Secure container transport: challenges & barriers in the complete stakeholder chain

Similar documents
Security platforms for logistics operations in MED ports

3.5 Advanced Inspection Technologies (AIT)

Proactive Approaches. To Minimize. Supply Chain Security. Breaches in the Rail, Air, Ocean and Land Environment

SEAL INTEGRITY PROGRAMME APPENDIX TO ANNEX I FRAMEWORK OF STANDARDS TO SECURE AND FACILITATE GLOBAL TRADE

By Dimitrios Tsamboulas National Technical University of Athens (NTUA)

Customs and the use of technology to secure global supply chain

Security of the supply chain Specific focus on air transportation. Interest of industrial platforms

Air Cargo & Air Supply Chain Security : Perspective From Integrators

Utmaningar och transportskydd i framtida transportsystem. Sören Jägerhök och Åsa Waern

CURRENT SECURITY ENVIRONMENT

Intelligent logistics from the entrepreneurial perspective

Global Trade Digitization

Maritime Security Council. AfrICANDO Security for Africa s Road & Rail Transportation Infrastructure

LogiC n. Our Partners LEAN SECURE RELIABLE. and LOGISTIC ULMAR CONNECTIVITY. To Get More Visit: for. SMEs

TRADELENS OVERVIEW MARTIN HAGELSTROM BLOCKCHAIN LEADER IBM LATIN

Supply Chain Security Management Systems The ISO Link

Rail Carrier Minimum-Security Criteria

Secure and Transparent Cargo Supply Chain: Enabling Chain-of-Custody with Economical and Privacy Respecting Biometrics, and Blockchain Technology

AAPA. Terminal and Container Cargo Security. Mark Tierney Senior Director Security and Compliance Maersk Inc

European Union Customs approach towards the use of modern technologies

Best practices of digital technology application in transport facilitation and logistics

MARITIME COMMERCE SECURITY PLAN FOR THE NATIONAL STRATEGY FOR MARITIME SECURITY

Security for dangerous goods

A guide to incoterms 2011

Jens Froese Technische Universität Hamburg-Harburg. Harburg. Bangkok 27 th October Container Security TUHH TUHH. Maritime Logistics

Open global trade digitization platform

Foreign Manufacturer Eligibility Requirements

Customs-Trade Partnership Against Terrorism

A Message for Brokers Letter And Security Guidelines for Brokers

Global Trade Digitization

The port as an enabler of the smart grid. Theodoros Theodoropoulos (SEAbility Ltd) Inte-Transit Training 19 November 2014, Valencia, Spain

Automation and Blockchain: A New Freight Distribution Paradigm for the Shipping Industry?

Minimum-Security Criteria for C-TPAT Foreign Manufacturers

Customs Trade Partnership Against Terrorism An Introduction

C-TPAT Security Guidelines for Air Freight Consolidators, Ocean Transportation Intermediaries and Non-Vessel Operating Common Carriers (NVOCC)

Blockchain dal commercio globale alle PMI

John F. Fevelo Chief Operating Officer. Metro One Loss Prevention Service Group, Inc. 900 South Ave. Staten Island, N.Y

Security Model. Jointly implement a security model within each segment of the supply chain Production Transportation Importation Distribution

INTEGRATING PORTS OF THE FUTURE IN SUPPLY CHAINS: NEW PLATFORMS OF SYNERGY

Introduction to Homeland Security

ICAO WCO JOINT WORKSHOP AIR CARGO SECURITY AND FACILITATION

Singapore Customs Secure Trade Partnership. Supply Chain Security

access to the world s markets. The National Conference of State Legislatures (NCSL) recognizes

Supply Chain Security: Boeing's C-TPAT Program (Customs-Trade Partnership Against Terrorism) & Commercial Invoices

X-RAY SECURITY SCREENING SYSTEMS

LEADERS THOUGHT. More importantly, these logistics thought leaders can give you guidance when considering improvements to your business processes.

