Security Management, February 2015
According to current estimates, 4 million containers arrive in U.S. ports each year from around the world. Surprisingly, maritime security is often overlooked as an aspect of national security. In this article, experts discuss the vulnerabilities of America’s ports and the global supply chain. What affects the security of this aspect of the nation’s critical infrastructure?
- The Security and Accountability for Every Port Act (SAFE) is just one of a number of laws and regulations designed to enhance port and maritime supply chain security.
- A risk score, based on the ship’s manifest not its cargo, is assigned to a container by an automated targeting system.
- The Department of Homeland Security is required to screen all cargo entering U. S. ports and physically scan high-risk cargo.
- Only an estimated 4.1 percent of containers are currently x-rayed before they come to the U.S.
Read how government agencies and persons on the front line of the port security assess the vulnerabilities and recommend solutions.
The U.S. lists eighteen critical infrastructure (CI) sectors. This White Paper explores the role of the CI within the U.S. as it relates to the well-being of society.
- Attacks on any sector could significantly disrupt the functioning of government and businesses, even those far beyond the location of the incident.
- Hacking and malware intrusions affecting sensitive and proprietary networks have increased the vulnerability of the IT and communication networks that support CI.
- Attacks using CI components as weapons of mass destruction would have devastating physical and psychological consequences throughout the nation.
- This 32-page report covers a range of security solutions to these scenarios, from current gaps to protection advancements.
Not a member?Join now and gain access to all ASIS resources,
including information, education, networking, and more.
Members Only Resources
This Standard was developed by ASIS International and the Supply Chain Risk Leadership Council (SCRLC), which includes world-class supply chain manufacturing and services organizations and academic institutions. It defines supply chain risk as the uncertainty in achieving an organization’s objectives throughout its supply chain.
- Supply chain risk management (SCRM) involves the assessment and control of risk events at all points, from sources of raw materials to end use by customers and consumers.
- SCRM is a dynamic discipline that should be integrated into business management and planning processes.
- A supply chain security contract for external and third-party providers and examples of sources of risk to an organization and its supply chain.
A fictitious pick-up, sometimes called a “deceptive pick-up,” is an identity theft scheme used to steal cargo. In this session, speaker Walter Fountain, CPP, director of corporate security for Schneider National, Inc., defines how the scheme works, who can be a victim, what fraudulent documents are used, and how freight shipments can be protected. He also offered these statistics:
- The average value of cargo stolen in a fictitious pickup in 2013 was $154,134, a 44 percent increase from the year before.
- Most fictitious pick-ups involve the theft of food and beverage because they are easy to fence.
- About half of fraudulent pickups occur on Thursday or Friday when shippers and brokers are anxious to move freight out the door.
View all published Security Spotlights Next month’s feature topic: