Discussion Paper presented at: UNECE-OSCE Roundtable on Inland Transport Security, Vienna, Austria,

Similar documents
Freight Forwarders: (Agente Transitario) The International Bank IMPORTER-EXPORTER FREIGHT FORWARDER IT- 2: PARTIES INVOLVED IN INTERNATIONAL TRADE.

1. Introductory notes to the tables

WORKSHOP: TRANSPORTING YOUR PRODUCTS TO OVERSEAS MARKETS WHAT EXPORTERS NEED TO KNOW Aug. 24, 2017 Kingston, Jamaica

Diversifying to International Markets: Customs Workshop. Page 1

COMMISSION OF THE EUROPEAN COMMUNITIES

Bringing Goods out of the EU

SEAL INTEGRITY PROGRAMME APPENDIX TO ANNEX I FRAMEWORK OF STANDARDS TO SECURE AND FACILITATE GLOBAL TRADE

ASEAN CUSTOMS TRANSIT SYSTEM (ACTS)

Introduction to Homeland Security

Explanation of the Single Administrative Document Fields

EXPORT ESSENTIALS. DHL Express The International Specialists. Phillip Poland Boston, 2015

Compliance or Enhance the Competitiveness? The Most Secure Port - HKG

updated with DA and IA(rev 4) G TSD Current Format of PN Current Format of codes Current Cardinality Codes Declaration type 1/1 a1 x1 a1 x1

RE: Docket No. USTR Comments on the Transatlantic Trade and Investment Partnership

FACILITATION PANEL (FALP)

Security of the supply chain Specific focus on air transportation. Interest of industrial platforms

Workshop for Developing Countries on The Revision of the Recommendations for International Merchandise Trade Statistics (IMTS) Bangkok 9-12 September

U.S. Customs and Border Protection (CBP) Outbound Issues Webinar

By Dimitrios Tsamboulas National Technical University of Athens (NTUA)

ICISnet MESSAGE GUIDE FOR ECONOMIC OPERATORS IMPORT CONTROL SYSTEM PHASE 1 GUIDE FOR THE EXTERNAL DOMAIN MESSAGES. Version 1.0

WALK-THROUGH OF END-TO-END, ROLL ON ROLL OFF PROCESS FOR GOODS ENTERING OR LEAVING THE UK

Inquiry on Illicit Firearms Customs presentation to the Law and Order Select Committee

APPENDIX E3 EXPORTS CUSTOMS PROCEDURE CODES

Customs Operational Competency for the private sector in the framework of Article 27(1)(b) of the UCC IA

Export Standard Operating Procedures

Jargon Buster. Haulage Industry Terms, and what they mean. UK s leading road haulage marketplace 1

Proactive Approaches. To Minimize. Supply Chain Security. Breaches in the Rail, Air, Ocean and Land Environment

DHL PARCEL EUROPE GENERAL TERMS & CONDITIONS OF CARRIAGE ( Terms and Conditions )

Air Cargo & Air Supply Chain Security : Perspective From Integrators

3.5 Advanced Inspection Technologies (AIT)

FSC.DEC/11/08 Organization for Security and Co-operation in Europe 5 November 2008 Forum for Security Co-operation Original: ENGLISH

Generic Standard Operating procedures for transiting and importing goods/supplies

Official Journal of the European Union L 98/3

Import Control System. Trader Guide

GUIDELINES FOR STRENGTHENING CONTROL OF CONTAINERS

LPI: The Logistics Performance Index

Crossing the Border. Mexico Trade & Logistics. Empower Your Supply Chain Seminar

Secure container transport: challenges & barriers in the complete stakeholder chain

Security platforms for logistics operations in MED ports

An Overview of the New Export System (NES)

Entry Summary Declaration using the web channel. Sea Traffic

A future-proof trade compliance program

EXTRACT. Think-easy Guide for Exports and Imports. Madeleine Nguyen-The Consultant and trainer in international trade

EURASIAN ECONOMIC COMMISSION COLLEGIUM RESOLUTION

Session 3: TRADE FACILITATION AGREEMENTS AND e-commerce. Pashupati N. Pandey World Customs Organization

Chapter 2 The Basic Entry Process - Entry and Entry Summary CFR , 149 Flash Drive: Ch 2 Entry and Entry Summary. I. Entry 142.

