Skip to main content

Maritime Security Measures and the Container Security Initiative (CSI)

  • Chapter
  • First Online:
Maritime Container Port Security

Abstract

This chapter begins by introducing the background to implementation of maritime security regimes. Various risk factors and the potential vulnerability posed in global supply chains are identified and discussed. With the growing concern about seaborne trade safety and security, compulsory and voluntary frameworks have been introduced at international, supranational, national and regional level. These frameworks and measures are in relation to the relevant regulatory body. This chapter provides a comprehensive description of the Container Security Initiative (CSI), including its background, regulatory body, strategic goals and elements, criteria for membership and implementation during different phases. Its controversial benefits and negativity are discussed critically, particularly focusing on the aspects of financing, operational efficiency and trade facilitation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 119.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Allen, N. H. (2006). The container security initiative costs, implications and relevance to developing countries. Public Administration and Development, 26(5), 439–447.

    Article  Google Scholar 

  • American Shipper. (2014). CSI’s Evolution. Available at http://www.americanshipper.com/main/news/csis-evolution57536.aspx?taxonomy=Security. Accessed 10 December 2016.

  • Babione, R., Kim, C. K., Phone, E., & Sanjaya, E. (2003). Post 9/11 Security Cost Impact on Port of Seattle Import/Export Container Traffic (Working Paper GTTL 502). The University of Washington.

    Google Scholar 

  • Banomyong, R. (2005). The impact of port and trade security initiatives on maritime supply chain management. Maritime Policy and Management, 32(1), 3–13.

    Article  Google Scholar 

  • Bennett, A. C., & Chin, Y. Z. (2008). 100% Container Scanning: Security Policy Implications for Global Supply Chains (Master of Science Dissertation). MIT Press, Cambridge.

    Google Scholar 

  • Bichou, K. (2004). The ISPS code and the cost of port compliance: An initial logistics and supply chain framework for port security assessment and management. Maritime Economics and Logistics, 6, 322–348.

    Article  Google Scholar 

  • Bichou, K. (2008). Security and risk-based models in shipping and ports: Review and critical analysis. ITF, Terrorism and International Transport: Towards Risk-based Security Policy. Paris: OECD.

    Google Scholar 

  • Bichou, K. (2011). Assessing the impact of procedural security on container port efficiency. Maritime Economics and Logistics, 13(1), 1–28.

    Article  Google Scholar 

  • Bichou, K., & Evans, A. (2007). Maritime security and regulatory risk-based models: Review and critical analysis. In K. Bichou, M. G. H. Bell, & A. Evans (Eds.), Risk Management in Port Operations, Logistics and Supply Chain Security (pp. 265–280). London: Informa.

    Google Scholar 

  • Bichou, K., Lai, K. H., Lun, V. Y. H., & Cheng, T. C. E. (2007). A quality management framework for liner shipping companies to implement the 24-hour advance vessel manifest rule. Transportation Journal, 46(1), 5–21.

    Google Scholar 

  • Bosk, L. B. (2006). Port and Supply Chain Security Initiatives in the United States and Abroad (Policy Research Report, 150). Austin, TX: The University of Texas at Austin, pp. 1–192.

    Google Scholar 

  • Bradsher, K. (2004, December 14). Bangladesh is Surviving to Export Another Day. The New York Times.

    Google Scholar 

  • Bueger, C. (2014). What is maritime security? Marine Policy, 53, 159–164.

    Article  Google Scholar 

  • CBP. (2003). Container Security Initiative: Update. United States Department of Homeland Security 2003. Available at http://www.whitehouse.gov/homeland/. Accessed 17 October 2014.

  • CBP. (2006). Container Security Initiative: Strategic Plan 2006–2011. Available at http://www.cbp.gov/linkhandler/cgov/trade/cargo_security/csi/csi_strategic_plan.ctt/csi_strategic_plan.pdf. Accessed 30 July 2013.

  • CBP. (2011). Container Security Initiatives in Summary. Available at https://www.cbp.gov/sites/default/files/documents/csi_brochure_2011_3.pdf. Accessed 7 August 2016.

  • CBP. (2014). CSI: Container Security Initiatives. Available at https://www.cbp.gov/border-security/ports-entry/cargo-security/csi/csi-brief. Accessed 27 August 2016.

  • CBPIA. (2002). Container Security Initiative Fact Sheet. 2002, pp. 1–5.

    Google Scholar 

  • Ceriotto, L. (2004). Buscantecnologia china para la aduana. Available at www.clarin.com. Accessed 30 October 2014.

  • Chan, Y. (2005). A statistical study of intrastate vs. interstate regulatory reforms. Journal of Geography, 13, 165–171.

    Article  Google Scholar 

  • Chang, C., & Thai, V. (2016). Do port security quality and service quality influence customer satisfaction and loyalty? Maritime Policy and Management, 43(6), 720–736.

