27:
872:
239:
and risk management industries; after the attacks more structured approaches were implemented. Early efforts were dominated by concerns over the use of maritime shipping to deliver weapons of mass destruction. From 2001 to 2006 efforts focused on the physical security of goods and shipments but from
331:
The Global
Container Control Programme (CCP), a joint United Nations Office on Drugs and Crime (UNODC)/World Customs Organization (WCO) initiative working to establish effective container controls at select ports across the globe with the aim to prevent trafficking of drugs, chemicals and other
193:
in the United States, "adversaries exploit supply chain vulnerabilities to steal
America’s intellectual property, corrupt our software, surveil our critical infrastructure, and carry out other malicious activities. They infiltrate trusted suppliers and vendors to target equipment, systems, and
218:
can take place anywhere in the logistics chain: from the shipper, carrier, or consignee. It may be packages, pallet loads, and full truck loads. It can involve individuals with an opportunity to take cargo or can involve organized crime. Security systems involving surveillance systems,
158:, and theft. A healthy and robust supply chain absent from security threats requires safeguarding against disturbances at all levels such as facilities, information flow, transportation of goods, and so on. A secure supply chain is critical for organizational performance.
387:, offers public and private enterprise an international high-level management standard that enables organisations to utilize a globally consistent management approach to applying supply-chain security initiatives. ISO/IEC 20243 is The
825:
461:
Supply chain cyber security is a subset of supply chain security which focuses on the digital aspects of the traditional supply chain as well as the supply chain for electronic and digital goods.
406:
in
November 2010, highlighting the need for their international "partnership to bring greater prosperity and security" for citizens on both sides of the Atlantic, provided a foundation for the
302:
Operation Safe
Commerce (OSC), a U.S. federal program designed to test and evaluate practices, policies and procedures aimed at improving the security of international containerized shipping.
894:
744:
Communication from the
Commission to the European Parliament, the Council and the European Economic and Social Committee on Customs Risk Management and Security of the Supply Chain
309:(WCO) adopted the Framework of Standards to Secure and Facilitate Global Trade in 2005, which consists of supply-chain security standards for Customs administrations including
275:
Customs authorities shall be primarily responsible for the supervision of the
Community's international trade, thereby contributing to ... overall supply chain security.
432:
399:
365:
undertakes an annual survey of supply chain risk exposure, identifying and updating the main supply chain security concerns. In its 2020 report,
190:
377:
410:
to build on, announcing at its
December 2010 meeting an agreement "to deepen transatlantic cooperation in supply chain security policies".
495:
296:
526:
388:
994:
91:
714:
343:
program designed to collect financial information about shipments, with the objective of determining the safety of cargo shipments.
63:
974:
659:
808:
581:
Agreement between Canada and the
European Union on Customs Cooperation with Respect to Matters Related to Supply-Chain Security
44:
245:
235:
were the defining event for modern supply chain security. Before 9/11 supply chain security was primarily the concern of the
70:
851:
989:
686:
436:
934:
446:
entered into an
Agreement on Customs Cooperation with Respect to Matters Related to Supply-Chain Security in March 2013.
783:
332:
contraband and to facilitate trade by strengthening cooperation between the customs, trade and enforcement communities.
321:
77:
920:
490:
110:
1009:
949:
838:
59:
594:
325:
299:(C-TPAT), a voluntary compliance program for companies to improve the security of their corporate supply chains.
595:"The impact of information security initiatives on supply chain robustness and performance: an empirical study"
407:
48:
480:
317:
743:
470:
310:
757:
632:
580:
456:
260:
935:
ICAO-WCO: Moving Air Cargo
Globally - Air Cargo and Mail Secure Supply Chain and Facilitation Guidelines
380:(ISO) has released a series of standards for the establishment and management of supply-chain security.
373:
and medical supplies and increasing warehouse and facility theft were identified as particular concerns.
