BUSN 6110 Webster Spring
Supply Chain Security “the single biggest threat facing American traders is supply chain security” Website for C-T PAT
As a whole, supply chain professionals see cargo theft as a major risk for their operations over the next five years. With 74% having felt moderate to major impacts on their supply chain operations due to theft, coupled with the ever‐continuing rise in cargo theft rates and loss values, it is no wonder that this criminal enterprise looms as one of the most significant concerns of the decade. As such, the industry continues to increase information sharing, best practices and cooperative measures to ensure the timely arrival and safe passage of goods throughout the nation’s supply chain.
Why should you care about SC Security? Is it a US problem? Global Problem Heathrow Airport delays Superbowl weekend 2005 RFID – is this the solution? ISO Guidelines for SC Security Terrorism Insurance
Supply Chain Security What’s the cost of 9/11 to the Supply Chain? Fortune Magazine - $50-80 billion a year inefficient supply chains higher transportation costs increased inventory
Problem? Terrorism/Piracy Obsolescence Pilferage Information Breach Proprietary Data – Camera Phones; Thumb Drives Cyberspace Security RFID Data Security 66% of Sealift Containers arrive at 20 Major Ports >58 % of all inbound containers come through New York/New Jersey, Los Angeles, Long Beach ~44% through Los Angeles/Long Beach 6/8/2016
Recent Headlines IMB identifies rash of false shipments into North Africa IMB identifies rash of false shipments into North Africa Pirates intensify attacks in new areas, with first Somali hijacking reported in Red Sea Pirates intensify attacks in new areas, with first Somali hijacking reported in Red Sea Maersk Alabama Captain Held by Pirates Peanut Corporation of America Somali piracy is worst in world – BBC News Russia Sends Warship to Somali Coast to Fight Piracy – Bloomberg.com UN adopts new Somalia piracy resolution
6/8/ Supply Chain Headlines “New Budget includes $10.2 Billion for Border Security.” “Battling the Bad Guys: 2005 Was a Tough Year” Dec 2005 Baseline Magazine “Major Data Theft Leads to Major Legal Problems” Baseline Magazine “Polo Ralph Lauren – Lost Point of Sale Data” “Somali pirates hijack fourth vessel in a week,” January 2, 2010
More Headlines “Somali pirates hijack cargo ship near Seychelles,” April 11, 2010, AP News “Somali pirates attempt attack on Dutch warship,” March 17, 2010 “New suite of ISO supply chain management standards to reduce risks of terrorism, piracy and fraud” 6/8/201615
Examples Major Distributor, Dec 2006 Locks on trucks SAFE Port Initiative Scanning of Containers C-TPAT ISO Standards for Supply Chain Security Threats in the international market-place know no borders.
Worldwide Incidents: updated on 23 April 2012 Total Attacks Worldwide: 121 Total Hijackings Worldwide: 13 Incidents Reported for Somalia: Total Incidents: 51 Total Hijackings:11 Total Hostages: 158 Current vessels held by Somali pirates: Vessels: 12 Hostages: 173
Terrorism Risk Insurance U.S. Terrorism Risk Insurance Act (TRIA)U.S. Terrorism Risk Insurance Act (TRIA) – property and casualty insurance experts are helping clients with interests in the United States make informed decisions about terrorism coverage. U.S. President George W. Bush signed the Terrorism Risk Insurance Act (TRIA) into law in November 2002 to stimulate business investment that had slowed to a trickle after the events of September 11, The law creates a three-year federal program that backs up insurance companies and guarantees that certain terrorist-related claims will be paid. TRIA is a short-term measure designed to give the insurance market time to recover and develop new solutions.
On December 26, 2007, the President signed into law the Terrorism Risk Insurance Program Reauthorization Act of 2007 which extends the Terrorism Risk Insurance Act through December 31, The law extends the temporary federal Program that provides for a transparent system of shared public and private compensation for insured losses resulting from acts of terrorism.
