcome Presenter s Name June 17,

2011 TAPA FSR Scoring Matrix FOR USE WITH TAPA BUYER AUDIT FORM 2011

TAPA FSR 2009 Kraków 4th June 2009 Leszek Sitkowski LRQA Poland

Transcription:

Proactive Approaches To Minimize Supply Chain Security Breaches in the Rail, Air, Ocean and Land Environment

Top Eight Rail Principles Track and monitor pulls on a 24 hour basis to determine location and status. All loaded containers and cars bound for the United States must be affixed with high security seals (when applicable) that meet or exceed the current ISO PAS 17712 standards for high security seals. Company unique seals are a plus. Ensure a systemic point inspection is performed and documented on all containers and instruments of traffic bound for the United States prior to loading at the point of origin. In addition, inspections should be conducted randomly while in route to the U.S. and at the last stop before entering the U.S. Comprehensive screening should be performed on all business partners involved in your supply chains.

Top Eight Rail Principles (Cont d) Ensure adequate hiring practices and employee background investigations are conducted on company employees and business partner employees. Conduct risk assessments to determine threats involved and weak areas of the supply chain. Have a visual audit trail for all containers or rail cars being loaded that are exported to the U.S. by insisting that loading bays and docks at the point of origin are monitored on a 24/7 basis by a CCTV System. Conduct seizure investigations and risk analysis in the event the supply chain is compromised.

Tracking and Monitoring Differential Global Positioning System (DGPS) Image fills this entire area (OR originates at the upper left corner of the area outlined and is sized to the full width or height of this bounding box.) An enhancement to GPS that uses a network of fixed, ground-based reference stations to broadcast the difference between the positions indicated by the satellite systems and the known fixed positions.

Tracking and Monitoring Automatic Equipment Identification (AEI) Image fills this entire area (OR originates at the upper left corner of the area outlined and is sized to the full width or height of this bounding box.) An electronic recognition system used to identify rail equipment while en route to its destination.

Tracking and Monitoring Hotbox Detectors A device attached to the track which monitors passing trains for hot axles & reports via radio transmission.

High Security Seals Image fills this entire area (OR originates at the upper left corner of the area outlined and is sized to the full width or height of this bounding box.) All loaded containers and cars bound for the United States must be affixed with High Security Seals (when applicable) that meet or exceed the current ISO PAS 17712 standards for high security seals. Company unique seals are considered a best practice.

Systemic Point Inspection Ensure a Systemic Point Inspection is performed and documented on all containers and instruments of traffic bound for the United States prior to loading at the point of origin. In addition, inspections should be conducted randomly while in route to the U.S. and at the last stop before entering the U.S.

Business Partner Screening Familiarize yourself with the partner s operation and production process to determine where the supply chain begins. Determine the level of security at your partner s facility; access controls, perimeter security, etc. Determine level of security and procedures at the point of stuffing and during the sealing process. Determine if partner conducts an extensive background investigation on employee s.

Adequate Hiring Practices Request background checks for all employees involved in all supply chains. Subject temporary employees, vendors and third party contractors to the same background investigations as your company s permanent employees. Have partners conduct criminal background checks to ensure the integrity of persons having access to your facility and cargo. Request random & periodic employee reinvestigations from business partners. Require partners to verify authenticity of an official government photo ID for all employees and maintain a copy within their personnel file.

Risk Assessments On an annual basis, and based on specific changes in operation, policy, or practices, the company should visit its partners directly involved in its supply chain to determine the efficiency of security measures at their site and/or at the points of stuffing. Questionnaires provided in advance should be utilized to confirm what is in place. Evaluate risk levels at the site and during transit. Companies should be provided feedback, recommendations, and/or ideas based on findings. A scoring matrix should be utilized (for multiple partners) to categorize strengths, weaknesses, threats, and best practices.

