January Rx-360 Supply Chain Security Guidance Paper: Cargo Theft in High Risk Areas

Size: px
Start display at page:

Download "January Rx-360 Supply Chain Security Guidance Paper: Cargo Theft in High Risk Areas"

Transcription

1 Rx-360 Supply Chain Security Guidance Paper: Cargo Theft in High Risk Areas January 2014

2 Intent/Purpose There is a major concern throughout the pharmaceutical industry with the escalation of violent cargo theft incidents in geographical areas categorized as high risk. A significant increase in thefts has been experienced by Rx-360 member companies in Italy, Mexico, Brazil, and other countries. The bureaucratic theft reporting process, the low probability that crimes will be properly categorized and investigated, and the negative publicity associated with the crimes cause these types of incidents to go unreported. This has a tendency to compound the problem. Transported Asset Protection Association Europe, Middle East and Africa (TAPA EMEA) reports that the modus operandi used by most thieves has been theft from unsecured truck stops, fraudulent pickups, collusion, thefts from moving trucks, and truck hijackings. The use of cargo tracking device (GPS) jammers, which render tracking devices inoperative, has also been on the increase. Significantly, global trends of increasing cargo theft correlate with increasing patient safety risk as stolen goods that have been inappropriately handled reenter the supply chain. The purpose of this document is to summarize issues that Rx-360 companies are experiencing in certain high-risk areas (specifically, Mexico and Italy) and to outline risk mitigation strategies that are currently being considered or implemented by member companies. A risk mitigation options matrix, provided in this document, describes potential risk mitigation elements, their benefits and costs, and how they are currently being used in high-risk areas. Problem Statement Italy: The threat of cargo theft in Italy is severe, with thieves employing a variety of methods to steal cargo. Robberies (the taking of goods by force or intimidation from a person that is present) and burglaries (the forcible entry into a structure with the intent to commit a crime within) are not reported regularly and cargo truck hijackings are routine occurrences. Hijackers in Italy are frequently armed and employ violence to commandeer high-value shipments, at times setting up roadblocks to stop in-transit cargo trucks. Fictitious pickups have also been reported, during which thieves use forged documents of fake shipping companies and false license plates to pose as legitimate truck drivers in order to steal cargo. Goods are subsequently diverted through various channels rather than delivered to the intended destination. Hired truck drivers have falsely reported cargo thefts while purloining shipments themselves. Thefts have also been carried out by thieves driving marked vehicles and dressed as police officers. 2

3 Cargo thieves in Italy typically use brute force to enter warehouses during burglaries. Use of pickaxes and crowbars to force open locks and windows has been reported. In some cases, cargo thieves are able to move carefully so as to avoid being spotted on security cameras, suggesting either insider collusion in some thefts or careful surveillance of facilities prior to burglaries. Cargo theft has also been reported from trucks during trucking industry protests. Demonstrators block drivers progress and force them to stop, creating opportunities to steal the cargo. Criminals frequently target the major transportation hub of Milan and follow specifically-selected loads before stealing the cargo. The extensive use of soft-sided trailers and unsecured parking areas facilitates unauthorized access to cargo shipments while in transit, as well as to preloaded trailers at company warehouses, distribution centers, freight forwarders, and third-party logistics providers. Below Table 1 outlines the data collected by IIS illustrating the tip of the iceberg, as only a fraction of the real cargo thefts are reported. Table 1 * TAPA January 2013 Pharmaceutical thefts were the second highest category over the last 5 years (Table 2). This is quite unusual since, on average, Life Science thefts account for just 1% of all IIS reported freight thefts in EMEA. The high number of such thefts recorded in Italy is in fact due to exceptionally good reporting by various pharmaceutical companies to IIS over the last few months, and should therefore be put into context. 3

4 Table 2 *TAPA January 2013 Table 3 illustrates cargo theft incidents by country. Table 3 *TAPA January

5 Mexico: The threat of cargo theft in Mexico is categorized as severe. Organized criminal groups, including extremely well-funded and well-equipped drug cartels, will go to great lengths to successfully steal in-transit goods. Cargo thieves in Mexico are often very knowledgeable of how to overcome protective measures such as container locks and seals, GPS units, and even security escorts. Thieves often use violence or the threat of violence during the course of cargo thefts. According to one survey, nearly 73% of all robberies in Mexico are violent. Since the beginning of 2012, hijackers have kidnapped between 15 and 20 truck drivers. Most of these kidnappings have taken place in Tamaulipas, a border state known for extreme levels of cartel violence. Organized criminals have been known to attack targeted shipments at vulnerable points of transit, such as isolated stretches of highway or areas known to be out of GPS range. Distribution centers and production facilities have also been targeted by organized criminal groups. In several cases involving cartel members, the thieves enter a facility, hold the employees at gunpoint while loading the company s own transport equipment, and depart with the stolen product. Cartels have been known to cordon off entire sections of highways by setting up roadblocks. Once vehicles and cargo trucks enter these cordoned areas, cartel members target the goods of their choice. In several reported incidents, cartels have used trucks and trailers stolen during earlier attacks to block roadways. Cargo thefts from freight trains are also prevalent in Mexico. These acts are often carried out by both opportunists and highly organized criminal gangs. Some of the methods employed include: The bribing of train conductors to stop in secluded areas to avoid detection. This is ideal (from the criminal s standpoint) for breaking seals on the rail cars and taking the goods in transit Holding the conductor and on-board security personnel at gunpoint while taking the cargo Executing multiple thefts along the same rail line in certain cities by opportunistic thieves 5