Summary How trade with EU countries might change if the UK leaves the EU with no deal on 29 March 2019.

CUSTOMS AND EXCISE ACT, 1964 AMENDMENT OF RULES

SECTION II: CORE BUSINESS

CROSS-BORDER E-COMMERCE

THE ROLE OF TRANSIT AND TRANS-SHIPMENT IN COUNTERPROLIFERATION EFFORTS

EXPORT & CUSTOMS COMPLIANCE MANAGEMENT COURSE

All transactions are handled in accordance with Standard Trading Conditions of the Co.

Supply Chain Security IGTLC

Frequently Asked Questions - Single Customs Territory (SCT)

CBP Daily Operations

USE OF INFORMATION AND COMMUNICATION TECHNOLOGY AND NON-INTRUSIVE INSPECTION

Summary Declaration for Temporary Storage using the web channel. Sea Traffic

POSSIBLE MEASURES TO PREVENT AND ADDRESS DIVERSION: SUPPORTING EFFECTIVE IMPLEMENTATION OF THE ARMS TRADE TREATY

ICAO WCO JOINT WORKSHOP AIR CARGO SECURITY AND FACILITATION

The Ever-Evolving Threat of Fraud and Theft

AUTOMATED ENTRY PROCESSING (AEP) EXPORT

MUTUAL RECOGNITION AIR CARGO SECURITY CANADA - US. Presentation to Border Commercial Consultative Committee February 12, 2014

Expert Group Meeting on Documentation and Procedures for Rail- Based Intermodal Transport Services in Northeast and Central Asia

Frequently Asked Questions on Brexit

Air Carrier Eligibility Requirements

DG TAXUD Standardised Framework for Risk Management in The Customs Administrations of the EU

Original language: English SC69 Doc CONVENTION ON INTERNATIONAL TRADE IN ENDANGERED SPECIES OF WILD FAUNA AND FLORA

2007/ECSG/SYM/007 Challenges for Intellectual Property Rights Enforcement in a Paperless Environment

TIGER Logistic Link INCOTERMS 2010 INCOTERMS. The rules come into effect on January 1, Israel Tel.:

SHIPPING MANUAL. 15 th ISPOR EUROPEAN CONGRESS Berlin Germany International Congress Centrum. Your contact:

Unit 52: Exporting and Importing Documentation and Procedures


Application for Economic Operator Registration and Identification (EORI)

The Brexit Border: 4 key slides

SRI LANKA Items Needed Documents Customs Regulations Notes

Avanco International, Inc. TRANSPORTATION PLAN FOR THE TRANSFER OF CLASSIFIED MATERIAL

CBTC(Customs Border Targeting Center) Korea Customs Service

THE MINISTRY OF FINANCE

That will suffice as an introduction to the main modi operandi. And increasingly, offenders adapt to preventive measures as they identify them.

CHAPTER 63 HM REVENUE AND CUSTOMS. (MOD Sponsor: ACOS Logs and Infra)

Standards in a Digital World

At the time of writing this guide, the following are the only nine compulsory SCS programs implemented internationally:

CUSTOMS PROCEDURE CODES

CBP Identifies Most Common Reasons for Outbound Detentions and Seizures

The relationship existing between two parties by which one is authorized to transact certain business for the other.

