AVIATION SECURITY
• Aviation – EU Regulations – Airport Security
• R CAR – Regulated Air Cargo Agent Regime
• Screening of Cargo
51
51
SAFE 4 CORE
ELEMENTS
• Advance Electronic Information
• Consistent Risk Management
Approach
• Inspection of Outbound Cargo – N
IDE
• Enhanced Trade Facilitation
• The 3 SAFE Pillars: Customs-to
Customs & Customs-to-Business &
Customs-to-Other Governmental &
Inter-governmental Departments
5
2
52
CONTAINER SECURITY INITIATIVE (C. S. I.)
USA Initiative
Pre-Screening
Focus on Customs Administrations and Ports in the Country of Export
Risk Management
Sharing Data and Intelligence
53
53
ISO Supply Chain Security
ISO 28000 : 2007
Plan ~ Do ~ Check ~ Act
(14 Countries, IMO, WCO, ICS)
54
54
Giving Specifications
For Security Management Systems for the
Supply Chain
Management System Standards
55
55
IMPACTS OF TERRORISM
Port Closures Tourism
Channel Closures
Closure of Businesses
Relocation of Businesses
Tourism Termination
56
56
HISTORICAL HIGHLIGHTS
Zealots at Judea (Sicarii)
Nizari Isamlis – Al-Assassin
Guy Fawkes (1605)
Reign of Terror (1793 – 94)
Munich Massacre (1972)
Tokyo Subway (1995)
Oklahoma City (1995)
World Trade Centre Twin Towers
(11/09/2001 or USA Term 9/11)
57
57
TERRORISM
Brutal But Not Senseless
= MOTIVE
Terrorism = Theatre
58
58
COUNTER TERRORISM IN THE PRIVATE SECTOR
= Discuss
Contact Numbers
Location of Police
Phone call Threats
Contingency Plans
Visitors
59
59
WMD
(weapons of mass destruction)
Statutory Acts and International Laws with WTO Global Agreements
in place:
Large numbers
Chemical, Biological, Radiological, Nuclear, Explosive ....
Even Loose Nukes
Export Control arrangements
Awareness
60
60
SECURITY DESIGNS
People
Physical Safeguards
Process
Security Systems
People Physical Process
Component Safeguards Component
Component
*Security Officer * Security Policies
* Police Officer * Physical Barriers * Security Plan
* Fire Fighter * Lighting * Procedures
* All Employees
* CCTV & Sensors * Education & Training
* Access Control * Emergency Preparedness
61
61
NAME SOME…
Physical Safeguards??
Top Management & Everybody’s commitment
EOP
62
62
PERSONNEL SECURITY & SCREENING
Invisible Barrier
Background checks
Authority to Release information
Reference checks
Drug & Alcohol tests
Periodic background tests
People always moving from Job to Job
63
63
PHYSICAL DEFENCE IN DEPTH
Out Fence – clear
Rings of Security
Padlocking
Parking considerations
Lighting considerations
Sensors x 3
Intrusion Detection Systems (IDS)
Alternative Power Sources
64
64
SECURITY MANAGING
Interior
Exterior
65
65
SENSITIVE AREAS
Doors
Employee ID Cards
Materials control
Package control
Patrols & Inspections
Alarms
CCTV
66
66
SECURITY EDUCATION
Employee participation
Weakest Link
3 Goals: understand ~ meet ~ embrace
Mindset & Security Awareness
Management participation
Apathy
Harden the target
67
67
DOCUMENTATION 68
All Types of Documents must be clear
Electronic & Manual
Loss vs. Recovery
System Access
Who, What, When, Why, Where
Cargo Description must be clear
(Continued…)
68
DOCUMENTATION (cont.)
Packing Lists
Bills of Lading
Advance Cargo Manifests
Shipping & Receiving
Deadlines & Delays
Storage Areas Secure
Tamper Seals UCR
Pre-load Inspections
Short loading
69
69
CARGO & CONVEYANCE SECURITY
Container Inspection
Container Integrity
Container Seal Programme
Stuffing Site
Loading Ocean Terminal
Transhipment Terminal
Off-loading Ocean Terminal
Types of Seals
Smart Technology
70
70
SMART CONTAINER TECHNOLOGY
71
71
TRUCK SECURITY PROGRAMME
Gate Controls
Inspections
Dock Security
Truck Staging
Driver Guidelines
High Value Cargo!!!
Report discrepancies
72
72
IT SECURITY / INFRASTRUCTURE
Confidentiality
Integrity
Availability
Protection, Hardware, Software and Networks
Virus attacks
Hacking
Information Security Policy
Types of Information
Firewalls and Data Protection
AND DATA???
73
73
BUSINESS PARTNER SECURITY
A CHAIN
IS AS STRONG
AS ITS
WEAKEST LINK
74
74
BUSINESS PARTNER SECURITY (continued)
Extend Security Supply Chain Screening Partners
Profile checking
Sub-contracting
Reviews of Security
Monitoring
Customer Screening
75
75
MANAGE AN INVESTIGATION
Reporting
Internal Theft
25/25/50 Principle
Silent Crime
Fraud – p 201
False Billing
Bribery
Investigation & Analysis
Evidence collection
Chain of Custody
76
76
RISK AND VULNERABILITY ASSESSMENT
METHODOLOGY
Step 1 - Identify critical business functions important to protect
Step 2 - Take stock of existing security measures and procedures
Step 3 - Identify possible threat scenarios
Step 4 - Assess consequences
Step 5 - Assess vulnerability
Step 6 - Evaluate risk score and determine mitigation strategy
Step 7 - Develop countermeasures
Step 8 - Re-assess likelihood
Step 9 - Evaluate countermeasures
Step 10 - Repeat the process
Step 11 - Continue the process
77
77
INCIDENT MANAGEMENT
Logging, Recording and Reacting to Bomb & Fire, Medical, Terror,
Hijacking, Theft etc.
Discovery of a suspicious device
Type up – DO NOT LIST!!
First Aid Training
78
78
EMERGENCY MANAGEMENT & CONTINGENCY PLANNING
Contingency Planning
Emergency Response
Evacuation & Assembly
Search & Rescue
Return to work
Crisis Management
Media Relations
Business Continuity
Business Recovery
79
79
Contingency Planning is a
Continuous
PROCESS
80
80
for additional research
• ISPS (International Ship & Port Facility Code)
• Singapore’s Secure Trade Partnership
• USA’s Customs-trade Partnership Against Terrorism (C-TPAT)
• Canada’s Partners in Protection (PIP)
• Sweden’s StairSec Programme
• New Zealand’s Secure Export Partnership (SEP) Programme
• Aviation – EU Regulation 2320/2002
• Free and Secure Trade (FAST) Programme
• EU’s AEO Customs Programme
• WCO SAFE Framework of Standards
• Container Security Initiative (CSD)
• 24-Hour Advance Manifest Rule
• Technology Asset Protection Association (TAPA)
• ISO/PAS Supply Chain Security Management System Standards (28000/2007)
81
USEFUL LINKS…
WCO http://www.iata.org/
http://www.wcoomd.org/home.htm
www.lifetrons.ch
http://www.icao.int/ [email protected]
82 82
Questions & Answers
For further information on this and other Training Courses offered
by GMLS, please contact us on:-
Website: www.gmls.co.za
Email: [email protected]
Office Mobile: +27 82 852 3626
Tel: +27 44 020 0103
or +27 10 880 4342
83