6 FreightWatch recorded an increase in hijacking events in Mexico throughout During the first quarter of the year, 76% of all recorded cargo theft incidents involved a hijacking. Moreover, pharmaceutical thefts increased by 50% from 2011 to Mexican cargo thieves have recently become more sophisticated and more specialized; they target high-demand products that will command high prices when sold on the black market. Organized cargo theft criminals establish relationships with drug cartels and the corrupt police officers who will facilitate thefts in exchange for payoffs. Some extort custom agents, warehouse employees, and security guards at truck yards by using the threat of violence. The use of GPS jamming devices has also increased. Overall, the average loss value per theft incident increased by 122% during the reporting period, from $178,558 USD in 2011 to $396,061 USD in 2012 (see Table 4 below). Alcohol, Cashin-transit and Tobacco all saw high average loss values. Pharmaceutical thefts increased significantly as well. Table 4 *FreightWatch International Mexico Annual Report January 29,

7 FreightWatch International illustrates the number of product types (left y axis) versus the average value (right y axis) of cargo thefts in Table 5. Table 5 January 2014 FreightWatch International Mexico Annual Report January 29, 2012 Incidents Experienced by Rx-360 Member Companies Rx-360 member companies have suffered many incidents of armed robberies in Italy since 2010, with a significant spike in activity from September 2012 to April The majority of robberies have been last mile, where deliveries are being made from a regional warehouse to hospitals and pharmacies in a limited geographical area. In most cases, these robberies involve a mixed load (i.e., from more than one company) of pharmaceutical products, with each company s loss being relatively low, and the thefts not being consistently reported by individual companies. Logistics service providers (LSP) main national warehouses have been targeted, but to a lesser extent. Load values at LSP warehouses are much higher than those in last mile incidents, but the level of protection afforded to them is also higher. The current distribution network in Italy relies on a limited number of licensed local distribution companies in each region, a system that has remained essentially unchanged since it was set up by the pharmaceutical industry in the late 1990s. The regional distribution companies operate their own regional warehouses and subcontract to the national LSP. The level of subcontracting 7

8 also extends to the transportation company, as local distribution companies do not always have their own vehicles. The reported modus operandi has been very similar for every incident. One or more cars driven by thieves block the road and force a delivery truck to stop. The driver is threatened physically or with guns, and the delivery truck is commandeered. The driver is either left behind, or tied up, blindfolded, and placed in the cargo area of the truck. The thieves drive the truck a short distance, unload it, and leave the truck and driver behind. The involvement of organized crime groups has been very significant in Italy. Many product losses have been through internally arranged and orchestrated thefts after infiltration or influencing of LSPs by such crime groups. Only recently has the magnitude of theft become apparent, as some companies local affiliates have not been reporting losses above country-level headquarters. In addition, and as a result of media coverage and research, it is apparent that there is also large-scale theft of high-value pharmaceutical product in hospitals and even at local pharmacies. Law enforcement response has been mixed, and appears to be uncoordinated among the various agencies authorized to investigate such criminal activity. There has, however, been a recent development through TAPA (partially at the instigation of the pharmaceutical industry) to address the overall issue of the high level of cargo crime in Italy. This has resulted in the formation of a special interest group, with pharmaceutical representation, that will seek to improve law enforcement response through the local Ministry of the Interior. Mitigation Options Matrix for Cargo Theft in High Risk Areas The Options Matrix for Cargo Theft in High Risk Areas was developed to outline mitigation options that Rx-360 member companies have recently started utilizing or are considering implementing in response to the increase in cargo thefts in high-risk areas. Each mitigation option includes a description, the benefit of the mitigation if employed, the risk of use, the cost involved, and how member companies have actually used the mitigation option in Italy or Mexico. 8

9

10 10 January 2014

11 In Mexico, armed escorts, daytime shipping, convoys, driver checklists, and driver security training have been used in combination (but tied to insurance requirements rather than product protection). Regular audits of distributors in Italy, combined with contract incentives, help increase security measures and monetarily incentivize compliance to the contract security requirements. Conclusion With cargo thefts continuing to increase at double digit rates from one year to the next, and violence on the rise in Italy, Mexico, and other countries, companies need to ensure their supply chain security programs are actively managed and monitored. Each individual program should be molded to the needs, region, and companies risk tolerance. It is also important for companies to partner with local regulatory agencies, local law enforcement authorities, and with peer companies to lobby the government to enact, enforce, and strengthen local laws to reduce the number of violent cargo thefts. Risk mitigation measures should be reviewed and modified periodically to account for changes in criminal activity. Successfully reducing the number of violent cargo thefts is heavily dependent upon programs that are strongly endorsed by senior management, cooperation among companies in forums like Rx-360, and coordination with regulatory and law enforcement agencies. This group will continue to explore anti-cargo theft programs, initiatives, and mitigation measures as the risks associated with pharmaceutical cargo theft continue to evolve.

12 ASSOCIATIONS: Associations that provide other resources that you should consider as part of your toolbox include the following: Transported Asset Protection Association (TAPA) TAPA is an association that sets standards for the secure storage and transportation of products. Their mission is to protect high-value theft targeted (HVTT) assets in the transportation supply chain. While the link here is for the TAPA Americas Chapter, it contains links for the other international chapters as well. Pharmaceutical Cargo Security Coalition (PCSC) PCSC is an organization comprising pharmaceutical industry professionals, law enforcement and government entities, cargo insurers, carriers, and risk management advocates who are dedicated to preventing theft of pharmaceutical products in transit. Pharmaceutical Security Institute (PSI) PSI is a not-for-profit membership organization dedicated to protecting the public health, sharing information on the counterfeiting of pharmaceuticals, and initiating enforcement actions through appropriate authorities. Team Members: Tim Valko (Amgen) Bob Satek (AbbVie) Brad Elrod (Pfizer) Edwin Kinkler (Teva) Javier L'Eglise (Bayer) Paul Gibbons (Amgen) Tom Sumner (Amgen) Brian Damon (Amylin) Tony Kidner (Boehiringer Ingelheim GmbH) Amy Imbrogno (Amgen) REFERENCES: 1. FreightWatch International; 2012 Mexico Annual Report; Jan 29, 2012; 2. BSi 3. TAPA EMEA, January 2013 Vigilant Report; 12

