Advertisement

Maritime Security Measures and the Container Security Initiative (CSI)

  • Xufan ZhangEmail author
  • Michael Roe
Chapter

Abstract

This chapter begins by introducing the background to implementation of maritime security regimes. Various risk factors and the potential vulnerability posed in global supply chains are identified and discussed. With the growing concern about seaborne trade safety and security, compulsory and voluntary frameworks have been introduced at international, supranational, national and regional level. These frameworks and measures are in relation to the relevant regulatory body. This chapter provides a comprehensive description of the Container Security Initiative (CSI), including its background, regulatory body, strategic goals and elements, criteria for membership and implementation during different phases. Its controversial benefits and negativity are discussed critically, particularly focusing on the aspects of financing, operational efficiency and trade facilitation.

References

  1. Allen, N. H. (2006). The container security initiative costs, implications and relevance to developing countries. Public Administration and Development, 26(5), 439–447.CrossRefGoogle Scholar
  2. American Shipper. (2014). CSI’s Evolution. Available at http://www.americanshipper.com/main/news/csis-evolution57536.aspx?taxonomy=Security. Accessed 10 December 2016.
  3. Babione, R., Kim, C. K., Phone, E., & Sanjaya, E. (2003). Post 9/11 Security Cost Impact on Port of Seattle Import/Export Container Traffic (Working Paper GTTL 502). The University of Washington.Google Scholar
  4. Banomyong, R. (2005). The impact of port and trade security initiatives on maritime supply chain management. Maritime Policy and Management, 32(1), 3–13.CrossRefGoogle Scholar
  5. Bennett, A. C., & Chin, Y. Z. (2008). 100% Container Scanning: Security Policy Implications for Global Supply Chains (Master of Science Dissertation). MIT Press, Cambridge.Google Scholar
  6. Bichou, K. (2004). The ISPS code and the cost of port compliance: An initial logistics and supply chain framework for port security assessment and management. Maritime Economics and Logistics, 6, 322–348.CrossRefGoogle Scholar
  7. Bichou, K. (2008). Security and risk-based models in shipping and ports: Review and critical analysis. ITF, Terrorism and International Transport: Towards Risk-based Security Policy. Paris: OECD.Google Scholar
  8. Bichou, K. (2011). Assessing the impact of procedural security on container port efficiency. Maritime Economics and Logistics, 13(1), 1–28.CrossRefGoogle Scholar
  9. Bichou, K., & Evans, A. (2007). Maritime security and regulatory risk-based models: Review and critical analysis. In K. Bichou, M. G. H. Bell, & A. Evans (Eds.), Risk Management in Port Operations, Logistics and Supply Chain Security (pp. 265–280). London: Informa.Google Scholar
  10. Bichou, K., Lai, K. H., Lun, V. Y. H., & Cheng, T. C. E. (2007). A quality management framework for liner shipping companies to implement the 24-hour advance vessel manifest rule. Transportation Journal, 46(1), 5–21.Google Scholar
  11. Bosk, L. B. (2006). Port and Supply Chain Security Initiatives in the United States and Abroad (Policy Research Report, 150). Austin, TX: The University of Texas at Austin, pp. 1–192.Google Scholar
  12. Bradsher, K. (2004, December 14). Bangladesh is Surviving to Export Another Day. The New York Times.Google Scholar
  13. Bueger, C. (2014). What is maritime security? Marine Policy, 53, 159–164.CrossRefGoogle Scholar
  14. CBP. (2003). Container Security Initiative: Update. United States Department of Homeland Security 2003. Available at http://www.whitehouse.gov/homeland/. Accessed 17 October 2014.
