1. RISK ASSESSMENT, PROFILING AND TARGETING

Size: px
Start display at page:

Download "1. RISK ASSESSMENT, PROFILING AND TARGETING"

Transcription

1 1. RISK ASSESSMENT, PROFILING AND TARGETING

2 CONFIDENTIAL CONTENTS 1. INTRODUCTION 2. LEARNING CIRCLE AND RISK ASSESSMENT 2.1. Introduction Risk Identification Risk analysis Seizure analysis Risk Evaluation and Prioritization 2.2. Risk Preparation/Profiling Introduction Steps in developing a profile 2.3. Targeting 2.4. Covering/Treatment 2.5. Evaluation of results 3. USE OF INFORMATION TECHNOLOGY 3.1. Introduction 3.2. Data storage and security 3.3. Data mining 3.4. Valuation Database as a Risk Assessment Tool 4. APPENDIXES Appendix I: Automated Targeting System Appendix II: ncen Bridging the gap through technology Appendix III: Data Mining in the Risk Management Process Appendix IV: Guidelines on the Development and use of a National Valuation Database as a Risk Assessment Tool RISK ASSESSMENT, PROFILING AND TARGETING

3 CONFIDENTIAL 1. INTRODUCTION The ongoing increase in international trade and travel has made exhaustive physical checking of all cargo and passengers almost impossible. The purpose of this document is to help Customs decide how best to utilize their limited sources. Every day Customs officers must make choices concerning which cargo or passengers will be checked, or not. It is not only available equipment, resources and manpower that are important for making choices, but also the reasons (risk indicators) as to why a cargo or passenger has been selected for checking. Many Customs services utilize Information and Communication Technology (ICT) systems to automatically generate risk indicators from profiles loaded within the system. The use of risk indicators makes it easier for the Customs officer to make the right choices. In Customs services without an electronic profile system, the Customs officer must decide which shipment of goods or passengers will be checked, by manual screening techniques which could be considered resource intensive. This document will address ways in which a Customs Administration can implement risk assessment in order to best decide (by assessment, profiling and targeting) where resources should be allocated or deployed in order to maximise results. The way a country implements risk assessment, profiling and targeting can differ depending on local circumstances. 1. RISK ASSESSMENT, PROFILING AND TARGETING 1-3

4 CONFIDENTIAL 2. LEARNING CIRCLE AND RISK ASSESSMENT 2.1. Introduction Risk assessment is the overall process of determining risk identification, risk analysis, risk evaluation and prioritisation. It is one of the most important steps in the learning circle and will be explained in the following sections. Learning circle starts with three steps of risk assessment, and then continues with preparation/ profiling, targeting, covering/treatment, evaluation of outcomes/feedbacks. Covering / Treatment Targeting Evaluation of outcomes / feedbacks LEARNING CIRCLE Preparation / Profiling Risk Identification Risk Analysis Risk Evaluation and Prioritization necessary, measures such as the issue of profiles or publication of new alerts can be taken to cover the risk. Detailed feedback on the results of Customs checks is vital. Both positive as negative results should be reported as they are equally valuable in identifying future risk indicators, new trends and contribute to the cycle of intelligence. For example, a negative result on referral of a shipment of poor quality fruit is still of interest since the shipment could have been used as a test shipment. So, for Customs services is it very important that all Customs officers can report all kinds of information to identify new and emerging risks. For this reason it is crucial that Customs services develop/ use a user-friendly system 1 to collect this kind of information. Customs officers must be trained how to recognize risks in the field they are working. For Customs officers it is important to be in a position to reach and to learn from all kinds of available information on crime and smuggling. Reports, alerts, and bulletins of organisations such as the WCO, Regional Intelligence Liaison Offices (RILOs), United Nations Office on Drugs and Crime (UNODC), Interpol and of national law enforcement agencies as well as open source information can assist in this. Sources of key information may be: Risk assessment is applied to Customs enforcement primarily to identify how best to apply effort and resources in order to maximise seizures of contraband, but also to facilitate the legitimate trade. The technique is used to improve selectivity or targeting by focusing enforcement efforts on the areas most likely to produce positive enforcement results. The obvious benefit of risk assessment is that it helps Customs management to decide how to allocate limited resources. The presence of risks may be a reason for Customs officers to select a specific shipment of goods or a passenger for a physical check or examination of documents. In general, irregularities will be reported and can be used for risk analysis. When Seizure reports Strategic, Tactical, Operational reports of other Customs administrations Intelligence data Information exchange with other Customs Administrations Risk signals from Customs officers and other law enforcement personnel Cooperation or interviews with other knowledgeable people from the importing and transportation field, e.g. Customs brokers, cargo agents, warehouse personnel, etc. Transport documents such as manifests, airway bills, etc. 1. For example: WCO Customs Enforcement Network (CEN) and National Customs Enforcement Network (ncen) systems RISK ASSESSMENT, PROFILING AND TARGETING

5 CONFIDENTIAL Available national Customs (or other law enforcement agencies) data bases Signals and alerts Risk Identification Risk Identification consists of identifying when, where, why, how and by whom risks can arise as the basis for further analysis. Risk identification is a somewhat subjective step, because thought is given to uncertain/unknown future events. However, if done by people familiar with the holistic business processes, supported by intelligence, then experience and knowledge can provide an objective view of the environment. The following example of risk identification at a border crossing describes the main elements to be considered in Box 1. Additional information and examples are given in the Manuals of Risk Indicators in Volume II. Box 1: Risk Identification at a Border Gate The steps in (drugs related) risk identification at a border crossing: 1. Describe the current enforcement controls system. 2. Draw a flowchart which shows each step in the control process. 3. What are the current controls in the system? 4. What are the current strengths and weaknesses in the system? 5. Where, when, how is the risk likely to be occur and by whom? 6. Why do the opportunities to circumvent the controls arise? 7. Categorize risks-controllable or Uncontrollable. In going through the risk identification process, there are many different areas in your control system to look at. The areas themselves have many different items to consider. Following are various possible items, not exhaustive, to be considered when reviewing the areas in the control system in order to try to identify risks or weaknesses. Geography Is your border crossing close to a contraband source area in the neighboring country? Is your border crossing or control point on a major contraband transit route? Is the country next to your border crossing a contraband transit country? Traffic Patterns and Staffing Is the amount of traffic consistent or is it heavier at certain times of the day or certain days of the week? What is the primary kind of traffic cars, trucks? Does the type of traffic change at certain times, with there being more cars, trucks or foot traffic than at other times? Is the staffing sufficient to meet traffic patterns amount of staff greater during higher traffic periods? Goods and Local (Drug) Trends Do the goods that normally come through your border crossing or control point offer good opportunity to conceal contraband? Does the packaging or containers for goods that normally come through your border crossing or control point offer good opportunity to conceal contraband? Are drug prices in your country going up or down (drug prices going down will possibly indicate that more drugs are entering the country)? Have the number of addicts or drug overdoses been increasing in your country (an increase would possibly indicate that more drugs are available in your country)? 1. RISK ASSESSMENT, PROFILING AND TARGETING 1-5

6 CONFIDENTIAL Cooperation with the other law enforcement agencies at the border Cooperation and information exchange is the key for combating Customs frauds in general and drugs in particular. Do you exchange information with other agencies at the border? Neighboring Country s Enforcement Activity Do your colleagues on the other side of the border conduct export searches? Do you exchange information with your colleagues? This information could concern seizures or intelligence. Controls What are the strengths and weaknesses of your controls? Why do opportunities exist for contraband to go through your controls? What percent of cargo, vehicles and people are searched? Do you ever question the operators or passengers in vehicles? Do you keep records or seizures? Do you develop profiles of suspect smugglers or concealment methods? Do new officers receiving training on what drugs to look for and common drug smuggling methods? Risk analysis Risk analysis, in general terms, is about developing an understanding of the risk. It provides an input to risk assessment and to decisions about whether risks need to be addressed together with the most appropriate strategies and methods to control the risk. Risk analysis consists of determining the consequences and their probabilities for identified risks. The consequences and their probabilities are then combined to determine a level of risk. In order to identify the level of risk (high, medium, low) you need to take in account all available information. The analysis considers: how likely is an event to happen; and what are the potential consequences and their magnitude. Risk analysis involves consideration of the causes and sources of risk, their consequences and the probability that those consequences can occur. Factors that affect consequences and probability should be identified. An event can have multiple consequences and can affect multiple objectives. Existing risk controls and their effectiveness should be taken into account. Risk analysis normally includes an estimation of the range of potential consequences that might arise from an event, situation or circumstance, and their associated probabilities, in order to measure the level of risk. When a risk analysis leads to the conclusion that consequences are likely to be insignificant and the probability is expected to be extremely low, consideration can be given to facilitate trade. The purpose of risk assessment is therefore not only to discover risks, but also to determine that in the majority of the traffic of cargo and passengers there is limited risk. For instance, if a certain flight has been checked several times with no results, one can conclude that the number of checks can be lowered. This should be verified intermittently to ensure the assessment remains current. Seizure analysis Seizure analysis is an important tool of risk assessment. Understanding how a violation of Customs law was carried out provides valuable lessons for recognising future attempts or weakness in the system. A significant proportion of major investigations result in the same people or companies being involved time after time. It is important to systematically apply intelligence, information, anecdotes RISK ASSESSMENT, PROFILING AND TARGETING