SETTING THE STANDARD FOR SUPPLY CHAIN SECURITY

SETTING THE STANDARD FOR SUPPLY CHAIN SECURITY Transported Asset Protection Association SETTING THE STANDARD FOR SUPPLY CHAIN SECURITY YOUR INVITATION TO JOIN TAPA EMEA Making your supply chain more resilient The Transported Asset Protection Association

More information

SECURITY IN TRUCKING

SECURITY IN TRUCKING SECURITY IN TRUCKING A CHECKLIST FOR FLEET OPERATORS SECURITY IN TRUCKING A CHECKLIST FOR FLEET OPERATORS This checklist for fleet security has been compiled by the Private Motor Truck Council of Canada

More information

IIS Asia Report Q1-2014

IIS Asia Report Q1-2014 IIS Asia Report Q1-2014 IIS Incident Information Service is a service from TAPA Asia. http://www.tapa-asia.org Q1-2014 Report In this issue: Summary Summary Incident Information System Update Map of Incidents

More information

1083.4 SUPPLY CHAIN INTEGRITY AND SECURITY

1083.4 SUPPLY CHAIN INTEGRITY AND SECURITY BRIEFING 1083.4 Supply Chain Integrity and Security. A new series of general informational chapters describing various aspects of the pharmaceutical supply chain replaces Good Distribution Practices Supply

More information

TSR2014 TRUCKING SECURITY REQUIREMENTS. Transported Asset Protection Association. All rights reserved.

TSR2014 TRUCKING SECURITY REQUIREMENTS. Transported Asset Protection Association. All rights reserved. TSR2014 TRUCKING SECURITY REQUIREMENTS About TAPA Cargo crime is one of the biggest supply chain challenges for manufacturers of high value, high risk products and their logistics service providers. The

More information

With Satellite Technology

With Satellite Technology Containing Cargo Theft... With Satellite Technology author: Anu Sood, SkyWave Mobile Communications Cargo theft is an international phenomenon. While no definitive statistics are available as to how much

More information

Cargo Theft Prevention and Risk Mitigation for the Holiday Season

Cargo Theft Prevention and Risk Mitigation for the Holiday Season Hanover Risk Solutions Cargo Theft Prevention and Risk Mitigation for the Holiday Season As the holiday season approaches, manufacturers warehouses are packed to capacity as high-season inventory begins

More information

SUPPLY CHAIN SECURITY IN THE 21 st CENTURY

SUPPLY CHAIN SECURITY IN THE 21 st CENTURY SUPPLY CHAIN SECURITY IN THE 21 st CENTURY INTRODUCTION Overview of the Supply Chain Recent Supply Chain Security Issues Standards: World Customs Organization (WCO) Framework U.S. Customs and Border Protection

More information

Supply Chain Cyber Crime. Presenter: Keith Lewis, Vice President of Operations, CargoNet Date: Tuesday March 18, 2014 Location: T&LC Conference 2014

Supply Chain Cyber Crime. Presenter: Keith Lewis, Vice President of Operations, CargoNet Date: Tuesday March 18, 2014 Location: T&LC Conference 2014 Supply Chain Cyber Crime Presenter: Keith Lewis, Vice President of Operations, CargoNet Date: Tuesday March 18, 2014 Location: T&LC Conference 2014 Talking Points Useless supply chain theft statistics

More information

DOT HAZMAT SECURITY AWARENESS TRAINING

DOT HAZMAT SECURITY AWARENESS TRAINING ERI Safety Videos DVDs, Digital Media & Custom Production 1319 DOT HAZMAT SECURITY AWARENESS TRAINING Leader s Guide Safety Source Productions DOT HAZMAT SECURITY AWARENESS TRAINING This easy-to-use Leader

More information

E3211. DOT Hazmat Security Awareness. Leader s Guide

E3211. DOT Hazmat Security Awareness. Leader s Guide E3211 DOT Hazmat Security Awareness Leader s Guide This easy-to-use Leader s Guide is provided to assist in conducting a successful presentation. Featured are: INTRODUCTION: A brief description of the

More information

A Supply Chain Management Perspective on Mitigating the Risks of Counterfeit Products

A Supply Chain Management Perspective on Mitigating the Risks of Counterfeit Products A Supply Chain Management Perspective on Mitigating the Risks of Counterfeit Products David M. Dreyfus Justin A. Heinonen Rod Kinghorn A-CAPP Backgrounder October 2013 Supply chain management can be the

More information

Rx-360 Supply Chain Security White Paper: Audits and Assessments of Third Party Warehousing and Distribution Facilities

Rx-360 Supply Chain Security White Paper: Audits and Assessments of Third Party Warehousing and Distribution Facilities Rx-360 Supply Chain Security White Paper: Audits and Assessments of Third Party Warehousing and Distribution Facilities 6 June 2012 INTRODUCTION Today s global corporations frequently outsource various

More information

CALIFORNIA HIGHWAY PATROL C.T.I.P. TASKFORCE

CALIFORNIA HIGHWAY PATROL C.T.I.P. TASKFORCE CALIFORNIA HIGHWAY PATROL C.T.I.P. TASKFORCE PRESENTER BACKGROUND Sgt. Ken Huerta 25 Years, Port of Los Angeles Police Cargo Theft Interdiction Program Cargo Criminal Apprehension Team Criminal Investigations

More information

"DOT IN-DEPTH HAZMAT SECURITY TRAINING"

DOT IN-DEPTH HAZMAT SECURITY TRAINING PRESENTER'S GUIDE "DOT IN-DEPTH HAZMAT SECURITY TRAINING" For the Department of Transportation's 49 CFR 172.700 Subpart H Training Requirements Quality Safety and Health Products, for Today...and Tomorrow

More information

Customs-Trade Partnership Against Terrorism (C-TPAT) Security Guidelines for Suppliers/Shippers

Customs-Trade Partnership Against Terrorism (C-TPAT) Security Guidelines for Suppliers/Shippers Customs-Trade Partnership Against Terrorism (C-TPAT) Security Guidelines for Suppliers/Shippers In support of Vectora's C-TPAT program implementation, these security requirements and guidelines are provided

More information

THE PITFALLS OF FREIGHT BROKERING AND SUB-CONTRACTING DO YOU KNOW WHERE YOUR CARGO IS?

