Download - Globalization of Container Security
Globalization of Container Security
Its Origins, Its Transition, and Its Current Status
Dr. Jim Giermanski
Powers International
Three Phase Development Phase 1 - Harmonizing divergent Customs
Practices
Phase 2 - 9/11 and Port Security
Phase 3 - Chain of Custody
Phase 1: Pre 9/111999-2001
Recognition of the Need for Cooperation and
Modernization
Modernizing Customs
Revised Kyoto Convention of 1999 a) simplifying Customs procedures
b) information technology
c) automated targeting systems
d) maximum use of information technology
f) e-commerce
A DEFINING MOMENT
9/11
Phase-2: 2001-2004
Post 9/11 and the Maritime Model
Emergence of Security Programs
1. Customs Trade Partnership Against Terrorism (C-TPAT), 2001
a) Originally 7 companiesb) Now 8,322 firmsc) 7 security areas mandatedd) focus on importer, vessel carrier, and port/terminals
2. U.S. Container Security Initiative (CSI), 2002
a) Generated the 24 hr. Ruleb) 32 Countries participating, 58 Ports
First U.S. Laws and Port Security
Trade Act of 2002 as amended by The Maritime Transportation Security Act in November 2002
1. Advance Cargo Data (electronically)2. Security-Related
Vessel identification systemVessel security plansPort security assessments; and in the
3. Operational and efficiency MattersMaritime intelligence system Grants program
International Organizations/Standards
1. Transported Asset Protection Association (TAPA) issues Freight Security Requirements, 2001
2. International Maritime Organization (IMO)
a) Creation of International Ship and Port Facility Security Code (ISPS)
b) ISPS went into effect 2004, “Special Measures to enhance Maritime Security”
UN Economic Commission for Europe
Recommendation 33, (Approved September, 2004)
The Single Window through which “…trade-related information and/or documents need only be submitted once at a single entry point to fulfill all import, export, and transit-related regulatory requirements.”
Phase-2 Culminates In
The Maritime Model:
Port-to-Port Security
Until 2004 - The Maritime Focus
Phase-3: 2004 - 2008
A New View:
Origin to Destination
Modernizing Customs
Kyoto Convention ICT Guidelines (Information and Communication Technology)
2004a) electronic exchange of information at export
and import
b) chain of “electronic” data
c) single global schema linked electronically
The EU Factor
EC Regulation No. 1935/2004 a) origin to destination and traceability
b) safety of foodstuffs
EU report # 40008032-6-2 - 2005 a) security essential to supply chain
b) supply chain secure origin to destination
NGOs and Government Actions1. World Customs Organization (WCO),
2005Framework of Standards to Secure and Facilitate
Global Trade
a) Section 1-2-4 of WCO Standards: stuffing to destinationb) Appendix 1, Annex 1 control at stuffing, intermediate handling,
loading, off loading, terminal, destination c) Edifact and XML as EDI standards
NGO’s and Governments, Cont.
U.S. Adopts WCO Standards, 2005
Kyoto ICT Guidelines go into effect, 2006
Governments Programs and Laws
C-TPAT Changes: New Standards for Importers 2005/2006 a) Security begins at Stuffing b) Tracking and monitoring c) 9 areas of security
SAFE Port Act, October 2006 a) Advance Electronic Informationb) Origin to Destination Securityc) Many WCO components incorporatedd) Codification of C-TPAT and CSIe) Green Lanes (Tier-3) established
The EU’s AEO
AEO (Authorized Economic Operator) 2006a) Use of advance electronic data
b) Electronic records
c) Security Compliance to SAFE Framework
d) Adopting of Single Window Concept
e) Authorized access to cargo and control of seals
f) Control of cargo from loading to unloading
g) Generally Consistent to C-TPAT
New U.S. Law and Supreme Court Decision
Implementing the 9/11 Commission Recommendations Act of 2007
a) Detect breach and access “prior” to entering U.S.b) Electronic notification of breach in supply chain c) Applicability of end-to-end security for all truck, rail, and vessel
New Federal Rules Of Civil Procedure 2007
a) Electronic data discoverable for litigation in civil matters b) Impact on role and value of chain of custody c) Role of 3rd party control of data
What Does it All Mean?
The New Model:
Electronic Global Chain of Custody (EGCC)
Maritime Model Obsolete
The New EGCC Global Supply Chain Defineda) No longer port-to-port b) Now Origin to Destination
Technology Needed a ) No longer RFID-only “RFID is only an interim solution and that ultimately CBP
will use container security devices…” Greg Olsavsky, CBP’s Director of
Cargo Control (May, 2008) b) Satellite c) GSM/Zigbeed) 3rd party platforms, servers, and call centers
A SINGLE WINDOW Implementation In U.S.
U.S. Single Window
International Trade Data System (ITDS) establishes a
single portal system: ACE
ACE (Automated Commercial Environment) Eventually Combines:
a) Automated Manifest System (AMS) b) Automated Broker Interface (ABI) c) Automated Export System (AES) d) Automated Commercial System (ACS)
Types of Data: CSI’s 24-hr. Manifest
Carrier SCAC Code Foreign Port of LadingLast Foreign Port First Foreign Place of ReceiptVessel Name Vessel CountryVoyage Number Date of Arrival at First US PortIMO Vessel ID Number Port of UnladingDate of Departure from Port Time of Departure from PortContainer NumberCommodity Description (with HTS-6)Commodity WeightBill of Lading NumberShipper Name and AddressConsignee Name and AddressHazmat CodeSeal NumberNumbers and Quantity
Proposed “10 + 2” Data
Manufacturer Name and AddressSeller Name and AddressBuyer Name and AddressShip To Name and AddressContainer Stuffing LocationConsolidator Name and AddressImporter of Record Number Ultimate Consignee Number Country of OriginCommodity/HTS-6 digit
Stow PlanContainer Movement Data
EGCC Today
Origin to Destination
Electronic Global Chain of Custody Model
Electronic Global Chain of Custody Paradigm
Virtual Network
Place of Origin
1.Container #2.Device#3.Date/time/seal4.Aurthorization ID5..Activation
PORT OF ORIGIN 24 hr. Manifest
Customs and Border Protection
Internet1.Container#2.Device#3.Date/Time4.Integrity Reading
Sails to destination port
EGCC Capabilities•Tracking•Detecting•Recording
•Transmitting•3rd Party Verifying
PORT OF DESTINATION
Place of Destination
Model’s Components
Software
& Hardware
Satellite Communications and Tracking Interface
Global Communications Interface