7 CONFIDENTIAL and lessons learned from major seizures to proactively plan for future targeting. With the benefit of hind sight it is often possible to look at things from a different perspective. Objectives of seizure analysis: Identify and outline the background to the seizure: Modus operandi, scope, scale of activity, persons involved Establish as far as possible all the subjects involved and what role they played Involves identifying persons, companies, suppliers, shippers, brokers Identify what aspects of the seizure are not known: Essentially identifying future work to fill in gaps Identify any on going risk to the border: Who was involved, and what risk do they present now Who was not arrested, do they pose a threat now Establish whether this seizure was part of a trend or pattern: Has it occurred overseas, in your country e.g. look at context of seizure Any new smuggling method identified? What if any lessons can be learned from this seizure (and who needs to be informed): Do profiles/targeting criteria need refining Were false leads followed unnecessarily? It should be noted however that seizure analysis only identifies where the Customs service has been successful. It does not take into account those shipments of smuggled goods that successfully evaded Customs controls. So the sharing of any kind of seizure information obtained from other law enforcement agencies or Customs administrations (e.g. CEN) is useful in this context. Risk Evaluation and Prioritization The risk assessment process will highlight context and other factors that might be expected to vary over time and which could change or invalidate the risk assessment. These factors should be specifically identified for on-going monitoring and review, so that the risk assessment can be updated when necessary. Box 2 below suggests some factors to consider when evaluating risk, using a land border environment as an illustration. Data to be monitored in order to refine the risk assessment should also be identified and collected. The effectiveness of controls should also be monitored and documented in order to provide data for use in risk analysis. Accountabilities for creation and reviewing the evidence and documentation should be defined. Box 2: Considerations for Determining Risk at a Land Border Crossing Assessing the Level of Risks at the Land Border Crossings The reason for analyzing and assessing the level of the identified risks is to determine which risks are the most serious and should have priority for being treated or having corrective action taken. You first rate the likelihood and the consequences as high, medium or low. From rating the likelihood and consequences, you have information which will be used to make a final assessment of the risks. This final rating will again be high, medium or low. As with the information provided for risk identification, the following non-exhaustive list is intended to give you some guidance in determining the level of risk. Geography If your border crossing is next to a contraband source country or on a major transit route, the likelihood of the risk occurring would be higher than if these circumstances did not exist. 1. RISK ASSESSMENT, PROFILING AND TARGETING 1-7

8 CONFIDENTIAL If the country next to your border crossing is a major transit country, then you should consider the possibility that it could pose a big a threat as a source country and increase the likelihood of smuggling. Traffic Patterns and Staffing If there is insufficient staff to handle the traffic, this increases the likelihood of smuggling. Traffic coming from a source area would be of higher risk than traffic from a non-source area and traffic going to a high user area would be of higher risk than traffic going to a low or non-user area. Cargo made up of multiple consignments will be more difficult to profile and perform selectivity on than cargo going to a single consignee, which would increase the likelihood of smuggling. Goods and Local (drug) Trends If legitimate goods, or their packaging and containers, which normally cross your controls, offer a good opportunity to conceal contraband, then this would increase the likelihood of contraband coming through your controls undetected. If you are not familiar with all the goods that commonly go through your controls crossing, then it is more difficult for you to profile and select suspect shipments, thereby increasing the risk. The greater the amount of drugs used in your country that are produced in the neighboring country, the greater the likelihood that they are being smuggled across your border crossing and the consequences are also high. Neighboring Country s Enforcement Activity If your colleagues on the other side of the border conduct export searches, this will probably make your particular border crossing less attractive to smugglers and they will choose a border crossing with less intense enforcement activity. This will decrease the likelihood of the risk occurring, but if they do not do export searches, it will increase the likelihood. If you do not exchange information with your colleagues across the border, you are missing a great opportunity and, therefore, increase the risk of smuggling at your border control point. Your Border Crossing Controls If searches are always cursory and not complete, the likelihood that contraband is coming through your controls will be higher. If you do not question any vehicle operators or passengers, you will not have the opportunity to discover many risk indicators which are revealed through questioning and this will increase the risk of smuggling by people or cargo. Failure to keep seizure records, to develop profiles of smugglers and methods and to use risk indicators means that you are using random selection techniques which are not effective and thereby increase the smuggling risk at your border crossing Risk Preparation/Profiling Introduction More and more Customs administrations utilise electronic targeting systems to select consignments and passengers for Customs control. These targeting systems generally use two kinds of risk profiles: specific risk profiles random profiles Profiles assist Customs Administrations in making choices since it is generally impossible (and not efficient or necessary) to check all consignments or passengers. Day to day practice has demonstrated that profiles cannot identify all risks. Several reasons exist for this: technical limitations of systems; lack of capacity to actually perform the selections; new modus operandi that are not known yet; and RISK ASSESSMENT, PROFILING AND TARGETING

9 CONFIDENTIAL profiled companies that do not appear on the manifests. A risk profile consists of one or a combination of indicators aimed at selecting certain consignments or passengers that require more Customs attention. Box 3 below describes the development and characteristics of a risk profile. Risk profile development is based on information gathering, systematic charting and analysis of the information. Box 4 below illustrates an example of charting risk indicators in the passenger context and Box 5 does the same in the sea cargo context. The risk profile contains a description of: the risk area (e.g. drugs/ revenue); assessment of the risk or possible risk that may be involved; specific indicators like companies, persons, origin, goods, etc.; the counter-measures to be taken (means of control); and the period that the profile is active for. On the other hand, selection system might be supported by random selection so that unknown risks can be discovered. Box 3: Development and Characteristics of a Risk Profile From Risk Areas to Risk Profiles A risk profile is a document which can be set out in a number of ways but it should be comprehensive and relevant to the traffic throughput in a Customs office. The risk profile should contain a description of the risk area, an assessment of the risk, the counter-measures to be taken, an action date, the results and an evaluation of the effectiveness of the action taken. A risk profile can be kept in a binder or on a local computer and it should be as accessible as possible to the relevant Customs officers. Risk indicators, on the other hand, are specified selectivity criteria such as: specific commodity code, country of origin, departure country, licensing indicator, value, trader, level of compliance, type of means of transport, purpose of the stay in the Customs territory, financial consequences, or financial situation of the trader/person. Once established, the profiles along with other information and intelligence will provide a basis for targeting potentially high risk movements of consignments, means of transport, or passengers. RISK AREAS SELECTIVITY CRITERIA Choice of general information RISK INDICATORS specific details for the risk RISK PROFILE Combination of risk indicators - Quota - GSP - CITES - Trade - etc - kind of goods - country of origin - transport route - principal - etc - textiles under quota - specific country of origin - unusual transport route - specific principal - etc - textiles under quota AND/OR - specific country of origin AND/OR - unusual transport route AND/OR - specific principal AND/OR 1. RISK ASSESSMENT, PROFILING AND TARGETING 1-9

10 Box 4: Charting Risk Indicators at an Airport CONFIDENTIAL Simple Profiling Example: Passengers Information contained in seizure reports resulted in the following chart: Age Sex Day of Week Time of Seizure 25 M Sunday 09:00 27 M Sunday 08:30 41 M Tuesday 09:15 23 F Saturday 10:00 30 M Monday 09:30 29 F Sunday 08:15 26 M Thursday 14:00 From this chart, it is possible to build a profile of what type of smuggler is operating at this border crossing. It is primarily a male, aged between 25 and 30 years who prefers attempting to bring contraband between 08:00 and 10:00 hours. The foregoing is an elementary example, but it serves to show how a profile can aid in not only knowing who to look for (males between 25 and 30 years), but also when to look for them (between 08:00 and 10:00 hours). Box 5: Charting Risk Indicators at a Sea Port Simple Profiling Example: Cargo: Information contained in seizure reports resulted in the following chart: Drug Type Cargo Type Concealment Shipping Line Heroin Computers Inside Computer Green Seas Hashish Clothing False Wall Royal Heroin Televisions Inside Television Green Seas Heroin Televisions Inside Television Green Seas Heroin Computers Inside Computer Royal Heroin Computers Inside Computer Green Seas Hashish Paper Products In Packaging Royal From this chart, it is possible to build a profile of what type of heroin smuggling methods are being used at this port. It is primarily hidden inside computers and televisions and arriving on vessels owned by Green Seas and Royal shipping companies. The foregoing is also an elementary example, but it serves to show how a profile can aid in not only knowing who to look for, but also on what arriving vessels to look for them Steps in developing a profile A. Collect available data from sources such as: seizure reports (modus operandi); intelligence data (Customs investigations reports, available Customs systems, information of other law enforcement agencies, international organisations); cooperation with other law enforcement officers; information of trade and industry, shipping companies, stevedores, custom brokers etc.; RISK ASSESSMENT, PROFILING AND TARGETING

