32
Globalization of Container Security Its Origins, Its Transition, and Its Current Status Dr. Jim Giermanski Powers International

Globalization of Container Security

  • Upload
    nevina

  • View
    22

  • Download
    0

Embed Size (px)

DESCRIPTION

Globalization of Container Security. Its Origins, Its Transition, and Its Current Status Dr. Jim Giermanski Powers International. Three Phase Development. Phase 1 - Harmonizing divergent Customs Practices Phase 2 - 9/11 and Port Security Phase 3 - Chain of Custody. - PowerPoint PPT Presentation

Citation preview

Page 1: Globalization of Container Security

Globalization of Container Security

Its Origins, Its Transition, and Its Current Status

Dr. Jim Giermanski

Powers International

Page 2: Globalization of Container Security

Three Phase Development Phase 1 - Harmonizing divergent Customs

Practices

Phase 2 - 9/11 and Port Security

Phase 3 - Chain of Custody

Page 3: Globalization of Container Security

Phase 1: Pre 9/111999-2001

Recognition of the Need for Cooperation and

Modernization

Page 4: Globalization of Container Security

Modernizing Customs

Revised Kyoto Convention of 1999 a) simplifying Customs procedures

b) information technology

c) automated targeting systems

d) maximum use of information technology

f) e-commerce

Page 5: Globalization of Container Security

A DEFINING MOMENT

9/11

Page 6: Globalization of Container Security

Phase-2: 2001-2004

Post 9/11 and the Maritime Model

Page 7: Globalization of Container Security

Emergence of Security Programs

1. Customs Trade Partnership Against Terrorism (C-TPAT), 2001

a) Originally 7 companiesb) Now 8,322 firmsc) 7 security areas mandatedd) focus on importer, vessel carrier, and port/terminals

2. U.S. Container Security Initiative (CSI), 2002

a) Generated the 24 hr. Ruleb) 32 Countries participating, 58 Ports

Page 8: Globalization of Container Security

First U.S. Laws and Port Security

Trade Act of 2002 as amended by The Maritime Transportation Security Act in November 2002

1. Advance Cargo Data (electronically)2. Security-Related

Vessel identification systemVessel security plansPort security assessments; and in the

3. Operational and efficiency MattersMaritime intelligence system Grants program

Page 9: Globalization of Container Security

International Organizations/Standards

1. Transported Asset Protection Association (TAPA) issues Freight Security Requirements, 2001

2. International Maritime Organization (IMO)

a) Creation of International Ship and Port Facility Security Code (ISPS)

b) ISPS went into effect 2004, “Special Measures to enhance Maritime Security”

Page 10: Globalization of Container Security

UN Economic Commission for Europe

Recommendation 33, (Approved September, 2004)

The Single Window through which “…trade-related information and/or documents need only be submitted once at a single entry point to fulfill all import, export, and transit-related regulatory requirements.”

Page 11: Globalization of Container Security

Phase-2 Culminates In

The Maritime Model:

Port-to-Port Security

Page 12: Globalization of Container Security

Until 2004 - The Maritime Focus

Page 13: Globalization of Container Security

Phase-3: 2004 - 2008

A New View:

Origin to Destination

Page 14: Globalization of Container Security

Modernizing Customs

Kyoto Convention ICT Guidelines (Information and Communication Technology)

2004a) electronic exchange of information at export

and import

b) chain of “electronic” data

c) single global schema linked electronically

Page 15: Globalization of Container Security

The EU Factor

EC Regulation No. 1935/2004 a) origin to destination and traceability

b) safety of foodstuffs

EU report # 40008032-6-2 - 2005 a) security essential to supply chain

b) supply chain secure origin to destination

Page 16: Globalization of Container Security

NGOs and Government Actions1. World Customs Organization (WCO),

2005Framework of Standards to Secure and Facilitate

Global Trade

a) Section 1-2-4 of WCO Standards: stuffing to destinationb) Appendix 1, Annex 1 control at stuffing, intermediate handling,

loading, off loading, terminal, destination c) Edifact and XML as EDI standards

Page 17: Globalization of Container Security

NGO’s and Governments, Cont.