960:
Supply chain security: adding to a complex operational and institutional environment, A Grainger (2007)
485:
418:
306:
979:
902:
898:
882:
421:
4 an opportunity to include necessary evaluations that assure supply chain security for IT products
84:
547:
147:
37:
890:
264:
500:
336:
146:
and to "facilitate legitimate trade". Their objective is to combine traditional practices of
267:(2008) includes reference to supply chain security in its outline of the mission of each EU
964:
443:
346:
Pilot initiatives by companies in the private sector to track and monitor the integrity of
232:
984:
174:
Ensuring the security of cargo while in transit, for example through the use of locks and
8:
975:
Chain of Perils: Hardening the Global Supply Chain and Strengthening America's Resilience
959:
939:
557:
236:
1014:
790:. Federal Register (Daily Journal of the United States Government). November 20, 2002
614:
532:
291:
There are a number of supply-chain security initiatives around the world, including:
268:
175:
606:
505:
347:
240:
2012 on focus shifted to cybersecurity as the awareness of cyber threats grew. The
990:
Global Supply Chain Security, James Giermanski, Scarecrow Press, 2012 - 218 Pages
552:
475:
414:
370:
220:
366:
241:
223:, and broader corporate security are needed to reduce the theft of material.
16:
Security of supply chain from trojans, tampering, privacy, theft and terrorism
1003:
618:
610:
542:
537:
381:
253:
209:
194:
information used every day by the government, businesses, and individuals."
826:
Cargo theft and labor exploitation incidents increase risk to supply chains
510:
197:
131:
746:, COM(2012) 793 final, published 8 January 2013, accessed 27 December 2023
954:
340:
135:
520:
515:
362:
280:
151:
139:
758:"Biden signs executive order demanding supply chain security review"
431:
Efforts for countries around the world to implement and enforce the
200:
often lack the resources to properly address supply chain security.
26:
901:
external links, and converting useful links where appropriate into
435:(ISPS Code), an agreement of 148 countries that are members of the
283:
made supply chain security one of his administration's priorities.
127:
385:
Specification for Security Management Systems for the Supply Chain
995:
Implementing a Robust Supply Chain Security & Risk Management
944:
256:, as a significant factor in relation to supply chain security.
403:
171:
Advance notification of the contents to the destination country
168:
Screening and validating of the contents of cargo being shipped
155:
395:) that addresses supply-chain security and secure engineering.
965:
World Customs Journal: special issue on supply chain security
249:
143:
126:(also "supply-chain security") activities aim to enhance the
351:
355:
150:
with the security requirements driven by threats such as
715:"How supply chain security has evolved over two decades"
969:
841:, published 20 November 2010, accessed 23 December 2020
393:
Mitigating Maliciously Tainted and Counterfeit Products
328:(DHS) focused on screening containers at foreign ports.
828:, published 21 October 2020, accessed 1 January 2021
815:, published 8 September 2004, accessed 28 July 2022
350:moving around the world using technologies such as
51:. Unsourced material may be challenged and removed.
433:International Ship and Port Facility Security Code
161:Typical supply-chain security activities include:
945:MIT Project on Supply Chain Response to Terrorism
885:may not follow Knowledge's policies or guidelines
691:Trends & Issues in Crime and Criminal Justice
639:. Office of the Director of National Intelligence
165:Credentialing of participants in the supply chain
1001:
660:"The Daily Challenges of Supply Chain Security"
191:Office of the Director of National Intelligence
980:ISO 28002 supply chain security and resilience
583:, signed 4 March 2013, accessed 18 August 2021
450:
378:International Organization for Standardization
955:Stanford Global Supply Chain Management Forum
854:, 17 December 2010, accessed 23 December 2020
708:
706:
687:"The Detection and Prevention of Cargo Theft"
950:Supply Chain Risk Management Maturity Model
496:Customs Trade Partnership against Terrorism
425:
297:Customs Trade Partnership against Terrorism
703:
575:
573:
921:Learn how and when to remove this message
527:Open Trusted Technology Provider Standard
389:Open Trusted Technology Provider Standard
111:Learn how and when to remove this message
850:U.S.-EU Transatlantic Economic Council,
738:
736:
570:
1002:
809:Operation Safe Commerce passes Round 1
755:
684:
733:
246:2010 transatlantic aircraft bomb plot
865:
592:
49:adding citations to reliable sources
20:
599:Information & Computer Security
437:International Maritime Organization
248:involving packages being sent from
13:
712:
322:U.S. Customs and Border Protection
286:
14:
1026:
970:Port and Maritime Security Online
861:
756:Starks, Tim (February 24, 2021).
