Securing a Supply Chain

Read this executive summary and introduction as a guide addressing security, its importance, the major players, logistics requirements, as well as the overall vision.

Executive Summary

The multi-layered approach

The generally accepted trend calls for a layered approach, made of essential regulatory, conceptual, technological, programmatic and procedural components. More specifically, the main SCS elements are:

  • Advance (electronic) Cargo Information (ACI)
  • Risk Management
  • Non-Intrusive Inspection (NII)
  • Operators' Certification (Authorized Economic Operator - AEO)

The variety of programs that compose the layered approach are mutually complementing and even sometimes slightly overlapping each other in such a way that is meant to reinforce the whole structure:

  • The ACI programs capture cargo information at an early stage, allowing the concerned Government Agencies to screen and analyze them through robust risk management techniques.
  • The certification or credentialing programs aim at ensuring that supply chain actors are proven to be legitimate, self-disciplined and trustworthy.
  • The application of recent technologies to SCS themes is being developed. For example: scanning and radiation detection, RFID-based "e-seals" and GPS-based container tracking, computer-based data-analysis and targeting systems, designed to screen and interpret themass of cargo data supplied every day by the ACI programs.
  • The ISPS code and the ship-tracking systems cover the port-vessel interface and the ocean- leg of the voyage at vessel level. The ISPS code provides for the security norms for port installations.

However a number of variances and discordant sounds can be heard.