11 CONFIDENTIAL irregularities; other signals of Customs officers; documents like Bills of Lading, Airway bills, invoices etc.; and information available on Internet an other open sources. The collection of recent and pertinent information relating to seizures is crucial. The WCO Customs Enforcement Network (CEN) is a set of tools used to collect, analyse and disseminate information and intelligence mainly on Customs seizures in WCO member countries. B. Evaluate, structure and chart the data (1) check and verify the reliability and accuracy of the data, (2) select a format for the chart which allows you to compare the pertinent data, (3) itemise data elements on the chart (4) establish a computer database if feasible All information collected has no value on its own merit. The usefulness of the information or data is dependent upon its validity and reliability. By evaluating the reliability of the source and accuracy of the information, this information is now ready to be analysed. C. Analyse the data There is no specific structure on how to analyse the data -every Customs service has its own method. The Analysis Guidelines - as a part of the WCO Risk compendium - contains guidelines for this topic. (1) Look for common elements (2) Recognise patterns: (a) movement of merchandise (information of counterparts) (b) methods of concealment (c) conveyances used (d) frequently utilised flights (e) day/date/time of seizures (f) age/sex of violators (g) routing of persons/carriers (h) origin of contraband The analysis involves examining components of collected information to establish patterns and relationships. Considering the context and the aim of the analysis, identify the main issues by examining the available information/data, such as (if it is drug related): main routes, source countries, suspect ports, risk countries, out of season commodities, mode of transport, concealment methods, etc. Automated tools are available to analyse data and assess risk. These tools can identify trends and lessons from past experiences, as well as point out high-risk areas. (see the WCO Databank on Advanced Technology) D. Establish, disseminate/activate the profile: (1) Customs profiling system (2) Bulletin board (3) Telephone (4) Mail (5) Briefing Before a profile is activated in an automated profiling system, consider testing the profile in order to check the impact and outcome F. Obtain feedback: (1) Seizure reports (2) Other written reports (3) Intelligence (4) Oral reports G. Modify profile: (1) Change elements as indicated by feedback (2) Profiles need regular updating. After the risk profiles have been used for a period of time it is important to assess their value. The result of the analysis work is used to feed new information back into the risk assessment process and at the same time update the risk profiles, if required. As a result of this work the Customs services are able to identify additional investigative leads and potential targets for inspection. Box6 provides an example of undertaking all the profiling steps discussed. 1. RISK ASSESSMENT, PROFILING AND TARGETING 1-11

12 CONFIDENTIAL Box 6: A Profiling Exercise: Combating Drug Smuggling In Country A, XYZ harbour has been identified as one of the ports for drug smuggling. A team has been tasked to analyze the situation and develop a profile. 1. COLLECT INFORMATION (a) Seizure reports, other documents such as manifests, bill of lading etc. (b) Intelligence data (c) Interviews with Customs officers and other law enforcement personnel as well as with other knowledgeable people from the importing and transportation field, e.g. Customs brokers, cargo agents, warehouse personnel, etc. (d) Other relevant information 2. EVALUATE AND CHART THE DATA (a) Evaluation is the beginning of the processing phase. It involves evaluating the reliability of the source and accuracy of the information. (b) Data was collated, a chart format was selected, data was itemized, and then data elements was entered on the chart. Effective collation assists the intelligence developer or the analysts to identify the relationship between persons and companies, determine significant events and patterns of activity and uncover information gaps and hence collect additional information. Collation could be made according to the chronological sequence of events, dates of information received, identities of the people involved, geographical regions and sources of information or any combination of the above. The process of coding involves transforming the original (or raw) information, into a number of variables (type of offence, mode of transport, time and location for example), and to develop within each variable, a number of mutually exclusive categories. 3. ANALYZE THE DATA Analysis involves examining components of collected and evaluated data to establish patterns and relationships. In our example, after analyzing the data, it was established that small lorries, fictitious companies and private cars form the biggest threat. 4. ESTABLISH THE DATA ELEMENTS (a) Draw up the list of data elements: After analyzing, data elements should be identified. WCO Data Model should also be considered while identifying data elements (namely, risk indicators). (b) Determine coefficients for each data element: Every data element should also have coefficient on its own, allowing the Customs officer to determine, if the targeted goods or conveyances establish high, medium or low risk. Based on the analysis the unit draws up a list of data elements and coefficients needed for the risk profiling. Risk Indicators : Coefficients: Importer 2 Fictitious companies 4 Lorries 4 New drivers 2 Private cars 4 New companies 2 Payment in cash 1 Hand written manifest 1 Suspicious routing 2 In addition to the risk indicators it is always important to find out if there is some intelligence data available concerning the target RISK ASSESSMENT, PROFILING AND TARGETING

13 CONFIDENTIAL 5. DEFINE THE LEVEL OF RISKS (a) Low risk (1-6) : No inspection (b) Medium risk (7-10): Case by case decision and/or documentary inspection (c) High risk (11 +): Physical inspection If the target is counted as a high risk, physical check should always be conducted. On the other hand, if the result of the risk profiling is that the target is a low risk there is usually no need to make an inspection. When the result of risk profiling is that the goods or conveyance under examination establish a medium risk the decision to make a search has to be decided using Customs officers intuition and other available information. Even if a physical inspection is not performed, there might be need for a documentary control. 6. DISSEMINATE, REVIEW & MODIFY (a) Circulate the profile to appropriate users / activate in an automated system (b) Collect feedback (c) Evaluate feedback, and (d) Modify the profile, if needed After the risk profiles have been used for period of time determined earlier it is time to assess the value that the risk profiles and gathered intelligence contributed to risk assessment process. The results of the analysis work are used to feed new information back to the risk assessment process and at the same time for updating the risk profiles and coefficients, if needed. As a result of this work the Customs services are able to identify additional investigative leads and potential targets for inspection Targeting Targeting is based upon the prior identification of high risk goods, conveyances and passengers combined with document review, questioning and observation techniques in order to actually decide which ones to submit to a closer examination. Targeting is different for different types of contraband. The ever changing nature of smuggling also introduces another variance. As Customs becomes aware of patterns and trends in smuggling and sets up characterisations based on them, eventually these trends will change, and the criminal community will try new methods to introduce contraband. Therefore, these characterisations are ever changing and evolving. The following are some examples of critical elements to be considered when developing characterisations of arriving travellers: Age Sex Ethnicity Socio-economic status--education, occupation, etc. Appearance Items carried luggage type, amount of currency Origin/destination Time elements frequency of travel, length of stay Mode of travel Purpose of travel Quite conveniently, there are frequently encountered types of passengers for which certain patterns have emerged. Ordinarily the types of international traveller can be identified, and interviews can be made more effective by tailoring questions to that category of individual. If questioning verifies that these people are who they say they are, then they should normally be treated as low risk. Selectivity criteria for dutiable goods include the history of the importer, exporter, carrier, agent, etc., the origin and routing of the goods, and prohibitions or restrictions. For example, if air cargo or aircraft is selected for more intensive checks, using risk assessment process is 1. RISK ASSESSMENT, PROFILING AND TARGETING 1-13

14 CONFIDENTIAL necessary. During this process identify those areas in which the airport faces the greatest risk and the strengths and weaknesses of control system. In the profiling stage, picture is built of what a smuggler or smuggling method may look like for the airport. These two steps will help identifying possible high-risk goods and flights. Selectivity is then used to decide which of those goods and flights to actually target. Adequacy of the concealment method can also be used as a risk identifier in that cargo shipments can be identified which for one reason or another do not appear to be normal for the airport. For example, a smuggler may ship goods by a route that does not appear direct or does not make economic sense, in order to avoid showing that the goods came from or transited a source country. There could be many reasons why the shipment appears to be abnormal, such as the type of goods, or the routing of the shipment or the method/cost of transport. However, in order for this practice to be most effective, you must be familiar with what is normal before you can recognise what is abnormal. Prior to reaching the selectivity stage, below mentioned issues have already been identified: what types of contraband are coming through the airport, why they are coming through the airport, what the strengths and weaknesses of border controls are and the characteristics common to smugglers and smuggling methods at the airport. However, due to the shortage of resources and the large amount of aircraft and cargo traffic, every piece of cargo or aircraft which fits a profile may not be examined. Therefore, document review, questioning, observation and other enforcement tools should also be utilised in order to select for examination those goods, conveyances and passengers that pose the highest risk. Automated Targeting System (ATS) of the United Stated Customs and Border Protection is summarized in Appendix I Covering/Treatment Specific measures (means of control) or combination of measures on how to detect a certain identified risk will be identified at this stage Evaluation of results The last step of the learning circle is reviewing the results to determine whether a risk has been addressed or targeted properly. To be able to determine this, it is important to have detailed reports during the different phases of the learning circle. The results of the evaluation and review are also used to feed back the risk assessment process and to update the risk profiles. The profiles that have been drafted to target certain consignments and passengers lead to a number of Customs examinations. The results of the checks give further information that can be used in the learning circle. Both positive and negative results are valuable. By reporting the results, one can determine whether the profile has been effective and efficient or not. By analysing the results a decision can be made to adjust the profile or not. As stated earlier profiling is a dynamic process that needs constant adjustment RISK ASSESSMENT, PROFILING AND TARGETING

