Presentation on theme: "Security Training and Threat Awareness Program for All Employees"— Presentation transcript:
1 Security Training and Threat Awareness Program for All Employees
2 Sealed Air and C-TPATWe have recently joined with U.S. Customs and Border Protection to help secure the international supply chain. As a member of the Customs-Trade Partnership Against Terrorism (C-TPAT) program, we have committed ourselves to new and improved security procedures throughout our operations. These new procedures are designed to enhance the security of our facilities, people, cargo shipping, cargo receiving and cargo tracking processes. Our goal is to prevent cargo loss and cargo tampering including the introduction of illegal merchandise such as drugs and weapons of mass destruction into our cargo boxes and containers. As a part of our commitment to supply chain security, we now require all of our employees to seriously consider supply chain security as a significant risk to our business.
3 Impact of Security Breaches on C-TPAT Status Suspension and Removal from C-TPATLoss of C-TPAT related benefitsPossibility of increased examinationsDelaysThat could lead to:Loss of BusinessDefault on contractual obligationsBrand name damaged or compromisedC-TPAT BenefitsReduced inspections at borders and portsFASTFirst of cargo to move during/after and event
5 Employee Identification Your ResponsibilitiesWhile on company propertyYour company identification badge must be properly displayed and worn at all times.Your company uniform (if applicable) must be worn at all times.Properly secure and protect your ID badge, uniform, keys and access control card, etc.
6 Visitor Controls Visitor Pre-meeting Requirements Inform your visitor of the company’s visitor policies including photo identification, check in with receptionist prior to their visit.Visitor Entrance RequirementsEnsure that your visitor has logged in and has been issued a visitor badge
7 Visitor Controls Visitor Escort Requirements Visitor Exit Requirements You must escort your visitors at ALL timesDo not leave your visitor unattendedVisitor Exit RequirementsEnsure that your visitor has logged out and has returned the visitor badge to the guard or receptionist
8 Visitor Controls – Reception Desk Responsibilities Visitor EntranceNotifyhostingemployeeDocumentarrival onVisitor LogCheckphotoidentificationIssuevisitorbadgeVisitor ExitSecurity personnel, the receptionist or a designated employee must adequately control the issuance and collection of visitor badges.All visitors must be escorted and visibly display their visitor badge.CollectvisitorbadgeDocumentdepartureon VisitorLog
9 Suspicious Persons LOOK FOR….. Any person without an employee badge, visitor badge or uniform.
10 Suspicious Persons Determine if the person is an employee or a visitor …and ACTDetermine if the person is an employee or a visitorIf an employee, remind them always to display their ID badge and uniform.If a visitor, escort them to the reception area or to the person with whom they are visiting.Report the incident to your immediate supervisor.In the event you identify an employee or visitor that is not wearing an identification badge or uniform:If its an employee, remind them to always display their ID badge and uniform or notify a supervisor regarding the situationIf its a visitor, escort them to the reception area or to the person with whom they are visiting.Supervisors – report incidents to Security
11 Suspicious Persons LOOK FOR….. Any person in unauthorized/restricted areasIf you identify an individual in an area he/she is prohibited from entering,
12 Suspicious Persons AND ACT….. Get them out of the area If a visitor, escort them to the reception area.Report the incident to your immediate supervisorIf its an employee, approach them and ask them if they need assistance or contact managementIf it’s a visitor, escort them to the reception area or security guardReport suspicious activity to your immediate supervisor.
13 Suspicious Persons Look for …. Any person: wearing an overcoat on a 95 degree day, or any kind of inappropriate clothingwaiting or loitering in an area or hallwayasking for an unknown department, person or employeeLook for suspicious persons which may include an individual wearing an overcoat on a 75 degree day, someone waiting in the hallway, someone asking for an employee that doesn’t work here.Cam :17:23AM /02/06
14 Suspicious Persons LOOK FOR…. Any person: who seems not to belong in the areagoing door to door, office to officeentering a private office unescortedselling itemswho seems lostLook for anyone that you’ve never seen in the building, peeking in offices, entering an office unescorted, someone that seems to be lost.Cam :17:23AM /02/06
15 Suspicious Persons LOOK FOR ….. Any person: Tampering with somebody’s desk, boxes, personal items, equipment, vehicles, cameras, lights…running, especially if carrying somethinghiding behind doors, fences, desks, …Cam :17:23AM /02/06
16 Suspicious Persons AND ACT……… Immediately report the incident to your immediate supervisorImmediately report suspicious activity to your immediate supervisor.
