Professional Documents
Culture Documents
10 1 1 469 6376 PDF
10 1 1 469 6376 PDF
Alan Erera*
Keng-Huat Kwek†
Nandini Goswami†
Chip White*
Huiwen Zhang†
†TLI-AP
National University of Singapore
Singapore
Abstract
1. Introduction
The intent of this document is to contribute to a better understanding of the impact of
security concerns on the productivity of the international freight transportation system.
More specifically, this report provides a stakeholder-focused taxonomy of security-
related costs associated with the transport of sea cargo. This report is companion to (Ref.
1, 2003), which contributes to a description of the flow of freight and information in the
international movement of freight by sea. The two reports together form steps necessary
for quantitatively analyzing the impact of security concerns on the productivity of the
international freight transportation system.
The events of 11 September 2001 in New York City and Washington, D.C., abruptly
changed the focus of U.S. maritime security. What was a focus on theft, drug trafficking,
and illegal immigration immediately shifted to a focus on terrorism. A seaport is
inherently vulnerable to, and a prime target for, terrorist attacks due to its geographic
size, economic importance, generally open accessibility by water and land, location in
areas of dense population, and its proximity to transportation links to other locations.
Containers moving through ports can be used by terrorists to deliver weapons of mass
destruction, which can lead to the destruction of major aspects of the transportation
system, high loss of life, and severe economic consequences.
Efforts have been made by the U.S. government and other stakeholders in the
port/terminal and shipping industry to insure the security of the international freight
transportation system. In January 2002, U.S. Customs initiated the Container Security
Initiative (CSI). CSI is aimed at securing the maritime link by identifying high-risk
containers through pre-screening exercises at the world’s twenty largest ports. Another
U.S. Customs initiative to enhance sea cargo security is C-TPAT (or Customs-Trade
Partnership Against Terrorism). C-TPAT was formed as a joint government-business
partnership in which businesses play an active role to enhance the security measures in
the parts of supply chain that they represent. The International Maritime Organization
(IMO) of the United Nations has also updated its ship and port security legislation to
respond to the need for securing the port and shipping supply chain.
New security improvements will require expensive new or retrofitted infrastructure and
technology and re-trained personnel. New security measures will also have impacts on
operations of the shipping supply chain. For example, additional inspection time at a port
is likely to lead to a delivery delay, which will tend to increase safety inventories and
inventory costs and hence reduce supply chain productivity. The challenge is to balance
security and productivity.
In this report, we will identify the costs that may be incurred as a result of new security
measures for many of the users and providers of the international freight transportation
system. A quantification of these costs is supply chain specific and would be the next
step leading to an analysis of the impact of security concerns on the productivity of a
specific supply chain.
We remark that an action taken may affect more than one of the above. For example,
hiring security personnel may affect both prevention and response.
Costs can be classified as either direct or indirect. Examples of direct costs include
the costs of purchasing new security equipment, hiring new security staff, and
training the current work force for new security procedures. Examples of indirect
costs include the cost resulting from an increased number of operations, increased
supply chain lead time average and variability, and increased management
complexity.
A one time, or setup cost is accrued when a new security system or process is inserted
into an operation. Examples of setup costs include the cost of updating a legacy
system, purchasing new equipment, and recruiting and training new security
personnel. Some of these costs may also be viewed as recurring costs. For example,
initial training for new security personnel may result in a one time cost associated
with the individual undergoing training; however, such training may be viewed as
! Cost of port employee background checks and credentialing. The new U.S.
port security rules require that all personnel entering ports be checked with regard
to previous employment history and criminal record and identifiable through us of
a badge system.
example, many shippers and ocean carriers still conduct business via fax and phone.
Shippers and freight forwarders typically used to fax their manifests to carriers any time
between 3 days before a vessel sailed to seven days after it departed a foreign port
destined for a U.S. port. However, under the 24-hour rule, shippers may be required to
forward the pertinent information to carriers at least 12 hours before the carriers have to
submit this information to U.S. Customs, which means 36 hours before the container is
loaded on a U.S.-bound vessel.
