Presentation is loading. Please wait.

Presentation is loading. Please wait.

Customs –Trade Partnership Against Terrorism ATEC (Insert Company Name) Copyright © 2005, 2006 ATEC Systems, Ltd.

Similar presentations


Presentation on theme: "Customs –Trade Partnership Against Terrorism ATEC (Insert Company Name) Copyright © 2005, 2006 ATEC Systems, Ltd."— Presentation transcript:

1 Customs –Trade Partnership Against Terrorism ATEC (Insert Company Name) Copyright © 2005, 2006 ATEC Systems, Ltd.

2 Agenda Background Background What is C-TPAT? What is C-TPAT? Who comprises the Supply Chain? Who comprises the Supply Chain? What does participation in C-TPAT require? What does participation in C-TPAT require? What are the benefits? What are the benefits? What are the threats? What are the threats? How criminals circumvent security measures How criminals circumvent security measures What are the foundations of cargo security? What are the foundations of cargo security? Securing the Supply Chain at (Insert name). What can we/you do? Recognizing potential security risks Documentation fraud Failure is not an option! Questions?

3 Customs and Border Protection (CBP) Part of the Department of Homeland Security Part of the Department of Homeland Security Formed in the years following 9/11, by merging: Formed in the years following 9/11, by merging:  U.S. Customs Service  Agricultural and Plant Health Inspection  Immigration and Naturalization Services  U.S. Border Patrol

4 Customs and Border Protection (CBP) Customs and Border Protection assumes responsibility for: Customs and Border Protection assumes responsibility for:  7,514 miles of border  95,000 miles of shoreline  350 ports of entry  750 million people annually  51,000 foreign vessel calls  11.2 million trucks  2.2 million rail cars

5 What is C-TPAT? The Customs-Trade Partnership Against Terrorism (C-TPAT) is a major program initiative to help protect the United States from future atrocities like Sept 11, 2001 The Customs-Trade Partnership Against Terrorism (C-TPAT) is a major program initiative to help protect the United States from future atrocities like Sept 11, 2001

6 What is C-TPAT? Customs-Trade Partnership Against Terrorism Customs-Trade Partnership Against Terrorism A joint government business initiative to build cooperative relationships that strengthen the overall supply chain and border security A joint government business initiative to build cooperative relationships that strengthen the overall supply chain and border security Customs recognizes that they can only be successful with industry cooperation Customs recognizes that they can only be successful with industry cooperation www.cbp.gov www.dhs.gov www.cbp.gov www.dhs.gov www.cbp.govwww.dhs.gov www.cbp.govwww.dhs.gov

7 Who comprises the Supply Chain? Manufacturers, shippers, suppliers, vendors Manufacturers, shippers, suppliers, vendors Carriers Carriers  Ocean lines  Airlines  Railroads  Truck lines Warehouses Warehouses

8 Who comprises the Supply Chain? NVOCC’s NVOCC’s Cargo handlers Cargo handlers Inspectors Inspectors Fumigators Fumigators Government agencies Government agencies Freight forwarders Freight forwarders Longshoremen Longshoremen Customs brokers Customs brokers Importers Importers

9 What does participation in C-TPAT Require? A signed Agreement with Customs and Border Protection (CBP) A signed Agreement with Customs and Border Protection (CBP)  Conduct a comprehensive assessment of the importers global supply chain based on C- TPAT criteria  Develop a written and verifiable process for determining risk throughout the supply chain and selection of business partners  Implement and maintain security measures

10 What does participation in C-TPAT Require? Self-assessment of our supply chain security using C-TPAT best practice guidelines Self-assessment of our supply chain security using C-TPAT best practice guidelines  Business Partner Requirements  Cargo Security  Container Security  Physical Access Controls  Personnel Security  Procedural Security  Security Training and Threat Awareness  Physical Security  Information Technology Security

11 What does participation in C-TPAT Require? Submission of a supply chain Security Profile to CBP Submission of a supply chain Security Profile to CBP Development and implementation of a program to enhance our supply chain security Development and implementation of a program to enhance our supply chain security Verification within 3 years Verification within 3 years

12 What are the benefits of participating in C-TPAT? A reduced number of cargo inspections A reduced number of cargo inspections Access to FAST lane at land borders Access to FAST lane at land borders An assigned account manager at Customs An assigned account manager at Customs Access to C-TPAT membership list Access to C-TPAT membership list An emphasis on self policing, not verifications An emphasis on self policing, not verifications An opportunity to play an active role in the war against terrorism An opportunity to play an active role in the war against terrorism A secure supply chain for employees, suppliers and customers A secure supply chain for employees, suppliers and customers

