38:
883:
250:
and risk management industries; after the attacks more structured approaches were implemented. Early efforts were dominated by concerns over the use of maritime shipping to deliver weapons of mass destruction. From 2001 to 2006 efforts focused on the physical security of goods and shipments but from
342:
The Global
Container Control Programme (CCP), a joint United Nations Office on Drugs and Crime (UNODC)/World Customs Organization (WCO) initiative working to establish effective container controls at select ports across the globe with the aim to prevent trafficking of drugs, chemicals and other
204:
in the United States, "adversaries exploit supply chain vulnerabilities to steal
America’s intellectual property, corrupt our software, surveil our critical infrastructure, and carry out other malicious activities. They infiltrate trusted suppliers and vendors to target equipment, systems, and
229:
can take place anywhere in the logistics chain: from the shipper, carrier, or consignee. It may be packages, pallet loads, and full truck loads. It can involve individuals with an opportunity to take cargo or can involve organized crime. Security systems involving surveillance systems,
169:, and theft. A healthy and robust supply chain absent from security threats requires safeguarding against disturbances at all levels such as facilities, information flow, transportation of goods, and so on. A secure supply chain is critical for organizational performance.
398:, offers public and private enterprise an international high-level management standard that enables organisations to utilize a globally consistent management approach to applying supply-chain security initiatives. ISO/IEC 20243 is The
836:
472:
Supply chain cyber security is a subset of supply chain security which focuses on the digital aspects of the traditional supply chain as well as the supply chain for electronic and digital goods.
417:
in
November 2010, highlighting the need for their international "partnership to bring greater prosperity and security" for citizens on both sides of the Atlantic, provided a foundation for the
313:
Operation Safe
Commerce (OSC), a U.S. federal program designed to test and evaluate practices, policies and procedures aimed at improving the security of international containerized shipping.
755:
Communication from the
Commission to the European Parliament, the Council and the European Economic and Social Committee on Customs Risk Management and Security of the Supply Chain
320:(WCO) adopted the Framework of Standards to Secure and Facilitate Global Trade in 2005, which consists of supply-chain security standards for Customs administrations including
443:
286:
Customs authorities shall be primarily responsible for the supervision of the
Community's international trade, thereby contributing to ... overall supply chain security.
201:
388:
506:
307:
537:
399:
410:
376:
undertakes an annual survey of supply chain risk exposure, identifying and updating the main supply chain security concerns. In its 2020 report,
55:
256:
905:
421:
to build on, announcing at its
December 2010 meeting an agreement "to deepen transatlantic cooperation in supply chain security policies".
447:
332:
1005:
931:
501:
121:
102:
725:
354:
program designed to collect financial information about shipments, with the objective of determining the safety of cargo shipments.
74:
1020:
985:
670:
819:
592:
Agreement between Canada and the
European Union on Customs Cooperation with Respect to Matters Related to Supply-Chain Security
336:
418:
246:
were the defining event for modern supply chain security. Before 9/11 supply chain security was primarily the concern of the
81:
59:
862:
1000:
697:
491:
328:
945:
481:
457:
entered into an
Agreement on Customs Cooperation with Respect to Matters Related to Supply-Chain Security in March 2013.
321:
794:
343:
contraband and to facilitate trade by strengthening cooperation between the customs, trade and enforcement communities.
88:
467:
271:
913:
909:
893:
496:
429:
317:
960:
849:
70:
48:
605:
310:(C-TPAT), a voluntary compliance program for companies to improve the security of their corporate supply chains.
606:"The impact of information security initiatives on supply chain robustness and performance: an empirical study"
754:
558:
158:
768:
643:
275:
591:
946:
ICAO-WCO: Moving Air Cargo
Globally - Air Cargo and Mail Secure Supply Chain and Facilitation Guidelines
511:
391:(ISO) has released a series of standards for the establishment and management of supply-chain security.
384:
and medical supplies and increasing warehouse and facility theft were identified as particular concerns.