Discussion Paper presented at: UNECE-OSCE Roundtable on Inland Transport Security, Vienna, Austria,

Barriers to Global Trade Through Marine Ports Country Reports

SECURITY OF RADIOACTIVE MATERIAL IN TRANSPORT

Air Carrier Eligibility Requirements

Session 3: TRADE FACILITATION AGREEMENTS AND e-commerce. Pashupati N. Pandey World Customs Organization

Lowe s Corporate Cargo Security Guidelines for Manufacturing and Warehouse Facilities

Security Procedure - Participation / Certification in Foreign Customs Administrations Supply Chain Security Programs

TRADE FACILITATION IN MEXICO

Air Cargo Systems Based on ICAO Standards that Balance Security and Trade Facilitation

Module Descriptions Computer-Based Training (CBT) Programme

Maritime Security in Logistics From Japanese Shippers point of View

APPENDIX I Questionnaire for Pilot Study Stage I Section 1: Customs Clearance Issues and Challenges Yes/No Remarks, if any

ICT and e-learning in Intermodal Transport

Radioactive Material Transport Security. Ann-Margret Eriksson Eklund IAEA Office of Nuclear Security

Asia-Pacific Trade Facilitation Forum: Setting the Regional Agenda

SECURITY X-RAY SCREENING SYSTEMS

The Role of the South Carolina State Port Authority Police Dept. August 2009

Safety & Security. Introduction. Chemical transportation. Chemical transportation risk management. Resources. Chemical Transportation

E Commerce. Solverminds Solutions & Technologies Pvt. Ltd.

Efficiency and Sustainability in Multi-Modal Supply Chains. Jean-Paul Rodrigue Dept. of Global Studies & Geography, Hofstra University, New York, USA

"SAFETY IN THE SEA PORTS

Standards in a Digital World

E Commerce. Solverminds Solutions & Technologies Pvt. Ltd.

Private IMDG - Receival and Delivery Procedures Adelaide Container Terminal

DOWNLOAD PDF REPORT REQUIRED FOR SEPARATE FREIGHT SHIPMENTS 79 62

C-TPAT Minimum Security Criteria

Open Global Trade Digitization Platform

C-TPAT Minimum Security Requirements Importers

INCOTERMS 2010 STANDARD TRADE DEFINITIONS USED IN ITERNATIONAL FREIGHT TRANSACTIONS

TOGETHER WE ARE THE SGS SCANNER SERVICES

Soft Infrastructure measures

AMERICAN ASSOCIATION OF PORT AUTHORITIES Talking Points on Requiring 100% Container Scanning at Overseas Ports Updated: August 23, 2010

The Port Logistic Hub: a well structured system

Importers: C-TPAT Minimum Security Requirements

HAZMAT Identification, Control, and Emergency Response: The Fundamental Weakness in the System

CROSS-BORDER E-COMMERCE

Main areas of UNECE transport facilitation

CBP Daily Operations

GUIDELINES FOR STRENGTHENING CONTROL OF CONTAINERS

New INCOTERMS effective January 1, 2011

Transform Milwaukee. Section 8 Freight Transportation and Logistics. Summary Findings

Frequently asked questions. REGDOC , Security of Nuclear Substances: Sealed Sources

UN/CEFACT United Nations Centre for Trade Facilitation and Electronic Business

Please complete the questionnaire and fax it to

EXW EX WORKS (... named place) FCA. FREE CARRIER (... named place)

UNESCAP Recommendations and Tools for Transport Facilitation Measures

PILLARS OF THE SECURE SUPPLY CHAIN. b) the secure movement and transfer of consignments from one entity to another; and

SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department

Barriers to Global Maritime Trade

The logic of the Incoterms 2010 rules

IV. IMPROVEMENT OF CROSS-BORDER TRANSPORT BY RAIL TRANSPORT

Effective Cargo and Vehicle Inspection and Enhanced. Border Security: Mexico SAT Accelerated Cargo Inspection Initiative.

Problem 03 More Than One Modes

SUPPLY CHAIN SECURITY

Transcription:

Secure container transport: challenges & barriers in the complete stakeholder chain Theodoros Theodoropoulos (SEAbility Ltd) 1 st Training Workshop 19 November 2014, Valencia, Spain

Overview Introduction The container transport chain Threat assessment Container security measures Wrap-up and conclusions

Introduction Transport authorities face several criminal and terrorist related challenges theft of goods and vehicles Fraud Potential misuse by terrorists illegal immigration Drugs

Introduction These threats cause Daily problems to authorities Impacts on the transport sector s ability To ensure the efficient flow of goods within the national and international marketplace

Introduction Multiple types of containers exist Maritime aviation and Swap Bodies for road-rail Focus will be made on maritime! Why?

Introduction Because essential component of global trade highly efficient relatively safe and reliable means of global goods transport across modes Maritime shipping containers are the most numerous container types involved in international trade truly intermodal in that they are carried by maritime, inland waterway, road and rail operators They are everywhere!

