Download presentation
Published byAmani Partington Modified over 9 years ago
1
Security Training and Threat Awareness Program for All Employees
2
Sealed Air and C-TPAT We have recently joined with U.S. Customs and Border Protection to help secure the international supply chain. As a member of the Customs-Trade Partnership Against Terrorism (C-TPAT) program, we have committed ourselves to new and improved security procedures throughout our operations. These new procedures are designed to enhance the security of our facilities, people, cargo shipping, cargo receiving and cargo tracking processes. Our goal is to prevent cargo loss and cargo tampering including the introduction of illegal merchandise such as drugs and weapons of mass destruction into our cargo boxes and containers. As a part of our commitment to supply chain security, we now require all of our employees to seriously consider supply chain security as a significant risk to our business.
3
Impact of Security Breaches on C-TPAT Status
Suspension and Removal from C-TPAT Loss of C-TPAT related benefits Possibility of increased examinations Delays That could lead to: Loss of Business Default on contractual obligations Brand name damaged or compromised C-TPAT Benefits Reduced inspections at borders and ports FAST First of cargo to move during/after and event
4
Topics Employee Identification Visitor Controls Suspicious Persons
Suspicious Activities Internal Conspiracies Suspicious Objects or Packages Computer Security Document Security Container Security/Seal Integrity
5
Employee Identification
Your Responsibilities While on company property Your company identification badge must be properly displayed and worn at all times. Your company uniform (if applicable) must be worn at all times. Properly secure and protect your ID badge, uniform, keys and access control card, etc.
6
Visitor Controls Visitor Pre-meeting Requirements
Inform your visitor of the company’s visitor policies including photo identification, check in with receptionist prior to their visit. Visitor Entrance Requirements Ensure that your visitor has logged in and has been issued a visitor badge
7
Visitor Controls Visitor Escort Requirements Visitor Exit Requirements
You must escort your visitors at ALL times Do not leave your visitor unattended Visitor Exit Requirements Ensure that your visitor has logged out and has returned the visitor badge to the guard or receptionist
8
Visitor Controls – Reception Desk Responsibilities
Visitor Entrance Notify hosting employee Document arrival on Visitor Log Check photo identification Issue visitor badge Visitor Exit Security personnel, the receptionist or a designated employee must adequately control the issuance and collection of visitor badges. All visitors must be escorted and visibly display their visitor badge. Collect visitor badge Document departure on Visitor Log
9
Suspicious Persons LOOK FOR…..
Any person without an employee badge, visitor badge or uniform.
10
Suspicious Persons Determine if the person is an employee or a visitor
…and ACT Determine if the person is an employee or a visitor If an employee, remind them always to display their ID badge and uniform. If a visitor, escort them to the reception area or to the person with whom they are visiting. Report the incident to your immediate supervisor. In the event you identify an employee or visitor that is not wearing an identification badge or uniform: If its an employee, remind them to always display their ID badge and uniform or notify a supervisor regarding the situation If its a visitor, escort them to the reception area or to the person with whom they are visiting. Supervisors – report incidents to Security
11
Suspicious Persons LOOK FOR…..
Any person in unauthorized/restricted areas If you identify an individual in an area he/she is prohibited from entering,
12
Suspicious Persons AND ACT….. Get them out of the area
If a visitor, escort them to the reception area. Report the incident to your immediate supervisor If its an employee, approach them and ask them if they need assistance or contact management If it’s a visitor, escort them to the reception area or security guard Report suspicious activity to your immediate supervisor.
13
Suspicious Persons Look for …. Any person:
wearing an overcoat on a 95 degree day, or any kind of inappropriate clothing waiting or loitering in an area or hallway asking for an unknown department, person or employee Look for suspicious persons which may include an individual wearing an overcoat on a 75 degree day, someone waiting in the hallway, someone asking for an employee that doesn’t work here. Cam :17:23AM /02/06
14
Suspicious Persons LOOK FOR…. Any person:
who seems not to belong in the area going door to door, office to office entering a private office unescorted selling items who seems lost Look for anyone that you’ve never seen in the building, peeking in offices, entering an office unescorted, someone that seems to be lost. Cam :17:23AM /02/06
15
Suspicious Persons LOOK FOR ….. Any person:
Tampering with somebody’s desk, boxes, personal items, equipment, vehicles, cameras, lights… running, especially if carrying something hiding behind doors, fences, desks, … Cam :17:23AM /02/06
16
Suspicious Persons AND ACT………
Immediately report the incident to your immediate supervisor Immediately report suspicious activity to your immediate supervisor.