347:
971:
Supply chain security: adding to a complex operational and institutional environment, A Grainger (2007)
990:
454:
243:
432:
4 an opportunity to include necessary evaluations that assure supply chain security for IT products
95:
568:
247:
1025:
625:
543:
279:
186:
157:
and to "facilitate legitimate trade". Their objective is to combine traditional practices of
617:
516:
358:
278:(2008) includes reference to supply chain security in its outline of the mission of each EU
975:
357:
Pilot initiatives by companies in the private sector to track and monitor the integrity of
995:
563:
486:
425:
381:
231:
185:
Ensuring the security of cargo while in transit, for example through the use of locks and
986:
Chain of Perils: Hardening the Global Supply Chain and Strengthening America's Resilience
970:
950:
377:
252:
1014:
801:. Federal Register (Daily Journal of the United States Government). November 20, 2002
553:
548:
392:
302:
There are a number of supply-chain security initiatives around the world, including:
264:
220:
17:
521:
251:
2012 on focus shifted to cybersecurity as the awareness of cyber threats grew. The
208:
142:
1001:
Global Supply Chain Security, James Giermanski, Scarecrow Press, 2012 - 218 Pages
351:
146:
37:
234:, and broader corporate security are needed to reduce the theft of material.
27:
Security of supply chain from trojans, tampering, privacy, theft and terrorism
629:
621:
531:
526:
373:
291:
205:
information used every day by the government, businesses, and individuals."
162:
150:
837:
Cargo theft and labor exploitation incidents increase risk to supply chains
757:, COM(2012) 793 final, published 8 January 2013, accessed 27 December 2023
965:
138:
414:
166:
769:"Biden signs executive order demanding supply chain security review"
442:
Efforts for countries around the world to implement and enforce the
211:
often lack the resources to properly address supply chain security.
912:
external links, and converting useful links where appropriate into
446:(ISPS Code), an agreement of 148 countries that are members of the
294:
made supply chain security one of his administration's priorities.
396:
Specification for Security Management Systems for the Supply Chain
260:
154:
1006:
Implementing a Robust Supply Chain Security & Risk Management
955:
362:
267:, as a significant factor in relation to supply chain security.
182:
Advance notification of the contents to the destination country
179:
Screening and validating of the contents of cargo being shipped
876:
406:) that addresses supply-chain security and secure engineering.
366:
31:
976:
World Customs Journal: special issue on supply chain security
137:(also "supply-chain security") activities aim to enhance the
161:
with the security requirements driven by threats such as
726:"How supply chain security has evolved over two decades"
980:
901:
896:
may not follow Knowledge (XXG)'s policies or guidelines
852:, published 20 November 2010, accessed 23 December 2020
404:
Mitigating Maliciously Tainted and Counterfeit Products
339:(DHS) focused on screening containers at foreign ports.
839:, published 21 October 2020, accessed 1 January 2021
826:, published 8 September 2004, accessed 28 July 2022
361:moving around the world using technologies such as
62:. Unsourced material may be challenged and removed.
444:International Ship and Port Facility Security Code
172:Typical supply-chain security activities include:
956:MIT Project on Supply Chain Response to Terrorism
702:Trends & Issues in Crime and Criminal Justice
650:. Office of the Director of National Intelligence
176:Credentialing of participants in the supply chain
671:"The Daily Challenges of Supply Chain Security"
284:
202:Office of the Director of National Intelligence
991:ISO 28002 supply chain security and resilience
594:, signed 4 March 2013, accessed 18 August 2021
389:International Organization for Standardization
966:Stanford Global Supply Chain Management Forum
865:, 17 December 2010, accessed 23 December 2020
719:
717:
698:"The Detection and Prevention of Cargo Theft"
8:
961:Supply Chain Risk Management Maturity Model
507:Customs Trade Partnership against Terrorism
308:Customs Trade Partnership against Terrorism
586:
584:
932:Learn how and when to remove this message
538:Open Trusted Technology Provider Standard
400:Open Trusted Technology Provider Standard
122:Learn how and when to remove this message
861:U.S.-EU Transatlantic Economic Council,
749:
747:
580:
820:Operation Safe Commerce passes Round 1
257:2010 transatlantic aircraft bomb plot
7:
60:adding citations to reliable sources
610:Information & Computer Security
448:International Maritime Organization
259:involving packages being sent from
333:U.S. Customs and Border Protection
25:
981:Port and Maritime Security Online
767:Starks, Tim (February 24, 2021).
604:P.N., Sindhuja (August 3, 2021).