U.S. Adopts WCO Standards, 2005

Kyoto ICT Guidelines go into effect, 2006

Page 18: Globalization of Container Security

Governments Programs and Laws

C-TPAT Changes: New Standards for Importers 2005/2006 a) Security begins at Stuffing b) Tracking and monitoring c) 9 areas of security

SAFE Port Act, October 2006 a) Advance Electronic Informationb) Origin to Destination Securityc) Many WCO components incorporatedd) Codification of C-TPAT and CSIe) Green Lanes (Tier-3) established

Page 19: Globalization of Container Security

The EU’s AEO

AEO (Authorized Economic Operator) 2006a) Use of advance electronic data

b) Electronic records

c) Security Compliance to SAFE Framework

d) Adopting of Single Window Concept

e) Authorized access to cargo and control of seals

f) Control of cargo from loading to unloading

g) Generally Consistent to C-TPAT

Page 20: Globalization of Container Security

New U.S. Law and Supreme Court Decision

Implementing the 9/11 Commission Recommendations Act of 2007

a) Detect breach and access “prior” to entering U.S.b) Electronic notification of breach in supply chain c) Applicability of end-to-end security for all truck, rail, and vessel

New Federal Rules Of Civil Procedure 2007

a) Electronic data discoverable for litigation in civil matters b) Impact on role and value of chain of custody c) Role of 3rd party control of data

Page 21: Globalization of Container Security

What Does it All Mean?

The New Model:

Electronic Global Chain of Custody (EGCC)

Page 22: Globalization of Container Security

Maritime Model Obsolete

Page 23: Globalization of Container Security

The New EGCC Global Supply Chain Defineda) No longer port-to-port b) Now Origin to Destination

Technology Needed a ) No longer RFID-only “RFID is only an interim solution and that ultimately CBP

will use container security devices…” Greg Olsavsky, CBP’s Director of

Cargo Control (May, 2008) b) Satellite c) GSM/Zigbeed) 3rd party platforms, servers, and call centers

A SINGLE WINDOW Implementation In U.S.

Page 24: Globalization of Container Security

U.S. Single Window

International Trade Data System (ITDS) establishes a

single portal system: ACE

ACE (Automated Commercial Environment) Eventually Combines:

a) Automated Manifest System (AMS) b) Automated Broker Interface (ABI) c) Automated Export System (AES) d) Automated Commercial System (ACS)

Page 25: Globalization of Container Security

Types of Data: CSI’s 24-hr. Manifest

Carrier SCAC Code Foreign Port of LadingLast Foreign Port First Foreign Place of ReceiptVessel Name Vessel CountryVoyage Number Date of Arrival at First US PortIMO Vessel ID Number Port of UnladingDate of Departure from Port Time of Departure from PortContainer NumberCommodity Description (with HTS-6)Commodity WeightBill of Lading NumberShipper Name and AddressConsignee Name and AddressHazmat CodeSeal NumberNumbers and Quantity

Page 26: Globalization of Container Security

Proposed “10 + 2” Data

Manufacturer Name and AddressSeller Name and AddressBuyer Name and AddressShip To Name and AddressContainer Stuffing LocationConsolidator Name and AddressImporter of Record Number Ultimate Consignee Number Country of OriginCommodity/HTS-6 digit

Stow PlanContainer Movement Data

Page 27: Globalization of Container Security

EGCC Today

Origin to Destination

Page 28: Globalization of Container Security

Electronic Global Chain of Custody Model

Page 29: Globalization of Container Security

Electronic Global Chain of Custody Paradigm

Virtual Network

Place of Origin

1.Container #2.Device#3.Date/time/seal4.Aurthorization ID5..Activation

PORT OF ORIGIN 24 hr. Manifest

Customs and Border Protection

Internet1.Container#2.Device#3.Date/Time4.Integrity Reading

Sails to destination port

EGCC Capabilities•Tracking•Detecting•Recording

•Transmitting•3rd Party Verifying

PORT OF DESTINATION

Place of Destination

Page 30: Globalization of Container Security

Model’s Components

Software

& Hardware

Satellite Communications and Tracking Interface

Page 31: Globalization of Container Security

Global Communications Interface

Page 32: Globalization of Container Security

Dr. Jim Giermanski

Powers International

[email protected]