Tag Archives: Trade

A National Strategy for Global Supply Chain Security

The following article is special to our International Maritime Shipping Week. While we often discuss the threats to maritime shipping, this week looks at dangers arising from such global trade, and possible mitigations.

At what cost certainty?
                                   Certainty at what cost?

Last year, the Obama Administration released its first-ever National Strategy for Global Supply Chain Security. As stated, the main goals of the strategy are to promote the efficient and secure movement of goods and foster a resilient supply chain. Maintaining a secure and resilient supply chain is certainly critical to ensuring the prosperity of the United States’ economy. However, existing legislation governing maritime cargo transit and port security directly contradicts the goals of this strategy.

In 2007, Congress mandated that 100 percent of the approximately 32,000 cargo containers entering U.S. ports each day be screened. The feasibility of this mandate has been questioned by security experts from day one.

In seeking to establish a workable alternative, Congress should consider supply chain realities in fostering a risk-based approach to maritime cargo security.

Given the extensive economic importance of the maritime supply chain, the vulnerability of maritime cargo to terrorist and other malicious attacks has long been a concern. With this concern heightened after 9/11, Congress and the Administration moved to create a risk-based approach to strengthen maritime security centered on analyzing cargo attributes, such as contents and origin of the cargo container, to single out high-risk cargo for further inspection.

By 2006, however, Congress turned sharply away from the risk-based approach with the passage of the Security and Accountability for Every Port Act, which called for testing the feasibility of scanning 100 percent of U.S.-bound cargo, a requirement that was fulfilled though the creation of the Secure Freight Initiative pilot program.

While the program showed that “scanning U.S.-bound maritime containers is possible on a limited scale,” major challenges existed in expanding 100-percent scanning to all 700 international maritime ports handling U.S.-bound cargo. These findings, however, would be disregarded, and Congress moved to mandate that 100 percent of all U.S.-bound maritime cargo be scanned by July 1, 2012—prior even to the pilot program’s completion.

Proponents of the 100-percent mandate have pointed to the supposed success of mandating 100-percent screening of air cargo. Besides the fact that this screening was limited to domestic cargo—screening of U.S.-bound international cargo proved much more difficult—and that a significantly greater volume of cargo transits through the maritime supply chain, another critical difference is that the air cargo security mandate called for the 100-percent screening of all cargo, whereas the maritime cargo mandate calls for 100 percent scanning.

While screening calls for cargo to be assessed for risk on the basis of contents, origin, and other attributes, scanning means that each of the approximately 10.7 million maritime cargo security containers entering U.S. ports each year must be physically scanned. The growth of maritime cargo containerization in recent decades means that typical maritime cargo containers often measure some 40 feet in length. One key issue regarding screening maritime cargo is, therefore, one of scale. While the basic technology exists to effectively screen cargo containers, the expanded technology necessary to perform this function on the larger forms of containerized cargo largely does not.

Cost and infrastructure are also important factors. A single x-ray scanner, the most common technology used for cargo screening, can have a price tag of $4.5 million, plus an estimated annual operating cost of $200,000, not to mention the roughly $600,000 per year for the personnel required to run the equipment and examine the results. Likewise, the mere placement of scanners can also cause logistical problems, as many ports were not built with natural bottlenecks through which all cargo passes. With today’s economy relying heavily on the timely and efficient movement of goods, such delays could amount to around $500 billion in total profit loss. And once scanning technology is installed, it may encounter multiple problems, such as incompatibility with previous technologies, outages due to weather, and insufficient communication infrastructure to transmit electronic data to the U.S. National Targeting Center-Cargo, where it is assessed.

A large part of the post-9/11 anxiety regarding maritime cargo security has centered on the “nuke in a suitcase” scenario, an extremely low probability event. The vast majority of cargo traveling through the maritime supply chain consists of legitimate goods. The 100-percent maritime screening mandate, however, fails to recognize this reality and instead treats every piece of cargo as a genuine threat.

Congress should rethink the 100-percent cargo security mandate and instead return to a risk-based approach to cargo security, centered on analyzing manifests and other data, to single-out only high-risk cargo for further inspection. Ensuring the security and prosperity of the maritime supply chain is simply too important for Congress not to get this right.

Emil Maine is a National Security Research Assistant at the Heritage Foundation, where he conducts independent research on U.S. defense posture. The views and opinions expressed in this article are his own.

Gooey Kablooey: How Agro-Terrorists Will Destroy You By Destroying Your Food

 The following article is special to our International Maritime Shipping Week. While we often discuss the threats to maritime shipping, this week looks at dangers arising from such global trade, and possible mitigations.

