Download The Threat - Massachusetts Institute of Technology

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
Freight Security and the
World Economic Forum
December 5, 2002
Agenda
The Real Threat to Global Supply Chains
The Problem – Where to Begin
The Call to Arms
Questions
©Accenture 2002 All Rights Reserved
2
A Conceptual Framework
The Transportation Security Model is a conceptual model or
“framework” designed to:
 Build an understanding of the security threats facing the
transportation system
 Create a common view which addresses the security issues of
each mode of transportation
 Provides a structured approach to collect and analyze risk
management data
©Accenture 2002 All Rights Reserved
3
Transportation Security Model
The model was designed around a basic transportation process
applicable to all modes of transportation and the potential threats to
each mode.
Definitions
Transportation
System
Transportation
Mode
Mode
Entry Points
Main Threat Areas
©Accenture 2002 All Rights Reserved

The entire system as a sum total of all
transportation modes

Method for moving goods and people
within the system (Air, Maritime, Rail,
Highway)

Points or locations at which threats may
enter the transportation mode

Focused areas or entities which have
credible potential to introduce threats into
the transportation system
4
Transportation Security Model - Examples
Transportation
System
Air
Airports
-Domestic
-Foreign
Highway Maritime
Border
Checkpoints
Pickup and
Delivery Points
Passengers
Employees
Employees Hazardous Material
Cargo
Cargo
©Accenture 2002 All Rights Reserved
Ports
-Domestic
-Foreign
Shippers
Employees
Cargo
5
Agenda
The Real Threat to Global Supply Chains
The Problem – Where to Begin
The Call to Arms
Questions
©Accenture 2002 All Rights Reserved
6
The Threat
The threat is systemic:
 While there are a number of individual activities or programs,
individual action will not provide the required security
 Cargo is the thread of continuity across modes
 Modal exchange and interchange points provide significant risk to
compromising supply chain security regardless of a company’s
individual activities
 The threat is fluid and will change in response to any activities
©Accenture 2002 All Rights Reserved
7
The Response
There has not been a comprehensive response:
 There have been a number of approaches suggested to support
freight and cargo security. Most of these focus on a specific
aspect or component of security.
 To date there has not been an overall vision or approach defined to
support this critical function.
 While the desire to avoid impacting supply chain efficiencies has
been acknowledged, there has been little work or analysis to
suggest how this can be accomplished
©Accenture 2002 All Rights Reserved
8
Agenda
The Real Threat to Global Supply Chains
The Problem – Where to Begin
The Call to Arms
Questions
©Accenture 2002 All Rights Reserved
9
Program Background
The Freight Security Initiative was developed to provide the
industry with a platform it could leverage to take a pro-active
stance on addressing freight security.
 At the 2002 Annual Meeting in New York, the Logistics and Transportation
Governors discussed the issue of “Security” and its impact on the industry.
 The World Economic Forum, Accenture, and the Massachusetts Institute
of Technology (MIT) partnered to explore relevant industry-wide issues
that could be addressed.
 Decision was made to put in place a program to move the issue forward.
©Accenture 2002 All Rights Reserved
10
Program Objectives
The program will provide a means to identify and communicate
inter-modal security issues and create a framework for industry to
engage governments and controlling entities.
 Crystallize and communicate the issues regarding freight security
 Conduct a fact-based analysis of these issues and develop corresponding
recommendations
 Provide recommendations from the business community to governments
and controlling entities such as IATA, US DOT and the EU to develop and
implement programs and processes for global freight security
 Identify and mobilize the appropriate resources to influence these issues
and implement the recommendations
©Accenture 2002 All Rights Reserved
11
Project Plan
The initial research will be developed to support the Annual
Meeting in Davos with both qualitative as well as quantitative
research.
 Conduct fifteen to twenty interviews with senior executives representing
carriers, shippers, government authorities, and insurance companies
 Conduct a broad survey of executives in the transportation industry based
on the interview responses
 Analyze interview and survey results and develop key messages
 Develop and disseminate a white paper for the 2003 Transport and
Logistics Governors Meeting
©Accenture 2002 All Rights Reserved
12
The Research is Structured Around Our
Five Freight Security Hypotheses
Industry Perception
of the Threat
Anecdotal evidence supports our belief that the industry views the
threat to freight security to be highly relevant.
Internal Security
Initiatives
Organizations are reviewing security procedures and policies, but
there has been little impact on reducing the overall threat to freight
security.
Government
Initiatives
Governments are taking a controlled response to freight security,
but still lack unilateral security measures to deal with the issue.
Customer Security
Requirements
Shippers will rely on carriers to lead the effort in developing
industry and organizational programs to address the security
issue.
The Economics of
Security
An effective freight security program will increase supply chain
costs, however there currently is no clear economic model for
providing enhanced security.
©Accenture 2002 All Rights Reserved
13
This Platform can be Used for an Industry
Led Response in Key Focus Areas
Illustrative
Facility and
Operations
Assessments
Conduct assessments and certify the operations of each provider
in the supply chain – shippers, carriers including maritime, rail,
truck, air, and bus, freight forwarders, and port operators
Shipment Data
Repository
Establish a standard repository for all shipment data that includes
the origination, route, and each “handling” that occurs.
Tracking Technology
Utilize technologies – RFID, GPS, Smart Seals – to track shipments
in route and potential tampering activities.
Pre-Emptive
Screening
Utilize shipment manifest information to target suspect or high risk
shipments for detail inspections or analysis.
Re-Active
Countermeasures
©Accenture 2002 All Rights Reserved
Utilize technologies to track vehicle locations against preauthorized routes and schedules. If deviations occur, vehicles
could be stopped electronically.
14
Agenda
The Real Threat to Global Supply Chains
The Problem – Where to Begin
The Call to Arms
Questions
©Accenture 2002 All Rights Reserved
15