1st Edition

Supply Chain Security A Comprehensive Approach

By Arthur G. Arway Copyright 2013
    192 Pages 24 B/W Illustrations
    by CRC Press

    The supply chain is a complex system of numerous, integrated stakeholders. These stakeholders are responsible for the transportation, storage, documentation, and handling of material goods and cargo. Each entity has its own unique relationship with and role within the chain—as well as its own unique security requirements. The challenge of trying to secure the supply chain at every level is both a domestic and global concern. In this global economy, companies must be able to integrate security into supply chain logistics to protect their employees, assets, and clients from incidents of theft and other damaging events.

    Supply Chain Security: A Comprehensive Approach provides security professionals the tools necessary to ensure supply chain security. The book demonstrates how to establish and enforce security policies and protocols, including rapid responses that must be deployed in the event of a theft or security incident. Most importantly, it enables professionals to integrate business practices into the planning, development, and successful operation of supply chains to ensure security and protect assets.

    Drawn from the experience of a recognized leader in domestic and international supply chain logistics, trade, and transportation security, the book illustrates through a series of case studies how security professionals can institute sound security practices. By demonstrating to their stakeholders and potential customers that they provide a secure environment for materials, products, goods, and cargo, companies can increase their customer base and improve their bottom line.

    WHAT IS SUPPLY CHAIN SECURITY?
    What Is a Supply Chain?
    Origin
    Manufacturing/Suppliers
    Handoffs
    Initial Service Provider
    Service Providers
    Trucking
    Ocean Shipping
    Airlines
    Third-Party Logistics Providers
    PODs
    Elements That Impact the Supply Chain
    Operations
    Contracts
    Customer Demands, Written and Nonwritten
    Provider Capability
    Geography
    Force Majeure/Acts of God
    Crime
    Volume
    Storage Capacity
    Government Controls
    Security: Supply Chain versus Corporate
    Focus of the Program
    Corporate Culture
    Supplier and Provider Relationships
    DEVELOPING A SUPPLY CHAIN SECURITY PROGRAM
    Security for Key Links in the Chain

    Origin
    Security Reviews of Origin
    Actions
    Customers
    Providers
    Provider Security Review
    CCTV
    Access Controls
    Intrusion Alarms
    Storage and Distribution
    Security Review of Facility and Location
    Transportation Security Review
    Shipping and Receiving
    Destination Concerns
    Elements of a Successful Supply Chain Security Program
    Goal of the Supply Chain Security Program
    Theft and Pilferage
    Smuggling and Contamination
    Antiterrorism
    Government Supply Chain Security Program Compliance
    Customer Contractual Obligations
    Risk Management
    Industry Positioning and Branding
    Marketing and Sales
    Methodology for Supply Chain Security
    Integration into the Business
    Business Unit Support
    Structure and Reporting
    Responsibilities and Roles
    Policies and Procedures
    Training
    Classifications
    Security Auditing and Assessments
    Information Technology
    Liaisons
    Budgeting
    Justification
    Internal vs. External
    Own or Rent?
    REGULATION AND RESOURCE
    Government and Industry Supply Chain Security Programs

    C-TPAT (Customs-Trade Partnership against Terrorism)
    A Growing Partnership
    Extending the Zone of US Border Security
    How It Works
    An Emerging Focus: Mutual Recognition Arrangements
    PIP (Partners in Protection)
    History
    Modernization
    Mutual Recognition
    Harmonization of PIP and C-TPAT
    FAST (Free and Secure Trade)
    How It Works
    Benefits
    FAST-Eligible Goods
    BASC (Business Alliance for Secure Commerce)
    Mission
    Vision
    Specific Objectives
    AEO (Authorized Economic Operator)
    AEO Guidelines
    CCSP (Certified Cargo Screening Program)
    Background
    Program Overview
    Benefits
    TAPA (Transported Asset Protection Association)
    About TAPA
    HVTT Asset Theft: A Shared Problem
    Standards Lead to Solutions
    Resources and Technology for Supply Chain Security
    GPS (Global Positioning System)
    GSM (Global System for Mobile Communications)
    Trucking-Focused Devices
    Asset Tracking and Radio Frequency Identification (RFID)
    Taping/Wrapping
    Seals
    Screening
    CASE STUDIES
    Case Studies

    Case Study 1: Ocean Container Theft, Port of Newark, NJ
    Case Study 2: Pilfering within a "Knitting" and Distribution Operation
    Case Study 3: Truck Theft
    Case Study 4: Parcel Network Operation Pilferage
    Case Study 5: Latin America Warehouse Assault
    APPENDICES
    Appendix A: Sample Customer Security Requirements

    Appendix B: Sample Policy/Procedure
    Appendix C: Sample Security Review/Audit
    Appendix D: Sample Security Budget
    Appendix E: List of Acronyms
    INDEX


    Biography

    Dr. Arthur G. Arway is a recognized leader in domestic and international logistics, trade, and transportation security. He brings to the table 27-plus years of supply chain cargo security, law enforcement, investigative, human resources, and corporate security experience. He is an advisor to senior management as well as governmental security agencies. Dr. Arway has contributed to the body of work on supply chain and logistics security and has been cited in trade publications such as Journal of Commerce, CargoVision, and the online logistics magazine, DCVelocity. As a Certified Protection Professional (CPP) with ASIS International, he has presented at numerous industry meetings and exhibitions. He has also been honored by ASIS International with the Golden Writers Award for his work on workplace violence.

    "This book certainly earns a place on the bookshelf of the security professional looking to explore the world of supply chain security, as well as the practitioner just starting in the field who needs a solid reference."
    —Bill Crews, CPP in Security Management