Introduction Security measures must be designed in a fashion so that costs of higher security can be recovered, at least partially, through greater efficiencies in the supply chain Improved security and integrity of the transport chain can reduce the danger of tampering and direct costs of theft losses automated customs inspection with timely transmission of accurate information can improve efficiency of customs control and lower direct costs of customs clearance

Overview Introduction The container transport chain Threat assessment Container security measures Wrap-up and conclusions

The container transport chain Difficulty with respect to security Container transport space is fragmented complex interactions among a great multitude of actors, industries, regulatory agencies, modes, operating systems, liability regimes, legal frameworks These actors are coordinated with respect to efficiency. HOWEVER trade-focused evolution of the container transport system has led to the existence of a number of security vulnerabilities that might be exploited

The container transport chain Container types Dry box tank containers for gaseous or liquid cargoes open frame containers for transporting odd-sized consignments soft-top containers reefers

The container transport chain Vulnerabilities per type Full tank containers: Not easily scanned, difficult to visually check, can contain harmful substances, dispersal platforms for chemical/biological agents Reefers: insulated walls and refrigeration equipment can be used to disguise explosive devices open-top containers are vulnerable to un-authorised access via the tarpaulin covering the top.

The container transport chain World traffic

The container transport chain If there are security concerns relating to the use of maritime shipping containers, it is because these have become so tremendously popular and ubiquitous in the world trading system!

The container transport chain The container transport chain, in aggregate, is a massive integrating network millions of shippers thousands of intermediaries to organizing and carrying goods hundreds of ports dozens of maritime carriers Visibility and transparency decreases at each step out of the port

The container transport chain No central system to co-ordinate security functions Each actor responsible of deploying security measures Even if security measures are deployed at each actor s level, this does not guarantee Compatibility of information management systems Coordinated regulatory frameworks clear security continuity protocols

The container transport chain Large presence of small and medium enterprises operating within the system especially at its outer bounds. It is not so much the size per se of shippers, forwarders, intermediaries and carriers (especially road carriers) that is cited as a vulnerability, but rather their limited resources and motivation to bolster security measures

The container transport chain Where to intervene in the container transport chain to secure it? Traditionally at the core of the system: large intermediaries, major carriers and natural chokepoints. However a wider umbrella of actors must be included in order to establish an auditable trail of existing security measures Add new measures if required

The container transport chain: actors Analysis of the actors and flows is required in order to enable the creation of an enhanced security framework. Each actor should participate in the creation of the security framework. Also collaboration mechanisms should be setup

The container transport chain: actors Seller-buyer Initiate containerized moves Seller could be the shipper shippers and buyers have detailed knowledge of the transaction leading to the shipment of the container Shippers usually are the only actor in the chain with detailed firsthand knowledge of the goods placed into a container Shippers are usually smes must be included in the security framework relative lack of resources available, and/or motivation, to implement security measures must be taken into account

The container transport chain: actors Freight forwarders visibility over the entire container transport chain are also characterized by a significant number of SMEs that may not be in a position to implement cumbersome or costly security measures Transport operators significant number of transport operators in the container transport chain are SMEs the first mile and last mile are the most vulnerable as carriage is often undertaken by small entrepreneurs unable and/or unwilling to implement effective security measures.

The container transport chain: actors Transport authorities responsible for vehicles, drivers and operators (and their facilities Custom authorities responsible for the contents of the container Port/terminal operators world s top 20 ports handled 48% of all port container moves in 2002, and the top 40, nearly 63%. Maritime carriers Transport chain concentrator

The container transport chain: physical flow The physical movement of the container and its contents from place to place and from mode to mode Important to know: how it has travelled, where it can be found and whether its integrity has been compromised The risk of a security breach at any one of its links (modes), compromise the security of the entire chain

The container transport chain: physical flow Security concerns related to the physical flow originating shipper has a critical role to play in the container security by generating a clear, accurate and complete inventory of the physical contents of the container Proper site security, stuffing procedures and oversight of the stuffing process are necessary for this important link in the chain to be secure

The container transport chain: physical flows Containers are most vulnerable to being tampered with when they are at rest and least vulnerable when they are in motion Especially at nodes of the network where the container is handled and/or stored (Land side border crossings) Containers travelling via certain modes are more vulnerable than others. Road carriage less safe in contrast to maritime

Training workshop, Sevilla -06/11/2013

The container transport chain: information flows Generating, receiving and processing information related to the container transport the examination and cross-examination of these flows that can reveal discrepancies indicating terrorist and/ or criminal involvement Big amount of data + non uniform handling (paper, mails, proprietary interfaces) makes cross referencing difficult