502:Counterfeit electronic components
881:
36:
848:Council of the European Union,
337:Department of Homeland Security
47:needs additional citations for
996:CSA Cargo Security Information
799:Office of the Federal Register
644:"Supply Chain Risk Management"
419:Transatlantic Economic Council
290:In February 2021 US President
1:
850:EU-US Summit: Joint statement
730:searchsecurity.techtarget.com
492:Container Security Initiative
329:Container Security Initiative
482:Authorized economic operator
322:authorized economic operator
468:Supply chain cyber security
462:Supply chain cyber security
453:The European Union and the
1042:
497:Counterfeit consumer goods
465:
318:World Customs Organization
218:
795:"Operation Safe Commerce"
244:terrorist attacks of 9/11
191:Inspecting cargo on entry
951:IMO FAQ on the ISPS Code
675:www.securitymagazine.com
622:10.1108/ICS-07-2020-0128
437:International agreements
331:(CSI), a program led by
209:Local police departments
153:systems for the world's
1021:Supply chain management
559:Supply-chain management
159:supply-chain management
71:"Supply chain security"
590:Government of Canada,
288:
276:Community Customs Code
753:European Commission,
512:Global Trade Exchange
348:Global Trade Exchange
270:The European Union's
135:Supply chain security
18:Supply Chain Security
902:improve this article
455:Government of Canada
149:, the transport and
56:improve this article
914:footnote references
677:. Security Magazine
773:www.cyberscoop.com
696:Mayhew, C (2001),
569:Trade facilitation
187:tamper-proof seals
942:
941:
934:
544:Package pilferage
380:, cargo theft of
280:customs authority
255:also treated the
200:According to the
132:
131:
124:
106:
16:(Redirected from
1033:
937:
930:
926:
923:
917:
885:
884:
877:
866:
859:
853:
846:
840:
833:
827:
824:Inside Logistics
817:
811:
810:
808:
806:
791:
785:
784:
782:
780:
764:
758:
751:
742:
741:
739:
737:
721:
712:
711:
710:
708:
693:
687:
686:
684:
682:
666:
660:
659:
657:
655:
640:
634:
633:
601:
595:
588:
517:James Giermanski
359:cargo containers
232:tracking systems
127:
120:
116:
113:
107:
105:
64:
40:
32:
21:
1041:
1040:
1036:
1035:
1034:
1032:
1031:
1030:
1011:
1010:
938:
927:
921:
918:
899:
890:This article's
886:
882:
875:
870:
869:
863:Joint Statement
860:
856:
847:
843:
834:
830:
818:
814:
804:
802:
793:
792:
788:
778:
776:
766:
765:
761:
752:
745:
735:
733:
724:Hayden, Ernie.
723:
722:
715:
706:
704:
695:
694:
690:
680:
678:
668:
667:
663:
653:
651:
642:
641:
637:
603:
602:
598:
589:
582:
577:
564:Track and trace
540:(ISO/IEC 20243)
487:Hardware Trojan
478:
470:
464:
439:
426:Common Criteria
382:pharmaceuticals
324:(AEO) programs.
300:
298:Key initiatives
240:
223:
217:
198:
128:
117:
111:
108:
65:
63:
53:
41:
28:
23:
22:
15:
12:
11:
5:
1039:
1037:
1029:
1028:
1023:
1013:
1012:
1009:
1008:
1003:
998:
993:
988:
983:
978:
973:
968:
963:
958:
953:
948:
940:
939:
894:external links
889:
887:
880:
874:
873:External links
871:
868:
867:
854:
841:
828:
812:
786:
759:
743:
713:
688:
661:
635:
616:(2): 365–391.
596:
579:
578:
576:
573:
572:
571:
566:
561:
556:
551:
546:
541:
534:
529:
524:
519:
514:
509:
504:
499:
494:
489:
484:
477:
474:
466:Main article:
463:
460:
459:
458:
451:
438:
435:
434:
433:
422:
407:
385:
378:drug smuggling
370:
355:
344:
340:
325:
314:
311:
299:
296:
253:European Union
239:
236:
219:Main article:
216:
213:
197:
194:
193:
192:
189:
183:
180:
177:
130:
129:
44:
42:
35:
26:
24:
14:
13:
10:
9:
6:
4:
3:
2:
1038:
1027:
1024:
1022:
1019:
1018:
1016:
1007:
1004:
1002:
999:
997:
994:
992:
989:
987:
984:
982:
979:
977:
974:
972:
969:
967:
964:
962:
959:
957:
954:
952:
949:
947:
944:
943:
936:
933:
925:
915:
911:
910:inappropriate
907:
903:
897:
895:
888:
879:
878:
872:
864:
858:
855:
851:
845:
842:
838:
832:
829:
825:
821:
816:
813:
800:
796:
790:
787:
774:
770:
763:
760:
756:
750:
748:
744:
732:. Tech Target
731:
727:
720:
718:
714:
703:
699:
692:
689:
676:
672:
669:Zalud, Bill.