17 Suspicious Activity LOOK FOR … Objects obstructing access points Disconnected or obstructed camerasBroken locks or access control systemsUnexplained clutter or debrisObjects thrown from a vehicle, especially while traveling at a high speed.
18 Suspicious Activity ACT … Immediately report any suspicious activity to your supervisor.
19 Internal Conspiracies Definition - when people work together by agreement to commit an illegal act. A conspiracy may exist when the parties use legal means to accomplish an illegal result, or to use illegal means to achieve something that is unlawful.Company personnel should be on the lookout for suspicious people hanging around the facility – have your staff challenge and report unauthorized individuals to managementIdentify the threat not only from the point of origin – but to destinationIdentify areas that may pose a threat to your employees and supply chain security – employees may be targeted in the form of bribes and/or intimidation
20 Conspiracy Indicators Conspirators (internal & external) may conduct surveillance and gather information about facilities and operations:May take photographs - (entrances, fencing, warehouse and hours of operation)Focus on weak and/or non-existing security measures - throughout the supply chain line (origin, transit, security and at destination – distribution center) to focus on the opportunity to initiate breachAssess the company’s vulnerabilities – the conspirator can create the opportunity for the breach to occur. Transit routes and stops are of particular interest. Stow plans of the cargo will also allow for quick and easy access to introduce illegal contraband.Collect/gather information on employees - schedules, work habits, off-duty social life, address, etc. Will focus on employees that have previous criminal records and/or weak in moral character.May seek information about security procedures - Will ask questions on how shipment routes are monitored, GPS system utilized, document routing, manifests, changing their work schedules in order to facilitate the breach, etc.
21 Conspiracy Indicators, Cont. Target employees with a “need” to make money and those in financial distress - These employees are prime targets for recruitment by the conspirators. The weaker employees may end up working as “lookouts”.May use social engineering tools - to gather information about the company and employeesMake unusual inquiries - about the cargo flow and method of shipmentAttempt to access unauthorized systems - to manipulate manifests, shipping documents, bill of lading, load plans, etc. Bogus information may be entered and/or altered in shipping documents in order to facilitate the introduction of unmanifested materials“Dry-run” or TestMay ship an un-related item with legitimate cargoEntering false information in the documents such as a bogus address, name, “fictitious" company, etc.Attempting to pick-up cargo without appropriate documentation and identificationUnique markings on legitimate cargo boxes/crates
22 Conspiracy Indicators, Cont. Probe the company’s security:May show up to work on day offEnter restricted and/or unauthorized zones without proper access/identificationDrivers may stray off the authorized route to test GPS geo-fencingEnter the warehouse with unauthorized personal items (backpacks, large gym bags, etc.)Activate alarms and check for reaction timeAcquire company equipment:Company uniforms, identification, access cards & codes to enterin sensitive areasStolen high-security seals and or disposed cut sealsCollecting company boxes/crates with branded logo to conceal thecontrabandA federal judge sentenced the former transportation director for SC Johnson to eight years in jail this month for his role in a shipping scheme that defrauded the company of tens of millions of dollars.At least two employees were part of a scheme in which trucking contractors billed SC Johnson at inflated rates and then returned part of the money to the company's transportation director, in the form of kickbacks. He bought gifts for one of his employees. He was convicted of mail fraud and filing a false tax return. The other employee was convicted of making false statements to a postal inspector.Investigators said the transportation director worked with trucking industry executives who also set up phony firms that paid Morris kickbacks.Three former Delta Air Lines Inc. employees, including two from metro Atlanta, were sentenced to prison Wednesday for importing illegal drugs through flights to Hartsfield-Jackson Atlanta International Airport.CBP agents inspected the luggage, and determined it contained multiple packages