It's the one to port
                           Cargo ships in San Francisco harbor. Is one of them out to ruin your dinner?

Sometime in 1843 or 1844, a ship most likely from Baltimore, New York, or Philadelphia landed in a European port. Among the seed potatoes in its hold was the North American fungus Phytophthora infestans. The resulting potato blight swept across Europe, and when it combined with the abominable agricultural policy in Ireland, the outcome was nearly a million dead and a 25 percent reduction in population if including emigration. 

Last year, around 25 million food shipments entered the United States, primarily by sea, but only roughly two percent of them were inspected by Food and Drug Administration agents, and nearly all of these inspections occurred on U.S. soil (the largest share at the massive port of Los Angeles). Meanwhile a 2012 report by the Centers for Disease Control shows that from 2005 – 2010 at least “39 outbreaks and 2,348 illnesses were linked to imported food from 15 countries”, and that “nearly half (17) occurred in 2009 and 2010.”

The fact is, importing foods to the United States is not only big business, it’s risky business. Food imports almost doubled from 1998 to 2007, with much of the growth in fruit, vegetables, and seafood; and agricultural inspections have struggled to keep up. While the Food Safety Modernization Act passed by Congress in 2010 allowed for the implementation of the computerized Predictive Risk-based Evaluation for Dynamic Import Compliance Targeting (PREDICT) system, a human inspection is still required to render a verdict. 

But there’s more. The introduction of blight or disease into the food supply of the United States would be a major long-term success for an adversary. That’s right, agro-terrorism is real and you should be worried about it. A subset of bioterrorism, agro-terrorism is the introduction of an animal or plant disease with the purpose of causing economic, health, and social damage. The seemingly low shock value of the topic means less public attention, but it is real enough that former Secretary of Health and Human Services Tommy Thompson gave a warning speech on its dangers—and was eviscerated for calling attention to the risk for adversaries. 

The problem is that the United States’ food supply really is vulnerable to agro-terrorism. In terms of targets, the agricultural sector is an easy mark due to modern livestock-raising methods; their feed preparation and distribution process; the geographically dispersed location of farms and ranches; and the relative safety of handling animal and plant pathogens by a human.

The low inspection-rate of imports coming by sea, and relatively smaller dollar amounts going to security for those imports, provide perhaps the safest vector for the undetected transmission of a pathogen. An adversary could rely on blind luck, transporting tainted food and hoping that it is added to a distribution system to achieve limited results. But an organized network could be more deadly by using existing sea routes for transport of contraband to smuggle pathogens to a recipient within the United States for more targeted distribution. Just as trafficked drugs or persons slip past the low inspection capacity of Customs and Border Patrol, pathogens infecting food could land in the hands of a determined adversary. 

What would the effects be of such a pathogen? Economically, the calculation is complicated. The 2001 foot-and-mouth outbreak in the United Kingdom, probably caused by the illegal import of tainted meat that was subsequently fed to pigs, is estimated to have cost that government $13 billion, including second-order impacts to businesses and restaurants dependent on the sale of livestock. But this figure does not include the cost of lost exports from the meat embargo immediately imposed by Britain’s trading partners.

In the United States, where the CIA World Factbook estimates the agriculture sector makes up $172 billion of the nation’s 2012 GDP compared to the United Kingdom’s $17 billion, the second and third order effects would be even greater. A 2002 limited study by National Defense University estimated that an outbreak of foot and mouth disease restricted to only ten ranches in the United States would cost up to $2 billion in cascading effects. A widespread outbreak would be orders of magnitude greater.

The health effects for citizens are more obvious, if only because of the legend of the Irish Potato Famine in the mythos of America’s development. But as with all forms of terrorism, a small death toll is all that’s needed to cause widespread panic. A 2005 outbreak of E. coli related to bagged spinach killed but three and sickened about 250, yet spread fear (and excuses for subbing fries for salad) across the country. If such as scenario was followed by a public statement from the responsible party, with promises of additional attacks, the response could collapse confidence in the entire food system, resulting in wide-spread loss of jobs and cascading social unrest. 

So what’s an American to do? The short answer is “not much.” The sheer volume of transported goods, the importance of the human element to detect agriculture disease, and the necessarily quick transfer of perishable items make stopping agro-terrorism before it occurs a near impossibility. Like many other forms of asymmetric attack, a determined adversary will succeed.

One thing that can be done is preparation to mitigate the effects of such an attack. The long-delayed National Bio and Agro-defense Facility (NBAF) took another lurching step forward in the FY14 Homeland Security Appropriations Bill in both the House and Senate. Designed to be one of the most sophisticated laboratories in the world, it would study the most dangerous pathogens in hopes of finding antibiotics or resistants to limit the damage an outbreak could cause.