Supply Chain Security “We have proved to our management that good security is good business.” — Ann Lister of Texas Instruments
Risk Supply Chains are inherently complex, dynamic, and fluid, characterized by uncertainty, ambiguity, and friction. These characteristics cloud the operating environment: they create risks
Risk Assessment Terrorism Port Security – over 12 million containers annually to the US; 400 million world wide Port Security – 300 US Ports Longshoremen Strike – 2002 Potential Airport Attack – LAX; MPS; LGA
Risk Assessment “If you do things the way you’ve always done them, you’ll get the same things you’ve always got.” -Darrell Waltrip This is not your Dad’s Supply Chain! Security is an integral part of the Supply Chain and Homeland Defense
What are Supply Chain Hazards? Theft/Pilferage Competition Information Systems Cell Phones Thumb Drives Camera Phones Disgruntled Employees Lack of Training
Important? September 11, $2 billion per day lost Longshoremen Strike, 2002 – ships backed up Potential loss of attack to major port - $20 billion estimate 12 million containers into US; up to 490 million containers world wide;
New Problem? “There were no ‘secure’ rear areas.” G eneral Joseph Heiser on Vietnam Logistics Sun Tzu – Chapter 1, The Art of War Native Americans American Civil War – Great Train Chase Pirates of the Caribbean
Supply Chain Security A Global Perspective
ISO Standards With an internationally recognized security management system, stakeholders in the supply chain can ensure the safety of cargo and people, while facilitating international trade, thus contributing to the welfare of society as a whole
Top 5 European Ports Rotterdam – million TEUs in 2009 Rotterdam Hamburg – million TEUs (9.7 mil in 2008) Antwerp – 7.3 million TEUs (8.6 in 2008) Bremen – million TEUs (5.5 in 2008) Valencia – 3.65 million (3.6 in 2008)
Other Key Ports Singapore – million TEUs Shanghai – 25 million Hong Kong – 20.9 million Shenzhen – million Pusan – million
Rotterdam > 900 intermodal barge moves daily to 72 locations > 200 rail moves 220 million people within 600 miles of Rotterdam
Rail > 15% of cargo to Germany via rail ~ 13% of Belgium cargo ~ 14 of French cargo US Rail – 4 major bridges over the Mississippi River
SAFE Port Act The SAFE Port Act codified into law a number of programs to improve security of U.S. ports, such as: Additional requirements for maritime facilities Creation of the Transportation Worker Identification Credentials Establishment of interagency operational centers for port security
Safe Port Act Container Security Initiative Foreign port assessments Customs Trade Partnership Against Terrorism
The three core elements of CSI are: Identify high-risk containers. CBP uses automated targeting tools to identify containers that pose a potential risk for terrorism, based on advance information and strategic intelligence. Prescreen and evaluate containers before they are shipped. Containers are screened as early in the supply chain as possible, generally at the port of departure. Use technology to prescreen high-risk containers to ensure that screening can be done rapidly without slowing down the movement of trade. This technology includes large-scale X-ray and gamma ray machines and radiation detection devices.
Containers - Concerns Cost to X-Ray containers Manpower Delays Radiation
DHS Secretary Janet Napolitano announced that the United States is no longer going to screen every cargo container before it enters the United States; she said, "We believe the so-called 100 percent requirement is probably not the best way to go“ November 28, 2011 news
Transportation Worker Identification Credentials Port Employees Long Shoremen Unescorted access personnel
C-TPAT Voluntary November members Canada has a program very similar to C-TPAT named FAST – Free and Secure Trade.
C-TPAT According to US Customs and Border Protection Agency, the benefits of participating in C-TPAT could include: – Playing an active role in the war against terrorism – A reduced number of CBP inspections. – Priority processing for CBP inspections.
Orlando International Airport No staffing of doors for employee entrance to baggage claim areas Guns smuggled into planes by employees “no requirement for us to staff those doors” OIA Spokesperson; TSA – “not my job!” Identified as security issues in – ½ of TSA Screeners failed test that measured how well employees could identify explosives, guns and other weapons on the scanner – but can identify bottles of mouthwash and toothpaste Source: Mike Thomas, Orlando Sentinel, Mar 15, 2007, p. B-1
Food Security
BioTerrorism? Peter Pan Peanut Butter – e coli – 2007 E-coli from fresh Spinach – 2006 Chi Chi’s e-coli – from green onions – 2003 Taco Bell – e coli 2005 None were terrorist attacks but impacted supply chains US Salmonella/e-coli scare 2008 Salmonella epidemic >3921 separate items recalled
Supply Chain Interruptions Other interruptions and impacts to supply chain continuity Volcanoes Tornados Floods Tsunamis
Just-In-TimeJust-In-Time and Lean Production Just-In-Time
JIT In Services Competition on speed & quality Competition on speed & quality Multifunctional department store workers Multifunctional department store workers Work cells at fast-food restaurants Work cells at fast-food restaurants Just-in-time publishing for textbooks - on demand publishing a growing industry Just-in-time publishing for textbooks - on demand publishing a growing industry Construction firms receiving material just as needed Construction firms receiving material just as needed
Producing only what is needed, when it is needed Producing only what is needed, when it is needed A philosophy A philosophy An integrated management system An integrated management system JIT’s mandate: Eliminate all waste JIT’s mandate: Eliminate all waste What is JIT ?