Risk Assessments On an annual basis and based on breaches of supply chain integrity, conduct a self-assessment on company practices to determine if there are weaknesses and/or vulnerabilities. Follow the flow of cargo from your facilities to the border. Evaluate security at each owned/leased facility. Determine if practices that maintain conveyance security integrity are effective and that they are carried out efficiently.

CCTV Have a visual audit trail for all containers or rail cars being loaded that are exported to the U.S. by insisting that loading bays and docks at the point of origin are monitored on a 24/7 basis by a CCTV System.

Seizure Response Engage with CBP and/or local authorities Inform SCSS and POE if seizure occurs on foreign side or within the U.S. Risk analysis and investigations Determine vulnerable spots along supply chain through immediate investigations. Share risk analysis findings along with seizure investigation findings with local authorities, CBP, and/or other agencies.

Seizure Response (Cont d) Communication between rail companies (US & Mexico) Share investigation findings with critical partners. Share intelligence with partners to help combat smuggling/terrorism.

Security Measures in an Air Cargo environment.

C-TPAT and current Air Security measures C-TPAT acknowledges that air carriers are already subject to defined security mandates created through public laws and regulations, such as the Aviation and Transportation Security Act (PL 107-71). It is not the intention of C-TPAT to duplicate these requirements, rather, C-TPAT seeks to build upon established foundations and require additional security measures and practices which enhance the overall security throughout the international supply chain. Where an air carrier does not control a specific element of the cargo transportation service it has contracted to provide, such as an airport terminal, direct handling of cargo containers or Unit Load Device (ULD). 1. The air carrier must work with these business partners to ensure that pertinent security measures are in place and adhered to. 2. The air carrier is responsible for exercising prudent oversight for all cargo loaded on board its aircraft.

Air Cargo Security Risks Potential risks associated with air cargo security include: 1. Introduction of explosive and incendiary devices in cargo placed aboard aircraft. 2. Shipment of undeclared or undetected hazardous materials aboard aircraft. 3. Cargo crime including theft and smuggling. 4. Aircraft hijackings and sabotage by individuals with access to aircraft.

C-TPAT Security Criteria Air Carriers Business Partner Requirements Container or Unit Load Devices (ULD) Security Physical Access Controls Personnel Security Procedural Security Security Training and Threat Awareness Physical Security Information Technology (IT) Security

Business Partner Requirements Air carriers must have written and verifiable processes for the screening of business partners, including carrier s agents and service providers. Air carriers must also have screening procedures for new customers, beyond financial soundness issues to include indicators of whether the customer appears to be a legitimate business or poses to be a security risk. Site Verification Verify Business Partners Portal Verification

Container or Unit Load Devices (ULD) Security Challenges for air cargo.

Contaminated ULD(s) and Carts

Cargo Screening and Inspection Participation in the Known Shipper Program X-RAYS K 9 s

High Security Seals Container Seals When containers/ulds are used, written procedures must stipulate how seals in the air carrier s possession are to be controlled, and only designated employees must distribute seals for integrity purposes. Procedures should also exist for recognizing and reporting compromised seals and/or containers/ulds to U.S. Customs and Border Protection or the appropriate foreign authority.

Personnel Security Background Checks Pre-Employment Verification Background checks / Social Economic Personnel Termination Procedures

Physical Security

Physical Access Controls Access controls prevent unauthorized entry to aircraft and facilities, maintain control of employees and visitors, and protect company assets. Access controls must include the positive identification of all employees, visitors, service providers, and vendors at all points of entry.

Conclusion C-TPAT recognizes the complexity of international supply chains and security practices, and endorses the application and implementation of security measures based upon risk. Therefore, the program allows for flexibility and the customization of security plans based on the member s business model. Appropriate security measures, as listed in the C-TPAT criteria, must be implemented and maintained. Air carriers shall have a documented and verifiable process to secure their cargo and facilities and to determine risk throughout their supply chains based on their business model (i.e., volume, country of origin, routing, C-TPAT membership, potential terrorist threat via open source information, ports identified by TSA as having inadequate security, past security incidents, etc.).

