28
Sean Moon Office of Policy Development Cargo, Maritime & Trade June 19, 2008 International Supply Chain Security

International Supply Chain Security

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: International Supply Chain Security

Sean MoonOffice of Policy DevelopmentCargo, Maritime & Trade

June 19, 2008

International Supply Chain Security

Page 2: International Supply Chain Security

2

Creating a Context…

What is “Security Infrastructure?”

The fundamental structure of security systems or organizations.

The basic, fundamental architecture of any system (electronic, mechanical, social, political, etc.) determines how it functions and how flexible it is to meet future requirements.

Page 3: International Supply Chain Security

3

The Size of the ChallengePhysical Size

95,000 miles of shoreline7,000 miles of land border3,537,441 square miles (9,161,930 square kilometers)

Infrastructure3,200 regulated facilities360 major ports

Trade volume2 billion tons annually of foreign and domestic freight59,000,000 20-foot equivalent units (TEUs) of containerized trade shipments in 20005 billion barrels of oil imported

Page 4: International Supply Chain Security

4

Page 5: International Supply Chain Security

5

Achieving SecuritySo how do we defend against the threats?

Risk ManagementLayering Partnerships

While ensuring that we strike a balanceFreedom of movementPrivacyEconomic Vitality

Page 6: International Supply Chain Security

6

Plans harmonized to each other

National Strategy for Homeland Security

National Infrastructure

Protection Plan

HSPD-5 HSPD-7 NSPD-41/HSPD-13

Sector Specific Plans

National Response

Plan

National Incident

Management System

National Strategy for Maritime Security

MDA

DOP

IOCS

MOTR

GMAII

Maritime Infrastructure Recovery Plan

MCSP

MTSSR

Intelligence Reform & Terrorism

Prevention Act of 2004

Maritime Transportation

Security Act of 2002

National Strategy for Transportation

Security

National Maritime Transportation Security Plan

Maritime Appendix of National Strategy for Transportation Security

Plan to Re-establish Cargo Flow After a Security Incident

Area Maritime Security Plans

Facility Security Plans

Vessel Security Plans

Salvage Response Plans

Page 7: International Supply Chain Security

7

Managing Risk

“We simply cannot eliminate all risk and even if we tried, we’d end up shutting down the

very systems we’re trying to protect.”

Secretary Chertoff, July 20, 2007

Page 8: International Supply Chain Security

8

Risk Defined

Threat Risk = Likelihood x Vulnerability x Consequence.

Page 9: International Supply Chain Security

9

Layered Security

The concept of layered security has been around for a very long time.

Take, for instance, castles…

Page 10: International Supply Chain Security

10

Page 11: International Supply Chain Security

11

Supply Chain Security StrategyRequired by the “Security and Accountability for Every Port Act of 2006.”

Establishes the overarching framework for the secure flow of cargo through the supply chain.

Builds on existing strategies, plans, programs, and partnerships.

Was BUILT in partnership.

http://www.dhs.gov/xprevprot/publications/gc_1184857664313.shtm

Page 12: International Supply Chain Security

12

Key Elements of StrategyStrategy builds on existing planning efforts, such as National Strategy for Maritime Security and the National Response Plan

Initial strategy integrates efforts of multiple agencies and explains the inter-relationships between their programs.

Many of the programs (e.g., the Customs-Trade Partnership Against Terrorism) are founded on private sector involvement.

Many of the programs (e.g., the Secure Freight Initiative) directly involve infrastructure, whether government or private.

Protocols for resumption explain relative roles of government agencies and private sector and provide basis for prioritization of cargo/vessels.

Page 13: International Supply Chain Security

13

A Partnership SuccessImmediately upon enactment, Policy gathered a writing team of SMEs from USCG, CBP, TSA, S&T, DNDO, G&T, and PREP. A first draft was completed at the end of February, 2007.

The first draft was vetted within the components by writing team members, and a second draft completed in early March.

The second draft was used to consult with the COAC, NMSAC, HSAC, and MSPCC. Comments received were used to create third draft, completed in early June.

Formal Interagency Review/OMB Clearance

International Consultations

State, Local, Tribal Stakeholder Consultation

Private Sector Consultation

Advisory Committee Consultation

Interagency Reviews

Internal Department Review

Plan Development by Subject Matter

Expert Writing Teams

Initial Submission to Congress (July 2007)

Final Submission to Congress (October 2009)

Page 14: International Supply Chain Security

14

End-to-End Systems ApproachSupply chain strategy stretches across the system, and is formatted based on transportation/processing nodes.

Destination

Destination

Storage

Shipment Consolidation

Port of Origin

Port of Entry Storage

Shipment Deconsolidation

Transshipment Port

Packaging Origination

Empty Container

CargoOrigination

Destination

Page 15: International Supply Chain Security

15

Responsibilities…

Destination

Destination

Storage

Shipment Consolidation

Port of Origin Port of Entry Storage

Shipment Deconsolidation

Transshipment Port

Packaging Origination

Empty Container

CargoOrigination Destination

Private Sector as owners, operators of cargo, transportation, and facilities.