THE PITFALLS OF FREIGHT BROKERING AND SUB-CONTRACTING DO YOU KNOW WHERE YOUR CARGO IS? THE PITFALLS OF FREIGHT BROKERING AND SUB-CONTRACTING DO YOU KNOW WHERE YOUR CARGO IS? 1 PRESENTER, TITLE Peter J. Scrobe Vice President, Loss Control Services Mark Cote, CMO - North America Marine Risk

More information

FSR2014 FACILITY SECURITY REQUIREMENTS. Transported Asset Protection Association. All Rights Reserved

FSR2014 FACILITY SECURITY REQUIREMENTS. Transported Asset Protection Association. All Rights Reserved FSR2014 FACILITY SECURITY REQUIREMENTS About TAPA Cargo crime is one of the biggest supply chain challenges for manufacturers of high value, high risk products and their logistics service providers. The

More information

Global Supply Chain Security Recommendations

Global Supply Chain Security Recommendations Global Supply Chain Security Recommendations These minimum security criteria are fundamentally designed to be the building blocks for foreign manufacturers to institute effective security practices designed

More information

Guidance Notes FSR 2014

Guidance Notes FSR 2014 Definition (page 13) TERM DEFINITION GUIDANCE/ AMENDMENT BACKED UP To make a copy of a data file which is stored securely in a separate location and can be used as a security copy. To make a copy of a

More information

Rx-360 Supply Chain Security White Paper: Incident Management

Rx-360 Supply Chain Security White Paper: Incident Management Rx-360 Supply Chain Security White Paper: Incident Management 1 Contents Background... 3 Scope... 3 Definitions... 4 Introduction... 5 Discovery & Investigation... 5 Incident Management... 6 Lessons Learned...

More information

Technology Asset Protection Association (TAPA) Securing the Global Supply Chain. Rosita Swain

Technology Asset Protection Association (TAPA) Securing the Global Supply Chain. Rosita Swain Technology Asset Protection Association (TAPA) Securing the Global Supply Chain Rosita Swain Agenda What is TAPA TAPA Evolution 2004 Strategic Objectives TAPA Uniformed Approach TAPA Uniformed Process

More information

Supply Chain Security Audit Tool - Warehousing/Distribution

Supply Chain Security Audit Tool - Warehousing/Distribution Supply Chain Security Audit Tool - Warehousing/Distribution This audit tool was developed to assist manufacturer clients with the application of the concepts in the Rx-360 Supply Chain Security White Paper:

More information

INVENTORY, SHIPPING, & RECEIVING FRAUD

INVENTORY, SHIPPING, & RECEIVING FRAUD INVENTORY, SHIPPING, & RECEIVING FRAUD Hidden Dangers in Every Transaction Lowers Risk Group Risk Mitigation White Paper Series Inventory, Shipping, & Receiving Fraud: Hidden Dangers in Every Transaction

More information

Security Criteria for C-TPAT Foreign Manufacturers in English

Security Criteria for C-TPAT Foreign Manufacturers in English Security Criteria for C-TPAT Foreign Manufacturers in English These minimum security criteria are fundamentally designed to be the building blocks for foreign manufacturers to institute effective security

More information

Customs-Trade Partnership Against Terrorism (C-TPAT) Minimum Security Criteria Third Party Logistics Providers (3PL)

Customs-Trade Partnership Against Terrorism (C-TPAT) Minimum Security Criteria Third Party Logistics Providers (3PL) Customs-Trade Partnership Against Terrorism (C-TPAT) Minimum Security Criteria Third Party Logistics Providers (3PL) Since its inception, the Customs-Trade Partnership Against Terrorism (C-TPAT) program

More information

Security Profile. Business Partner Requirements, Security Procedures (Updated)

Security Profile. Business Partner Requirements, Security Procedures (Updated) Security Profile For each of the sections below, you will be required to write a response and/or upload a document demonstrating how your company adheres to the stated requirement. There is no one right

More information

{TSR} PROTECTED. Transported Asset Protection Association

{TSR} PROTECTED. Transported Asset Protection Association {TSR} PROTECTED TRUCK SECURITY REQUIREMENTS (TSR) 2012 About TAPA About TAPA Cargo crime is one of the biggest supply chain challenges for manufacturers of high value, high risk products and their logistics

More information

Rail Carrier Security Criteria

Rail Carrier Security Criteria Rail Carrier Security Criteria Rail carriers must conduct a comprehensive assessment of their security practices based upon the following C-TPAT minimum-security criteria. Recognizing that rail carriers

More information

Return the attached PPG Supply Chain Security Acknowledgement by email, fax, or mail within two weeks from receipt.

Return the attached PPG Supply Chain Security Acknowledgement by email, fax, or mail within two weeks from receipt. TO: International Suppliers shipping to the United States PPG Industries, Inc., and its affiliates have been certified as a member of the U. S. Customs Trade Partnership Against Terrorism ( C-TPAT ). C-TPAT

More information

KEEPING YOUR CARGO SAFE

KEEPING YOUR CARGO SAFE KEEPING YOUR CARGO SAFE KEEPING YOUR CARGO SAFE A 360 APPROACH TO FREIGHT SECURITY IN AN UNSAFE WORLD There is no doubt that supply chains are complex, and this complexity creates vulnerability. Unfortunately,

More information

APEC Private Sector. Supply Chain Security Guidelines

APEC Private Sector. Supply Chain Security Guidelines APEC Private Sector Supply Chain Security Guidelines 1 Contents Executive Summary 3 Physical Security 4 Access Control 5 Personnel Security 6 Education and Training Awareness 7 Procedural Security 8 Documentation

