The supply chain is a complex system of numerous, integrated stakeholders. These stakeholders are responsible for the transportation, storage, documentation, and handling of material goods and cargo. Each entity has its own unique relationship with and role within the chain—as well as its own unique security requirements. The challenge of trying to secure the supply chain at every level is both a domestic and global concern. In this global economy, companies must be able to integrate security into supply chain logistics to protect their employees, assets, and clients from incidents of theft and other damaging events.
Supply Chain Security: A Comprehensive Approach provides security professionals the tools necessary to ensure supply chain security. The book demonstrates how to establish and enforce security policies and protocols, including rapid responses that must be deployed in the event of a theft or security incident. Most importantly, it enables professionals to integrate business practices into the planning, development, and successful operation of supply chains to ensure security and protect assets.
Drawn from the experience of a recognized leader in domestic and international supply chain logistics, trade, and transportation security, the book illustrates through a series of case studies how security professionals can institute sound security practices. By demonstrating to their stakeholders and potential customers that they provide a secure environment for materials, products, goods, and cargo, companies can increase their customer base and improve their bottom line.
WHAT IS SUPPLY CHAIN SECURITY?
What Is a Supply Chain?
Origin
Manufacturing/Suppliers
Handoffs
Initial Service Provider
Service Providers
Trucking
Ocean Shipping
Airlines
Third-Party Logistics Providers
PODs
Elements That Impact the Supply Chain
Operations
Contracts
Customer Demands, Written and Nonwritten
Provider Capability
Geography
Force Majeure/Acts of God
Crime
Volume
Storage Capacity
Government Controls
Security: Supply Chain versus Corporate
Focus of the Program
Corporate Culture
Supplier and Provider Relationships
DEVELOPING A SUPPLY CHAIN SECURITY PROGRAM
Security for Key Links in the Chain
Origin
Security Reviews of Origin
Actions
Customers
Providers
Provider Security Review
CCTV
Access Controls
Intrusion Alarms
Storage and Distribution
Security Review of Facility and Location
Transportation Security Review
Shipping and Receiving
Destination Concerns
Elements of a Successful Supply Chain Security Program
Goal of the Supply Chain Security Program
Theft and Pilferage
Smuggling and Contamination
Antiterrorism
Government Supply Chain Security Program Compliance
Customer Contractual Obligations
Risk Management
Industry Positioning and Branding
Marketing and Sales
Methodology for Supply Chain Security
Integration into the Business
Business Unit Support
Structure and Reporting
Responsibilities and Roles
Policies and Procedures
Training
Classifications
Security Auditing and Assessments
Information Technology
Liaisons
Budgeting
Justification
Internal vs. External
Own or Rent?
REGULATION AND RESOURCE
Government and Industry Supply Chain Security Programs
C-TPAT (Customs-Trade Partnership against Terrorism)
A Growing Partnership
Extending the Zone of US Border Security
How It Works
An Emerging Focus: Mutual Recognition Arrangements
PIP (Partners in Protection)
History
Modernization
Mutual Recognition
Harmonization of PIP and C-TPAT
FAST (Free and Secure Trade)
How It Works
Benefits
FAST-Eligible Goods
BASC (Business Alliance for Secure Commerce)
Mission
Vision
Specific Objectives
AEO (Authorized Economic Operator)
AEO Guidelines
CCSP (Certified Cargo Screening Program)
Background
Program Overview
Benefits
TAPA (Transported Asset Protection Association)
About TAPA
HVTT Asset Theft: A Shared Problem
Standards Lead to Solutions
Resources and Technology for Supply Chain Security
GPS (Global Positioning System)
GSM (Global System for Mobile Communications)
Trucking-Focused Devices
Asset Tracking and Radio Frequency Identification (RFID)
Taping/Wrapping
Seals
Screening
CASE STUDIES
Case Studies
Case Study 1: Ocean Container Theft, Port of Newark, NJ
Case Study 2: Pilfering within a "Knitting" and Distribution Operation
Case Study 3: Truck Theft
Case Study 4: Parcel Network Operation Pilferage
Case Study 5: Latin America Warehouse Assault
APPENDICES
Appendix A: Sample Customer Security Requirements
Appendix B: Sample Policy/Procedure
Appendix C: Sample Security Review/Audit
Appendix D: Sample Security Budget
Appendix E: List of Acronyms
INDEX
Biography
Dr. Arthur G. Arway is a recognized leader in domestic and international logistics, trade, and transportation security. He brings to the table 27-plus years of supply chain cargo security, law enforcement, investigative, human resources, and corporate security experience. He is an advisor to senior management as well as governmental security agencies. Dr. Arway has contributed to the body of work on supply chain and logistics security and has been cited in trade publications such as Journal of Commerce, CargoVision, and the online logistics magazine, DCVelocity. As a Certified Protection Professional (CPP) with ASIS International, he has presented at numerous industry meetings and exhibitions. He has also been honored by ASIS International with the Golden Writers Award for his work on workplace violence.
"This book certainly earns a place on the bookshelf of the security professional looking to explore the world of supply chain security, as well as the practitioner just starting in the field who needs a solid reference."
—Bill Crews, CPP in Security Management