15 CONFIDENTIAL 3. USE OF INFORMATION TECHNOLOGY 3.1. Introduction The advantage of using Information and Communication technologies for control purposes is the ability to make information easily available to all authorised Customs officials. Information technology opens up better possibilities for the collection, analysis, targeting, profiling and outcomes of your efforts. Furthermore IT enables a more effective exchange of information with other law enforcement agencies. The application of Information and Communication technologies also allows Customs to assess various data, such as selectivity criteria, speedily and accurately, in order to identify their usefulness and helps them to react quickly to changing circumstances. The use of information technology is an effective tool for risk assessment. It enables a more rapid analysis of selectivity criteria than would be possible manually. Automation allows Customs administrations to establish a national database of information on all transactions and movements which can be updated and used for rapid information sharing and identification of changing risk areas. It can also provide a database of all risk profiles which would form the basis for a selectivity module within an automated clearance system. An automated system makes it easier for Customs administrations to subject declarations to a series of selectivity filters (i.e. the profiles) to determine which declarations may require further examination. With a better selection it also allows Customs to facilitate the legitimate trade Data storage and security Administrations are advised to take into consideration the legal requirements for storing data and ensuring its security. Guidelines on Application of Information and Communication Technology (Revised Kyoto Convention, General Annex, Chapter 7) provides further information. WCO has developed a system (National Customs Enforcement Network ncen) to assist Customs administrations to collect, store and exchange law enforcement data. Appendix II contains detailed information on ncen Data mining Data mining is a relatively new field that enables finding interesting knowledge (patterns, models and relationships) in the data sets. It is the most essential part of the knowledge discovery process and has the potential to predict events or to assist in analysis. Data mining has elements of databases, statistics, artificial intelligence and machine learning. Data mining software allows users to analyze large data sets from many different dimensions or angles, categorize it, and summarize the relationships identified. Technically, data mining is the process of finding correlations or patterns among dozens of fields in large databases. Customs might have such large databases, for instance from the operational import and export systems. Data mining techniques help us to perform better in risk identification, analyzing and preparing for audits or checks. With data mining Customs can gain time and can perform less checks with the same or even better results. Some of the applicable data mining techniques are shown below. With time series analysis, Customs can look for not known patterns, in order to discover new risks. Explaining a significant increase of trade for a certain product from a certain country of origin makes it possible that new risks will be found. This technique can be used in the stage of risk identification. With predictive modelling, one is able to produce estimations of unknown dependable variables at present or in the past. More commonly, with this method you can predict whether a situation will occur or has occurred. Techniques often used for this method are regression analysis, decision trees and neural networks. Those techniques are also suitable for making selection rules or for improving existing selection rules. With selection rules Customs administrations can select importand export shipments for a check. 1. RISK ASSESSMENT, PROFILING AND TARGETING 1-15

16 CONFIDENTIAL Document on Data Mining in the Risk Management Process developed by the WCO Electronic Crime Expert Group is attached as Appendix III Valuation Database as a Risk Assessment Tool A national valuation database is a risk assessment tool which may be used by Customs along with other risk tools to assess potential risk regarding the accuracy of the declared Customs value for imported goods. The information in the database should be recent data reflecting the Customs value and other pertinent information for previously imported goods. The values may not be used to determine the Customs value for imported goods, as a substitute value for imported goods, or as a mechanism to establish minimum values. Guidelines on the Development and Use of a National Valuation Database as a Risk Assessment Tool address various issues pertaining to the development and use of a national valuation database (Appendix IV) RISK ASSESSMENT, PROFILING AND TARGETING

17 CONFIDENTIAL 4. APPENDIXES Appendix I: Automated Targeting System Appendix II: ncen Bridging the gap through technology Appendix III: Data Mining in the Risk Management Process Appendix IV: Guidelines on the Development and use of a National Valuation Database as a Risk Assessment Tool 1. RISK ASSESSMENT, PROFILING AND TARGETING 1-17

18 CONFIDENTIAL Appendix I: Automated Targeting System AUTOMATED TARGETING SYSTEM (ATS): U.S. Customs and Border Protection s Experience The U.S. Department of Homeland Security (DHS), Customs and Border Protection (CBP) has developed the Automated Targeting System (ATS). Using a common approach for data management, analysis, rules-based risk management, and user interfaces, ATS supports all CBP mission areas and the data and rules specific to those areas. ATS is an Intranet-based enforcement and decision support tool that is the cornerstone for all CBP targeting efforts. CBP uses ATS to improve the collection, use, analysis, and dissemination of information that is gathered for the primary purpose of targeting, identifying, and preventing potential terrorists and terrorist weapons from entering the United States. Additionally, ATS is utilized by CBP to identify other violations of U.S. laws that are enforced by CBP. In this way, ATS allows CBP officers to focus their efforts on travelers and cargo shipments that most warrant greater scrutiny. ATS standardizes names, addresses, conveyance names, and similar data so these data elements can be more easily associated with other business data and personal information to form a more complete picture of a traveler, import, or export in context with previous behavior of the parties involved. Every traveler and all shipments are processed through ATS, and are subject to a realtime rule based evaluation. ATS provides equitable treatment for all individuals in developing any individual s risk assessment score, because ATS uses the same risk assessment process for any individual using a defined targeting methodology for a given time period at any specific port of entry. ATS receives various data in real time from the following different CBP mainframe systems: the Automated Commercial System (ACS), the Automated Export System (AES), the Automated Commercial Environment (ACE), and the Treasury Enforcement Communication System (TECS). ATS collects certain data directly from commercial carriers in the form of a Passenger Name Record (PNR). Lastly, ATS also collects data from foreign governments and certain express consignment services in conjunction with specific cooperative programs. ATS accesses data from these sources, which collectively include electronically filed bills, entries, and entry summaries for cargo imports; shippers export declarations and transportation bookings and bills for cargo exports; manifests for arriving and departing passengers; landborder crossing and referral records for vehicles crossing the border; airline reservation data; nonimmigrant entry records; and records from secondary referrals, incident logs, suspect and violator indices, and seizures. In addition to providing a risk-based assessment system, ATS provides a graphical user interface (GUI) for many of the underlying legacy systems from which ATS pulls information. This interface improves the user experience by providing the same functionality in a more rigidly controlled access environment than the underlying system. Access to this functionality of ATS uses existing technical security and privacy safeguards associated with the underlying systems. ATS consists of six modules that provide selectivity and targeting capability to support CBP inspection and enforcement activities. ATS-Inbound inbound cargo and conveyances (rail, truck, ship, and air): ATS-Inbound is CBP s primary decision support tool for targeting inbound cargo. The system is available to CBP officers at all United States ports of entry and CBP operations overseas. It provides an efficient, accurate, and consistent method for rapidly selecting high-risk targets for further scrutiny. ATS-Inbound assists in identifying cargo shipments, which pose a threat of terrorism, narcotic smuggling or other violations of U.S. law RISK ASSESSMENT, PROFILING AND TARGETING

19 CONFIDENTIAL ATS-Outbound outbound cargo and conveyances (rail, truck, ship, and air): ATS-Outbound is the outbound cargo targeting module of ATS that assists in identifying high risk exports. ATS-Outbound uses export declaration data that exporters file electronically. The export data is sorted and compared to a set of rules and evaluated in a comprehensive fashion. ATS-Passenger (ATS-P) travelers and conveyances (air, ship, and rail): ATS-Passenger is the module used at all U.S. airports and seaports receiving international flights and voyages to evaluate whether passengers and crewmembers should receive additional screening prior to arrival or departure. The system analyzes advance passenger information provided by carriers to develop a risk assessment for each traveler based on defined rules that pertain to specific operational objectives or enforcement efforts. ATS-Land (ATS-L) - private vehicles arriving by land: ATS-Land is the module that provides for the analysis and rule-based risk assessment of private passenger vehicles crossing the nation s borders. Using the vehicle license plate number, ATS-L allows CBP officers to cross-reference Federal and State databases using the weighted rulesbased assessment process and within seconds, determine whether the vehicle and its occupants should undergo further scrutiny. ATS - International (ATS-I) - cargo targeting for CBP s collaboration with foreign Customs authorities: ATS-International provides foreign Customs authorities with controlled access to automated cargo targeting capabilities and provides a means for exchanging best practices and developing and testing targeting concepts. This exchange provides vital support to other countries in the development of targeting systems that can enhance the security of international supply chains and harmonize targeting methodologies. ATS-Trend Analysis and Analytical Selectivity Program (ATS-TAP) (analytical module): ATS-Trend Analysis and Analytical Selectivity Program improves CBP s ability to examine, locate, and target violators of US laws, treaties, quotas, and policies regarding international trade. The trend analysis function provides an overview of trade activity for commodities, importers, manufacturers, shippers, nations, and filers to assist in identifying anomalous trade activity collectively. ATS supports the decision-making process and reinforces the role of the trained professionals making independent decisions necessary to identify violations of U.S. law at the border. 1. RISK ASSESSMENT, PROFILING AND TARGETING 1-19

