This page contains a Flash digital edition of a book.
SECURITY\\\


The biggest risk to goods in the supply chain is complacency, warns Thorsten Neumann, Europe,


Middle East and


Africa region chairman of the Transported Asset Protection Association (TAPA). Average losses in the supply chain having increased year on year since 2010, and what the criminals are actually stealing is becoming more varied, he says. “Ten years ago it was mobile


phones and computer chips, but among the top cargo crimes in 2014 was a trailer-load of Parmesan cheese, worth about €1 million,” Neumann explains. “It’s anything that criminals can turn into money.”


Until recently, selling a large


quantity of a niche product was difficult, and goods for which there was no market tended not to be stolen, but now food, pharmaceuticals, clothing and even metals are all vulnerable. Online marketplaces have made disposal of goods relatively easy and risk-free, and goods stolen in Europe can be sold on the other side of the world. So just because the goods


a company deals in are ‘low value’ doesn’t mean that they cannot be stolen, Neumann says. Often, the real cost of a theft


is not just the replacement cost of the goods themselves – if a


consignment fails to arrive and shelves go empty of X-boxes or the latest iPads as a result, the loss of customer goodwill and company reputation can be incalculable. Supply chain crime is


becoming more the province of sophisticated, professional criminals rather than petty pilferers. There is also evidence to suggest that crimes are becoming more brutal, with weapons and violence more likely to be used. At the same time, criminals are making increased use of insider information; around 70% of all supply chain crimes, Neumann estimates.


Criminals also tend to target


Issue 2 2015 - Freight Business Journal


41 Chips or cheese – it’s all bread to the criminals


different parts of the supply chain. Sometimes trucks on the road are the most vulnerable; at other time it’s warehouses, or parking areas. One positive development is the network developed by the European Secure Parking Organisation. While there are still gaps in coverage, the network has grown to the extent that, with careful planning of road movements, there is now really no excuse for using an insecure parking area. This may all sound like doom


and gloom, but there are plenty of things companies can do to protect themselves, Neumann continues. One of the most steps a firm can make is to


sign up for TAPA membership. Statistics show that companies that become TAPA-registered reduce their losses on average by 40% in the first year alone, and their insurance premiums also decrease as a result of those reduced losses. TAPA is taking steps to sign up


more companies and terminals, having seen a 10% increase in the number of registered sites in the EMEA region to 635 in the last year and with the number of registered firms now standing at around 300. (EMEA is the organisation’s biggest region.) A working group is working on the detail of a self-certification scheme


to help companies achieve the entry-level ‘C’ level More blackboard than black ops Most of us in fondly imagine that


Civvy Street military


logistics is controlled by laser beams from space, and money is no object. But Giles Peeters, defence director at situational command and control provider, Track24, says that the reality is much more whiteboard and marker pen. The ‘Loggies’ are to some extent the poor relation within most militaries and their importance is often undervalued, says Peeters, who spent 19 years in the forces. Most


militaries operate to


very tight budgets these days and there is no money available for elaborate track and trace systems. Moreover, security concerns and tightly controlled procurement policies can make it impossible for military logicians to get their hands on the sorts of advanced supply chain management systems that commercial operators are beginning to take for granted these days. Often, the limited number


of companies allowed to deal direct with the military add large mark-ups to commercial systems, putting them beyond their means - contrary to popular opinion, it is not a case of ‘money is no object’ in most countries, at least as far as the Loggies are concerned. With the primitive tracking


systems currently available, stuff does go missing, or get stolen, in theatres of


conflict - often parts that are very critical to the success of operations, for example helicopter parts in operational war theatres. Track24 has seen an


opportunity to bring military logistics into the 21st Century, bringing commercial standards of track and trace and automation – but maintaining high levels of security. Nothing horrifies the military mind more than the thought that information on the whereabouts of supplies and kit could be somewhere on the Cloud. There are three main


technologies used for tracking purposes, and each has its advantages and limitations, Peeters continues. Cellular (GPRS/GSM) has the advantage that antennae can be small and, because the signals can pass through matter, can be fitted inside the container. But it is also very easy to jam - “you can buy a $50 device to do that in a local market” - and that is something the military have to think about. Mobile phone- based systems may be cheap, at first sight, but what is the cost of losing a helicopter engine? Yes, the data can be


encrypted, but it does still give away location and direction of travel information to the ill- intentioned. How do you think the Somali pirates were able to find and chase down merchant


ships so easily and sometimes hundreds of miles from the shore line?