Multiple Homeland Security Presidential Directives also require Federal and local coordination preparations and plans to respond to an agro-terror attack. In most cases, mitigating the effects of such an attack will require identifying the pathogen, containing it, and then taking steps to destroy it before it can escape from the containment zone. These steps can only be taken in time with prior coordination and practice.

Finally, we need to do what the Irish couldn’t—be able to quickly tell which ship, at which port, and from which point of departure carried the blight. While impossible to inspect every cargo container, with a concerted effort the United States can establish a system that provides more efficient and effective tracking of the containers themselves over the course of their travels, from loading to unloading. Shedding more light on their journey creates a less-hospitable route for potential practitioners of malfeasance.

Sherman Patrick is a Senate staffer working on national security issues. The views expressed in this article are his alone.

Smashing Maritime Ratlines – A Team Sport

The following article is special to our International Maritime Shipping Week. While we often discuss the threats to maritime shipping, this week looks at dangers arising from such global trade, and possible mitigations.

 

A boarding near Cape Verde

U.S. Navy publications often describe the sea as a global commons; the idea being that the oceans represent a resource to be shared for the benefit of all.  The reality, however, is that although the world’s oceans facilitate billions of dollars of legitimate commerce and trade every day, criminal networks, insurgent groups, and transnational terrorist organizations exploit sea lanes for more nefarious ends. The same ports and ocean routes used by sailors for thousands of years also provide today’s afloat highways, over which both legal and illicit cargoes move. These routes – or “ratlines”, when used for illicit traffic – exist amid a complex international patchwork of intertwined economies, diverse cultures, and varying legal authorities and levels of governance.

Disrupting these ratlines requires teamwork and a networked approach.  Accordingly, a number of U.S. government agencies have responsibility of some sort or another for stemming the flow of illegal shipments at sea. Obvious players are Department of Homeland Security organizations, including the U.S. Coast Guard, Immigrations and Customs Enforcement, U.S. Navy, and the U.S. Drug Enforcement Agency. The Human Smuggling and Trafficking Center is a relatively new agency charged by Congress to work against smuggling, illegal trafficking of people against their will, and terrorist travel. Many other agencies play an important role in supporting interdiction efforts with intelligence and law enforcement expertise.
 
Many readers are familiar with the efforts of the Joint Interagency Task Force South, at Naval Air Station Key West, Fla. This long-standing organization consists of several U.S. agencies working with numerous partner nations to counter narcotics trafficking moving through the Caribbean and Eastern Pacific into North America. In addition to this major drug transit zone, lesser-known maritime facilitation routes throughout the world move people, money, and materials illicitly for both financial profit and malign intent.

One example is Islamic foreign fighters who leave their home country and travel over sea, land, and air routes to train and take up arms in conflict zones. The foreign fighter pipeline has supported numerous jihadi battlefields, including Afghanistan, Iraq, Pakistan, Chechnya, Bosnia, Kashmir, Somalia, Yemen, Libya, and Syria. The relatively short ocean crossing connecting Yemen and Somalia, and their long coastlines, has resulted in significant foreign fighter flow between two countries, further destabilizing the region. Estimates of the number of foreigners who traveled in the late 2000s to train and fight with Somalia’s Al Shabaab militant Islamist group range from 200 to more than 1,000. Several of these foreign fighters were westerners from the United States and United Kingdom, including the first known U.S. suicide bomber. The problem garnered significant attention, such that the African Union’s commissioner for peace and security pressed the U.N. Security Council to authorize a naval blockade in order to prevent the entry of foreign fighters into Somalia. 

pic_03A more-obscure maritime ratline involves Afghani hashish and heroin smuggled from Pakistan’s Makran Coast to the Gulf States and East Africa. These smuggling routes reflect a nexus between criminal drug-trafficking and the funding of ongoing conflict and corruption in Afghanistan. In 2009, a U.S. Navy cruiser patrolling in the Gulf of Aden seized a skiff carrying 4 tons of hashish with a street value of $28 million. In all, international naval forces operating in the Indian Ocean seized 53 tons of drugs along the “hashish highway” in 2008 and more than 22 tons during 2009. This success notwithstanding, a lack of maritime patrol and reconnaissance assets combined with lax customs laws, and competing priorities of the various countries involved make narcotics interdiction along these sea routes a challenging proposition.

A different facet of illicit maritime networks is the transport of weapons and bomb-making materials into war zones. This usually involves a combination of legitimate businesses from source countries where electronics or other “dual-use” improvised explosive device (IED) components are produced and witting smugglers, who ship the goods sometimes hidden in legitimate cargoes.