More information

CVS Pharmacy C-TPAT Requirements For Import Product Suppliers

CVS Pharmacy C-TPAT Requirements For Import Product Suppliers CVS Pharmacy C-TPAT Requirements For Import Product Suppliers To Our Import Product Suppliers: CVS Pharmacy, Inc. (CVS) is committed to ensuring supply chain security within a framework consistent with

More information

MINIMUM SECURITY GUIDELINES FOR SOURCE MANUFACTURER/WAREHOUSEMEN C-TPAT INFORMATION

MINIMUM SECURITY GUIDELINES FOR SOURCE MANUFACTURER/WAREHOUSEMEN C-TPAT INFORMATION MINIMUM SECURITY GUIDELINES FOR SOURCE MANUFACTURER/WAREHOUSEMEN C-TPAT INFORMATION 1.0 Objective The purpose of this procedure is to ensure that Toys R Us, Inc. and its manufacturers, suppliers, and warehousemen

More information

WESTERVILLE DIVISION OF POLICE Security Survey Checklist: Business

WESTERVILLE DIVISION OF POLICE Security Survey Checklist: Business Business Name: Owner Name: Business Address: Officer: Survey No.: WESTERVILLE DIVISION OF POLICE Security Survey Checklist: Business "Being There When Needed" DOORS 1. Is the exterior doors solid core

More information

LOJACK SUPPLY CHAIN INTEGRITY. Solving the Commercial On-Highway Theft Problem for Cargo, Trucks and Trailers

LOJACK SUPPLY CHAIN INTEGRITY. Solving the Commercial On-Highway Theft Problem for Cargo, Trucks and Trailers LOJACK SUPPLY CHAIN INTEGRITY Solving the Commercial On-Highway Theft Problem for Cargo, Trucks and Trailers TABLE OF CONTENTS OVERVIEW... 3 Securing the Supply Chain: Evolving Solutions to Meet Today

More information

2013 Global Cargo Theft Threat Assessment. Prepared by FreightWatch International Supply Chain Intelligence Center

2013 Global Cargo Theft Threat Assessment. Prepared by FreightWatch International Supply Chain Intelligence Center 2013 Global Cargo Theft Threat Assessment Prepared by FreightWatch International Supply Chain Intelligence Center 2006-2013 FreightWatch International The information contained is the property of FreightWatch

More information

This report provides the executive summary for Indicators of School Crime and Safety: 2014.

This report provides the executive summary for Indicators of School Crime and Safety: 2014. 1 Liability Report Number: LB-10-66 Release Date: August 6, 2015 Section Title: General Information Abstract School violence not only has a direct impact on students, but also on educators, parents, and

More information

Customs-Trade Partnership against Terrorism Supply Chain Security Profile

Customs-Trade Partnership against Terrorism Supply Chain Security Profile Customs-Trade Partnership against Terrorism Supply Chain Security Profile Service Provider Assessment (Trucker) Please answer the following questions about your company s cargo security processes and participation

More information

C-TPAT Self-Assessment - Manufacturing & Warehousing

C-TPAT Self-Assessment - Manufacturing & Warehousing Task # Section/Control Description 1 Security Management System 1.1 Is there a manager or supervisor responsible for implementing security within the company? Please provide the security manager s name

More information

ABBVIE C-TPAT SUPPLY CHAIN SECURITY QUESTIONNAIRE

ABBVIE C-TPAT SUPPLY CHAIN SECURITY QUESTIONNAIRE AbbVie is a participant in the U.S. Customs supply chain security program called the Customs-Trade Partnership Against Terrorism (C-TPAT). Participation in C-TPAT requires AbbVie to ensure that its overseas

More information

Cargo Loss Control in Mexico

Cargo Loss Control in Mexico Cargo Loss Control in Mexico AIMU Cargo Loss Control Committee Mexico Subcommittee Mike Burke, Travelers Sherman Drew, ACE Group Pete Scrobe, Starr Marine Agency, Inc. Steven Weiss, Liberty International

More information

CVS Pharmacy C-TPAT Requirements For Product Suppliers

CVS Pharmacy C-TPAT Requirements For Product Suppliers CVS Pharmacy C-TPAT Requirements For Product Suppliers To Our Product Suppliers: CVS Pharmacy, Inc. (CVS) is committed to ensuring supply chain security within a framework consistent with Customs-Trade

More information

April 16th, 2009. By John Tabor Corporate Security Director National Retail Systems Inc.

April 16th, 2009. By John Tabor Corporate Security Director National Retail Systems Inc. April 16th, 2009 By John Tabor Corporate Security Director National Retail Systems Inc. In my former position as loss prevention executive for a major retailer, an important responsibility was designing

More information

UNDERSTANDING THE SUPPLY CHAIN SECURITY CERTIFICATION STANDARDS

UNDERSTANDING THE SUPPLY CHAIN SECURITY CERTIFICATION STANDARDS UNDERSTANDING THE SUPPLY CHAIN SECURITY CERTIFICATION STANDARDS A discussion about the challenges, impacts and opportunities for the security of supply chain management systems MARCH 2010 AUTHORS Chris

More information

White Paper How are thieves stealing modern vehicles?