665:
662:
649:
645:
639:
636:
631:
627:
623:
619:
615:
611:
607:
600:
597:
593:
587:
585:
581:
574:
570:
567:
565:
562:
560:
557:
555:
554:Security risk
552:
550:
549:Package theft
547:
545:
542:
539:
535:
533:
530:
528:
525:
523:
520:
518:
515:
513:
510:
508:
505:
503:
500:
498:
495:
493:
490:
488:
485:
483:
480:
479:
475:
473:
469:
461:
456:
452:
449:
445:
441:
440:
436:
431:
427:
423:
420:
416:
412:
408:
405:
401:
397:
394:
393:ISO/PAS 28000
390:
386:
383:
379:
375:
371:
368:
364:
360:
356:
353:
349:
345:
341:
338:
334:
330:
326:
323:
319:
315:
312:
309:
305:
304:
303:
297:
295:
293:
287:
283:
281:
277:
273:
268:
266:
265:United States
262:
258:
254:
249:
245:
237:
235:
233:
228:
222:
221:Package theft
215:Transit theft
214:
212:
210:
206:
203:
195:
190:
188:
184:
181:
178:
175:
174:
173:
170:
168:
164:
160:
156:
152:
148:
144:
140:
136:
126:
123:
115:
112:February 2014
104:
101:
97:
94:
90:
87:
83:
80:
76:
73: –
72:
68:
67:Find sources:
61:
57:
51:
50:
45:This article
43:
39:
34:
33:
30:
19:
928:
919:
904:by removing
891:
857:
844:
831:
823:
815:
803:. Retrieved
798:
789:
777:. Retrieved
775:. CyberScoop
772:
762:
734:. Retrieved
729:
705:, retrieved
701:
691:
679:. Retrieved
674:
664:
652:. Retrieved
647:
638:
613:
609:
599:
522:Denise Krepp
471:
428:offers with
411:EU-US Summit
403:
395:
301:
289:
285:
269:
241:
226:
224:
207:
199:
171:
143:supply chain
134:
133:
118:
109:
99:
92:
85:
78:
66:
54:Please help
49:verification
46:
29:
835:BSI Group,
707:January 25,
648:www.dni.gov
352:data-mining
147:value chain
1015:Categories
922:March 2021
575:References
402:(O-TTPS) (
272:regulation
225:Theft and
82:newspapers
906:excessive
630:2056-4961
532:ISO 31000
527:ISO 28000
374:BSI Group
292:Joe Biden
248:insurance
227:shrinkage
163:terrorism
151:logistics
1026:Security
805:July 17,
779:March 7,
736:March 7,
681:March 7,
654:March 7,
476:See also
413:held in
350:, a DHS
196:Overview
139:security
900:Please
892:use of
335:in the
274:on the
263:to the
238:History
141:of the
96:scholar
628:
450:(IMO).
415:Lisbon
167:piracy
98:
91:
84:
77:
69:
261:Yemen
155:cargo
103:JSTOR
89:books
807:2016
781:2021
738:2021
709:2023
683:2021
656:2021
626:ISSN
536:The
424:The
409:The
387:The
372:The
365:and
363:RFID
346:The
327:The
316:The
306:The
242:The
75:news
908:or
618:doi
430:EAL
367:GPS
145:or
58:by
1017::
822:,
797:.
771:.
746:^
728:.
716:^
700:,
673:.
646:.
624:.
614:29
612:.
608:.
583:^
165:,
935:)
929:(
924:)
920:(
916:.
898:.
809:.
783:.
740:.
685:.
658:.
632:.
620::
369:.
282::
125:)
119:(
114:)
110:(
100:·
93:·
86:·
79:·
52:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.