2 Agenda Background What is C-TPAT? Who comprises the Supply Chain? What does participation in C-TPAT require?What are the benefits?What are the threats?How criminals circumvent security measuresWhat are the foundations of cargo security?Securing the Supply Chain at (Insert name). What can we/you do?Recognizing potential security risksDocumentation fraudFailure is not an option!Questions?This morning/afternoon, we’ll review the following items.Read the agenda items.At the end of the presentation, you’ll have a good understanding of what C-TPAT is and what you can do as an individual to help protect the supply chain.We’ll have a short Q&A session after the presentation to discuss any questions or comments that come up. Also, feel free to ask questions during the course of the presentation.
3 Customs and Border Protection (CBP) Part of the Department of Homeland SecurityFormed in the years following 9/11, by merging:U.S. Customs ServiceAgricultural and Plant Health InspectionImmigration and Naturalization ServicesU.S. Border PatrolCustoms and Border Protection is a part of the Department of Homeland Security which was formed post 9/11Formerly the U.S. Customs Service, it was decided to focus efforts on border security and resulted in the merging of read the names of the agencies from the slide
4 Customs and Border Protection (CBP) Customs and Border Protection assumes responsibility for:7,514 miles of border95,000 miles of shoreline350 ports of entry750 million people annually51,000 foreign vessel calls11.2 million trucks2.2 million rail carsThe following data will give you an idea of the formidable task CBP has in protecting our country. Read the slide text
5 What is C-TPAT?The Customs-Trade Partnership Against Terrorism (C-TPAT) is a major program initiative to help protect the United States from future atrocities like Sept 11, 2001Read the slide.Immediately following 9/11, the U.S. Government went to Level One alert.Commercial traffic at the land border points of entry came to a halt. By Sept 14, automobile manufacturing plants dependent on JIT inventory began to shut down. Given that over $1billion in trade moves each day across just the US/Canada border, it became obvious the government needed the cooperation of the private sector,
6 What is C-TPAT? Customs-Trade Partnership Against Terrorism A joint government business initiative to build cooperative relationships that strengthen the overall supply chain and border securityCustoms recognizes that they can only be successful with industry cooperationRead the bullets.CBP’s strategy, focused on the continuing threat of future terrorist attacks was rooted in a basic military strategy “push the border out”.The C-TPAT initiative is based on that wisdom.Today C-TPAT has over 8,000 private sector partners
7 Who comprises the Supply Chain? Manufacturers, shippers, suppliers, vendorsCarriersOcean linesAirlinesRailroadsTruck linesWarehousesRead the bullets.Many of these are our partners in each and every shipment.On any given transaction, there are any number of opportunities for terrorists to introduce trouble into the supply chain.If all companies get on board and conscientiously do their job, our supply chain and country will be more secure.
8 Who comprises the Supply Chain? NVOCC’sCargo handlersInspectorsFumigatorsGovernment agenciesFreight forwardersLongshoremenCustoms brokersImportersRead the bullets.
9 What does participation in C-TPAT Require? A signed Agreement with Customs and Border Protection (CBP)Conduct a comprehensive assessment of the importers global supply chain based on C-TPAT criteriaDevelop a written and verifiable process for determining risk throughout the supply chain and selection of business partnersImplement and maintain security measuresRead the bullet.We complete an agreement to work cooperatively with Customs to improve supply chain security. In the process, we assess our current security status, develop written documentation to support the program and implement and maintain our security plan.
10 What does participation in C-TPAT Require? Self-assessment of our supply chain security using C-TPAT best practice guidelinesBusiness Partner RequirementsCargo SecurityContainer SecurityPhysical Access ControlsPersonnel SecurityProcedural SecuritySecurity Training and Threat AwarenessPhysical SecurityInformation Technology SecurityRead the bullet.Our job is to assess our current supply chain security status using the “best practice” guidelines published on Customs web site.
