• Commentary by Erik Hoffer, President CGM Security Solutions Inc.

    During each day over 38 million major cargo shipments and 75 million courier shipments begin and end at our door steps. We take in cargo as a matter of course and welcome the couriers and drivers as they deliver products to us. Little consideration is given to much of this cargo as to where it has been, or who handled it, who shipped it or the fact of its relative safety or security, we just sign the form and take it in!

  • Q: What are the benefits to industry of participating in Air Cargo Advance Screening (ACAS)? A: While the benefits of ACAS participation vary between organizations, several universal advantages of joining include . . .

  • An interesting academic article published in International Security a few months before the 9/11 attacks provides a good way to conceptualize the fight against al-Qaeda. Written by Ivan Arreguín-Toft, “How the Weak Win Wars” began with an extended look at the famed “rumble in the jungle” boxing match between Muhammad Ali and George Foreman . . . Foreman, “the strongest, hardest hitting boxer of his generation,” was heavily favored—but was defeated by Ali’s “rope-a-dope” strategy, which turned Foreman’s strength against him . . . 

  • Asset Retention Technology, or A.R.T., defines the new platform of  Rigsecure, a Florida Corporation’s product line for 2008. For every vulnerability to truck theft or loss, there is an appropriate deterrent that can reduce that risk to a manageable level. No product alone can replace prudent security best practices and no one can ever guaranty to neutralize all threats. By layering your security technology and processes to address known threats to corporate profits, you do stand the best chance to reduce conditions of loss and turn security costs into profit centers.

  • (PowerPoint Presentation for download)

    Thank you for attending today’s Webinar on the topic of cargo security.  I’m Walt Beadling, President of the Cargo Security Alliance and Managing Partner of Cayuga Partners LLC, here today with Jim Barrett, President of Road Scholar Transport, a leader in High Security, High Velocity, Full Truck Load and Less Than Load transportation services, and a member of the CSA.  Our topic today is cargo security, including techniques, technologies and best practices to protect your employees, products, customer relationships and your company’s reputation.

  • Companies traditionally find it challenging to justify security-related investments because they focus largely on the direct expenses and not on the collateral benefits (e.g., supply chain efficiency, improved customer satisfaction, improved inventory management, etc.) that may be realized. Limited research has been completed regarding the creation of collateral benefits from security investments. To fill this gap, the institute and Stanford University have conducted a study to confirm and quantify the magnitude of collateral benefits received by a select group of companies that are considered ``innovators” in supply chain security in their industries such as chemicals, consumer goods, food, information technology, automotive parts and logistics service providers.

  • By Erik Hoffer

    Remarkably, the need to protect and secure unattended transported cargo, seems to be a debatable concept? Documented losses through damage far exceed those from theft. In fact losses in some industries and from certain products through counterfeiting, diversion and all forms of fraud, also seem to exceed those quantifiable losses from supply chain theft. So where should business rank theft, and a secure supply chain, in terms of a budgeted priority and corporate strategic focus against other known threats? Is it worth caring about this problem at all? Who is financially responsible for remedy and then who is responsible for the loss? Is it smart to seek remedy proactively or do you wait to become a victim before taking action? Does the same entity pay when goods are stolen as when goods are damaged? What role does the shipper have vs. the carrier in reducing or assuming risk? All of these questions elicit a variety of unrelated answers depending on who is being asked and what products they transport or ship. This array of answers defines the dilemma of where does cargo security fall in corporate strategic planning from a shipper or carrier prospective?

  • Cargo travels through many hands: airlines, ground handlers, trucking companies. That’s why it must have a chain of custody, Walt Beadling, managing partner at logistics security company Cargo Security Alliance, says.  “What that means is at any point in time, you know who has a particular piece of cargo, whatever it may,” Beadling says. “You may not know where it is, but you know who has responsibility for it. And at each point where the cargo’s transferred, there’s a handoff, a formal handoff, where custody is transferred from one entity to another.” 

    Erik Hoffer, vice president of CSA, says someone must design a logistical plan in order to create that chain of custody and have as few handoffs as possible.  “There’s always going to be that one point where nobody’s watching the store,” he says. “Without having the ability to have a chain of custody throughout the different modalities, you’re not going to get anywhere.  You’re just going to have a problem always.” 

  • Presentation to JFK Air Cargo Assn. on the subject of Truck Driver ID Fraud and the unique requirements of the air cargo indiusrty (PowerPoint)

  • Presentation by CSA Managing Partner Walt Beadling on the topic of best practices in access managment and personnel identification at C-TPAT Best Practices seminar sponsored by American River International 5/1/2014 [Power Point - subset]