The container transport chain: information flows Security relevant highlights Security-relevant information generated early on in the commercial contracting and documentary credit cycles is not used by Customs. Early access to this information could facilitate and otherwise improve Customs security screening of container When looking at the entire container transport chain lack of messaging interoperability is still the rule and not the exception. Especially when considering the outer bounds of the system

Overview Introduction The container transport chain Threat assessment Container security measures Wrap-up and conclusions

Threat assessment Containers have been misused in order to smuggle drugs, contraband goods and even people Criminals have found ways in response to authority vigilance Will they use the container transport system be used in order to deliver a CBRN weapon?. Difficult to answer An assessment must be made in order to analyze such a scenario

Threat assessment: Methodology The threat assessment analysis must take the following into consideration Type of the threat Vulnerabilities of the system Criticality Risk Such an assessment is essential when considering measures that are costly and trade-unfriendly measures

Threat assessment: Risk Example: Would the container system be used as a delivery vehicle for a weapon of mass destruction? No evidence that it has happened. Considerable evidence that terrorists and rogue states have used shipping containers in support of their actions. Therefore it they used it as a delivery mechanism that would probably mean the end of using it for other supportive actions as the counter-measures would likely shut off all other possibilities Moreover would they choose the container transport system instead of other means?

Threat assessment: Type Use the container transport to deliver a CBRN weapon or to purchase the components needed for developing weapons? As mentioned previously most likely the second Relative programs include the US Second Line of Defence

Threat assessment: Vulnerabilities

Overview Introduction The container transport chain Threat assessment Container security measures Wrap-up and conclusions

Container security measures: Overall Scan or otherwise physically confirm the contents of the container Measures seeking to ensure the physical integrity of the container. Measures aimed at ensuring the security of the container environment Measures seeking to track and trace the container in the supply chain. Measures centred on the provision, and use of, information related to the shipment.

Container security measures: assessment

Container security measures: scanning Scanning: Theoretically a two step process Screening: Assessment of the need for scanning on the basis of available information Scanning: Physical act of inspecting the container contents

Container security measures Screening methodology Establish security criteria for identifying high-risk containers based on advance information. Pre-screen containers at the earliest possible point. Use technology to quickly pre-screen high-risk containers. Develop secure and smart containers. Send officials to foreign countries to perform the screening

Training workshop, Sevilla -06/11/2013

Container security measures Scanning cnt d Non-Intrusive Inspection (NII) devices such as X-ray scanners Physical inspection if image quality is not sufficient Sophisticated SW or experienced personnel is required in order to identify chemical, biological, radioactive or nuclear materials. Instrumentation and equipment costs but could be combined with the effort to avoid smuggling and increase tax collection

Container security measures: container integrity Container integrity Indicative mechanical seals Secured mechanical seals Mechanical seals: high-security seals Electronic seals Smart and safe containers

Container security measures: secure environment Securing the container environment Usually considered from the inland and away from port environment unsecured rail yards road stops shipping/loading interchange terminal facilities

Container security measures: secure environment Border crossings variable QoS Lack of or insufficient computer equipment Inadequate x-ray verification capacity. Poor co-ordination among authorities responsible for the border verifications. Lack of respect for the TIR procedures Insufficient number of customs personnel Unethical corrupt behaviour

Container security measures: secure environment Securing the container environment measures: intermodal facilities should be physically secured to minimise the risks ofunauthorised access Employment of technologies such as smart cards as access control cards, biometric authentication, CCTV cameras, etc Re evaluation of security in road transport

Container security measures: tracking Container tracking Collaboration for carrier-industry/government tracking Real time data are great but right time data are better Aggregated information such as: a container was late arriving at a checkpoint and know who the last carrier was and how they may be contacted Take advantage of technology Low cost GNSS devices are emerging

Container security measures: intelligence Trading document and process visibility

Container security measures: intelligence Trading document and process visibility the party responsible for generating security-relevant data provides that data to Customs when the data is first generated incorporate and/or communicate proprietary information to the principal agency in charge of screening containerized consignments

Conclusion Transport authorities must address weak links of the container transport chain More specific threat assessments involving Transport authorities needed Security measures must be adapted to the threat Policy levers at the disposal of Transport authorities Guiding principles to secure the container transport chain Specific recommendations to inland Transport and Maritime authorities

Thank You Theodoros Theodoropoulos (SEAbility Ltd) 3 rd Training Workshop 19 November 2014, Valencia, Spain