White Paper How are thieves stealing modern vehicles? SECURITY WHITEPAPER How are thieves stealing modern vehicles? SBD/SEC/2288 1 Introduction Developments in vehicle security over recent years have made it increasingly difficult for thieves to steal vehicles

More information

Ministry of Transport, Public Works and Water Management Bob Oudshoorn

Ministry of Transport, Public Works and Water Management Bob Oudshoorn PREVENTION CRIMINALITY IN ROAD TRANSPORT Ministry of Transport, Public Works and Water Management Bob Oudshoorn 29 april 2009 Covenant Tackling Crime in Road Transport Sector 50% of the enterprises are

More information

Corporate Basel, 2015. Panalpina Security. "Adding value, while ensuring our customers' products are safe and secure"

Corporate Basel, 2015. Panalpina Security. Adding value, while ensuring our customers' products are safe and secure Corporate Panalpina Security "Adding value, while ensuring our customers' products are safe and secure" 2 Corporate security mission & objective Panalpina Corporate Security has the primary goal to provide

More information

WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM

WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM BACKGROUND WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM In the aftermath of September 11, U.S. Customs and Border Protection (CBP) in cooperation with its trade

More information

Risk Assessments and Risk Based Supply Chain Security. March, 2010

Risk Assessments and Risk Based Supply Chain Security. March, 2010 Risk Assessments and Risk Based Supply Chain Security March, 2010 What is Risk? What a Risk Assessment Isn t What a Risk Assessment Is How does the Risk Assessment fit into the C-TPAT program? How can

More information

Understanding the Flow of Counterfeit and Gray Market Goods though the U.S. Automotive and Commercial Vehicle Parts Marketplace

Understanding the Flow of Counterfeit and Gray Market Goods though the U.S. Automotive and Commercial Vehicle Parts Marketplace Understanding the Flow of Counterfeit and Gray Market Goods though the U.S. Automotive and Commercial Vehicle Parts Marketplace MEMA Brand Protection Council January 20091 Understanding the Flow of Counterfeit

More information

LOGISTICS FREIGHT FORWARDERS SUPPLEMENTAL APPLICATION

LOGISTICS FREIGHT FORWARDERS SUPPLEMENTAL APPLICATION LOGISTICS FREIGHT FORWARDERS SUPPLEMENTAL APPLICATION INSTRUCTIONS FOR COMPLETING APPLICATION: 1. Please answer all the questions. This information is required to make an underwriting and pricing evaluation.

More information

Partners in Protection / C-TPAT Supply Chain Security Questionnaire

Partners in Protection / C-TPAT Supply Chain Security Questionnaire Partners in Protection / C-TPAT Supply Chain Security Questionnaire Dear: Supply Trade Partner As you are aware there have been several changes in the transportation industry over the past few years. One

More information

Commercial Burglary Prevention

Commercial Burglary Prevention Commercial Burglary Prevention Montgomery County Police 2 nd District Officer Dana Stroman Community Services Officer Officer Oliver Janney Community Services Officer 240-773-6700 Message from the commander

More information

C-TPAT: What Every Security Executive Should Know

C-TPAT: What Every Security Executive Should Know C-TPAT: What Every Security Executive Should Know Barry Brandman President Danbee Investigations Fair Lawn, NJ SPONSOR LOGO C-TPAT: What Every Security Executive Should Know In this session, you will learn:

More information

APPENDIX B ABOUT U.S. CUSTOMS AND BORDER PROTECTION: MISSION AND CORE VALUES

APPENDIX B ABOUT U.S. CUSTOMS AND BORDER PROTECTION: MISSION AND CORE VALUES APPENDIX B ABOUT U.S. CUSTOMS AND BORDER PROTECTION: MISSION AND CORE VALUES Northern Border Activities B-1 July 2012 CBP MISSION We are the guardians of our Nation s borders. We are America s frontline.

More information

Financial Institutions. Placing clients money too close at hand can open the doors f or criminals.

Financial Institutions. Placing clients money too close at hand can open the doors f or criminals. Financial Institutions Placing clients money too close at hand can open the doors f or criminals. Financial Institutions At Great American Insurance Group, we understand the pressures faced by today s

More information

Crime Location Crime Type Month Year Betting Shop Criminal Damage April 2010 Betting Shop Theft April 2010 Betting Shop Assault April 2010

Crime Location Crime Type Month Year Betting Shop Criminal Damage April 2010 Betting Shop Theft April 2010 Betting Shop Assault April 2010 Crime Location Crime Type Month Year Betting Shop Theft April 2010 Betting Shop Assault April 2010 Betting Shop Theft April 2010 Betting Shop Theft April 2010 Betting Shop Assault April 2010 Betting Shop

More information

C-TPAT Highway Carrier Security Criteria

C-TPAT Highway Carrier Security Criteria C-TPAT Highway Carrier Security Criteria The supply chain for highway carriers for C-TPAT purposes is defined from point of origin from the yard or where the tractors and trailers are stored, through pickup

More information

A RISK-BASED REMEDY FOR PHARMA SUPPLY CHAIN SECURITY CONCERNS

A RISK-BASED REMEDY FOR PHARMA SUPPLY CHAIN SECURITY CONCERNS Supply Chain Security Solutions A RISK-BASED REMEDY FOR PHARMA SUPPLY CHAIN SECURITY CONCERNS An Analysis by Dan Purtell, Senior Vice President, BSI Supply Chain Solutions No business is immune from costly

More information

Chapter 15 Crime Insurance Coverages and Surety Bonds

Chapter 15 Crime Insurance Coverages and Surety Bonds Chapter 15 Crime Insurance Coverages and Surety Bonds Overview In addition to the property and liability risks faced by businesses, losses can also occur as a result of crime. Losses attributable to crime

More information

Customs & Trade Partnership Against Terrorism (C TPAT)

Customs & Trade Partnership Against Terrorism (C TPAT) Customs & Trade Partnership Against Terrorism (C TPAT) Bristol Myers Squibb Company Customs & Trade & Corporate Security Departments As a result of the events of September 11, 2001, the United States Customs

More information

16 th European Report on Bank Robberies. Executive Summary. EBF ref. 2283. Brussels, November 2008

16 th European Report on Bank Robberies. Executive Summary. EBF ref. 2283. Brussels, November 2008 EBF ref. 2283 Brussels, November 2008 16 th European Report on Bank Robberies Executive Summary The problem of robberies is constant and will remain as long as money exists. Recently, countries have had

More information

Supply Chain Security Training Needs for Law Enforcement Agencies

Supply Chain Security Training Needs for Law Enforcement Agencies Supply Chain Security Training Needs for Law Enforcement Agencies Presented by Dr. Juha Hintsa, CBRA 1st CORE SUPPLY CHAIN FORUM, Transport & Logistics Fair September 24, 2015, Antwerp. HICL2015 Authors:

More information

MSC Security Program Security in the Logistics Supply Chain

MSC Security Program Security in the Logistics Supply Chain Maritime Security Council L MSC Security Program Security in the Logistics Supply Chain First Hemispheric Convention on Port Logistics and Competitiveness Ixtapa-Zihuatanejo November 3-5, 2010 Talking

More information

FOOD DEFENSE STRATEGIES: Four Ways to Proactively Protect Your Brand

FOOD DEFENSE STRATEGIES: Four Ways to Proactively Protect Your Brand FOOD DEFENSE STRATEGIES: Four Ways to Proactively Protect Your Brand Food Defense: Proactively protecting the food supply chain is paramount for protecting company profitability, liability, and survival.