DANGEROUS GOODS PANEL (DGP) MEETING OF THE WORKING GROUP OF THE WHOLE

Second International Hazardous Waste

CUSTOMS-2-BUSINESS CUSTOMS-2-GOVERNMENT CUSTOMS-2-CUSTOMS

Asia-Pacific Trade Facilitation Forum: Setting the Regional Agenda

EU CDM (The EU Customs Data Model)

A Guide to the changes being introduced on 1st July 2009

Customs Approval to Stuff Container. Freight Forwarder Books Space on Vessel. Permission to Stuff Container. Book Space. Container Made Available

Making the Case for RegTech: Lufthansa Cargo

Cabotage Rules for Canadian-Based Drivers

GENERAL ANNEX GUIDELINES

What Future for 100% scanning WCO Third party views Part 2. Brussels, June 11th Andrew Yell - Pierre Harris

SHIPPING MANUAL. By 24 th IAOM-MEA - Official Freight Forwarder

P12 Export Documents

AUTOMATED ENTRY PROCESSING (AEP)

Transcription:

Customs Perspectives on Detection of Deliberate Regulatory Violations in Global Supply Chains - the Role of Information and Data in Risk Identification Discussion Paper presented at: UNECE-OSCE Roundtable on Inland Transport Security, Vienna, Austria, 13.12.2011 Hintsa J., Männistö T., Urciuoli L., Ahokas J. Cross-border Research Association, Lausanne, Switzerland 1

Agenda Setting the scene: risk-based Paper intends to create common grounds for productive discussions between public and private sectors Recommendations 2

Risk what? Risk management Risk assessment Targeting Risk rules... Identification! Profiling High risk indicators 3

EU Internal Security Strategy and Common risk management framework Common risk management framework, CRMF, has its basis laid out in the Internal Security Strategy, ISS, of the European Union. As part of Objective 4 of the ISS document - Strengthen security through border management CRMF basics are explained in Action 3: Common risk management for movement of goods across external borders. 4

EU Internal Security Strategy and Common risk management framework (cont.) Significant legal and structural developments have taken place in recent years to improve the security and safety of international supply chains and movement of goods crossing the EU border. The Common Risk Management Framework (CRMF), implemented by customs authorities, entails continuous screening of electronic prearrival (and pre-departure) trade data to identify the risk of security and safety threats to the EU and its inhabitants, as well as dealing with these risks appropriately. The CRMF also provides for application of more intensive controls targeting identified priority areas, including trade policy and financial risks. It also requires systematic exchange of risk information at EU level. A challenge in the coming years is to ensure uniform, high-quality performance of risk management, associated risk analysis, and risk-based controls in all Member States. In addition to the annual report on the smuggling of illicit goods referred to above, the Commission will develop EU level customs assessments to address common risks. Pooling information at EU-level should be used to reinforce border security. In order to strengthen customs security to the required level at external borders, the Commission will work in 2011 on options to improve EU level capabilities for risk analysis and targeting and come forward with proposals as appropriate. 5

Business government communication: pretty much one-way street today? Here you are, Mr. Government agency! -My facilities -My IT systems -My pre-departure data -My declaration -My end-of month accounts etc. Now, can I get anything back from you? Thanks Ms. Supply chain operator. Sure, you get many things back from me, including: -Do-not-load messages -Flagging for physical inspections -Phone calls about missing or unclear information and data - Audit visits etc. 6

Discussion paper: Customs Perspectives on Detection of Deliberate Regulatory Violations in Global Supply Chains - the Role of Information and Data in Risk Identification 7

Financial objectives: -Illicit revenues - illicit cost savings Sequence of three bads Individuals Political, ideological, psychological objectives Type Bad actors in the supply chain WHO? Companies Networks of individuals and/or companies Illicit goods / content: -Prohibited items - Restricted items (w/o licenses) - Counterfeit goods - Endagered species - Stolen goods - Immigration violations Fiscal fraud (with licit goods): -Duty evasion - Excise tax evasion Type Bad shipments and movements in the supply chain WHERE? Within the cargo Within the vehicles Individuals Fiscal Type Bad consequences from the supply chain TO WHOM? Companies Non-fiscal Society as a whole 8

