Title: Secure global supply chains
1Secure global supply chains
- Dr Albert Veenstra
- Decision and information sciences
- RSM Erasmus University
- IAME 12-14 july 2006
2Background
- Security influences worldwide supply chains
- 9/11
- Madrid, London
- Security growing political issue
- Container Security Initiative, CSI, 24h Manifest
Rule - Customs Trade Partnership Against Terrorism,
C-TPAT - Containerscans, radiation detection gates
- Security measures so far focused on transport
system - Ships, Terminals, Ports, ...
3Starting point
- Towards reliable and secure global supply chains
- ? There has to be a win-win in striving for
security with business efficiency gains
4- International developments
5Developments
- World Customs Organisation Framework of
standards to secure and facilitate global trade - US C-TPAT, CSI, 24hr rule,
- Security requirements for imports in many other
countries (Frontline, PIP, SEP, FAST, BASC,
Stairsec, ) - EU Authorized economic operator, regulation on
enhancing supply chain security
6Developments
In China Red list/ black list Anti-corruption
policy Anti-overloading policy
- Netherlands safe entrepreneurship, platform
vehicle crime, intelligence agenda,
implementation of regulation - Technology providers Savi networks, GE, Siemens,
Philips, IBM, Zoca, . (RFID, seals, locks, smart
box, anti-tampering devices, cameras, scanners,
) - International pilots
7Developments
- ISO RFID standards (433 MHz)
- ISO 28000/28001
- CEN security standard
- TAPA security standards (FSR, TSR)
- C-TPAT certification
- AEO screening
- Information system security
8Results on Security Measure Popularity
Source Gutierrez X., Hintsa J. (2006). Voluntary
Supply Chain Security Programs A Systematic
Comparison. ILS 2006. The International
Conference on Information Systems, Logistics and
Supply Chain. Lyon, France. May 15-17, 2006.
(submitted, under review)
9- Opinion pole among shippers and logistics service
providers
10Terrorism what is the extent of the following
occurrences on your company
11Crime what is the extent of the following
occurrences on your company
12Summary
- Ports, airports, transportation by road are seen
as major weak spots - Much of the industry initiatives focus(ed) on
transportation and ports
13- Secure supply chain strategy
14(No Transcript)
15 Visibility in the chain
Receiver
Bonded warehouse Europe
Inland shipping terminal
Producer
Port China
Port Europe
16Issues
- Who will facilitate information flow?
- What kind of information is useful for security
purposes? - What is the special role of transport operators
and ports?
17Example Savi Technology? SST
18The Technology RFID Tag
- information gtgt barcode
- sender activated
- size lt pinhead
- cost few cents
19ISO Standards
- ISO 10374 Permanent Container Tag
- ISO 17363 e-Seal Supply Chain Tag
- ISO 18185 e-Seal Shipping-Line Tag
-
20Port of Hong Kong
Radiation portal monitor
Optical character recognition
(Vacis is the brand name)
21Evaluation
- 100 scanning is the future (US is contemplating
to make this mandatory, and in some industries,
it already is common) - Customs exchange of information is promoted by
WCO. - Technical standards are not satisfactory yet
- Main interest for terminal ops and shipping lines
is in commercial use of the information
22Example Port Infolink
23Port infolink
Port infolink Information exchange platform
24Datamining
- Port Infolink is the single entry platform for
customs declaration for cargo coming in by sea
Suspect containers
Import declaration Sagitta Binnenbrengen
Selector/ expert
Intelligent selection system
administrative handling
Remainder
Intelligence Rules ? Analysis ?
25Port Infolink
- Platform for new data gathering
- Tracking and tracing technology
- Scanning
- Image recognition
- Dissemination of different types of data
- Document corrections
- Late data entry
- Incomplete declarations
- Partnering information
- Previous partners
- Partner status
- Additional applications of datamining
26Example Port of Rotterdam
- What is the involvement of the Port of Rotterdam
in international container security?
27Security Policy Port of Rotterdam
Supply Chain Security
NL VITAL project Identifying critical
infrastructure objects in the port ? ISPS approach
Port security (EU directive)
Ships and terminals (ISPS)
28Security Policy Port of Rotterdam
- Does the Port of Rotterdam have a role in supply
chain security? - Veenstra van Nunen (2005) The port does not
have to be secure, as long as the cargo flowing
through it are secure - And
- The port should facilitate whatever security
level is required by the port users
29Port of Rotterdam
30Port of Rotterdam
31Port of Rotterdam
2nd maasvlakte Central Gate concept should the
area have single secure entry gate or not?
32Port of Rotterdam
- For the moment PoR central gate concept
- Reason lets not bother the tendering companies
at Maasvlakte II with complications - But Securitas has a contract to jointly secure
ECT, Customs, power station, Lyondell, EMO,
(end of 2005) on Maasvlakte I
33Port of Rotterdam
34Port of Rotterdam
- Dilemma
- ECT and Savi want RFID readers in all cranes, as
well as some gates and along A15 - Siemens wants ATD readers on all nuclear readers
as well as along A15 - Euromax terminal will have its own scanner,
mainly for verifying if container is empty - ? Should Port of Rotterdam facilitate this kind
of security infrastructure?
35Thank you for your attention!