17
Suspicious Activity LOOK FOR … Objects obstructing access points
Disconnected or obstructed cameras Broken locks or access control systems Unexplained clutter or debris Objects thrown from a vehicle, especially while traveling at a high speed.
18
Suspicious Activity ACT …
Immediately report any suspicious activity to your supervisor.
19
Internal Conspiracies
Definition - when people work together by agreement to commit an illegal act. A conspiracy may exist when the parties use legal means to accomplish an illegal result, or to use illegal means to achieve something that is unlawful. Company personnel should be on the lookout for suspicious people hanging around the facility – have your staff challenge and report unauthorized individuals to management Identify the threat not only from the point of origin – but to destination Identify areas that may pose a threat to your employees and supply chain security – employees may be targeted in the form of bribes and/or intimidation
20
Conspiracy Indicators
Conspirators (internal & external) may conduct surveillance and gather information about facilities and operations: May take photographs - (entrances, fencing, warehouse and hours of operation) Focus on weak and/or non-existing security measures - throughout the supply chain line (origin, transit, security and at destination – distribution center) to focus on the opportunity to initiate breach Assess the company’s vulnerabilities – the conspirator can create the opportunity for the breach to occur. Transit routes and stops are of particular interest. Stow plans of the cargo will also allow for quick and easy access to introduce illegal contraband. Collect/gather information on employees - schedules, work habits, off-duty social life, address, etc. Will focus on employees that have previous criminal records and/or weak in moral character. May seek information about security procedures - Will ask questions on how shipment routes are monitored, GPS system utilized, document routing, manifests, changing their work schedules in order to facilitate the breach, etc.
21
Conspiracy Indicators, Cont.
Target employees with a “need” to make money and those in financial distress - These employees are prime targets for recruitment by the conspirators. The weaker employees may end up working as “lookouts”. May use social engineering tools - to gather information about the company and employees Make unusual inquiries - about the cargo flow and method of shipment Attempt to access unauthorized systems - to manipulate manifests, shipping documents, bill of lading, load plans, etc. Bogus information may be entered and/or altered in shipping documents in order to facilitate the introduction of unmanifested materials “Dry-run” or Test May ship an un-related item with legitimate cargo Entering false information in the documents such as a bogus address, name, “fictitious" company, etc. Attempting to pick-up cargo without appropriate documentation and identification Unique markings on legitimate cargo boxes/crates
22
Conspiracy Indicators, Cont.
Probe the company’s security: May show up to work on day off Enter restricted and/or unauthorized zones without proper access/identification Drivers may stray off the authorized route to test GPS geo-fencing Enter the warehouse with unauthorized personal items (backpacks, large gym bags, etc.) Activate alarms and check for reaction time Acquire company equipment: Company uniforms, identification, access cards & codes to enter in sensitive areas Stolen high-security seals and or disposed cut seals Collecting company boxes/crates with branded logo to conceal the contraband A federal judge sentenced the former transportation director for SC Johnson to eight years in jail this month for his role in a shipping scheme that defrauded the company of tens of millions of dollars. At least two employees were part of a scheme in which trucking contractors billed SC Johnson at inflated rates and then returned part of the money to the company's transportation director, in the form of kickbacks. He bought gifts for one of his employees. He was convicted of mail fraud and filing a false tax return. The other employee was convicted of making false statements to a postal inspector. Investigators said the transportation director worked with trucking industry executives who also set up phony firms that paid Morris kickbacks. Three former Delta Air Lines Inc. employees, including two from metro Atlanta, were sentenced to prison Wednesday for importing illegal drugs through flights to Hartsfield-Jackson Atlanta International Airport. CBP agents inspected the luggage, and determined it contained multiple packages of suspected illegal narcotics. Later that same day, Carlos R. Springer, 42, of Hampton, Ga., was interviewed by Homeland Security Investigations agents. Springer was the performance leader for the shift of ramp employees who off-loaded the baggage on flight 364. During a search of Springer’s cellular telephone, agents found coded, incriminating text messages between Springer and Luis Marroquin, 36, of Atlanta, around the time of the arrival of the flight. Rondon was observed on the video of the arrival and unloading of flight 364, although he was off-duty and had no authorization to work the flight. Agents also learned Marroquin recruited Kelvin Rondon, 28, of Miami. Rondon was to make sure that the bag was on the flight, and was to be paid $500 per package. The day before flight 364 arrived Rondon was shown a photo of the drug-laden bag on Marroquin’s telephone. Rondon said when he arrived on the tarmac he helped unload the cargo and attempted to find the bag, but was unsuccessful. Marroquin was sentenced to 15 years and eight months. Springer was sentenced to 11 years and three months in prison. Rondon was sentenced to five years and three months in prison. Two employees at a sunglasses manufacturer would duplicate orders to create two packages of same order Manifested first package per procedure, manually manifested second package and shipped to sports distributor in NY where 3rd conspirator would ship back name brand basketball shoes, which the two employees would then sell. The sunglasses were being sold at flea markets. Came up as cycle count variances, however, employees were not able to discover cause until upper management hired undercover employee who uncovered the scheme. Company even implemented RFID (radio frequency ID) in sunglasses cases and found these in the possession of employee involved. Lessons learned: Automated inventory systems eliminated opportunity to create duplicate orders; One person involved had a record, but no background check had been conducted.