20 CONFIDENTIAL Appendix II: ncen Bridging the gap through technology ncen is a system developed by the World Customs Organization (WCO) to assist Customs administrations to collect, store and exchange law enforcement information. The system when full functional will consist of an application for the collection and storage of enforcement data at a national level and an Information Communications interface (Icomm) for the exchange of these data amongst Customs administrations on international level. The receipt and exchange of accurate and timely information is the life blood of law enforcement activity. ncen consists of several complimentary components: a website, a secure communication system and various databases designed to facilitate the easy collection, storage, retrieval and dissemination of this information at the national level. In the future the system can be further developed in order to facilitate exchange of information at a national level between law enforcement and/or border control agencies. The Information Communications interface component of the system will allow the exchange of information at the regional and international level where information exchange protocols are in place to do so. By adopting ncen Customs administrations will have the ability to manage within structured database information on all aspects of their law enforcement functions. This will allow: better intelligence analysis, enabled risk targeting, seizure and performance management reporting, resource utilization and most importantly provide the platform for enhanced co-operation and collaboration across the whole border sector. ncen puts Customs administrations on the front foot. It provides a secure, cost effective pathway to assist administrations unlock key elements contained within the WCO Customs in the 21st Century Strategic Document, such as, Coordinated Border Management and a Globally Networked Customs. What does ncen do? It offers: A database of nominal Customs seizures and offences at a national level, comprising data required for the analysis of illicit traffic. A database where information on suspected persons, means of transport, means of concealment and offending business entities can be stored and queried at the national level. A dedicated website (ncws) that can be managed by a Member implementing ncen and which can contain alerts as well as intelligence needed by Customs administrations. A concealment picture database which enables Customs officers to view exceptional concealment methods and exchange X-ray pictures. A communication application to facilitate cooperation and communication between Customs administrations. An Information Communication interface (Icomm) for data exchange facilities; envisaged as data exchange specifications that can be implemented by third parties (other national Customs administrations, national Police, international organizations) and used to communicate with ncen systems or just for communication between parties. For WCO Members which do not have a centralized database in place ncen will provide these Members with a centralized database on seizures and Customs offences, a database on suspect persons, business entities, concealments, conveyances, etc. and a database of business entities where VAT information can be stored. Members introducing the complete ncen package will be able to exchange sets of data with each other and easily feed data into the global CEN database (option 1) RISK ASSESSMENT, PROFILING AND TARGETING

Automated Targeting System

Automated Targeting System for the Automated Targeting System Contact Point Phil Landfried Office of Information and Technology U.S. Customs and Border Protection (703) 822-6237 Reviewing Official Hugo Teufel III Chief Privacy Officer

More information

SPECIAL RECOMMENDATION IX: CASH COURIERS DETECTING AND PREVENTING THE CROSS-BORDER TRANSPORTATION OF CASH BY TERRORISTS AND OTHER CRIMINALS

SPECIAL RECOMMENDATION IX: CASH COURIERS DETECTING AND PREVENTING THE CROSS-BORDER TRANSPORTATION OF CASH BY TERRORISTS AND OTHER CRIMINALS )LQDQFLDO$FWLRQ7DVN)RUFH RQ0RQH\/DXQGHULQJ *URXSHGDFWLRQILQDQFLqUH VXUOHEODQFKLPHQWGHFDSLWDX[ '(7(&7,1*$1'35(9(17,1*7+(&5266%25'(5 75$163257$7,212)&$6+%

More information

APPENDIX B ABOUT U.S. CUSTOMS AND BORDER PROTECTION: MISSION AND CORE VALUES

APPENDIX B ABOUT U.S. CUSTOMS AND BORDER PROTECTION: MISSION AND CORE VALUES APPENDIX B ABOUT U.S. CUSTOMS AND BORDER PROTECTION: MISSION AND CORE VALUES Northern Border Activities B-1 July 2012 CBP MISSION We are the guardians of our Nation s borders. We are America s frontline.

More information

STATUTORY INSTRUMENTS SUPPLEMENT No. 1 11th May, 2012.

STATUTORY INSTRUMENTS SUPPLEMENT No. 1 11th May, 2012. THE EAST AFRICAN COMMUNITY STATUTORY INSTRUMENTS SUPPLEMENT No. 1 11th May, 2012. to the East African Community Gazette No. 7 of 11th May, 2012. Printed by the Uganda Printing and Publishing Corporation,

More information

Department of Homeland Security

Department of Homeland Security Department of Homeland Security Privacy Office 2011 Data Mining Report to Congress February 2012 2011 DHS Data Mining Report FOREWORD February 2012 I am pleased to present the Department of Homeland Security

More information

Global Supply Chain Security Recommendations

Global Supply Chain Security Recommendations Global Supply Chain Security Recommendations These minimum security criteria are fundamentally designed to be the building blocks for foreign manufacturers to institute effective security practices designed

More information

Security Criteria for C-TPAT Foreign Manufacturers in English

Security Criteria for C-TPAT Foreign Manufacturers in English Security Criteria for C-TPAT Foreign Manufacturers in English These minimum security criteria are fundamentally designed to be the building blocks for foreign manufacturers to institute effective security

More information

APEC Private Sector. Supply Chain Security Guidelines

APEC Private Sector. Supply Chain Security Guidelines APEC Private Sector Supply Chain Security Guidelines 1 Contents Executive Summary 3 Physical Security 4 Access Control 5 Personnel Security 6 Education and Training Awareness 7 Procedural Security 8 Documentation

More information

ESTABLISHING RISK MANAGEMENT/ CARGO SELECTIVITY CAPABILITY

ESTABLISHING RISK MANAGEMENT/ CARGO SELECTIVITY CAPABILITY CUSTOMS MODERNIZATION HANDBOOK ESTABLISHING RISK MANAGEMENT/ CARGO SELECTIVITY CAPABILITY July 2004 This publication was produced for review by the United States Agency for International Development. It

More information

FALCON Data Analysis & Research for Trade Transparency System

FALCON Data Analysis & Research for Trade Transparency System for the FALCON Data Analysis & Research for Trade Transparency System DHS/ICE/PIA-038 January 16, 2014 Contact Point James Dinkins Executive Associate Director Homeland Security Investigations U.S. Immigration

More information

2010 DHS Data Mining Report. DHS Privacy Office

2010 DHS Data Mining Report. DHS Privacy Office DHS Privacy Office 2010 Data Mining Report to Congress December 2010 Foreword I am pleased to present the Department of Homeland Security s (DHS) 2010 Data Mining Report to Congress. Section 804 of the

More information

LOGISTICS, SECURITY AND COMPLIANCE: THE PART TO BE PLAYED BY AUTHORISED ECONOMIC OPERATORS (AEOs) AND DATA MANAGEMENT

LOGISTICS, SECURITY AND COMPLIANCE: THE PART TO BE PLAYED BY AUTHORISED ECONOMIC OPERATORS (AEOs) AND DATA MANAGEMENT LOGISTICS, SECURITY AND COMPLIANCE: THE PART TO BE PLAYED BY AUTHORISED ECONOMIC OPERATORS (AEOs) AND DATA MANAGEMENT Abstract Doug Tweddle Enhanced security, compliance and logistics management in both

More information

Rail Carrier Security Criteria

Rail Carrier Security Criteria Rail Carrier Security Criteria Rail carriers must conduct a comprehensive assessment of their security practices based upon the following C-TPAT minimum-security criteria. Recognizing that rail carriers

More information

Customs Guidelines on Integrated Supply Chain Management

Customs Guidelines on Integrated Supply Chain Management Customs Guidelines on Integrated Supply Chain Management June 2004 ISCM Guidelines «Copyright 2005 World Customs Organization. All rights reserved. Requests and inquiries concerning translation, reproduction

More information

C-TPAT Security Criteria Sea Carriers

C-TPAT Security Criteria Sea Carriers C-TPAT Security Criteria Sea Carriers Sea carriers must conduct a comprehensive assessment of their security practices based upon the following C-TPAT minimum-security criteria. Where a sea carrier does

More information

D&B s Global Business Intelligence Solutions Plug Cargo Security Loopholes Government Solutions: Cargo Security

D&B s Global Business Intelligence Solutions Plug Cargo Security Loopholes Government Solutions: Cargo Security D&B s Global Business Intelligence Solutions Plug Cargo Security Loopholes Government Solutions: Cargo Security The September 11, 2001 terrorist attacks increased awareness of the significant security

More information

Reducing Trade-Financing Risks Through the Use of the Powers Secured Chain of Custody

Reducing Trade-Financing Risks Through the Use of the Powers Secured Chain of Custody Reducing Trade-Financing Risks Through the Use of the Powers Secured Chain of Custody Banks are normally sought out by importers who need financing. Traditionally the financing has usually been through

More information

WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM

WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM BACKGROUND WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM In the aftermath of September 11, U.S. Customs and Border Protection (CBP) in cooperation with its trade

More information

welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation

welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation Minimum Security Criteria Scope Designed to be the building

More information

Return the attached PPG Supply Chain Security Acknowledgement by email, fax, or mail within two weeks from receipt.