Taxonomy on customs related illicit activites four main categories The first category includes events where bad actors smuggle restricted and prohibited goods across borders in order to circumvent prohibitions, license requirements, quotas, and anti-dumping restrictions. The second category concerns shipping of cargo to forbidden destinations. In this category, the bad actors violate regulations regarding embargoed countries, organizations and individuals. The third category encompasses actions where the bad actors evade duties and taxes, which collection is the customs responsibility. Tax and duty fraud can be either partial or complete. The fourth category of customs related illicit activities relates to false reimbursement claims for refundable VAT, export subsidies, and drawbacks. The two latter categories, the duty fraud and the false reimbursement claims, are purely profit-driven illicit activities. In comparison, the smuggling of prohibited and restricted goods and the shipping of cargo to forbidden destinations can be motivated by fiscal benefits and sometimes by political and ideological reasons. 9

Taxonomy on customs related illicit activites nine criminal (sub)mos 1 Complete avoidance of customs controls 2 Undervaluation 3 Overvaluation 4 Under-declaration of quantity 5 Misrepresentation of tariff code 6 Misuse of authorizing documentation 7 False declaration of country of origin 8 False declaration of country of destination 9 False declaration of consignee 10

Type of customs realted illicit activity Smuggling of restricted and prohibited goods Shipping cargo to forbidden destination Tax and duty fraud False reimbursement claims Modus operandi Evasion of Absolute prohibition Licensing requirements Quota Anti dumping policies Country embargo Denied & restricted party controls Taxes & duties completely Taxes & duties partially Complete avoidance of 1 x x x x x x x customs controls Smuggling of restricted and prohibited goods Shipping cargo to forbidden destinations 2 Undervaluation x Tax and duty fraud 3 Overvaluation x x 4 Underdeclaration of quantity x x x 7. False declaration of country of origin Misrepresentation of tariff 5 x x x x x x x x x code 6 Misuse of authorizing documentation x x x x x x x x 7 False declaration of country of origin x x x x x x 8 False declaration of country of destination x x 9 x x x COPYRIGHT False declaration 2005-2011. of consignee Cross-border Research Association 11

Information sources to identify bad actors and bad shipments I. Authority II. Supply chain actors III. Third party Country embargoes (e,g. UN) Advance cargo information Declaration data Company databases, e.g. D&B Denied parties (e.g. EU) Postclearance audit data Shipping line databases Chamber of Commerce databases Criminal records Port community systems Aviation and air cargo databases Media and news Intel from other agencies Tips from informants 12

Flexibilities in data timing and data filing 13

Examples of data elements which may be used for risk identification purposes (CASSANDRA project - ICS/ECS + SAD) Consignor Consignee EORI number Country of consignment Country (ies) of transit (routing) Country of destination HS code Notify party Container owner Transport charges Method of payment Licence Country of Origin Procedure code Duty override code 14

Illustration of high risk indicators Supply chain actor / stage Shipper Illustration on what might be considered as high risk indicators Commodity Country of origin Carrier Container Routing and transshipments Importer 15

Supply chain actor / stage Illustration of high risk indicators (cont.) Illustration on what might be considered as high risk indicators Shipper Shipper has not exported the specific commodity before Shipper information cannot be found from commercial registers or from the Internet Commodity Hazardous materials which may be used for terrorist acts: e.g. Sulphur Dioxide and Iridium 192 Common materials which may be used for concealment purposes: e.g. sugar and auto parts Country of origin High level of corruption in the country Non-existing (or low) level of export controls: e.g. pre-cursor chemicals, narcotics, and dual use goods. Carrier Specific crew associated with organized crime Carrier history of frequent violations of customs enforced regulations Container Goods description does not match with the container type or with the total weight of the container. Discrepancies in seal numbers (documents versus actual seal) Routing and transshipments Routing of shipment is not cost effective Transshipment cost paid with cash Importer The frequency of imports does not support a sustainable business. A suspect employee is working for the importer. 16