RFID (radio-frequency


identification) is, in many ways, “a fantastic technology” says Peeters, particularly as it can be encrypted and is low cost, but it does have a very limited range. Satellites are used a lot by


the military, and commercial organisations too. Advantages are that they can communicate anywhere in the world, the data is encrypted and security is better because, unlike mobile phones, devices are not continually ‘polling’ (sending a signal to the network so that it knows where it is, which is how all such devices work). It is possible to jam satellite devices, but it is much harder than with mobile phones because


devices that transmit to satellites send their signals skyward, making them far less easy to intercept and jam. Satellite systems are


often held up as being expensive compared with GSM/GPRS


but, echoing


other contributors to this report, Peeters says this is not necessarily the case. Depending on the number of containers and transmitters involved, transmission costs could be around $20 a month, or even lower. The


satellite’s main


disadvantage is that it needs ‘line of sight’ to the antenna. In order words, if the antenna is behind a solid object – such as another container - the satellite signal will not get through to it. It also has higher power needs than a mobile phone based device; this isn’t an insuperable problem, though “it means that


devices are bigger than we would like” explains Peeters. Another disadvantage is that,


because of the requirement for line of sight, traditionally the device has to sit on top of the container, where it can easily be levered off – and it highlights that the container contains a valuable or ‘interesting’ cargo. That said, the latest low orbit


satellites used by the Iridium have greatly reduced the ‘line of sight’ problem. So each system has its


strengths and weaknesses – but what if they can be combined together to provide a complete turnkey monitoring solution for military cargo on the move? For example, a container underneath a stack could communicate through RFID with one on top, so if anyone interferes with its doors, an alert can still be sent by satellite. Containers could also communicate with a satellite transmitter on board the ship.


Antennae could be made much smaller and more discrete. This is what Track24 is


working on the moment, and it hopes to make a further announcement in the first quarter of 2015. An important aspect of Track24 is that, rather than the software as a service approach commonly taken, it can install its systems behind military firewalls – something that could be of interest for commercial firms – for whom Track24 also works - with sensitive goods such as pharmaceuticals or cash in transit. The Cloud is all very well,


says Peeters, but to a military person, the idea of having critical data sitting on an unknown server is a security risk. Track24’s approach, in contrast, is to establish a closed network behind the firewall and, as far as the data is concerned, walk away and let the military get on with it.


Containing the bomb problem


The EU-funded Fly-Bag project is developing a system that could bomb-proof cargo or passenger baggage containers on board planes. While most emphasis is, quite rightly, on preventing such devices getting on board aircraſt in the first place, scanning systems cannot absolutely guarantee that


nothing, ever will get smuggled on board – or that all undeclared Lithium batteries will always be detected prior to loading. The project is developing


new materials for cargo holds or containers that could,


to some


extent, contain any explosion or outbreak of fire. The project has


developed a textile-based freight and luggage container for narrow- body aircraſt holds which is now being tested. It uses a multilayer textile ‘blanket’ that can be used to line a ULDS, together with strengthened


flooring, closed


by a high-resistance, specially- designed zip.


of certification. “A lot of sites probably already to reach ‘C’ level,” Neumann explains. “So we’ve started a programme to make things easier for people who want to achieve this.” TAPA has published


new TSR and FSR security standards. It has also signed important partnerships with the EU’s TISPOL road policing programme, with the Europol European law enforcement agency


and the German


Ministry of Transport. TAPA is also putting a lot of


emphasis on training, alongside new technologies like RFID or GPS. At the end of the day, systems and IT are only as good as the people using them.


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48