Return the attached PPG Supply Chain Security Acknowledgement by email, fax, or mail within two weeks from receipt. TO: International Suppliers shipping to the United States PPG Industries, Inc., and its affiliates have been certified as a member of the U. S. Customs Trade Partnership Against Terrorism ( C-TPAT ). C-TPAT

More information

How to build a great compliance program for your U.S. imports

How to build a great compliance program for your U.S. imports How to build a great compliance program for your U.S. imports For the importer of record, compliance means the complete and accurate recording of all internal processes through books and records, from

More information

What is C-TPAT? Customs Trade Partnership Against Terrorism

What is C-TPAT? Customs Trade Partnership Against Terrorism Learning Objectives What is C-TPAT? Terrorist Awareness Supply Chain Security Container Security Program 7 Point Inspection Seal Program Locks, Keys & Access Control / Visitor Controls Pre-Employment Verifications

More information

The Authorized Economic Operator and the Small and Medium Enterprise FAQ

The Authorized Economic Operator and the Small and Medium Enterprise FAQ The Authorized Economic Operator and the Small and Medium Enterprise FAQ May 2010 Copyright 2010 World Customs Organization. All rights reserved. Requests and inquiries concerning translation, reproduction

More information

GUIDELINES FOR THE IMMEDIATE RELEASE OF CONSIGNMENTS BY CUSTOMS

GUIDELINES FOR THE IMMEDIATE RELEASE OF CONSIGNMENTS BY CUSTOMS GUIDELINES FOR THE IMMEDIATE RELEASE OF CONSIGNMENTS BY CUSTOMS 1. Introduction 1.1. In recent decades business has seized on information technology to exploit such innovative transport initiatives as

More information

DHL GLOBAL FORWARDING Import Customs Brokerage USA

DHL GLOBAL FORWARDING Import Customs Brokerage USA Trade Lane Management DHL GLOBAL FORWARDING Import Customs Brokerage USA Patrick Demler / Robert Marjai, Chicago December 15 2011 OVERVIEW MODULES 1. USA Import brokerage / CBP and OGA (Other Government

More information

Statement of John Sammon. Assistant Administrator for. Transportation Sector Network Management. Transportation Security Administration

Statement of John Sammon. Assistant Administrator for. Transportation Sector Network Management. Transportation Security Administration Statement of John Sammon Assistant Administrator for Transportation Sector Network Management Transportation Security Administration U.S. Department of Homeland Security Before the United States House

More information

C-TPAT Importer Security Criteria

C-TPAT Importer Security Criteria C-TPAT Importer Security Criteria Importers must conduct a comprehensive assessment of their international supply chains based upon the following C-TPAT security criteria. Where an importer outsources

More information

Customs-Trade Partnership Against Terrorism (C-TPAT) Minimum Security Criteria Third Party Logistics Providers (3PL)

Customs-Trade Partnership Against Terrorism (C-TPAT) Minimum Security Criteria Third Party Logistics Providers (3PL) Customs-Trade Partnership Against Terrorism (C-TPAT) Minimum Security Criteria Third Party Logistics Providers (3PL) Since its inception, the Customs-Trade Partnership Against Terrorism (C-TPAT) program

More information

STRATEGIC PLAN 2013/2014 TO 2015/2016

STRATEGIC PLAN 2013/2014 TO 2015/2016 STRATEGIC PLAN 2013/2014 TO 2015/2016 1. WCO Strategic Plan Introduction 1. The purpose of this document is to present the WCO Strategic Plan that was approved by the Council in June 2013 for the years

More information

publish in advance any regulation governing customs matters that it proposes to adopt; and

publish in advance any regulation governing customs matters that it proposes to adopt; and CHAPTER SIX CUSTOMS ADMINISTRATION ARTICLE 6.1 : PUBLICATION AND NOTIFICATION 1. Each Party shall ensure that its laws, regulations, guidelines, procedures, and administrative rulings governing customs

More information

2010 SECURITY AWARENESS TRAINING

2010 SECURITY AWARENESS TRAINING 2010 SECURITY AWARENESS TRAINING Hazardous materials are essential to the economy of the United States and the well being of its people. They fuel our cars and trucks and locomotives, heat and cool our

More information

Risk-Based Approach to Managing Supply Chain Security and Compliance

Risk-Based Approach to Managing Supply Chain Security and Compliance Risk-Based Approach to Managing Supply Chain Security and Compliance Supply chain security remains a U.S. policy priority, and the U.S. Government continues to work closely with the trade community to

More information

Inspection of U.S. Customs and Border Protection Miami Field Office Ports of Entry

Inspection of U.S. Customs and Border Protection Miami Field Office Ports of Entry Inspection of U.S. Customs and Border Protection Miami Field Office Ports of Entry December 18, 2014 HIGHLIGHTS Inspection of U.S. Customs and Border Protection Miami Field Office Ports of Entry December

More information

SAFE FRAMEWORK OF STANDARDS

SAFE FRAMEWORK OF STANDARDS SAFE FRAMEWORK OF STANDARDS TO SECURE AND FACILITATE GLOBAL TRADE On 23 June 2005 safer world trade became a reality when Directors General of Customs, representing the then 166 Members of the WCO, unanimously

More information

Privacy Act of 1974; Department of Homeland Security, U.S. Customs and Border

Privacy Act of 1974; Department of Homeland Security, U.S. Customs and Border BILLING CODE: 4410-10 DEPARTMENT OF HOMELAND SECURITY Office of the Secretary DHS-2008-0052 Privacy Act of 1974; Department of Homeland Security, U.S. Customs and Border Protection Electronic System for

More information

WCO Customs Risk Management Compendium

WCO Customs Risk Management Compendium WCO Customs Risk Management Compendium TABLE OF CONTENTS FOREWORD... V EXECUTIVE SUMMARY... VI I. INTRODUCTION... VIII II. GLOSSARY... X III. VOLUME 1... 1 1. RISK MANAGEMENT IN THE CUSTOMS CONTEXT...

More information

Making critical connections: predictive analytics in government

Making critical connections: predictive analytics in government Making critical connections: predictive analytics in government Improve strategic and tactical decision-making Highlights: Support data-driven decisions using IBM SPSS Modeler Reduce fraud, waste and abuse

More information

Intermec Security Letter of Agreement

Intermec Security Letter of Agreement Intermec Security Letter of Agreement Dear Supplier, Please be advised that Intermec Technologies has joined US Customs and Border Protection (USC&BP) in the Customs-Trade Partnership Against Terrorism

More information

Import Control System (ICS) An Overview

Import Control System (ICS) An Overview Import Control System (ICS) An Overview Robert Windsor Manager Trade Services Version 1 dated 5/7/2010 The Legislation European Parliament and Council Regulation 648/2005 and Commission Regulation 1875/2006

More information

SUPPLY CHAIN SECURITY: THE CUSTOMS COMMUNITY S RESPONSE

SUPPLY CHAIN SECURITY: THE CUSTOMS COMMUNITY S RESPONSE World Customs Journal SUPPLY CHAIN SECURITY: THE CUSTOMS COMMUNITY S RESPONSE Abstract Kunio Mikuriya The international customs community has developed measures to secure and facilitate global trade which

More information

Customs-Trade Partnership Against Terrorism (C-TPAT) Security Guidelines for Suppliers/Shippers

Customs-Trade Partnership Against Terrorism (C-TPAT) Security Guidelines for Suppliers/Shippers Customs-Trade Partnership Against Terrorism (C-TPAT) Security Guidelines for Suppliers/Shippers In support of Vectora's C-TPAT program implementation, these security requirements and guidelines are provided

More information

Customs & Trade Partnership Against Terrorism (C TPAT)

Customs & Trade Partnership Against Terrorism (C TPAT) Customs & Trade Partnership Against Terrorism (C TPAT) Bristol Myers Squibb Company Customs & Trade & Corporate Security Departments As a result of the events of September 11, 2001, the United States Customs

More information

CEOP Relationship Management Strategy

CEOP Relationship Management Strategy Making every child child matter matter... everywhere... everywhere CEOP Relationship Management Strategy Breaking down the barriers to understanding child sexual exploitation Child Exploitation and Online

More information

IBM Content Analytics: Rapid insight for crime investigation

IBM Content Analytics: Rapid insight for crime investigation IBM Content Analytics: Rapid insight for crime investigation Discover insights in structured and unstructured information to speed case and identity resolution Highlights Reduces investigation time from

More information

b. Other serious crimes, including organized crime, that are transnational in nature; and

b. Other serious crimes, including organized crime, that are transnational in nature; and Frequently Asked Questions Regarding Customs and Border Protection Receipt of Passenger Name Records Related to Flights between the European Union and the United States United States law requires airlines

More information

U.S. Customs Trade Compliance and

U.S. Customs Trade Compliance and The Institute of Brazilian Business and Public Management Issues The Minerva Program U.S. Customs Trade Compliance and Risk Management Process: A Model for Brazilian Customs Modernization Student: Murilo

More information

EU-U.S. DECLARATION ON COMBATING TERRORISM DROMOLAND CASTLE, 26 JUNE 2004

EU-U.S. DECLARATION ON COMBATING TERRORISM DROMOLAND CASTLE, 26 JUNE 2004 COUNCIL OF THE EUROPEAN UNION Dromoland Castle, 26 June 2004 10760/04 (Presse 205) EU-U.S. DECLARATION ON COMBATING TERRORISM DROMOLAND CASTLE, 26 JUNE 2004 Since the attacks of 11 September 2001, the

More information

World Customs Organization

World Customs Organization World Customs Organization The Authorised Economic Operator, the Authorised Person and the Authorised Operator ADB- WCO National Workshop on RKC implementation Thimphu, Bhutan, 10 June 2014 The SAFE Framework

More information

Security Profile. Business Partner Requirements, Security Procedures (Updated)