! Cost of personnel training. Personnel need to be trained to comply with the new
operational requirements and use of the revised information system.
! Cost of personnel training. This is a similar cost to the one mentioned earlier for
shippers.
! Cost of inspection time delay at port terminals. Drivers and other personnel of
trucking companies, before being permitted to proceed beyond a port access point,
will be subjected to comprehensive inspections. Trucks and all items on them will
also be screened and inspected at large ports. Therefore, drivers need to wait for a
longer time at port access points before they are allowed to enter the container
terminal.
! Cost of personnel training. This is a similar cost to the one mentioned earlier for
shippers.
! Cost of increased labor. Security measures increase the amount of labor needed
to load, unload, and inspect cargo, and to operate specialized equipment. For
example, the International Maritime Organization international code for ship
security has a requirement for a ship security officer (SSO) on each vessel.
containers and address the most common security problems associated with
containers, including theft, tampering, and temperature control. Technologies,
such as Global Positioning System (GPS), Radio Frequency Identification (RFID)
and e-seals will all be used for real-time tracking and recording of containers’
logistical journey. Moreover, ocean carriers may have to upgrade their
transportation equipment such as to use Smart Container in the future because of
the security requirement. Installation of security equipments on vessels is another
cost that needs to be considered.
! Cost of providing more detailed manifest data. The requirement for detailed
manifest data may cost more than the timeliness requirement in the 24-hour rule.
In the past, the information about product descriptions contained in the container
has been deliberately vague in order to insure that the longshoremen or others
know what high-value goods were in the containers. As more detailed data is
required, the risk of theft may increase. The cost of higher risk of theft is not
likely to be borne by a single party in the supply chain but rather split among
various parties. Like cost of time delay, this cost is difficult to quantify.
! Cost of security tax. Increased terrorist threat has imposed a “security tax”. The
new terrorism tax described by congressional economists represents the extra
short- and long-term costs of securing buildings, transportation, infrastructure
and business. Most parties in the supply chain need to carry a higher cost because
of the tax increase.
! Cost of higher insurance costs. Although security at ports has been tightened,
ports and vessels remain likely terrorist targets. Insurance premiums on
containers and vessels have increased correspondingly. Higher cost of buying
insurance adds to already increased security costs in the supply chain.
9. Conclusions
In this paper, we have identified a number of possible security-related costs that can be
incurred at ports or other parts of the shipping system. We focused on summarizing these
costs and tried to develop a checklist that parties concerned can refer to when security
costs are under consideration. Some costs are more important than others and worthy of
further research efforts. Quantifying costs is not discussed in the paper. However, we
believe that quantifying certain overriding costs will be highly valuable.
10. References
3. Development strategy and policy for small states in the context of global
change, Victor Jordan, The Fourth Annual SALISES Conference, January 2003.
10. Security/Coast Guard offers guidelines for port security, David Cruz, American
City & County, June 2002.
12. Squall brewing over the cost of tighter maritime security, Toby Shelley,
Financial Times, December 6, 2002.
13. Strong Links – Adding security and value to the supply chain, APL paper,
http://www.apllogistics.com
14. The Virtual Box – Electronic business tools for container shipping, Digital Ship
October 2002 page 30-33.
15. U.S. Port container security and tracking, Brian Creighton, David Poppe, Heidi
Tsun, Ben Van’t Hul, 2002. http://www.bus.iastate.edu
16. U.S. Tests cargo security system, RFID Journal News, December 18, 2002.
http://www.rfidjournal.com/article/view/167/1/1/
17. Where have we been? Where are we going? How are we going to get there?
Bethann Rooney, Ports and Harbors, September 2002.
18. http://www.aapa-ports.org
19. http://www.gtnexus.com/pdf/arc_security_sept2002.pdf
20. http://www.hph.com.hk/news/news_room/hph-2dec02.htm
21. http://www.imo.org
22. http://www.savi.com