.... Lean Operations: Best Implementation is Toyota Production System TPS is a production management system that aims for the “ideal” through continuous improvement Includes, but goes way beyond JIT. Pillars: – Synchronization Reduce transfer batch sizes Level load production Pull production control systems (vs. push): Kanban Quality at source Layout: Cellular operations – Continuous Improvement (Kaizen): through visibility & empowerment
Toyota’s waste elimination in Operations 1. Overproduction 2. Waiting 3. Inessential handling 4. Non-value adding processing 5. Inventory in excess of immediate needs 6. Inessential motion 7. Correction necessitated by defects
Waste in Operations
Flexible Resources Multifunctional workers Multifunctional workers General purpose machines General purpose machines Study operators & improve operations Study operators & improve operations
The Push System Pre-planned issues of supplies/merchandise regardless of customer demand criteria Creates excess and shortages not efficient over the long run
The Pull System Material is pulled through the system when needed Reversal of traditional push system where material is pushed according to a schedule Forces cooperation Prevent over and underproduction
Kanban Production Control System Kanban card indicates standard quantity of production Derived from two-bin inventory system Kanban maintains discipline of pull production Production kanban authorizes production Withdrawal kanban authorizes movement of goods
A Sample Kanban
Types of Kanbans Bin Kanban - when bin is empty replenish Kanban Square Marked area designed to hold items Signal Kanban Triangular kanban used to signal production at the previous workstation Material Kanban Used to order material in advance of a process Supplier Kanbans Rotate between the factory and suppliers
Components of Lead Time Processing time Reduce number of items or improve efficiency Move time Reduce distances, simplify movements, standardize routings Waiting time Better scheduling, sufficient capacity Setup time Generally the biggest bottleneck
Common Techniques for Reducing Setup Time Preset Buttons/settings Quick fasteners Reduce tool requirements Locator pins Guides to prevent misalignment Standardization Easier movement
Uniform Production Results from smoothing production requirements Results from smoothing production requirements Kanban systems can handle +/- 10% demand changes Kanban systems can handle +/- 10% demand changes Smooths demand across planning horizon Smooths demand across planning horizon Mixed-model assembly steadies component production Mixed-model assembly steadies component production
Quality at the Source Jidoka is authority to stop production line Jidoka is authority to stop production line Andon lights signal quality problems Andon lights signal quality problems Undercapacity scheduling allows for planning, problem solving & maintenance Undercapacity scheduling allows for planning, problem solving & maintenance Visual control makes problems visible Visual control makes problems visible Poka-yoke prevents defects (mistake proof the system) Poka-yoke prevents defects (mistake proof the system)
Kaizen Continuous improvement Continuous improvement Requires total employment involvement Requires total employment involvement Essence of JIT is willingness of workers to Essence of JIT is willingness of workers to Spot quality problems Spot quality problems Halt production when necessary Halt production when necessary Generate ideas for improvement Generate ideas for improvement Analyze problems Analyze problems Perform different functions Perform different functions
Goals of JIT 1.Reduced inventory - where? 2.Improved quality 3.Lower costs 4.Reduced space requirements 5.Shorter lead time 6.Increased productivity 7.Greater flexibility 8.Better relations with suppliers 9.Simplified scheduling and control activities 10.Increased capacity 11.Better use of human resources 12.More product variety 13.Continuous Process Improvement
Use JIT to finely tune an operating system Somewhat different in USA than Japan JIT is still evolving JIT as an inventory reduction program isn’t for everyone - JIT as a CPI program is! Some systems need Just-in- Case inventory JIT Implementation