657:
593:P.N., Sindhuja (August 3, 2021).
491:Counterfeit electronic components
870:
203:
25:
844:
837:Council of the European Union,
831:
818:
802:
326:Department of Homeland Security
36:needs additional citations for
985:CSA Cargo Security Information
788:Office of the Federal Register
776:
749:
678:
651:
633:"Supply Chain Risk Management"
625:
586:
408:Transatlantic Economic Council
279:In February 2021 US President
1:
839:EU-US Summit: Joint statement
719:searchsecurity.techtarget.com
563:
481:Container Security Initiative
318:Container Security Initiative
471:Authorized economic operator
311:authorized economic operator
7:
464:
457:Supply chain cyber security
451:Supply chain cyber security
442:The European Union and the
184:
10:
1031:
486:Counterfeit consumer goods
454:
307:World Customs Organization
226:
207:
784:"Operation Safe Commerce"
233:terrorist attacks of 9/11
180:Inspecting cargo on entry
940:IMO FAQ on the ISPS Code
664:www.securitymagazine.com
611:10.1108/ICS-07-2020-0128
426:International agreements
320:(CSI), a program led by
198:Local police departments
142:systems for the world's
1010:Supply chain management
548:Supply-chain management
148:supply-chain management
60:"Supply chain security"
579:Government of Canada,
277:
265:Community Customs Code
742:European Commission,
501:Global Trade Exchange
337:Global Trade Exchange
273:
259:The European Union's
124:Supply chain security
891:improve this article
444:Government of Canada
138:, the transport and
45:improve this article
903:footnote references
666:. Security Magazine
762:www.cyberscoop.com
685:Mayhew, C (2001),
558:Trade facilitation
176:tamper-proof seals
931:
930:
923:
533:Package pilferage
369:, cargo theft of
269:customs authority
244:also treated the
189:According to the
121:
120:
113:
95:
1022:
926:
919:
915:
912:
906:
874:
873:
866:
855:
848:
842:
835:
829:
822:
816:
813:Inside Logistics
806:
800:
799:
797:
795:
780:
774:
773:
771:
769:
753:
747:
740:
731:
730:
728:
726:
710:
701:
700:
699:
697:
682:
676:
675:
673:
671:
655:
649:
648:
646:
644:
629:
623:
622:
590:
584:
577:
506:James Giermanski
348:cargo containers
221:tracking systems
116:
109:
105:
102:
96:
94:
53:
29:
21:
1030:
1029:
1025:
1024:
1023:
1021:
1020:
1019:
1000:
999:
927:
916:
910:
907:
888:
879:This article's
875:
871:
864:
859:
858:
852:Joint Statement
849:
845:
836:
832:
823:
819:
807:
803:
793:
791:
782:
781:
777:
767:
765:
754:
750:
741:
734:
724:
722:
713:Hayden, Ernie.
711:
704:
695:
693:
683:
679:
669:
667:
656:
652:
642:
640:
631:
630:
626:
591:
587:
578:
571:
566:
553:Track and trace
529:(ISO/IEC 20243)
476:Hardware Trojan
467:
459:
453:
428:
415:Common Criteria
371:pharmaceuticals
313:(AEO) programs.
289:
287:Key initiatives
229:
212:
206:
187:
117:
106:
100:
97:
54:
52:
42:
30:
17:
12:
11:
5:
1028:
1018:
1017:
1012:
998:
997:
992:
987:
982:
977:
972:
967:
962:
957:
952:
947:
942:
937:
929:
928:
883:external links
878:
876:
869:
863:
862:External links
860:
857:
856:
843:
830:
817:
801:
775:
748:
732:
702:
677:
650:
624:
605:(2): 365–391.