11 What does participation in C-TPAT Require? Submission of a supply chain Security Profile to CBPDevelopment and implementation of a program to enhance our supply chain securityVerification within 3 yearsRead the bullets.After we make our assessment, we compile a profile of our companies security which is sent to Customs for review. Customs will either accept our profile or come back with recommendations we should take prior to certification.During our assessment, we’ll likely find some security items we can institute or improve. We’ll create a plan to make changes.Once Customs accepts our application, we will be come C-TPAT “certified”. Within three years of our certification, Customs will visit our facility to validate the information provided in our profile, review our Security Policy and continue to work with us to improve security.
12 What are the benefits of participating in C-TPAT? A reduced number of cargo inspectionsAccess to FAST lane at land bordersAn assigned account manager at CustomsAccess to C-TPAT membership listAn emphasis on self policing, not verificationsAn opportunity to play an active role in the war against terrorismA secure supply chain for employees, suppliers and customersRead the first bullet.The number of Customs exams of non-CTPAT companies is increasing daily. A single “intensive exam” by CBP can cost our company over $800. By becoming C-TPAT certified, Customs agrees to reduce the number of cargo inspections our company is subjected to.Read the second bullet.For our U.S./Canada or U.S./Mexico shipments, we will have access to expedited clearance.Read the third bullet.Customs will assign us an Account Manager to help us achieve our goal of improving our supply chain security as well as working out issues with our imports.Read the fourth bullet.Access to the C-TPAT list will enable us to identify which of our partners or future partners are currently C-TPAT certified. We will look to conduct business with C-TPAT certified companies first.Read the fifth bullet.C-TPAT participants will be asked to develop a policy to self-police their supply chain security. This allow CBP to focus on higher risk companies.Read the remaining bullets
13 What are the benefits of participating in C-TPAT? Companies that spend on supply chain security can expect an advantage far outweighing the costs of implementing security processes, according to a study by Stanford University.The study quantified for the first time the benefits of investing in supply chain security:Companies collectively reduced their Customs inspections by 48%Increased the automated handling of their imports by 43%Saw a 29% reduction in transit timesAsset visibility in the supply chain improved by 50%30% improvement in on-time shipping to their customersReduced time taken to identify problems by 21%Reduced time taken for problem solving dropped by 31%Reduced inventory theft by 38%Excess inventory was reduced by 14%Reduced customer attrition by 26%Read the first bullet.The number of Customs exams of non-CTPAT companies is increasing daily. A single “intensive exam” by CBP can cost our company over $800. By becoming C-TPAT certified, Customs agrees to reduce the number of cargo inspections our company is subjected to.Read the second bullet.For our U.S./Canada or U.S./Mexico shipments, we will have access to expedited clearance.Read the third bullet.Customs will assign us an Account Manager to help us achieve our goal of improving our supply chain security as well as working out issues with our imports.Read the fourth bullet.Access to the C-TPAT list will enable us to identify which of our partners or future partners are currently C-TPAT certified. We will look to conduct business with C-TPAT certified companies first.Read the fifth bullet.C-TPAT participants will be asked to develop a policy to self-police their supply chain security. This allow CBP to focus on higher risk companies.Read the remaining bullets
14 What are the threats? Terrorism, sabotage Trafficking – drugs; conventional, nuclear, chemical or biological weaponsIllegal entry – stowaways in containers, trailersTheft of cargo, personal property or informationRead the bullets.The threats are real and many are on-going every day. This program will enable us to reduce these risks.
15 How criminals circumvent security measures Loitering near the facility observing procedures, asking questionsTaking pictures, obtaining plans or making diagrams of facilitiesImpersonating workers i.e. pest controlCalling or ing employees about proceduresRead the bullets.Different facilities, conveyances and situations provide different risks. These are but a few examples.Thieves, Terrorists, Smugglers, etc. look for and carefully study opportunities. Think about the potential risks in our supply chain…
16 What are the foundations of cargo security? Identify the risksUnderstand the risksIsolate the risksAllocate resources to neutralize the risksAssign ownership for actionAnticipate actsImplement solutionsMeasure results and share best practicesRead the bullets.These are the steps CBP takes in fighting terrorism. If properly employed, the actions resulting from these steps will help to improve our cargo security.These are the steps we’ll take in implementing our C-TPAT program.