  15. CBP. (2006). Container Security Initiative: Strategic Plan 2006–2011. Available at http://www.cbp.gov/linkhandler/cgov/trade/cargo_security/csi/csi_strategic_plan.ctt/csi_strategic_plan.pdf. Accessed 30 July 2013.
  16. CBP. (2011). Container Security Initiatives in Summary. Available at https://www.cbp.gov/sites/default/files/documents/csi_brochure_2011_3.pdf. Accessed 7 August 2016.
  17. CBP. (2014). CSI: Container Security Initiatives. Available at https://www.cbp.gov/border-security/ports-entry/cargo-security/csi/csi-brief. Accessed 27 August 2016.
  18. CBPIA. (2002). Container Security Initiative Fact Sheet. 2002, pp. 1–5.Google Scholar
  19. Ceriotto, L. (2004). Buscantecnologia china para la aduana. Available at www.clarin.com. Accessed 30 October 2014.
  20. Chan, Y. (2005). A statistical study of intrastate vs. interstate regulatory reforms. Journal of Geography, 13, 165–171. CrossRefGoogle Scholar
  21. Chang, C., & Thai, V. (2016). Do port security quality and service quality influence customer satisfaction and loyalty? Maritime Policy and Management, 43(6), 720–736.CrossRefGoogle Scholar
  22. Clark, X., Dollar, D., & Micco, D. (2004). Port Efficiency, Maritime Transport Costs and Bilateral Trade (NBER Working Paper No. 10353). Available at http://www.nber.org/papers/w10353.pdf. Accessed 4 January 2017.
  23. Coleman, N., & Levin, C. (2006). An Assessment of US Efforts to Secure the Global Supply Chain: Prepared by the Majority & Minority staffs of the Permanent Subcommittee on Investigations. Available at https://www.hsdl.org/?view&did=464168.
  24. Congressional Budget Office. (2016). Scanning and Imaging Shipping Containers Overseas: Costs and Alternatives. Available at http://www.cbo.gov/sites/default/files/114th-congress-2015-2016/reports/51478-Shipping-Containers.pdf. Accessed 10 March 2017.
  25. Dallimore, C. (2008). Securing the Supply Chain: Does the Container Security Initiative comply with WTO Law? (Dissertation). University of Münster, Münster, Germany.Google Scholar
  26. Damas, P. (2001, November). Supply chains at war. American Shipper, pp. 17–18.Google Scholar
  27. Dekker, S., & Stevens, H. (2007). Maritime security in the European Union-empirical findings on financial implications for port facilities. Maritime Policy and Management, 34(5), 458–499.CrossRefGoogle Scholar
  28. DHS. (2003). N-RAT Assessment Exercise Part II: Implementation of National Maritime Security Initiatives. The Federal Register: 68/204.Google Scholar
  29. DHS. (2009). Testimony of Acting Commissioner Jayson P. Ahern, U.S. Customs and Border Protection, before the House Appropriations Committee, Subcommittee on Homeland Security, on Cargo and Container Security. Available at https://www.dhs.gov/news/2009/04/01/us-customs-and-border-protection-acting-commissioner-jason-aherns-testimony-cargo. Accessed 15 June 2016.
  30. DHS. (2014). Privacy Impact Assessment for the Non-Intrusive Inspection Systems Programme. Available at https://www.dhs.gov/sites/default/files/publications/privacy_pia_cbp_nii_jan2014.pdf. Accessed 2 May 2016.
  31. DHS. (2016). Operational and Support Components. DHS. Available at https://www.dhs.gov/operational-and-support-components. Accessed 30 March 2017.
  32. DNV Consulting. (2005). Study on the Impacts of Possible European Legislation to Improve Transport Security (European Commission Report 40008032-6-2, pp. 1–236).Google Scholar
  33. Donner, M., & Kruk, C. (2009). Supply Chain Security Guide (The World Bank and DFID, 1), pp. 1–107. Available at http://siteresources.worldbank.org/INTPRAL/Resources/SCS_Guide_Final.pdf. Accessed 20 April 2016.
  34. Drewry. (2015, January). Analysis of the shipping markets. Shipping Insight Monthly.Google Scholar
  35. Ellis, J. (2010). Undeclared dangerous goods-risk implications for maritime transport. WMU Journal of Maritime Affairs, 9(1), 5–27.CrossRefGoogle Scholar
  36. Erera, A, Lewis, B., & White, C. (2003). Optimisation Approaches for Efficient Container Security Operations at Transhipment Seaports (Transportation Research Record, No. 1822), pp. 1–8.Google Scholar
  37. European Conference of Ministers of Transport. (2005). Container Transport Security Across Modes. Available at http://www.itf-oecd.org/sites/default/files/docs/05containersec.pdf. Accessed 10 May 2016.
  38. Federal Bureau of Investigation (FBI). (2013). Terrorism 2000/2001. Available at https://www.fbi.gov/stats-services/publications/terror. Accessed 15 November 2016.
  39. Felixstowe Port Authority. (2004). Security Charge—Q&A. Available at http://www.phoenixcargo.com/news/documents/Security%20Charge%20QA.pdf. Accessed 15 November 2016.
  40. GAO. (2003). Container Security: Expansion of Key Customs Programs Will Require Greater Attention to Critical Success Factors 2003. United States Government Accountability Office (GAO) Reports, p. 1.Google Scholar
  41. Gerencser, M., Weinberg, J., & Vincent, D. (2003). Port Security War Game: Implications for US Supply Chains. Washington, DC: Booz Allen Hamilton.Google Scholar
  42. GlobalSecurity.org. (no date). Homeland Security: Limburg Oil Tanker Attacked. Available at https://www.globalsecurity.org/security/profiles/limburg_oil_tanker_attacked.htm. Accessed 26 April 2018.
  43. Goulielmos, A. M., & Anastasakos, A. A. (2005). Worldwide security measures for shipping, seafarers and ports: An impact assessment of ISPS Code. Disaster Prevention and Management, 14, 462–478.CrossRefGoogle Scholar
  44. Hall, P. V. (2004). “We’d have to sink the ships”: Impact studies and the 2002 West Coast port lockout. Economic Development Quarterly, 18(4), 354–367.CrossRefGoogle Scholar
  45. Hintsa, J., Gutierrez, X., Wieser, P., & Hameri, A. P. (2009). Supply chain security management: An overview. International Journal of Logistics Systems and Management, 5(3/4), 344–355.CrossRefGoogle Scholar
  46. Holmes, J. L. (2004). The container security initiative. Fleet Equipment, 30, 15.Google Scholar
  47. IMF. (2001). World Economic Outlook: The Global Economy after September 11. Available at http://www.imf.org/external/pubs/ft/weo/2001/03. Accessed 20 December 2015.
  48. International Organisation for Standardisation (ISO). (2007). ISO 28000:2007: Specification for Security Management Systems for the Supply Chain. Available at https://www.iso.org/standard/44641.html. Accessed 20 March 2016.
  49. Koch, C. (2002). Testimony Before the House Transportation and Infrastructure Committee. Available at http://www.house.gov/transportation/cgmt/03-13-02/koch.html. Accessed 13 March 2016.
  50. Kristiansen, S. (2005). Maritime Transportation: Safety Management and Risk Analysis. New York: Routledge.Google Scholar
  51. Kruk, C., & Donner, M. (2008). Review of Cost of Compliance with the New International Freight Transport Security Requirements. Washington, DC: The World Bank.Google Scholar
  52. Lee, H. L., & Whang, S. (2005). Higher supply chain security with lower cost: Lessons from total quality management. International Journal of Production Economies, 96(3), 289–300.CrossRefGoogle Scholar
  53. Lenain, P., Bonturi, M., & Vincent, K. (2002). The Economic Consequences of Terrorism (Economics Department Working Paper, 334). Organisation for Economic Co-Operation and Development, pp. 23–32.Google Scholar