Security Profile. Business Partner Requirements, Security Procedures (Updated) Security Profile For each of the sections below, you will be required to write a response and/or upload a document demonstrating how your company adheres to the stated requirement. There is no one right

More information

Protecting Your Company s Identity

Protecting Your Company s Identity Protecting Your Company s Identity Stages of Identity Theft Acquisition of the identity such as theft, internet, garbage and mail Use of the identity For financial gain (most common) and/or evade Law Enforcement

More information

Risk Assessments and Risk Based Supply Chain Security. March, 2010

Risk Assessments and Risk Based Supply Chain Security. March, 2010 Risk Assessments and Risk Based Supply Chain Security March, 2010 What is Risk? What a Risk Assessment Isn t What a Risk Assessment Is How does the Risk Assessment fit into the C-TPAT program? How can

More information

Partners in Protection / C-TPAT Supply Chain Security Questionnaire

Partners in Protection / C-TPAT Supply Chain Security Questionnaire Partners in Protection / C-TPAT Supply Chain Security Questionnaire Dear: Supply Trade Partner As you are aware there have been several changes in the transportation industry over the past few years. One

More information

A Message for Warehouse Operators And Security Guidelines for Warehouse Operators

A Message for Warehouse Operators And Security Guidelines for Warehouse Operators A Message for Warehouse Operators And Security Guidelines for Warehouse Operators Kingchem LLC is a participant in the Customs-Trade Partnership Against Terrorism (C-TPAT). C-TPAT is a voluntary joint

More information

FRAMEWORK OF STANDARDS TO SECURE AND FACILITATE GLOBAL TRADE

FRAMEWORK OF STANDARDS TO SECURE AND FACILITATE GLOBAL TRADE FRAMEWORK OF STANDARDS TO SECURE AND FACILITATE GLOBAL TRADE June 2005 Copyright 2005 World Customs Organization. All rights reserved. Requests and inquiries concerning translation, reproduction and adaptation

More information

Frequently Asked Questions

Frequently Asked Questions 1 Frequently Asked Questions 1. Why do import shipments have to be bonded? 2. Why do ocean shipments have to be insured under a marine policy? 3. Why does it take Customs so long to examine shipments?

More information

Republika e Kosovës Republika Kosovo-Republic of Kosovo Kuvendi - Skupština - Assembly

Republika e Kosovës Republika Kosovo-Republic of Kosovo Kuvendi - Skupština - Assembly Republika e Kosovës Republika Kosovo-Republic of Kosovo Kuvendi - Skupština - Assembly Law No. 03/L-065 ON INTEGRATED MANAGEMENT AND CONTROL OF THE STATE BORDER The Assembly of Republic of Kosovo, On the

More information

HIGH-RISK COUNTRIES IN AML MONITORING

HIGH-RISK COUNTRIES IN AML MONITORING HIGH-RISK COUNTRIES IN AML MONITORING ALICIA CORTEZ TABLE OF CONTENTS I. Introduction 3 II. High-Risk Countries 3 Customers 4 Products 7 Monitoring 8 Audit Considerations 8 III. Conclusion 10 IV. References

More information

Bureau of Customs and Border Protection

Bureau of Customs and Border Protection Bureau of Customs and Border Protection General Notices Automated Commercial Environment (ACE): National Customs Automation Program Test of Automated Truck Manifest AGENCY: Customs and Border Protection;

More information

Importers must have written and verifiable processes for the selection of business partners including manufacturers, product suppliers and vendors.

Importers must have written and verifiable processes for the selection of business partners including manufacturers, product suppliers and vendors. Security Profile For each of the sections below, you will be required to write a response and/or upload a document demonstrating how your company adheres to the stated requirement. There is no one right

More information

ARTICLE 7.4: RISK MANAGEMENT

ARTICLE 7.4: RISK MANAGEMENT WTO Agreement on Trade Facilitation UNCTAD Trade Facilitation Technical Note No. 12 Rev 4 December 2014 ARTICLE 7.4: RISK MANAGEMENT A. BACKGROUND Given the high number of exports, imports and transit

More information

AIR CARGO SECURITY: An Overview of Several Regulatory Initiatives around the World

AIR CARGO SECURITY: An Overview of Several Regulatory Initiatives around the World AIR CARGO SECURITY: An Overview of Several Regulatory Initiatives around the World A presentation by Maria Buzdugan (McGill Institute of Air and Space Law, Montreal, Canada) Questions Raised Why is air

More information

PRIOR NOTICE OF IMPORTED FOOD SHIPMENTS A

PRIOR NOTICE OF IMPORTED FOOD SHIPMENTS A U.S. Food and Drug Administration Protecting the U.S. Food Supply U.S. Department of Health and Human Services What You Need to Know About PRIOR NOTICE OF IMPORTED FOOD SHIPMENTS A Small Entity Compliance

More information

Making Critical Connections: Predictive Analytics in Government

Making Critical Connections: Predictive Analytics in Government Making Critical Connections: Predictive Analytics in Improve strategic and tactical decision-making Highlights: Support data-driven decisions. Reduce fraud, waste and abuse. Allocate resources more effectively.

More information

JAMAL EL-HINDI DEPUTY DIRECTOR FINANCIAL CRIMES ENFORCEMENT NETWORK

JAMAL EL-HINDI DEPUTY DIRECTOR FINANCIAL CRIMES ENFORCEMENT NETWORK JAMAL EL-HINDI DEPUTY DIRECTOR FINANCIAL CRIMES ENFORCEMENT NETWORK REMARKS AT THE PARLIAMENTARY INTELLIGENCE SECURITY FORUM JUNE 20, 2016 VIENNA, AUSTRIA Good morning. I would like to thank Congressman

More information

A Risk Assessment Methodology (RAM) for Physical Security

A Risk Assessment Methodology (RAM) for Physical Security A Risk Assessment Methodology (RAM) for Physical Security Violence, vandalism, and terrorism are prevalent in the world today. Managers and decision-makers must have a reliable way of estimating risk to

More information

Supply Chain Security Training Needs for Law Enforcement Agencies

Supply Chain Security Training Needs for Law Enforcement Agencies Supply Chain Security Training Needs for Law Enforcement Agencies Presented by Dr. Juha Hintsa, CBRA 1st CORE SUPPLY CHAIN FORUM, Transport & Logistics Fair September 24, 2015, Antwerp. HICL2015 Authors:

More information

Passenger Protect Program Transport Canada

Passenger Protect Program Transport Canada AUDIT REPORT OF THE PRIVACY COMMISSIONER OF CANADA Passenger Protect Program Transport Canada Section 37 of the Privacy Act 2009 AUDIT OF PASSENGER PROTECT PROGRAM, TRANSPORT CANADA The audit work reported

More information

Filing your EEI into AES

Filing your EEI into AES Filing your EEI into AES Presenter Korrie Thomas Director, Compliance Houston Joined BDP in 2011 24 years of trade experience Licensed Customs broker since 1994 korrie.thomas@bdpinternational.com 281-775-8338

More information

Case Story. The use of the WCO Time Release Study to measure border performance in a landlocked developing country (Uganda)

Case Story. The use of the WCO Time Release Study to measure border performance in a landlocked developing country (Uganda) Case Story The use of the WCO Time Release Study to measure border performance in a landlocked developing country (Uganda) Executive Summary (1) A Time Release study (TRS) is a unique tool 1 and method

More information

Five Keys to Letter-Perfect U.S. Export Compliance

Five Keys to Letter-Perfect U.S. Export Compliance Five Keys to Letter-Perfect U.S. Export Compliance A White Paper Introduction For many global importers and U.S. exporters especially those engaged in publishing industry shipping the nuances of complying

More information

Preparation of a Rail Safety Management System Guideline

Preparation of a Rail Safety Management System Guideline Preparation of a Rail Safety Management System Guideline Page 1 of 99 Version History Version No. Approved by Date approved Review date 1 By 20 January 2014 Guideline for Preparation of a Safety Management

More information

Customs Trade Partnership Against Terrorism (C-TPAT) International Supply Chain Security Risk Assessment Frequently Asked Questions

Customs Trade Partnership Against Terrorism (C-TPAT) International Supply Chain Security Risk Assessment Frequently Asked Questions Customs Trade Partnership Against Terrorism (C-TPAT) International Supply Chain Security Risk Assessment Frequently Asked Questions In an effort to clarify the April 23, 2010 bulletin regarding international

More information

Introduction. Description of Stakeholders

Introduction. Description of Stakeholders Information Paper on Hazardous Materials Automated Cargo Communications for Efficient and Safe Shipments (HM-ACCESS): Electronic Shipping Papers for Shippers and Carriers Introduction HM-ACCESS is a pilot

More information

ROADMAP. A. Context and problem definition

ROADMAP. A. Context and problem definition TITLE OF THE INITIATIVE ROADMAP Commission Communication on EU Risk management and supply chain security LEAD DG RESPONSIBLE UNIT TAXUD B2 DATE OF ROADMAP 10 / 2012 This indicative roadmap is provided

More information

Position Classification Standard for Traffic Management Series, GS-2130. Table of Contents

Position Classification Standard for Traffic Management Series, GS-2130. Table of Contents Position Classification Standard for Traffic Management Series, GS-2130 Table of Contents SERIES DEFINITION... 2 EXCLUSIONS... 2 OCCUPATIONAL INFORMATION... 2 TITLES... 5 EVALUATING POSITIONS... 5 GRADE

More information

Canada Border Services Agency. System Outage Contingency Plan

Canada Border Services Agency. System Outage Contingency Plan Canada Border Services Agency System Outage Contingency Plan Version 1.0 March 2015 1 Table of Contents CBSA System Outage Contingency Plan... 1 Introduction... 4 Key Principles... 4 Data Elements Required...