    Article  Google Scholar 

  • Clark, X., Dollar, D., & Micco, D. (2004). Port Efficiency, Maritime Transport Costs and Bilateral Trade (NBER Working Paper No. 10353). Available at http://www.nber.org/papers/w10353.pdf. Accessed 4 January 2017.

  • Coleman, N., & Levin, C. (2006). An Assessment of US Efforts to Secure the Global Supply Chain: Prepared by the Majority & Minority staffs of the Permanent Subcommittee on Investigations. Available at https://www.hsdl.org/?view&did=464168.

  • Congressional Budget Office. (2016). Scanning and Imaging Shipping Containers Overseas: Costs and Alternatives. Available at http://www.cbo.gov/sites/default/files/114th-congress-2015-2016/reports/51478-Shipping-Containers.pdf. Accessed 10 March 2017.

  • Dallimore, C. (2008). Securing the Supply Chain: Does the Container Security Initiative comply with WTO Law? (Dissertation). University of Münster, Münster, Germany.

    Google Scholar 

  • Damas, P. (2001, November). Supply chains at war. American Shipper, pp. 17–18.

    Google Scholar 

  • Dekker, S., & Stevens, H. (2007). Maritime security in the European Union-empirical findings on financial implications for port facilities. Maritime Policy and Management, 34(5), 458–499.

    Article  Google Scholar 

  • DHS. (2003). N-RAT Assessment Exercise Part II: Implementation of National Maritime Security Initiatives. The Federal Register: 68/204.

    Google Scholar 

  • DHS. (2009). Testimony of Acting Commissioner Jayson P. Ahern, U.S. Customs and Border Protection, before the House Appropriations Committee, Subcommittee on Homeland Security, on Cargo and Container Security. Available at https://www.dhs.gov/news/2009/04/01/us-customs-and-border-protection-acting-commissioner-jason-aherns-testimony-cargo. Accessed 15 June 2016.

  • DHS. (2014). Privacy Impact Assessment for the Non-Intrusive Inspection Systems Programme. Available at https://www.dhs.gov/sites/default/files/publications/privacy_pia_cbp_nii_jan2014.pdf. Accessed 2 May 2016.

  • DHS. (2016). Operational and Support Components. DHS. Available at https://www.dhs.gov/operational-and-support-components. Accessed 30 March 2017.

  • DNV Consulting. (2005). Study on the Impacts of Possible European Legislation to Improve Transport Security (European Commission Report 40008032-6-2, pp. 1–236).

    Google Scholar 

  • Donner, M., & Kruk, C. (2009). Supply Chain Security Guide (The World Bank and DFID, 1), pp. 1–107. Available at http://siteresources.worldbank.org/INTPRAL/Resources/SCS_Guide_Final.pdf. Accessed 20 April 2016.

  • Drewry. (2015, January). Analysis of the shipping markets. Shipping Insight Monthly.

    Google Scholar 

  • Ellis, J. (2010). Undeclared dangerous goods-risk implications for maritime transport. WMU Journal of Maritime Affairs, 9(1), 5–27.

    Article  Google Scholar 

  • Erera, A, Lewis, B., & White, C. (2003). Optimisation Approaches for Efficient Container Security Operations at Transhipment Seaports (Transportation Research Record, No. 1822), pp. 1–8.

    Google Scholar 

  • European Conference of Ministers of Transport. (2005). Container Transport Security Across Modes. Available at http://www.itf-oecd.org/sites/default/files/docs/05containersec.pdf. Accessed 10 May 2016.

  • Federal Bureau of Investigation (FBI). (2013). Terrorism 2000/2001. Available at https://www.fbi.gov/stats-services/publications/terror. Accessed 15 November 2016.

  • Felixstowe Port Authority. (2004). Security Charge—Q&A. Available at http://www.phoenixcargo.com/news/documents/Security%20Charge%20QA.pdf. Accessed 15 November 2016.

  • GAO. (2003). Container Security: Expansion of Key Customs Programs Will Require Greater Attention to Critical Success Factors 2003. United States Government Accountability Office (GAO) Reports, p. 1.

    Google Scholar 

  • Gerencser, M., Weinberg, J., & Vincent, D. (2003). Port Security War Game: Implications for US Supply Chains. Washington, DC: Booz Allen Hamilton.

    Google Scholar 

  • GlobalSecurity.org. (no date). Homeland Security: Limburg Oil Tanker Attacked. Available at https://www.globalsecurity.org/security/profiles/limburg_oil_tanker_attacked.htm. Accessed 26 April 2018.

  • Goulielmos, A. M., & Anastasakos, A. A. (2005). Worldwide security measures for shipping, seafarers and ports: An impact assessment of ISPS Code. Disaster Prevention and Management, 14, 462–478.