  54. Limao, N., & Venables, A. J. (2001). Infrastructure, geographical disadvantage, transport costs and trade. The World Bank Economic Review, 15(3), 451–479.CrossRefGoogle Scholar
  55. Machalaba, D. (2001, July 9). US ports are losing the battle to keep up with overseas trade. The Wall Street Journal. Available at http://www.nc.gsu.edu/_ecojxm/7030/notes/articles/w070901.htm. Accessed 2 December 2016.
  56. Maersk Line. (2011). Emma Maersk/The Largest Container Ship. Available at http://www.emma-maersk.com/. Accessed 10 January 2015.
  57. Maersk Line. (2013). The World’s Largest Ship. Available at https://www.maersk.com/en/explore/fleet/triple-e. Accessed 15 January 2015.
  58. Martonosi, S. E., Ortiz, D. S., & Willis, H. H. (2005). Evaluating the viability of 100 percent container inspections at America’s ports. In H. W. Richardson, P. Gordon, & J. E. II Moore (Eds.), The Economic Impacts of Terrorist Attacks. Cheltenham: Edward Elgar Publishing.Google Scholar
  59. Metaparti, P. (2010). Rhetoric, rationality and reality in post-9/11 maritime security. Maritime Policy and Management, 37(7), 723–736.CrossRefGoogle Scholar
  60. Miller, J. (2007, October 25). New shipping law makes big waves in foreign ports. Wall Street Journal.Google Scholar
  61. NISAC. (2005). Port Operations and Economic Conditions Simulators (pp. 1–15). Washington, DC: NISAC.Google Scholar
  62. O’Hanlon, M. E. (2002). Protecting the American Homeland: A Preliminary Analysis. Washington, DC: Brookings Institution.Google Scholar
  63. OECD. (2003). Maritime Transport Committee Security in Maritime Transport: Risk Factors and Economic Impact. Available at https://www.oecd.org/newsroom/4375896.pdf.
  64. OECD. (2009). Terrorism and International Transport: Towards Risk-Based Security Policy. Round Table 144.Google Scholar
  65. OECD. (2015). International Transport Forum: The Impact of Mega-Ships. Available at http://www.itf-oecd.org/sites/default/files/docs/15cspa_mega-ships.pdf.
  66. Parfomak, P., & Frittelli, J. (2007). CRS Report for Congress. Maritime Security: Potential Attacks and Protection Priorities. Available at http://www.fas.org/sgp/crs/homesec/RL33787.pdf.
  67. Park, H. G. (2013). Impact of Supply Chain Security Orientation on Port Performance (PhD thesis). Cardiff University, UK.Google Scholar
  68. RAND. (2012). RAND Database of Worldwide Terrorism Incidents. Available at http://www.rand.org/nsrd/projects/terrorismincidents.html. Accessed 19 April 2013.
  69. Richardson, M. (2004). Growing Vulnerability of Seaports from Terror Attacks, to Protect Ports While Allowing Global Flow of Trade Is a New Challenge. Viewpoint, Institute of South East Asian Studies.Google Scholar
  70. Rodrigue, J. P., Comtois, C., & Slack, B. (2009). The Geography of Transport Systems. New York: Routledge.Google Scholar
  71. Russell, D. M., & Saldanha, J. P. (2003). Five tenets of security-aware logistics and supply chain operation. Transportation Journal, 42(4), 44–54.Google Scholar
  72. Sadovaya, E., & Thai, V. V. (2012, May 27–30). Maritime Security Requirements for Shipping Companies and Ports: Implementation, Importance and Effectiveness. Paper presented at International Forum on Shipping, Ports and Airports (IFSPA) 2012, Hong Kong.Google Scholar
  73. Sandler, T. (2014). The analytical study of terrorism: Taking stock. Journal of Peace Research, 51(2), 257–271.CrossRefGoogle Scholar
  74. Sarathy, R. (2006). Security and the global supply chain. Transportation Journal, 45(4), 28.Google Scholar
  75. Saywell, T., & Borsuk, R. (2002, October 24). The fallout of the Bali bombings on regional economies: The neighbourhood takes a hit. Far Eastern Economic Review, Hong Kong.Google Scholar