More information

C-TPAT Customs Trade Partnership Against Terrorism

C-TPAT Customs Trade Partnership Against Terrorism Food and Agriculture Border Gateway Summit C-TPAT Customs Trade Partnership Against Terrorism Robert Gaydo, Senior Trade Advisor A.N. DERINGER, INC. Feb. 20, 1014 Who can participate? Air/Rail/Sea Carriers

More information

Business. Security Tips. Smarter Ways To Help Protect Your Business. Safer. Smarter. Tyco. TM

Business. Security Tips. Smarter Ways To Help Protect Your Business. Safer. Smarter. Tyco. TM Business Security Tips Smarter Ways To Help Protect Your Business / Deterrence / is smarter deterrence external threats Make It Difficult For Criminals To Get Into Your Business. Locks, Lighting And Landscaping

More information

U.S. President s Malaria Initiative (PMI) Approach and Steps to Counter Theft and Diversion of Medicines

U.S. President s Malaria Initiative (PMI) Approach and Steps to Counter Theft and Diversion of Medicines U.S. President s Malaria Initiative (PMI) Approach and Steps to Counter Theft and Diversion of Medicines We are working with national governments, medical stores and local institutions to strengthen oversight

More information

the Ministry of Community Safety and Correctional Services

the Ministry of Community Safety and Correctional Services Message from the Ministry of Community Safety and Correctional Services The Ontario Association of Chiefs of Police (OACP) is conducting its first public education and awareness campaign on crime prevention.

More information

MPS GROUP GLOBAL ANTI-MONEY LAUNDERING POLICY

MPS GROUP GLOBAL ANTI-MONEY LAUNDERING POLICY Siena, march 2012 Pag. 1 di 5 MPS GROUP 1 - A p p l i c a t i o n This Global Anti-Money Laundering Policy (Policy) applies to all Banca Monte dei Paschi di Siena subsidiaries and branches (collectively

More information

welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation

welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation Minimum Security Criteria Scope Designed to be the building

More information

Hazardous Materials Security Awareness

Hazardous Materials Security Awareness Hazardous Materials Security Awareness Security Awareness Objectives Provide employees with skills to: Identify hazardous materials (hazmat) security risks Improve transportation security Recognize and

More information

Warehouse Security Tips

Warehouse Security Tips Warehouse Security Tips an e Book from RSI Insurance Brokers to Help Prevent Cargo Loss www.rsiinsurancebrokers.com/warehousesecurity Toll Free (800) 828 5273 Email: info@rsi ins.com TABLE OF CONTENTS:

More information

Why a Network-based Security Solution is Better than Using Point Solutions Architectures

Why a Network-based Security Solution is Better than Using Point Solutions Architectures Why a Network-based Security Solution is Better than Using Point Solutions Architectures In This Paper Many threats today rely on newly discovered vulnerabilities or exploits CPE-based solutions alone

More information

Eighth UPS Pain in the Chain Survey. Survey Snapshot

Eighth UPS Pain in the Chain Survey. Survey Snapshot Eighth UPS Pain in the Chain Survey Survey Snapshot 1 About Pain in the Chain UPS has been surveying the healthcare and life sciences industry about supply chain issues since 2008. We started with a simple

More information

UCR Highlights Crime in Virginia

UCR Highlights Crime in Virginia Virginia State Police Criminal Justice Information Services (CJIS) Division Newsletter UCR Highlights Crime in Virginia July 2015 Volume 28, Issue 1 Page UCR - Crime in Virginia 1-3 UCR - Group A Offenses

More information

Cargo Theft, Identity Theft, and Double Brokering Michele Greene, Group Product Manager, TransCore Freight Solutions

Cargo Theft, Identity Theft, and Double Brokering Michele Greene, Group Product Manager, TransCore Freight Solutions DAT SPECIAL REPORT Freight Solutions Cargo Theft, Identity Theft, and Double Brokering Michele Greene, Group Product Manager, TransCore Freight Solutions DAT SPECIAL REPORT 2 Don t Be a Victim Cargo theft,

More information

THE CHANGING FACE OF IDENTITY THEFT THE CURRENT AND FUTURE LANDSCAPE

THE CHANGING FACE OF IDENTITY THEFT THE CURRENT AND FUTURE LANDSCAPE THE CHANGING FACE OF IDENTITY THEFT THE CURRENT AND FUTURE LANDSCAPE Identity is the unique set of characteristics that define an entity or individual. Identity theft is the unauthorized use of an individual

More information

Control measures for guarding against some recent fraud cases

Control measures for guarding against some recent fraud cases Our Ref.: B1/15C B9/81C 5 June 2014 The Chief Executive All Authorized Institutions Dear Sir/Madam, Control measures for guarding against some recent fraud cases I am writing to draw the attention of your

More information

Seventh Avenue Inc. 1

Seventh Avenue Inc. 1 Seventh Avenue Inc. Supply Chain Security Profile Customs-Trade Partnership against Terrorism Supplier Questionnaire Seventh Avenue is a member of the Customs-Trade Partnership against Terrorism (C-TPAT).