    Article  Google Scholar 

  • Hall, P. V. (2004). “We’d have to sink the ships”: Impact studies and the 2002 West Coast port lockout. Economic Development Quarterly, 18(4), 354–367.

    Article  Google Scholar 

  • Hintsa, J., Gutierrez, X., Wieser, P., & Hameri, A. P. (2009). Supply chain security management: An overview. International Journal of Logistics Systems and Management, 5(3/4), 344–355.

    Article  Google Scholar 

  • Holmes, J. L. (2004). The container security initiative. Fleet Equipment, 30, 15.

    Google Scholar 

  • IMF. (2001). World Economic Outlook: The Global Economy after September 11. Available at http://www.imf.org/external/pubs/ft/weo/2001/03. Accessed 20 December 2015.

  • International Organisation for Standardisation (ISO). (2007). ISO 28000:2007: Specification for Security Management Systems for the Supply Chain. Available at https://www.iso.org/standard/44641.html. Accessed 20 March 2016.

  • Koch, C. (2002). Testimony Before the House Transportation and Infrastructure Committee. Available at http://www.house.gov/transportation/cgmt/03-13-02/koch.html. Accessed 13 March 2016.

  • Kristiansen, S. (2005). Maritime Transportation: Safety Management and Risk Analysis. New York: Routledge.

    Google Scholar 

  • Kruk, C., & Donner, M. (2008). Review of Cost of Compliance with the New International Freight Transport Security Requirements. Washington, DC: The World Bank.

    Google Scholar 

  • Lee, H. L., & Whang, S. (2005). Higher supply chain security with lower cost: Lessons from total quality management. International Journal of Production Economies, 96(3), 289–300.

    Article  Google Scholar 

  • Lenain, P., Bonturi, M., & Vincent, K. (2002). The Economic Consequences of Terrorism (Economics Department Working Paper, 334). Organisation for Economic Co-Operation and Development, pp. 23–32.

    Google Scholar 

  • Limao, N., & Venables, A. J. (2001). Infrastructure, geographical disadvantage, transport costs and trade. The World Bank Economic Review, 15(3), 451–479.

    Article  Google Scholar 

  • Machalaba, D. (2001, July 9). US ports are losing the battle to keep up with overseas trade. The Wall Street Journal. Available at http://www.nc.gsu.edu/_ecojxm/7030/notes/articles/w070901.htm. Accessed 2 December 2016.

  • Maersk Line. (2011). Emma Maersk/The Largest Container Ship. Available at http://www.emma-maersk.com/. Accessed 10 January 2015.

  • Maersk Line. (2013). The World’s Largest Ship. Available at https://www.maersk.com/en/explore/fleet/triple-e. Accessed 15 January 2015.

  • Martonosi, S. E., Ortiz, D. S., & Willis, H. H. (2005). Evaluating the viability of 100 percent container inspections at America’s ports. In H. W. Richardson, P. Gordon, & J. E. II Moore (Eds.), The Economic Impacts of Terrorist Attacks. Cheltenham: Edward Elgar Publishing.

    Google Scholar 

  • Metaparti, P. (2010). Rhetoric, rationality and reality in post-9/11 maritime security. Maritime Policy and Management, 37(7), 723–736.

    Article  Google Scholar 

  • Miller, J. (2007, October 25). New shipping law makes big waves in foreign ports. Wall Street Journal.

    Google Scholar 

  • NISAC. (2005). Port Operations and Economic Conditions Simulators (pp. 1–15). Washington, DC: NISAC.

    Google Scholar 

  • O’Hanlon, M. E. (2002). Protecting the American Homeland: A Preliminary Analysis. Washington, DC: Brookings Institution.

    Google Scholar 

  • OECD. (2003). Maritime Transport Committee Security in Maritime Transport: Risk Factors and Economic Impact. Available at https://www.oecd.org/newsroom/4375896.pdf.

  • OECD. (2009). Terrorism and International Transport: Towards Risk-Based Security Policy. Round Table 144.

    Google Scholar 

  • OECD. (2015). International Transport Forum: The Impact of Mega-Ships. Available at http://www.itf-oecd.org/sites/default/files/docs/15cspa_mega-ships.pdf.

  • Parfomak, P., & Frittelli, J. (2007). CRS Report for Congress. Maritime Security: Potential Attacks and Protection Priorities. Available at http://www.fas.org/sgp/crs/homesec/RL33787.pdf.

  • Park, H. G. (2013). Impact of Supply Chain Security Orientation on Port Performance (PhD thesis). Cardiff University, UK.

    Google Scholar 

  • RAND. (2012). RAND Database of Worldwide Terrorism Incidents. Available at http://www.rand.org/nsrd/projects/terrorismincidents.html. Accessed 19 April 2013.

  • Richardson, M. (2004). Growing Vulnerability of Seaports from Terror Attacks, to Protect Ports While Allowing Global Flow of Trade Is a New Challenge. Viewpoint, Institute of South East Asian Studies.