Department of Homeland Security: Direct AuthorityDepartment of Homeland Security: International Agreements and Initiatives

U. S. Coast Guard

U. S. Customs and Border Protection

Transportation Security Administration

Federal Emergency Management

Office of Intelligence and Analysis

Office of Operations Coordination

Department of Defense (including U. S. Army Corps of Engineers)

Department of State

Department of Transportation

Maritime Administration Federal Highway Administration

Federal Railroad Administration

Saint Lawrence Seaway Development Corporation (ONLY within Seaway)

Office of Pipeline Safety

Department of Interior

Department of Commerce

National Oceanic and Atmospheric Administration

Department of Energy

Department of Justice

State, Local, Tribal Governments (within their geographic regions)

Port Authorities

Immigrations and Customs Enforcement

Page 16: International Supply Chain Security

16

Program Impacts

Destination

Destination

Storage

Shipment Consolidation

Port of Origin Port of Entry Storage

Shipment Deconsolidation

Transshipment Port

Packaging Origination

Empty Container

CargoOrigination Destination

Customs-Trade Partnership Against Terrorism

DOE MegaPorts

CSI

24-Hour Rule

Known Shipper

IPSP

International Ship and Port Facility Security Code (ISPS Code)

IPSP

Maritime Transportation Security Act Regulations

Advance Notice of Arrival

USCG Operational Security

Transportation Worker Identification Credentials

Cargo Screening/ATS

Radiation Portal Monitors

Non-Intrusive Inspections

Inspections

USCG Certain Dangerous Cargo Reporting

Domestic Air Cargo Programs

Domestic Surface Transportation Programs

Nationwide Automatic Identification System (NAIS)

Long Range Identification and Tracking (LRIT) System

SFI

Page 17: International Supply Chain Security

17

Trade ResumptionStrategy to Enhance International Supply Chain Security.

Prioritization protocolsCodifies use of Recovery Units

APEC Trade Recovery ProgrammeGovernment to government communicationsFramework of agreed upon actions in APEC

APEC TRP Pilot Exercise

Page 18: International Supply Chain Security
Page 19: International Supply Chain Security

19

Security and Accountability For Every (SAFE) Port Act of 2006Section 231 §(a)

Scanning Pilot Program Requirement“The Secretary shall designate three foreign seaports through which containers pass or are transshipped to the United States for the establishment of pilot integrated scanning systems that couple non- intrusive imaging equipment and radiation detection equipment.”

Section 232 §(a)

100% Screening Requirement“The Secretary shall ensure that

• 100% of the cargo containers unloaded at a U.S. seaport undergo a screening to identify high-risk containers.

• 100% of the containers identified as high-risk are scanned or searched before leaving a U.S. seaport facility.”

Page 20: International Supply Chain Security

20

9/11 Recommendations Implementation Act

The legislation amended Section 232 of the SAFE Port Act and requires 100% scanning of all U.S.-bound containers by July 1, 2012. Two-year extensions can be granted if any two of the following conditions exist:

Scanning systems are unavailable for purchase & installation.Scanning systems generate high false alarm rates.Physical infrastructure is unavailable to install/operate equipment.Scanning systems cannot be integrated with existing systems.“Trade capacity and the flow of cargo” are significantly impacted.No automatic mechanisms are available to identify high-risk containers and generate inspection.

Page 21: International Supply Chain Security

21

C-TPAT Achievements: As of Dec. 31, 2007

7,948 Certified Partners:6,891 Total Validations Completed

6,290 Initial Validations Completed

601 Re-Validations Completed

464 total suspensions/ removals (234 Highway Carriers)

Year(s) Certified Validated2002-2006 5,347 5,329

2007 2,601 961Total: 7,948 6,290

0

1000

2000

3000

4000

2003 2004 2005 2006 2007

Page 22: International Supply Chain Security

22

C-TPAT BenefitsA reduced number of inspections and reduced border wait times.

A C-TPAT supply chain specialist to serve as the CBP liaison for validations, security issues, procedural updates, communications, and training.

A reduced selection rate for Compliance Measurement Examinations in the Automated Commercial Systems (ACS).

Targeting benefits in the ATS targeting system.

Access to FAST lanes on the Canadian and Mexican borders.

Priority access to the Automated Commercial Environment (ACE).

Page 23: International Supply Chain Security

23

Thank you.Sean K. Moon, Senior Policy Advisor

Office of Policy Development Cargo, Maritime, and Trade

U.S. Department of Homeland Security Washington, DC, USA 20528

(202) 282-9063

Page 24: International Supply Chain Security

24

Container Security Initiative (CSI)

CSI core elements:Identify high-risk containers, using automated targeting tools based on advance information and intelligenceEvaluate containers as early in the supply chain as possible, generally at the port of departure before shipmentRapidly scan high-risk containers without slowing down trade, using large-scale X-ray and gamma ray machines and radiation detection devices

Page 25: International Supply Chain Security

25

Current CSI Ports

Page 26: International Supply Chain Security

26

Secure Freight Initiative (SFI)

Enhance SecurityIdentify radiological or nuclear threats earlier in the supply chain and provide host governments with greater visibility into potentially dangerous shipments.

Facilitate TradeReduce the need for redundant exams, maintain port efficiency, and ensure seamless trade resumption protocols.

Improve Risk ManagementProvide U.S. Customs and Border Protection (CBP) additional data elements to improve its risk assessment capabilities.

On December 7, 2006, DHS and the Department of Energy announced this joint-initiative to:

Page 27: International Supply Chain Security

27

Current SFI Ports

Page 28: International Supply Chain Security

28

In conclusion…

DHS is strongly committed to partnerships – with all the stakeholders.

We are moving toward homogenized security infrastructure, based on valid lessons learned from current programs.

We are very aware of the potential impacts of security programs – and the need to balance facilitation with them.