23
Suspicious Objects or Packages
LOOK FOR…. Unexplained objects or packages that look strange or do not belong to the area Strange markings on boxes (unknown code, color) or strange characteristics (weight, number, odd shape) Strange leaking substance (powder, liquid, etc…) Suspicious objects in the middle of an area (e.g., hallway, lobby, etc.)
24
Suspicious Objects or Packages
25
Suspicious Objects or Packages
AND ACT……… Immediately report any suspicious packages or objects to your supervisor or security
26
Suspicious Objects or Packages
AND ACT…….
27
Computer Security Do not share access to your computer with strangers
Log-off when you leave your computer Passwords should be changed every 60 to 90 days Do not share your password with anyone Do not write down your password.
28
Computer Security Selecting a Password Use hard-to-guess passwords
Do not use the same password in more than one place A password should have a mix of letters, numbers and symbols I Love to be Secure Always on time to work !AoT2wx My Password is Very Secure MyP1VS# Yo Quiero Taco Bell yqtb!10
29
Computer Security Electronic Mail Restrictions
Do not use company for private business activities, amusement or entertainment. Do not send containing racist, sexist, threatening or other objectionable language. Do not join mailing lists. Do not open unknown or unexpected attachments.
30
Document Security ALWAYS shred sensitive documents – anything with prices, customer names, purchase order and financial information, just to name some examples NEVER leave sensitive documents on your desk when you are away - store in a locked drawer or cabinet Don’t forget about information stored on disc – treat these just as you would paper documents Don’t leave sensitive documents at the printer - use the locked print feature, if available
31
Container/Trailer Inspection
Utilize the 7-Point Inspection for all US Imports from outside the US, excluding Mexico Utilize the 17-Point Inspection for all US Imports from Mexico ONLY Container/Trailer integrity must be maintained to protect against the introduction of unauthorized material and/or persons. Begin and end your inspection at the same point every time. To ensure a systematic and consistent process, a checklist is used for documentation and verification. Checklists are important to establish chain of custody.
32
17-Point Truck & Trailer/Container Inspection
1. Bumper 2. Engine 3. Tires (truck & trailer) 4. Floor (inside truck) 5. Fuel Tanks 6. Cab/ Storage Compartments 7. Air Tanks 8. Drive Shafts 9. Fifth Wheel 10. Outside/ Undercarriage 11. Floor (inside) 12. Outside/ Inside Doors 13. Side Walls 14. Ceiling/ Roof 15. Front Wall 16. Refrigeration Unit
33
7-Point Container/Trailer Inspection Process
1. Outside/ Undercarriage (before entering facility) 2. Inside/ Outside doors 3. Right side 4. Left Side 5. Front Wall 6. Ceiling/Roof 7. Floor (Inside)
34
Importance of Container/Trailer Inspections
Step up to get inside…WHY?? To make room for 1,300 lbs. of cocaine!
35
Importance of Container/Trailer Inspections
Normal block and air vent Short distance between block and vent Wall colors are different!
36
Importance of Container Inspections
False wall = 1,290 lbs. Marijuana.
37
Importance of Container/Trailer Inspections
Tires – What to look for: Recently Mounted Tampered Bolts Water Streaks
38
Importance of Container/Trailer Inspections
Exhaust / Air Deflector:
39
Seal Integrity A seal inspection process should be implemented throughout the supply chain. The VVTT Seal Inspection Process is a good example of one: V – View seal & container locking mechanisms. V – Verify seal number for accuracy. T – Tug on seal to make sure it is affixed properly. T – Twist & Turn seal to make sure it does not unscrew.
40
Employee Identification Visitor Controls Suspicious Persons
Let’s review… Employee Identification Visitor Controls Suspicious Persons Suspicious Activities Internal Conspiracies Suspicious Objects or Packages Computer Security Document Security Container Security/Seal Integrity
41
Security is not out of reach if you practice it every day.
42
For more information, refer to Customs & Border Protection Website:
QUESTIONS? Contact: Sheri Wolf For more information, refer to Customs & Border Protection Website: or
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.