  76. Smeele, F. (2010). International civil litigation and the pollution of the marine environment. In J. Basedow, U. Magnus, & R. Wolfrum (Eds.), The Hamburg Lectures on Maritime Affairs 2007 and 2008 (pp. 77–118). Berlin: Springer.Google Scholar
  77. Stasinopoulos, D. (2003). Maritime security: The need for a global agreement. Maritime Economics and Logistics, 5(3), 311–320.CrossRefGoogle Scholar
  78. Talas, R., & Menachof, D. (2009). The efficient tradeoff between security and cost for seaports: A conceptual model. International Journal of Risk Assessment and Management, 13(1), 46–59.CrossRefGoogle Scholar
  79. Thai, V. V. (2007). Impacts of security improvements on service quality in maritime transport: An empirical study of Vietnam. Maritime Economics and Logistics, 9(4), 335–356.CrossRefGoogle Scholar
  80. Thai, V. V. (2009). Effective maritime security: Conceptual model and empirical evidence. Maritime Policy and Management, 36(2), 147–163.CrossRefGoogle Scholar
  81. The Economist. (2002, April 6). Special Report: When Trade and Security Clash-Container Trade. London.Google Scholar
  82. The Star. (2004). Temporary Reprieve from CSI-Related Charges. Available at http://thestar.com.my/. Accessed 5 April 2015.
  83. Thibault, M., Brooks, M., & Button, K. (2006). The response of the US maritime industry to the new container security initiatives. Transportation Journal, 45(1), 5–15.Google Scholar
  84. UNCTAD. (2003, February 24–28). Report on the Expert Meeting on Efficient Transport and Trade Facilitation to Improve Participation by Developing Countries in International Trade: Problems and Potential for the Application of Current Trade Facilitation Measures by Developing Countries. Trade and Development Board. Commission on Enterprise, Business Facilitation and Development Seventh session, Geneva, pp. 2–9.Google Scholar
  85. UNCTAD. (2004, February 26). Container Security: Major Initiatives and Related International Developments. Geneva: Report by the UCTAD Secretariat.Google Scholar
  86. UNCTAD. (2007). Maritime Security: ISPS Code Implementation, Costs and Related Financing. UNCTAD/SDTE/TLB/2007. Available at http://unctad.org/en/Docs/sdtetlb20071_en.pdf.
  87. Walkenhorst, P., & Dihel, N. (2002). Trade Impacts of the Terrorist Attacks of 11 September 2001: A Quantitative Assessment. Paper presented to the Institute of Global Research (DIW) workshop on The Economic Consequences of Global Terrorism, Berlin. Available at http://www.diw.de/documents/dokumentenarchiv/17/diw_01.c.39105.de/diw_ws_consequences200206_walkenhorst.pdf.
  88. Willis, H. H., & Ortiz, D. (2004). Evaluating the Security of the Global Containerised Supply Chain. RAND Technical Report Series.Google Scholar
  89. WSC. (2007). Statement Regarding Legislation to Require 100% Container Scanning. http://www.worldshipping.org/pdf/wsc_legislation_statement.pdf.
  90. Yang, Y. C. (2010). Impact of the container security initiative on Taiwan’s shipping industry. Maritime Policy and Management, 37(7), 699–722.CrossRefGoogle Scholar
  91. Yeo, G., Pak, J., & Yang, Z. (2013). Analysis of dynamic effects on seaports adopting port security policy. Transportation Research Part A, 49, 285–301.Google Scholar
  92. Zin, C. T. (2007). US container screening bill slammed. Bunker World. http://www.bunkerworld.com/news/2007/08/68737.

Copyright information

© The Author(s) 2019

Authors and Affiliations

  1. 1.Department of LogisticsBeijing WuZi UniversityBeijingChina
  2. 2.Graduate School of ManagementPlymouth UniversityPlymouthUK

Personalised recommendations