Practical Suggestions to Mitigate Cargo Security Risks.

Slides:



Advertisements
Similar presentations
DOCKMEN TRAINING LINC LOGISTICS INSIGHTS CORPORATION.
Advertisements

C-TPAT SECURITY AWARENESS TRAINING
FFIEC Agency Supplement to Authentication in an Internet Banking Environment
/0403 Copyright ©2004 Business and Legal Reports, Inc. BLRs Safety Training Presentations Transportation Security TrainingPart II 49 CFR
Welcome to Telect’s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation.
Beyond the Border Integrated Cargo Security Strategy Canada – United States Transportation Border Working Group Detroit, Michigan April , 2013.
Customs-Trade Partnership Against Terrorism
Security Training and Threat Awareness Program for All Employees
PHYSICAL SECURITY Attacker. Physical Security Not all attacks on your organization's data come across the network. Many companies focus on an “iron-clad”
Transportation/Fleet Safety and Environmental Safety Travel - Hazardous Materials Transportation Security- Sandra J. Perry Consulting Services & Treatment.
Social Engineering J Nivethan. Social Engineering The process of deceiving people into giving away access or confidential information Onlinne Phone Offline.
Hazardous Materials Transportation
PELLET PLANT LAY DOWN TRAFFIC MANAGEMENT POLICY COMMUNICATION.
Chapter 10: Auditing the Expenditure Cycle
Freight Security and the World Economic Forum December 5, 2002.
Top 10 Security-Related Discrepancies ///MARSEC Corporation.
Actionable Process Steps and Focused Mitigation Strategies
Network security policy: best practices
Public Information Promoting Air Cargo Security: A Shared Responsibility Las Vegas, Nevada April 7, 2008.
MNM Fatal Powered Haulage Accident Powered Haulage Accident October 20, 2010 (Georgia) October 20, 2010 (Georgia) Fuller’s Earth (Clay) Operation.
Field Operations U.S. Customs and Border Protection Customs-Trade Partnership Against Terrorism (C-TPAT) Texas Broker and Freight Forwarder Conference.
3.6.6 Student Book © 2004 Propane Education & Research CouncilPage 1 In the wake of the September 11 th attack and continuing terrorist threats, shippers,
  WAREHOUSING   DISTRIBUTION   LOGISTICS Consolidated Shipping Logistics Centre JEBEL ALI FREE ZONE, DUBAI, UAE.
/0503 Copyright ©2005 Business and Legal Reports, Inc. BLR’s Safety Training Presentations Hazardous Materials Transportation 49 CFR BLR’s.
Security Issues with Vendors, Employees, and Customers Chapter 10.
What to Expect at a Compliance Review CTMA Conference July 2015.
Chapter 13 Security Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Objectives State the major responsibility.
HOMELAND SECURITY ADVISORY SYSTEM. Established after the terrorist attacks on America September 11, 2001.
UNHCR/e-Centre/InterWorks - Emergency Management Training
SECTION 1 - BOOKING Requirement Timely and Accurate submission of booking information Where APL Logistic Taipei Office Cut-Off Vendor should submit the.
Chapter 15 Industrial Security. Loss Specific to Industry  Industrial losses frequently include:  Tools.  Materials.  Supplies.  Products.  Pallets.
INITIAL OSHA & DOT TRAINING MODULE 10 Security. INITIAL OSHA & DOT TRAINING Module 10 – Security Introduction The Transportation Security Administration.
SANDLER AND TRAVIS TRADE ADVISORY SERVICES, INC. © Sandler & Travis Trade Advisory Services, Inc. All Rights Reserved Trade Facilitation.
Industrial Control Security & Access Control Facilities Management UNECE International Forum on Trade Facilitation Geneva, Switzerland May
(Customs & Trade Partnership
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
3.4.9 Student Book © 2004 Propane Education & Research CouncilPage Identifying Bulk Plant Security Procedures In the wake of the September 11 th,
Hazardous Materials Company Anti-Terrorism Tips. Overview This presentation is designed to inform companies of the appropriate steps that should be taken.
VEHICLE SEARCHES AND HAZARDS SSG. CHRIS GESKEY TF 1-114TH INF. BN. SOUTH CAMP, SINAI MFO 47.
Reports. Report Summary Warehouse Reports Returned Material Serial Numbers Not Found This report list the serial numbers of material returned which were.
IAEA School of Drafting Regulations Transportation regulations in Republic of Latvia Radiation Safety Centre (RSC) Marcis Slavinskis Vienna, 3-14 November.
Sample only Order at Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the.
Module 3: Getting Products To Market
Safeguarding Animal Health National Veterinary Stockpile Improving Disease Response Through Science-Based Logistics NVS Logistics Warehouse Training Module.
In-flight & Airport supplies ( )
RCA Feedback Communication to Transportation partners.
Security in Air Transportation
Appropriate record of compliance with customs requirements Satisfactory system of managing commercial and, where appropriate, transport.
CREATED BY THE JOINT INTELLIGENCE UNIT. CRIME PREVENTION TIPS GOAL To make security companies and business owners aware of some safety tips and crime.
Warehousing and Storage Principles Session 12 – Security Day 6 / PM.
Outbound Process Using Wave, Pick-HU, Packing, Staging, and Loading
IE 8580 Module 2: Transportation in the Supply Chain
School of Drafting Regulations Transportation regulations in
ROUTE MANAGER TRAINING
Business Partner Screening
TWIC Training & Maritime Security Awareness
CSA 2010 A Compendium for Shippers April 14, 2010.
Driver Anti-Terrorism Tips
Shipping and Freight - A to Z
C-TPAT Awareness Training Program
Transportation Security
Top 10 Security-Related Discrepancies
Clemson University Red Flags Rule Training
Managing the IT Function
Customised solutions for the logistics industry
SECURITY TRAINING AND THREAT AWARENESS
Part 1 Security Action Plan Template.
Consolidated Shipping Logistics Centre
EFCOG Design Basis Threat Update/ Unmanned Aircraft Systems Overview
Shipping and Receiving Hazardous Materials
Presentation transcript:

Practical Suggestions to Mitigate Cargo Security Risks

Objectives Examine seven risk indicators  Sea Environment  Air Environment  Land Environment Look at mitigating risk with C-TPAT criterion Study examples of breached supply chains

“BSI has determined that since 2004, at least 600 attacks targeting the supply chain have occurred – a rate that equals to one attack every four days.” -BSi Grade-

Risk Indicators 1.Surveillance 2.Elicitation/Collecting Information 3.Probing of Security 4.Acquiring Supplies 5.Suspicious People 6.Dry Run/Rehearsal 7.Positioning for the Compromise

Surveillance Casing (photos/notes of movements) Following employees Studying routes Corporate espionage/theft Posing as employees/vendors Studying entrances

Surveillance Sea Environment  Dock workers monitoring vessel docking location  Entrances and exits of seaport (port authority)  Container staging Air Environment  Warehouse security camera positioning  Accessibility to airfield or consolidation station Land Environment  “Spotters” monitoring the frequency of border crossings by driver, company, or logistics provider

Elicitation/Seeking Information Targeting employees to befriend Social engineering Posing as vendors Use of fraudulent s and faxes Making unusual inquiries Accessing unauthorized IT systems

Elicitation/Seeking Information Sea Environment  Gathering basic information utilizing a “Ship’s Automatic Identification System”  Enquiring about a vessel’s ship security plan, schematics, and load plan  Acquiring information on dock worker movements and schedules Air Environment  Gauging ramp crew movements and schedules both on and off duty  Asking questions about security protocols for aircraft and cargo Land Environment  Monitoring driver movements for trends and patterns  Asking seemingly benign questions about a load, routing or destination

Probing Security Driving past the intended target Penetrating the intended target Purposely activating alarms Testing established procedures for gaps

Probing Security Sea Environment  Dock employees on premises on days off  Staging containers and heavy equipment Air Environment  Entering the airfield/warehouse with unauthorized personal belongings  Entering a restricted zone without proper credentials Land Environment  Leaving predetermined routes  Prolonging previously established transit times to the border

Contraband Behind Aft Cargo Panel

Total of 62 Packages

Acquiring Supplies Lost/stolen uniforms Lost/stolen employee IDs Missing high security seals Collecting used seals Missing branded boxes/packaging material

Acquiring Supplies Sea Environment  Port/vessel employees reporting missing boiler suits and hard hats  Missing trade specific tools Air Environment  Employees losing multiple ID’s  Accountability for ULD’s, “cookie sheets” and pallets Land Environment  Employee acquires tools necessary to modify the tractor and trailer  Devices to block GPS signal, mechanical or technological

Replica packaging material

Heroin imbedded in wood

Heroin package with special markings

Suspicious People Individuals that do not belong Demeanor does not relate to location/area Types of questions asked Unusual behavior

Suspicious People Someone unfamiliar loitering in your parking lot, office building, or warehouse Anyone asking a lot of questions, especially concerning routes or loads or drop-off times. Employers should be alert for unusual employment applications. Don’t assume it couldn’t be an inside job.

Dry Run/Rehearsal Monitoring response times to an incident Shipping unrelated un-manifested items Fake shipping documents Unanticipated problems on a routine basis

Dry Run/Rehearsal Sea Environment  Attempting to pick up container without proper documentation  Creating fake shipping documents/ghost company  Shipping cargo to a fake address Air Environment  Staging bogus items in the aircraft/cargo  Clone airway bill and similar shipment for pick-up Land Environment  Break/replace seal and cross border  Commingle unmanifested goods with legitimate cargo

Unknown device at importer premises

Box commingled with manifested goods

Positioning for the Compromise Getting into position Crew/conspirators on high alert Behavioral changes in demeanor and appearance Unusual requests and breaking from routine

Positioning for the Compromise Sea Environment  Unauthorized schedule changes  Uncharacteristic change in employee’s behavior and appearance Air Environment  Last minute swap/request to work specific flights, days or times  Employee reports to work in unusually baggy clothing Land Environment  A driver adamant about driving a specific load across the border  Reporting to truck yard extremely early/late on specific days/routes

Other Risk Indicators First time shipper Paying in cash Address not in-line with common business districts Weights, values, quantities don’t support manifested cargo

Mitigating Risk  Business Partner Requirement  Container Security  Container Inspection  Physical Access Controls  Physical Security  Personnel Security  Procedural Security  Security Training and Threat Awareness  Information Technology Security

S/SCSS Bryan Picado C-TPAT Evaluation & Assessments Branch S/SCSS Christopher Foulkes DC Field Office