• (PowerPoint Presentation for download)

    Thank you for attending today’s Webinar on the topic of cargo security.  I’m Walt Beadling, President of the Cargo Security Alliance and Managing Partner of Cayuga Partners LLC, here today with Jim Barrett, President of Road Scholar Transport, a leader in High Security, High Velocity, Full Truck Load and Less Than Load transportation services, and a member of the CSA.  Our topic today is cargo security, including techniques, technologies and best practices to protect your employees, products, customer relationships and your company’s reputation.

  • Companies traditionally find it challenging to justify security-related investments because they focus largely on the direct expenses and not on the collateral benefits (e.g., supply chain efficiency, improved customer satisfaction, improved inventory management, etc.) that may be realized. Limited research has been completed regarding the creation of collateral benefits from security investments. To fill this gap, the institute and Stanford University have conducted a study to confirm and quantify the magnitude of collateral benefits received by a select group of companies that are considered ``innovators” in supply chain security in their industries such as chemicals, consumer goods, food, information technology, automotive parts and logistics service providers.

  • Presentation to JFK Air Cargo Assn. on the subject of Truck Driver ID Fraud and the unique requirements of the air cargo indiusrty (PowerPoint)

  • Presentation by CSA Managing Partner Walt Beadling on the topic of best practices in access managment and personnel identification at C-TPAT Best Practices seminar sponsored by American River International 5/1/2014 [Power Point - subset]  

  • Cargo theft by fictitious pick-up is a growing threat to supply chain security.  A proliferation of information technologies enable thieves to defraud shippers and carriers at multiple points across the supply chain.  This paper seeks to better define the terms and scope of this new and rapidly evolving brand of “supply chain cybercrime”, and recommends 7 Best Practices

  • Presentation to Pharmaceutical Cargo Security Coalition (PCSC) on April 11, 2017 looks at the root causes of "Strategic" cargo theft, which is very different from the traditional, opportunistic theft, and requires a very different approach to remediation.  CSA's Walt Beadling reviews current Best Practices in verifying the identities of motor freight companies and drivers, including commercially available technologies and case studies, and wraps up with a summary of the Keys to Success.   

    Don't Trust - Verify! PCSC Presentation 4/11/2017

  • Today’s U.S. airport security policy rests on a fallacious proposition. By applying equal screening resources to all passengers and all bags, the system acts as if security officials believe that every passenger and every bag is equally likely to be a threat. This premise wastes limited security resources on low-risk passengers and bags, thereby devoting less resources to higher-risk passengers and bags. In addition, this approach has created a “hassle factor” at airports that drives away airline passengers.

  • By Erik Hoffer

    DEFINING VULNERABILITY: The overwhelming perception is that the global air freight system is both dynamic and efficient as it moves millions of packages worldwide on a daily basis. Little thought is given to possible disruptions in service or to the vulnerability of our fragile supply chain, especially as it relates to an airfreight based catastrophe. Logisticians routinely discount the myriad of threats to commerce as they use the air cargo system. Air cargo’s intrinsic vulnerability to financial loss seems to be almost transparent to them and therefore little is done or funded by business to reduce these perils at a corporate level. Only recently has our government dedicated resources to identify these risks worldwide and, unfortunately, has yet to create oversight standards to mitigate them.

  • By Erik Hoffer

    Our transportation industry serves as the pulse of commerce, and the heart of our economy. Collectively we move food, clothing, and most other essential goods by truck, rail and air. The question I propose here deals with the transparent nature of logistics masking the fact that we are not alone in our efforts. There a black side to logistics and no one sees it. There are contra-logistic forces out there which replicate our processes for their personal gain. and commonly deliver stolen, diverted and counterfeit goods to clients right under our noses! Besides essentials, contraband drugs and illegal weapons are also commonly transported using commercial trucks and courier services.