17 Securing the Supply Chain at (Insert Name). What can we/you do? Educate employeesKnow our partnersCreate and share our security policy expectationsUse C-TPAT certified service providersImplement a Security Policy and ProceduresSecure our facilities, systems and conveyancesBe conscious of security day to dayRead the bullets.These are the things you and I can do at [insert company name] to secure the supply chain.
18 Securing the Supply Chain at (Insert Name). What can we/you do? Challenge unfamiliar or unidentified visitors in the office or warehouseDon’t share system passwordsReport in confidence any suspected or actual anomaly (irregularity) or illegal activity to managementRead the bullets.Specifically, you can help by:taking this message to heartlook for potential holes in our security policy and report them to managementmake security a daily routinepolitely challenge visitors who do not have a badge when on our premisesdon’t share your passwords with anyone except your supervisor or managerreport any suspicious or illegal behavior to you supervisor or manager without fear of reprisaldon’t share security related information about our company with outside individuals. If you have a question, ask your supervisor or manager.
19 Securing the Supply Chain at (Insert Name). What can we/you do? Report potential security risks to management i.e. broken lock, fence, security light, etc.Don’t share information outside (Insert Name)Be wary of outside requests for information about company policies, procedures, assets, etc.Read the bullets.Constantly be on vigil.
20 Recognizing potential security risks Activity out of the normLoitering out of normal sight linesAttempts to bypass securityClothing not suited to the weatherNoises or odors not expected from containersContainers with holes, patches, missing or damaged seals or seal numbers that don’t matchIncorrect Hazmat labels for cargoCan you think of others?Read the bullets.These are a few examples of security risks. Look for things that don’t add up, seem out of place, suddenly change, etc. Report them to your supervisor or manager.
21 Documentation FraudFraud involves the use of dishonest or deceitful conduct in order to obtain some unjust advantage over someone else.The basic motivation for fraud is greed.Fraud is the product of three factors:Motivation – someone willing to commitVictim or targetLack of a capable guardianRead the bullets.Documentation fraud exists every day. Sometimes it’s easy to spot, most times it’s very difficult.The best way for us to minimize documentation fraud is to make you aware of the potential, do business with honest partners and keep our eyes open.Look for things that don’t add up, seem out of place, suddenly change, etc. Report them to your supervisor or manager.
22 Documentation Fraud Three ways to limit fraud: Reduce the supply of motivated offendersProtect and educate the targets*Limit opportunities by making the crime difficult to commit* * controllable factorsHow to detect fraudLook for anomalies i.e. changes in lifestyle, valuation or description on documentation, increase in claims, etc.Read the bullets.Fraud will always occur. The best we can do is attempt to minimize it. By educating our employees and limiting opportunities to commit fraud, we can limit its occurrence.Be on the watch for things out of the normal.
23 Failure is not an option! Loss of lifeTrade is shut downProduction lines are shut downScarce and expensive food, clothes, etc.Layoffs and business failuresRead the bullets.Failure to secure our Supply Chain could be devastating. We can’t stress enough the need for each and every individual to do their part. Take security to heart each and every day. Sometimes the smallest thing can make the difference…
24 Questions?"The message should be clear -- if a business takes steps to secure its cargo against terrorism, we will give it the 'fast lane' through the border...C-TPAT is a program through which businesses win, governments win, and most importantly, the American people win. "(US Customs Commissioner Robert C. Bonner, April 16, 2002)I’ll be happy to address any questions or comments at this time. Thank you for your interest.