13 What are the benefits of participating in C-TPAT? Companies that spend on supply chain security can expect an advantage far outweighing the costs of implementing security processes, according to a study by Stanford University. Companies that spend on supply chain security can expect an advantage far outweighing the costs of implementing security processes, according to a study by Stanford University. The study quantified for the first time the benefits of investing in supply chain security: The study quantified for the first time the benefits of investing in supply chain security:  Companies collectively reduced their Customs inspections by 48%  Increased the automated handling of their imports by 43%  Saw a 29% reduction in transit times  Asset visibility in the supply chain improved by 50%  30% improvement in on-time shipping to their customers  Reduced time taken to identify problems by 21%  Reduced time taken for problem solving dropped by 31%  Reduced inventory theft by 38%  Excess inventory was reduced by 14%  Reduced customer attrition by 26%

14 What are the threats? Terrorism, sabotage Terrorism, sabotage Trafficking – drugs; conventional, nuclear, chemical or biological weapons Trafficking – drugs; conventional, nuclear, chemical or biological weapons Illegal entry – stowaways in containers, trailers Illegal entry – stowaways in containers, trailers Theft of cargo, personal property or information Theft of cargo, personal property or information

15 How criminals circumvent security measures Loitering near the facility observing procedures, asking questions Loitering near the facility observing procedures, asking questions Taking pictures, obtaining plans or making diagrams of facilities Taking pictures, obtaining plans or making diagrams of facilities Impersonating workers i.e. pest control Impersonating workers i.e. pest control Calling or e-mailing employees about procedures Calling or e-mailing employees about procedures

16 What are the foundations of cargo security? Identify the risks Identify the risks Understand the risks Understand the risks Isolate the risks Isolate the risks Allocate resources to neutralize the risks Allocate resources to neutralize the risks Assign ownership for action Assign ownership for action Anticipate acts Anticipate acts Implement solutions Implement solutions Measure results and share best practices Measure results and share best practices

17 Securing the Supply Chain at (Insert Name). What can we/you do? Educate employees Educate employees Know our partners Know our partners Create and share our security policy expectations Create and share our security policy expectations Use C-TPAT certified service providers Use C-TPAT certified service providers Implement a Security Policy and Procedures Implement a Security Policy and Procedures Secure our facilities, systems and conveyances Secure our facilities, systems and conveyances Be conscious of security day to day Be conscious of security day to day

18 Securing the Supply Chain at (Insert Name). What can we/you do? Challenge unfamiliar or unidentified visitors in the office or warehouse Don’t share system passwords Report in confidence any suspected or actual anomaly (irregularity) or illegal activity to management

19 Securing the Supply Chain at (Insert Name). What can we/you do? Report potential security risks to management i.e. broken lock, fence, security light, etc. Don’t share information outside (Insert Name) Be wary of outside requests for information about company policies, procedures, assets, etc.

20 Recognizing potential security risks Activity out of the norm Activity out of the norm Loitering out of normal sight lines Loitering out of normal sight lines Attempts to bypass security Attempts to bypass security Clothing not suited to the weather Clothing not suited to the weather Noises or odors not expected from containers Noises or odors not expected from containers Containers with holes, patches, missing or damaged seals or seal numbers that don’t match Containers with holes, patches, missing or damaged seals or seal numbers that don’t match Incorrect Hazmat labels for cargo Incorrect Hazmat labels for cargo Can you think of others? Can you think of others?

21 Documentation Fraud Fraud involves the use of dishonest or deceitful conduct in order to obtain some unjust advantage over someone else. Fraud involves the use of dishonest or deceitful conduct in order to obtain some unjust advantage over someone else. The basic motivation for fraud is greed. The basic motivation for fraud is greed. Fraud is the product of three factors: Fraud is the product of three factors:  Motivation – someone willing to commit  Victim or target  Lack of a capable guardian

22 Documentation Fraud Three ways to limit fraud: Three ways to limit fraud:  Reduce the supply of motivated offenders  Protect and educate the targets*  Limit opportunities by making the crime difficult to commit* * controllable factors How to detect fraud How to detect fraud  Look for anomalies i.e. changes in lifestyle, valuation or description on documentation, increase in claims, etc.

23 Failure is not an option! Loss of life Loss of life Trade is shut down Trade is shut down Production lines are shut down Production lines are shut down Scarce and expensive food, clothes, etc. Scarce and expensive food, clothes, etc. Layoffs and business failures Layoffs and business failures

24 Questions? "The message should be clear -- if a business takes steps to secure its cargo against terrorism, we will give it the 'fast lane' through the border...C-TPAT is a program through which businesses win, governments win, and most importantly, the American people win. "(US Customs Commissioner Robert C. Bonner, April 16, 2002)


Download ppt "Customs –Trade Partnership Against Terrorism ATEC (Insert Company Name) Copyright © 2005, 2006 ATEC Systems, Ltd."

Similar presentations


Ads by Google