585:
568:
567:
565:
562:
561:
560:
555:
550:
545:
540:
535:
530:
523:
518:
513:
508:
503:
498:
493:
488:
483:
478:
473:
466:
463:
455:Main article:
452:
449:
448:
447:
440:
427:
424:
423:
422:
411:
396:
374:
367:drug smuggling
359:
344:
333:
329:
314:
303:
300:
288:
285:
242:European Union
228:
225:
208:Main article:
205:
202:
186:
183:
182:
181:
178:
172:
169:
166:
119:
118:
33:
31:
24:
15:
9:
6:
4:
3:
2:
1027:
1016:
1013:
1011:
1008:
1007:
1005:
996:
993:
991:
988:
986:
983:
981:
978:
976:
973:
971:
968:
966:
963:
961:
958:
956:
953:
951:
948:
946:
943:
941:
938:
936:
933:
932:
925:
922:
914:
904:
900:
899:inappropriate
896:
892:
886:
884:
877:
868:
867:
853:
847:
840:
834:
827:
821:
814:
810:
805:
789:
785:
779:
763:
759:
752:
745:
739:
737:
721:. Tech Target
720:
716:
709:
707:
692:
688:
681:
665:
661:
658:Zalud, Bill.
654:
638:
634:
628:
620:
616:
612:
608:
604:
600:
596:
589:
582:
576:
574:
569:
559:
556:
554:
551:
549:
546:
544:
543:Security risk
541:
539:
538:Package theft
536:
534:
531:
528:
524:
522:
519:
517:
514:
512:
509:
507:
504:
502:
499:
497:
494:
492:
489:
487:
484:
482:
479:
477:
474:
472:
469:
468:
462:
458:
445:
441:
438:
434:
430:
429:
420:
416:
412:
409:
405:
401:
397:
394:
390:
386:
383:
382:ISO/PAS 28000
379:
375:
372:
368:
364:
360:
357:
353:
349:
345:
342:
338:
334:
330:
327:
323:
319:
315:
312:
308:
304:
301:
298:
294:
293:
292:
284:
282:
276:
272:
270:
266:
262:
257:
255:
254:United States
251:
247:
243:
238:
234:
224:
222:
217:
211:
210:Package theft
204:Transit theft
201:
199:
195:
192:
179:
177:
173:
170:
167:
164:
163:
162:
159:
157:
153:
149:
145:
141:
137:
133:
129:
125:
115:
112:
104:
101:February 2014
93:
90:
86:
83:
79:
76:
72:
69:
65:
62: –
61:
57:
56:Find sources:
50:
46:
40:
39:
34:This article
32:
28:
23:
22:
19:
917:
908:
893:by removing
880:
846:
833:
820:
812:
804:
792:. Retrieved
787:
778:
766:. Retrieved
764:. CyberScoop
761:
751:
723:. Retrieved
718:
694:, retrieved
690:
680:
668:. Retrieved
663:
653:
641:. Retrieved
636:
627:
602:
598:
588:
511:Denise Krepp
460:
417:offers with
400:EU-US Summit
392:
384:
290:
278:
274:
258:
230:
215:
213:
196:
188:
160:
132:supply chain
123:
122:
107:
98:
88:
81:
74:
67:
55:
43:Please help
38:verification
35:
18:
824:BSI Group,
696:January 25,
637:www.dni.gov
341:data-mining
136:value chain
1004:Categories
911:March 2021
564:References
391:(O-TTPS) (
261:regulation
214:Theft and
71:newspapers
895:excessive
619:2056-4961
521:ISO 31000
516:ISO 28000
363:BSI Group
281:Joe Biden
237:insurance
216:shrinkage
152:terrorism
140:logistics
1015:Security
794:July 17,
768:March 7,
725:March 7,
670:March 7,
643:March 7,
465:See also
402:held in
339:, a DHS
185:Overview
128:security
889:Please
881:use of
324:in the
263:on the
252:to the
227:History
130:of the
85:scholar
617:
439:(IMO).
404:Lisbon
156:piracy
87:
80:
73:
66:
58:
250:Yemen
144:cargo
92:JSTOR
78:books
796:2016
770:2021
727:2021
698:2023
672:2021
645:2021
615:ISSN
525:The
413:The
398:The
376:The
361:The
354:and
352:RFID
335:The
316:The
305:The
295:The
231:The
64:news
897:or
607:doi
419:EAL
356:GPS
134:or
47:by
1006::
811:,
786:.
760:.
735:^
717:.
705:^
689:,
662:.
635:.
613:.
603:29
601:.
597:.
572:^
154:,
924:)
918:(
913:)
909:(
905:.
887:.
798:.
772:.
729:.
674:.
647:.
621:.
609::
358:.
271::
114:)
108:(
103:)
99:(
89:·
82:·
75:·
68:·
41:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.