In an operation a few years back (in which this author was personally involved), a non-DOD intelligence tipper on possible maritime facilitation of IED components was passed to a U.S. military special operations task force, which pushed the information to conventional naval forces. The Navy teams interdicted the vessel of interest, boarded it, and conducted an exhaustive search. Though they did not find the incriminating cargo, irregularities in the cargo manifest warranted further investigation. The ship was allowed to proceed to the next port of call where the host nation’s authorities, assisted by U.S. officials, conducted additional inspections. Through these searches the dual-use material was found and host nation authorities seized the cargo, with disruptive effects on the IED network. Moreover, because the effort required coordination between at least five U.S. government agencies, multiple DOD commands, and several countries, valuable lessons were learned that will pave the way for success in future counter-maritime facilitation actions. 

Above all, countering illicit maritime networks requires open and flat communications at multiple levels – both interagency and international. Traditional command-and-control structures that are comfortable to most military operators are not appropriate for an interdiction effort involving multiple agencies and countries. Rather, early and frequent meetings – such as secure teleconferences – will foster an environment of collaboration and coordination.  Because maritime targets are dynamic, rapid dissemination of intelligence and intent is necessary for a successful interdiction. In the above example, only about 12 hours passed between the initial intelligence tipper and the vessel’s identification, boarding, and interdiction. In some cases, the vessel of interest must be intercepted and boarded before it passes into territorial waters. At other times, coordinating for partner nation authorities at the next port of call to inspect the cargo ashore might be more feasible. 

Africa Partnership Station 2012Differing security classifications and communication systems between agencies and countries complicate the flow of information, but these obstacles can be overcome by persistent outreach and liaison. While advances in technology have certainly helped ease information-sharing blockages, it is often viewed as a panacea. Nothing beats the information flow that can be achieved from a closely tied liaison network working towards a common end state. Along these lines, countering illicit maritime facilitation requires a careful balance between various military, agency, and partner-nation equities. Sometimes these equities are competing; in other cases they are complementary. Law enforcement agencies often require that the chain of custody for any evidence seized during a maritime interdiction be carefully preserved in order to build a legal case against an individual facilitator. These efforts are sometimes at odds with the exploitation of a seizure for intelligence purposes and the need to maintain operational security. Meanwhile, a partner nation may see broadcasting the results of a successful interdiction effort through information operations as a way to gain legitimacy in the eyes of its population. Finally, internecine struggles and political friction between various institutions often stifle coordination despite the best efforts and intentions of those involved.

The maritime facilitation networks of criminals and terrorists present serious challenges to the security interests of the United States and friendly governments. Disrupting these ratlines requires a thoughtful and integrated approach by various organizations focusing on all aspects of the interdiction problem: intelligence, legal, diplomatic, and physical.

CDR Chris Rawley serves in the special operations community. He led boarding teams during maritime interception operations against oil smugglers in the Persian Gulf and coordinated operational level maritime interdiction efforts in the Middle East and the Horn of Africa. He is the author of Unconventional Warfare 2.0: A Better Path to Regime Change in the Twenty-First Century and blogs regularly at Information Dissemination. The above opinions are his own.

For more articles in our International Maritime Shipping Week, click here.

Welcome to International Maritime Shipping Week

ContainersYou’re reading this on a screen made in Malaysia, connected to a hard-drive made in Taiwan, supported by a bevy of parts made in China. Sitting here in Bahrain, I’m eating Pistachios grown in California on a ship with British diesels with other like ships brought here on even bigger ships. We take for granted the virtue of global shipping and the ease with which international trade is now executed over the high seas.

Yet as the more nuanced critics of globalization have long pointed out, a network is not inherently good or evil, rather it merely more rapidly facilitates the intent of those that use it. The roads of the Incan Empire not only served to streamline the administration of their realm, but also hasten their destruction. While international shipping has far more check-valves than an open road, and we need not worry about Pizarro’s men pouring out in Seattle’s ports to storm the town hall, we should consider how this intricate seaborne network might cause us harm: from the vulnerabilities of relying on seaborne trade to the instability caused by illicit weapons proliferation to the use of commercial vessels as Trojan horses.

This week, we take a moment away from our Amazon, Best Buy, and Home Depot bounties to consider the defenses necessary to prevent this seaborne boon from becoming a curse. Click here to see the International Maritime Shipping Week contributor line-up.

Matt Hipple is a surface warfare officer in the U.S. Navy.  The opinions and views expressed in this post are his alone and are presented in his personal capacity.  They do not necessarily represent the views of U.S. Department of Defense or the U.S. Navy.