More information

Social Media Use in Law Enforcement:

Social Media Use in Law Enforcement: Research Crime prevention and investigative activities continue to drive usage. November Background and methodology Overview Social media is increasingly valuable to the way law enforcement professionals

More information

Lone Working. A guide for safety representatives

Lone Working. A guide for safety representatives Lone Working A guide for safety representatives November 2009 The HSE says lone workers are those who work by themselves without close or direct supervision. A huge number of jobs can require people to

More information

Global Network and Application Security Testing Market An Overview of Emerging Trends and Growth Opportunities For Test Solution Vendors

Global Network and Application Security Testing Market An Overview of Emerging Trends and Growth Opportunities For Test Solution Vendors Global Network and Application Security Testing Market An Overview of Emerging Trends and Growth Opportunities For Test Solution Vendors May 2013 Contents Section Slide Numbers Executive Summary 4 Market

More information

A Framework for Managing Crime and Fraud

A Framework for Managing Crime and Fraud A Framework for Managing Crime and Fraud ASIS European Security Conference & Exhibition Gothenburg, April 15, 2013 Torsten Wolf Group Head of Crime and Fraud Prevention Agenda Introduction Economic Crime

More information

Pool Distribution - Enhancing Store Fulfillment

Pool Distribution - Enhancing Store Fulfillment Pool Distribution - Enhancing Store Fulfillment Service quality and cost equally matter for your company s distribution programs.. The good news is you don t have to sacrifice one for the other when you

More information

Date: Business Name: Business Contact Person: Business Address: Business Telephone Number: Alternate Contact Number/Email: Officer: Case No:

Date: Business Name: Business Contact Person: Business Address: Business Telephone Number: Alternate Contact Number/Email: Officer: Case No: ISLE OF PALMS POLICE DEPARTMENT Thomas E. Buckhannon, III, Chief of Police 30 J. C. Long Boulevard Isle of Palms, South Carolina 29451 (843) 886-6522 BUSINESS SECURITY SURVEY Date: Business Name: Business

More information

Hazardous Materials Transportation Security Planning

Hazardous Materials Transportation Security Planning Objectives To better understand security threats; To detail new security requirements; and To provide guidance and resources to assist in developing and adhering to a security plan. PART I Understanding

More information

REPORT ON CONTAINER TRANSPORT SECURITY ACROSS MODES. Transport Authorities Must Address Weak Links of the Container Transport Chain

REPORT ON CONTAINER TRANSPORT SECURITY ACROSS MODES. Transport Authorities Must Address Weak Links of the Container Transport Chain REPORT ON CONTAINER TRANSPORT SECURITY ACROSS MODES EXECUTIVE SUMMARY Transport Authorities face a number of crime and security challenges relating to the systems under their jurisdiction. These persistent

More information

IDENTITY THEFT PREVENTION PROGRAM

IDENTITY THEFT PREVENTION PROGRAM IDENTITY THEFT PREVENTION PROGRAM Contents Welcome... 3 Overview... 4 Definitions... 5 Red Flags... 6 Red Flag 1 Alerts, Notifications or Warnings from a Consumer Reporting Agency... 7 Red Flag 2 Suspicious

More information

Security Policies and Procedures

Security Policies and Procedures Security Policies and Procedures April 26, 2012 Kristen Whelan Transportation Consultant kwhelan@libertyint.com www.libertyint.com Customs-Trade Partnership Against Terrorism What is C-TPAT? CBP and Industry

More information

WHY DO I NEED DATA PROTECTION SERVICES?

WHY DO I NEED DATA PROTECTION SERVICES? WHY DO I NEED DATA PROTECTION SERVICES? Data processing operations have evolved with breathtaking speed over the past few years, expanding from very large mainframe operations to small business networks.

More information

Jordan customs Electronic Transit Monitoring and Facilitation System (Jordan model)

Jordan customs Electronic Transit Monitoring and Facilitation System (Jordan model) Jordan customs Electronic Transit Monitoring and Facilitation System (Jordan model) Supply chain Security and Facilitations measures taken by Jordan customs To ensure its move towards effective and efficient

More information

Setting the Standard for Safe City Projects in the United States

Setting the Standard for Safe City Projects in the United States Leading Safe Cities Setting the Standard for Safe City Projects in the United States Edge360 is a provider of Safe City solutions to State & Local governments, helping our clients ensure they have a secure,

More information

Customs-Trade Partnership against Terrorism Supply Chain Security Profile

Customs-Trade Partnership against Terrorism Supply Chain Security Profile Customs-Trade Partnership against Terrorism Supply Chain Security Profile Service Provider Assessment (Warehouse) Please answer the following questions about your company s cargo security processes and

More information

Track and Trace in the Pharmaceutical Supply Chain

Track and Trace in the Pharmaceutical Supply Chain Track and Trace in the Pharmaceutical Supply Chain Edmund W. Schuster Visiting Operations Researcher Robin Koh Associate Director Auto-ID Labs Massachusetts Institute of Technology Cambridge, MA husetts

More information

Facilitating itinerant crime groups Research synthesis

Facilitating itinerant crime groups Research synthesis Summary Facilitating itinerant crime groups Research synthesis In recent years, the Minister of Security and Justice has repeatedly expressed his concerns over the broad range of property offences committed

More information

Intermec Security Letter of Agreement

Intermec Security Letter of Agreement Intermec Security Letter of Agreement Dear Supplier, Please be advised that Intermec Technologies has joined US Customs and Border Protection (USC&BP) in the Customs-Trade Partnership Against Terrorism

More information

APPENDIX 1: ORACLE SUPPLY CHAIN AND HIGH VALUE ASSET PHYSICAL SECURITY STANDARDS

APPENDIX 1: ORACLE SUPPLY CHAIN AND HIGH VALUE ASSET PHYSICAL SECURITY STANDARDS APPENDIX 1: ORACLE SUPPLY CHAIN AND HIGH VALUE ASSET PHYSICAL SECURITY STANDARDS The requirements of these Oracle Global Supply Chain and High Value Asset Physical Security Standards apply to all geographical

More information

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft

More information