Cargo Security Best Practices

Cargo Security Best Practices

CSA White Paper: Cargo Theft by Fictitious Pick-up

Cargo theft by fictitious pick-up is a growing threat to supply chain security.  A proliferation of information technologies enable thieves to defraud shippers and carriers at multiple points across the supply chain.  This paper seeks to better define the terms and scope of this new and rapidly evolving brand of “supply chain cybercrime”, and recommends 7 Best Practices

Cargo theft by fictitious pick-up is a growing threat to supply chain security.  A proliferation of information technologies enable thieves to defraud shippers and carriers at multiple points across the supply chain.  This paper seeks to better define the terms and scope of this new and rapidly evolving brand of “supply chain cybercrime”, and recommends 7 Best Practices that can help prevent it.    

Definition 

Don't Trust - Verify! Driver/Carrier Verification Technology

Presentation to Pharmaceutical Cargo Security Coalition (PCSC) on April 11, 2017 looks at the root causes of "Strategic" cargo theft, which is very different from the traditional, opportunistic theft, and requires a very different approach to remediation.  CSA's Walt Beadling reviews current Best Practices in verifying the identities of motor freight companies and drivers, including commercially available technologies and case studies, and wraps up with a summary of the Keys to Success.   

Don't Trust - Verify! PCSC Presentation 4/11/2017

Presentation to Pharmaceutical Cargo Security Coalition (PCSC) on April 11, 2017 looks at the root causes of "Strategic" cargo theft, which is very different from the traditional, opportunistic theft, and requires a very different approach to remediation.  CSA's Walt Beadling reviews current Best Practices in verifying the identities of motor freight companies and drivers, including commercially available technologies and case studies, and wraps up with a summary of the Keys to Success.  

CSA Presentation: C-TPAT Best Practices in Access Management

Presentation by CSA Managing Partner Walt Beadling on the topic of best practices in access managment and personnel identification at C-TPAT Best Practices seminar sponsored by American River International 5/1/2014 [Power Point - subset]  

Presentation by CSA Managing Partner Walt Beadling on the topic of best practices in access managment and personnel identification at C-TPAT Best Practices seminar sponsored by American River International 5/1/2014 [Power Point - subset]  

 

CSA Presentation: Best Practices in Deterring Driver ID fraud - Air Cargo

Presentation to JFK Air Cargo Assn. on the subject of Truck Driver ID Fraud and the unique requirements of the air cargo indiusrty (PowerPoint)

Presentation to JFK Air Cargo Assn. on the subject of Truck Driver ID Fraud and the unique requirements of the air cargo indiusrty (PowerPoint)

Better Security Drives Business Value

Companies traditionally find it challenging to justify security-related investments because they focus largely on the direct expenses and not on the collateral benefits (e.g., supply chain efficiency, improved customer satisfaction, improved inventory management, etc.) that may be realized. Limited research has been completed regarding the creation of collateral benefits from security investments. To fill this gap, the institute and Stanford University have conducted a study to confirm and quantify the magnitude of collateral benefits received by a select group of companies that are considered ``innovators” in supply chain security in their industries such as chemicals, consumer goods, food, information technology, automotive parts and logistics service providers.

By Barchi Peleg-Gillai, Gauri Bhat and Lesley Sept
Stanford University
Sponsored by the Manufacturing Institute and IBM Corporation

Best Practices in Truck Transportation Security

(PowerPoint Presentation for download)

Thank you for attending today’s Webinar on the topic of cargo security.  I’m Walt Beadling, President of the Cargo Security Alliance and Managing Partner of Cayuga Partners LLC, here today with Jim Barrett, President of Road Scholar Transport, a leader in High Security, High Velocity, Full Truck Load and Less Than Load transportation services, and a member of the CSA.  Our topic today is cargo security, including techniques, technologies and best practices to protect your employees, products, customer relationships and your company’s reputation.

PowerPoint presentation of Webinar delivered on 15 June 2010 (wih narrative)

Risk-Based Airport Security Models

Today’s U.S. airport security policy rests on a fallacious proposition. By applying equal screening resources to all passengers and all bags, the system acts as if security officials believe that every passenger and every bag is equally likely to be a threat. This premise wastes limited security resources on low-risk passengers and bags, thereby devoting less resources to higher-risk passengers and bags. In addition, this approach has created a “hassle factor” at airports that drives away airline passengers.

Today’s U.S. airport security policy rests on a fallacious proposition. By applying equal screening resources to all passengers and all bags, the system acts as if security officials believe that every passenger and every bag is equally likely to be a threat. This premise wastes limited security resources on low-risk passengers and bags, thereby devoting less resources to higher-risk passengers and bags. In addition, this approach has created a “hassle factor” at airports that drives away airline passengers.

Security is a State of Mind.

By Erik Hoffer

DEFINING VULNERABILITY: The overwhelming perception is that the global air freight system is both dynamic and efficient as it moves millions of packages worldwide on a daily basis. Little thought is given to possible disruptions in service or to the vulnerability of our fragile supply chain, especially as it relates to an airfreight based catastrophe. Logisticians routinely discount the myriad of threats to commerce as they use the air cargo system. Air cargo’s intrinsic vulnerability to financial loss seems to be almost transparent to them and therefore little is done or funded by business to reduce these perils at a corporate level. Only recently has our government dedicated resources to identify these risks worldwide and, unfortunately, has yet to create oversight standards to mitigate them.

By Erik Hoffer

DEFINING VULNERABILITY: The overwhelming perception is that the global air freight system is both dynamic and efficient as it moves millions of packages worldwide on a daily basis. Little thought is given to possible disruptions in service or to the vulnerability of our fragile supply chain, especially as it relates to an airfreight based catastrophe. Logisticians routinely discount the myriad of threats to commerce as they use the air cargo system. Air cargo’s intrinsic vulnerability to financial loss seems to be almost transparent to them and therefore little is done or funded by business to reduce these perils at a corporate level. Only recently has our government dedicated resources to identify these risks worldwide and, unfortunately, has yet to create oversight standards to mitigate them.

The Underground Supply Chain

By Erik Hoffer

Our transportation industry serves as the pulse of commerce, and the heart of our economy. Collectively we move food, clothing, and most other essential goods by truck, rail and air. The question I propose here deals with the transparent nature of logistics masking the fact that we are not alone in our efforts. There a black side to logistics and no one sees it. There are contra-logistic forces out there which replicate our processes for their personal gain. and commonly deliver stolen, diverted and counterfeit goods to clients right under our noses! Besides essentials, contraband drugs and illegal weapons are also commonly transported using commercial trucks and courier services.

By Erik Hoffer

Our transportation industry serves as the pulse of commerce, and the heart of our economy. Collectively we move food, clothing, and most other essential goods by truck, rail and air. The question I propose here deals with the transparent nature of logistics masking the fact that we are not alone in our efforts. There a black side to logistics and no one sees it. There are contra-logistic forces out there which replicate our processes for their personal gain. and commonly deliver stolen, diverted and counterfeit goods to clients right under our noses! Besides essentials, contraband drugs and illegal weapons are also commonly transported using commercial trucks and courier services.

Syndicate content