of suspected illegal narcotics.Later that same day, Carlos R. Springer, 42, of Hampton, Ga., was interviewed by Homeland Security Investigations agents. Springer was the performance leader for the shift of ramp employees who off-loaded the baggage on flight 364.During a search of Springer’s cellular telephone, agents found coded, incriminating text messages between Springer and Luis Marroquin, 36, of Atlanta, around the time of the arrival of the flight. Rondon was observed on the video of the arrival and unloading of flight 364, although he was off-duty and had no authorization to work the flight.Agents also learned Marroquin recruited Kelvin Rondon, 28, of Miami. Rondon was to make sure that the bag was on the flight, and was to be paid $500 per package. The day before flight 364 arrived Rondon was shown a photo of the drug-laden bag on Marroquin’s telephone. Rondon said when he arrived on the tarmac he helped unload the cargo and attempted to find the bag, but was unsuccessful.Marroquin was sentenced to 15 years and eight months.Springer was sentenced to 11 years and three months in prison.Rondon was sentenced to five years and three months in prison.Two employees at a sunglasses manufacturer would duplicate orders to create two packages of same orderManifested first package per procedure, manually manifested second package and shipped to sports distributor in NY where 3rd conspirator would ship back name brand basketball shoes, which the two employees would then sell. The sunglasses were being sold at flea markets.Came up as cycle count variances, however, employees were not able to discover cause until upper management hired undercover employee who uncovered the scheme. Company even implemented RFID (radio frequency ID) in sunglasses cases and found these in the possession of employee involved.Lessons learned: Automated inventory systems eliminated opportunity to create duplicate orders; One person involved had a record, but no background check had been conducted.
23 Suspicious Objects or Packages LOOK FOR….Unexplained objects or packages that look strange or do not belong to the areaStrange markings on boxes (unknown code, color) or strange characteristics (weight, number, odd shape)Strange leaking substance (powder, liquid, etc…)Suspicious objects in the middle of an area (e.g., hallway, lobby, etc.)
27 Computer Security Do not share access to your computer with strangers Log-off when you leave your computerPasswords should be changed every 60 to 90 daysDo not share your password with anyoneDo not write down your password.
28 Computer Security Selecting a Password Use hard-to-guess passwords Do not use the same password in more than one placeA password should have a mix of letters, numbers and symbolsI Love to be SecureAlways on time to work !AoT2wxMy Password is Very Secure MyP1VS#Yo Quiero Taco Bell yqtb!10
29 Computer Security Electronic Mail Restrictions Do not use company for private business activities, amusement or entertainment.Do not send containing racist, sexist, threatening or other objectionable language.Do not join mailing lists.Do not open unknown or unexpected attachments.
30 Document SecurityALWAYS shred sensitive documents – anything with prices, customer names, purchase order and financial information, just to name some examplesNEVER leave sensitive documents on your desk when you are away - store in a locked drawer or cabinetDon’t forget about information stored on disc – treat these just as you would paper documentsDon’t leave sensitive documents at the printer - use the locked print feature, if available
31 Container/Trailer Inspection Utilize the 7-Point Inspection for all US Imports from outside the US, excluding MexicoUtilize the 17-Point Inspection for all US Imports from Mexico ONLYContainer/Trailer integrity must be maintained to protect against the introduction of unauthorized material and/or persons.Begin and end your inspection at the same point every time.To ensure a systematic and consistent process, a checklist is used for documentation and verification.Checklists are important to establish chain of custody.
37 Importance of Container/Trailer Inspections Tires – What to look for:Recently MountedTampered BoltsWater Streaks
38 Importance of Container/Trailer Inspections Exhaust / Air Deflector:
39 Seal IntegrityA seal inspection process should be implemented throughout the supply chain. The VVTT Seal Inspection Process is a good example of one: V – View seal & container locking mechanisms. V – Verify seal number for accuracy. T – Tug on seal to make sure it is affixed properly. T – Twist & Turn seal to make sure it does not unscrew.