Proactive Approaches To Minimize Supply Chain Security Breaches in the Marine Environment

The Top Five Marine Principles Ensure a Seven Point Inspection is performed and documented on all containers bound for the United States prior to loading at the point of origin. Have a visual audit trail for all containers being loaded for export to the U.S. by insisting that loading bays and docks at the point of origin are monitored on a 24/7 basis by a CCTV System. All loaded containers bound for the United States must be affixed with a High Security Seal that meets or exceeds the current ISO PAS 17712 standards for high security seals. Company unique seals are a plus. Know your Trucking Company s Drivers. They are the weak link in the supply chain. Insist that thorough Background Checks are performed on all personnel involved in your supply chains.

Seven Point Inspection

CCTV System Have a visual audit trail for all containers being loaded. Avoid this situation: Trap Doors

High Security Seals Container Seals Must meet or exceed current ISO PAS 17712 standards; Documented procedures for how seals are controlled and affixed; Verify seal numbers match shipping documentation. Company unique seals are a plus.

Background Checks Require background checks for all employees involved in your supply chains. Subject temporary employees, vendors and third party contractors to the same background investigations as your company s permanent employees. Conduct criminal background checks to ensure the integrity of persons who have access to your facility and cargo. Randomly subject employees to periodic reinvestigations. Verify authenticity of an official government photo ID for all employees and maintain a copy within their personnel file.

Truck Drivers Maintain communication with drivers. Require your highway carriers to issue cell phones or radios to all their drivers. Have them call their dispatchers and document it on a regular basis, particularly at arrival at foreign customs or U.S. CBP and their ultimate destination. Utilize multiple monitoring methods. Track conveyances by timing the driver s movements, fuel consumption and. GPS. Today s modern highway carriers have GPS and text messaging in all their tractors. This enables the driver to communicate with their dispatchers. GPS will detect anomalies, unscheduled stops, route variances and enable drivers to quickly send a distress message.

Proactive Approaches To Minimize Supply Chain Security Breaches in the Land Border Environment

Land Border Container/Trailer Security Freight transportation 7-point container/trailer inspection Types of seals Tamper proof nuts and bolts Narcotic detector dogs Unannounced visits

Land Border Container/Trailer Security Who moves the freight at points along the Supply Chain? C-TPAT Certified Companies Non-CTPAT Certified Companies Is the 7-point container/trailer inspection conducted? This inspection must be documented Company must get a copy of the inspection

Land Border Container/Trailer Security Types of seals Plastic Metal Bolt - ISO/PAS 17712 Cable ISO/PAS 17712 Locking Bar with cable seal ISO/PAS 17712 Tamper Evident Security Tape

Plastic, Metal and Cable Seals

Locking Bar and Bolt Seal Image fills this entire area (OR originates at the upper left corner of the area outlined and is sized to the full width or height of this bounding box.) Try to make multiple images approximately the same size Align and group images in an organized manner

Tamper Evident Security Tape

Tamper Proof nuts and bolts The use of tamper proof nuts and bolts will help deter unauthorized entry. Trailer door hinge Trailer door hinge pins Door hasp Door bar lock assembly Work with companies during site visits. Show them which trailers are in need of repair. Weld the bolts if no other option exists.

Tamper Proof nuts and bolts

Hasp Manipulation

Narcotic Detector Dogs Narcotic detector dogs are available at most Mexican / U.S. border crossings. Located on the Mexican side prior to crossing into the U.S. Dogs are taught to detect concealed narcotics. Most companies also conduct trailer inspection. All inspections are documented. Can go to the company facility or trailer terminal. Drivers should not know when they have to be inspected. Low cost per trailer.

K-9 Inspection

Unannounced Site Visits Company will not have time to prepare for your visit. You can verify what the company tells you they are doing. Use caution when crossing the border. Be aware of your surroundings. Know how to get to and out of the place you are visiting. Know the language. Make sure the company is aware that an unannounced visit is possible. Have a plan!