More information

New Certified Company Program (NEEC) Reinforcing Supply Chain Security in Mexico NEEC Profile

New Certified Company Program (NEEC) Reinforcing Supply Chain Security in Mexico NEEC Profile New Certified Company Program (NEEC) Reinforcing Supply Chain Security in Mexico NEEC Profile October, 2012 Program Content Certified Company and New Certified Company Program (NEEC) Background General

More information

FAQs Organised Crime and Anti-corruption Legislation Bill

FAQs Organised Crime and Anti-corruption Legislation Bill FAQs Organised Crime and Anti-corruption Legislation Bill What is organised crime? Organised crime normally refers to an organisation of criminals who engage in illegal activity on a large, centralised

More information

Asset management firms and the risk of market abuse

Asset management firms and the risk of market abuse Financial Conduct Authority Asset management firms and the risk of market abuse February 2015 Thematic Review TR15/1 TR15/1 Asset management firms and the risk of market abuse Contents 1. Executive summary

More information

TO MEASURE THE TIME REQUIRED

TO MEASURE THE TIME REQUIRED GUIDE TO MEASURE THE TIME REQUIRED FOR THE RELEASE OF GOODS Version 2 2011 WORLD CUSTOMS ORGANIZATION I/1. Table of Contents 1. Introduction and Context 2. Background - History of the Time Release Study

More information

DRAFT PLANNING THE OPENING OF A ROAD PROJECT GUIDELINE 1

DRAFT PLANNING THE OPENING OF A ROAD PROJECT GUIDELINE 1 DRAFT PLANNING THE OPENING OF A ROAD PROJECT GUIDELINE 1 Guideline: DRAFT Planning the opening of a road project guideline Version: 1.1 Issue: September 2009 Approved By: Phil Margison General Manager,

More information

What Insurance Agents and Brokers Should Expect under the New Anti-Money Laundering Regulations for Life Insurance Companies

What Insurance Agents and Brokers Should Expect under the New Anti-Money Laundering Regulations for Life Insurance Companies What Insurance Agents and Brokers Should Expect under the New Anti-Money Laundering Regulations for Life Insurance Companies The USA PATRIOT Act includes provisions intended to prevent the financial services

More information

ABBVIE C-TPAT SUPPLY CHAIN SECURITY QUESTIONNAIRE

ABBVIE C-TPAT SUPPLY CHAIN SECURITY QUESTIONNAIRE AbbVie is a participant in the U.S. Customs supply chain security program called the Customs-Trade Partnership Against Terrorism (C-TPAT). Participation in C-TPAT requires AbbVie to ensure that its overseas

More information

OUTCOME OF PROCEEDINGS Customs Cooperation Working Party (Experts meeting and Plenary meeting) on: 11-12 December 2012 Subject: Summary of discussions

OUTCOME OF PROCEEDINGS Customs Cooperation Working Party (Experts meeting and Plenary meeting) on: 11-12 December 2012 Subject: Summary of discussions COUNCIL OF THE EUROPEAN UNION Brussels, 19 December 2012 17977/12 FOCUSTOM 143 OUTCOME OF PROCEEDINGS of: Customs Cooperation Working Party (Experts meeting and Plenary meeting) on: 11-12 December 2012

More information

Best Practices C-TPAT 5-Step Risk Assessment Process

Best Practices C-TPAT 5-Step Risk Assessment Process Best Practices C-TPAT 5-Step Risk Assessment Process 17 th Annual T&T Conference April 3, 2013 Karen Lobdell Director Global Solutions Integration Point 1 Is This Your Current Process? 2 CBP s Approach

More information

Harmonized Risk Scoring-Advance Trade Data Internal Audit Report

Harmonized Risk Scoring-Advance Trade Data Internal Audit Report Harmonized Risk Scoring-Advance Trade Data Internal Audit Report March 2011 Table of Contents Executive Summary...2 1.0 Introduction...4 1.1 Background...... 4 1.2 Risk Assessment... 5 1.3 Audit Objective

More information

C-TPAT Customs Trade Partnership Against Terrorism

C-TPAT Customs Trade Partnership Against Terrorism Food and Agriculture Border Gateway Summit C-TPAT Customs Trade Partnership Against Terrorism Robert Gaydo, Senior Trade Advisor A.N. DERINGER, INC. Feb. 20, 1014 Who can participate? Air/Rail/Sea Carriers

More information

C-TPAT Highway Carrier Security Criteria

C-TPAT Highway Carrier Security Criteria C-TPAT Highway Carrier Security Criteria The supply chain for highway carriers for C-TPAT purposes is defined from point of origin from the yard or where the tractors and trailers are stored, through pickup

More information

TSA Operations Center Incident Management System

TSA Operations Center Incident Management System for the TSA Operations Center Incident Management System DHS/TSA/PIA-029(a) August 25, 2015 Contact Point John Bogers System Owner Transportation Security Operations Center Transportation Security Administration

More information

Anti-Money Laundering and Counter- Terrorism Financial Policy

Anti-Money Laundering and Counter- Terrorism Financial Policy Anti-Money Laundering and Counter- Terrorism Financial Policy Version: March 2014 1. INTRODUCTION...3 2. DEFINITIONS...3 3. RISK-BASED APPROACH...3 4. AML COMPLIANCE OFFICER...4 5. SUSPICIOUS TRANSACTION

More information

DOT HAZMAT SECURITY AWARENESS TRAINING

DOT HAZMAT SECURITY AWARENESS TRAINING ERI Safety Videos DVDs, Digital Media & Custom Production 1319 DOT HAZMAT SECURITY AWARENESS TRAINING Leader s Guide Safety Source Productions DOT HAZMAT SECURITY AWARENESS TRAINING This easy-to-use Leader

More information

Customs-Trade Partnership against Terrorism Supply Chain Security Profile

Customs-Trade Partnership against Terrorism Supply Chain Security Profile Customs-Trade Partnership against Terrorism Supply Chain Security Profile Service Provider Assessment (Warehouse) Please answer the following questions about your company s cargo security processes and

More information

Increasing Competitiveness / Lowering Costs with Supply Chain Management and Security Standards

Increasing Competitiveness / Lowering Costs with Supply Chain Management and Security Standards Increasing Competitiveness / Lowering Costs with Supply Chain Management and Security Standards September 2010 SURGE logistics- GSProgress Inc. 1000 Potomac Street NW The Flour Mill Building Washington,

More information

WCO GUIDELINES FOR POST-CLEARANCE AUDIT(PCA) Draft/January 2012

WCO GUIDELINES FOR POST-CLEARANCE AUDIT(PCA) Draft/January 2012 WCO GUIDELINES FOR POST-CLEARANCE AUDIT(PCA) Draft/January 2012 TABLE OF CONTENTS I. INTRODUCTION II. VOLUME 1 1. BACKGROUND TO POST CLEARANCE AUDIT (PCA) 1.1. What are the objectives of PCA? 1.2. Benefits

More information

AGREEMENT BETWEEN THE UNITED STATES OF AMERICA AND THE EUROPEAN POLICE OFFICE

AGREEMENT BETWEEN THE UNITED STATES OF AMERICA AND THE EUROPEAN POLICE OFFICE AGREEMENT BETWEEN THE UNITED STATES OF AMERICA AND THE EUROPEAN POLICE OFFICE Preamble The United States of America and the European Police Office (Europol): considering that it is within their common

More information

Case study on asset tracing

Case study on asset tracing Recovering Stolen Assets: A Practitioner s Handbook ARNO THUERIG * Case study on asset tracing I. Case study background The client adviser of a Swiss private bank transferred approximately USD 1 million

More information

Revised Kyoto Convention Let s talk

Revised Kyoto Convention Let s talk Revised Kyoto Convention Let s talk Your questions answered International Convention on the Simplification and Harmonisation of Customs Procedures (as amended) A Customs blueprint for the 21 st century

More information

GUIDELINES FOR FOOD IMPORT CONTROL SYSTEMS

GUIDELINES FOR FOOD IMPORT CONTROL SYSTEMS GUIDELINES FOR FOOD IMPORT CONTROL SYSTEMS SECTION 1 SCOPE CAC/GL 47-2003 1. This document provides a framework for the development and operation of an import control system to protect consumers and facilitate

More information

Mexico Shipments Made Simple. Third-party logistics providers help streamline the U.S. Mexico cross-border process WHITE PAPER

Mexico Shipments Made Simple. Third-party logistics providers help streamline the U.S. Mexico cross-border process WHITE PAPER Mexico Shipments Made Simple Third-party logistics providers help streamline the U.S. Mexico cross-border process WHITE PAPER Introduction With the cost of manufacturing rising in Asia, many companies

More information