EU Common Risk Management Framework 7. Identify risky supply chain actors and/or risky shipments and movements 1. Information on the supply chain actor (e.g. EU AEO or not ; previous record) 2. Pre-departure and/or pre-arrival data sets (DG TAXUD; ICS/ECS) 3. Intelligence (from a variety of sources) 6. National customs administration: -Receives pre-departure / pre-arrival data, through ICS and ECS - Carries out risk assessment, in a national targeting system, including EU common risk criteria 4. EU Common risk criteria and priorities ( risk rules ) 5. National risk criteria and priorities ( risk rules ) 10. 8. 9. Communication network linking all major points of entry (airports, seaports, land frontier) and all 27 national risk analysis centres - Communication between the Commission and Member States (MS) and among the MS - Exchange of risk related information - Implementation of the Priority Control Areas 17

Illustration of US TSA risk scoring f (current) = Random Inspection + IAC + Shipper (Not currently based upon risk assessment) (Approved: Y/N) (Known: Y/N) f (pilot)= Known Shipper Risk IAC Carrier & Shipment Risk Flight + + + + Risk Risk External Factor Risk Contact Name Company Name Address Employee Names 3 rd Party History Typical Cargo Classification KS and D&B Scores Inspection Results/ Vulnerabilities System Transaction History Shipper Profile Contact Name Company Name Address Employee Names 3 rd Party History Typical Cargo Classification IAC and D&B* Scores Inspection Results/ Vulnerabilities System Transaction History IAC Profile Inspection Results/ Vulnerabilities Flight Route Cargo Passenger Relationship Carrier Name Carrier Address System Transaction History Carrier Profile D&B Score Aircraft Type Dimensions (LxWxH) Weight Origination Destination Insurance Receiver Name Receiver Address Shipper Name Shipper Address Value Content Verification (through inspection) Multi-mode Travel Route Current Threat Conditions Watch List Country of Origin Region of Origin Country of Destination System Transaction History Region of Destination Airport of Departure Airport of Destination Flight Date Flight Time Number of Handlers Classification Codes Date Hazmat Data Trucking Company and Driver Data Data used in Pilot Risk Model Piece Count IAC = Indirect Air Carrier 18

Illustration of US TSA risk scoring (cont.) f (current) = Random Inspection + IAC + Shipper (Not currently based upon risk assessment) (Approved: Y/N) (Known: Y/N) f (pilot)= Known Shipper Risk IAC Carrier & Shipment Risk Flight + + + + Risk Risk External Factor Risk Contact Name Company Name Address Employee Names 3 rd Party History Typical Cargo Classification KS and D&B Scores Inspection Results/ Vulnerabilities System Transaction History Shipper Profile Contact Name Company Name Address Employee Names 3 rd Party History Typical Cargo Classification IAC and D&B* Scores Inspection Results/ Vulnerabilities System Transaction History IAC Profile Inspection Results/ Vulnerabilities Flight Route Cargo Passenger Relationship Carrier Name Carrier Address System Transaction History Carrier Profile D&B Score Aircraft Type Dimensions (LxWxH) Weight Origination Destination Insurance Receiver Name Receiver Address Shipper Name Shipper Address Value Content Verification (through inspection) Multi-mode Travel Route Current Threat Conditions Watch List Country of Origin Region of Origin Country of Destination System Transaction History Region of Destination Airport of Departure Airport of Destination Flight Date Flight Time Number of Handlers Classification Codes Date Hazmat Data Trucking Company and Driver Data Data used in Pilot Risk Model Piece Count IAC = Indirect Air Carrier 19

Revisiting EU ISS, Objective 4 20

Recommendations 1. Specify which additional risk related information and data sharing would have tangible benefits: Public to private, e.g. organized crime threats and MOs Private to public, e.g. internal risk management practices and outcomes 2. Analyze the costs and risks of enhanced risk related information sharing between public and private, including: Risk that enhanced sharing leads into educating the bad guys (government concern) Risk that enhanced sharing reveals some additional issues (business concern) 3. Based on the outcomes of step 1 and 2 above, take tangible next steps towards enhanced public-private risk related information and data sharing in the supply chain. 4. Look at also possibilities to improve multi-agency common risk analyses, as explained in EU ISS 21

Related on-going research please pick a brochure! FP7-FOCUS FP7-CASSANDRA CBRA 30 Customs Case Studies 22