    Google Scholar 

  • Rodrigue, J. P., Comtois, C., & Slack, B. (2009). The Geography of Transport Systems. New York: Routledge.

    Google Scholar 

  • Russell, D. M., & Saldanha, J. P. (2003). Five tenets of security-aware logistics and supply chain operation. Transportation Journal, 42(4), 44–54.

    Google Scholar 

  • Sadovaya, E., & Thai, V. V. (2012, May 27–30). Maritime Security Requirements for Shipping Companies and Ports: Implementation, Importance and Effectiveness. Paper presented at International Forum on Shipping, Ports and Airports (IFSPA) 2012, Hong Kong.

    Google Scholar 

  • Sandler, T. (2014). The analytical study of terrorism: Taking stock. Journal of Peace Research, 51(2), 257–271.

    Article  Google Scholar 

  • Sarathy, R. (2006). Security and the global supply chain. Transportation Journal, 45(4), 28.

    Google Scholar 

  • Saywell, T., & Borsuk, R. (2002, October 24). The fallout of the Bali bombings on regional economies: The neighbourhood takes a hit. Far Eastern Economic Review, Hong Kong.

    Google Scholar 

  • Smeele, F. (2010). International civil litigation and the pollution of the marine environment. In J. Basedow, U. Magnus, & R. Wolfrum (Eds.), The Hamburg Lectures on Maritime Affairs 2007 and 2008 (pp. 77–118). Berlin: Springer.

    Google Scholar 

  • Stasinopoulos, D. (2003). Maritime security: The need for a global agreement. Maritime Economics and Logistics, 5(3), 311–320.

    Article  Google Scholar 

  • Talas, R., & Menachof, D. (2009). The efficient tradeoff between security and cost for seaports: A conceptual model. International Journal of Risk Assessment and Management, 13(1), 46–59.

    Article  Google Scholar 

  • Thai, V. V. (2007). Impacts of security improvements on service quality in maritime transport: An empirical study of Vietnam. Maritime Economics and Logistics, 9(4), 335–356.

    Article  Google Scholar 

  • Thai, V. V. (2009). Effective maritime security: Conceptual model and empirical evidence. Maritime Policy and Management, 36(2), 147–163.

    Article  Google Scholar 

  • The Economist. (2002, April 6). Special Report: When Trade and Security Clash-Container Trade. London.

    Google Scholar 

  • The Star. (2004). Temporary Reprieve from CSI-Related Charges. Available at http://thestar.com.my/. Accessed 5 April 2015.

  • Thibault, M., Brooks, M., & Button, K. (2006). The response of the US maritime industry to the new container security initiatives. Transportation Journal, 45(1), 5–15.

    Google Scholar 

  • UNCTAD. (2003, February 24–28). Report on the Expert Meeting on Efficient Transport and Trade Facilitation to Improve Participation by Developing Countries in International Trade: Problems and Potential for the Application of Current Trade Facilitation Measures by Developing Countries. Trade and Development Board. Commission on Enterprise, Business Facilitation and Development Seventh session, Geneva, pp. 2–9.

    Google Scholar 

  • UNCTAD. (2004, February 26). Container Security: Major Initiatives and Related International Developments. Geneva: Report by the UCTAD Secretariat.

    Google Scholar 

  • UNCTAD. (2007). Maritime Security: ISPS Code Implementation, Costs and Related Financing. UNCTAD/SDTE/TLB/2007. Available at http://unctad.org/en/Docs/sdtetlb20071_en.pdf.

  • WCO. (2007). SAFE Framework Standards. http://www.wcoomd.org/files/1.%20Public%20files/PDFandDocuments/SAFE%2.

  • Walkenhorst, P., & Dihel, N. (2002). Trade Impacts of the Terrorist Attacks of 11 September 2001: A Quantitative Assessment. Paper presented to the Institute of Global Research (DIW) workshop on The Economic Consequences of Global Terrorism, Berlin. Available at http://www.diw.de/documents/dokumentenarchiv/17/diw_01.c.39105.de/diw_ws_consequences200206_walkenhorst.pdf.

  • Willis, H. H., & Ortiz, D. (2004). Evaluating the Security of the Global Containerised Supply Chain. RAND Technical Report Series.

    Google Scholar 

  • WSC. (2007). Statement Regarding Legislation to Require 100% Container Scanning. http://www.worldshipping.org/pdf/wsc_legislation_statement.pdf.

  • WTO. (2017). Trade Facilitation. https://www.wto.org/english/tratop_e/tradfa_e/tradfa_e.htm#I.

  • Yang, Y. C. (2010). Impact of the container security initiative on Taiwan’s shipping industry. Maritime Policy and Management, 37(7), 699–722.

    Article  Google Scholar 

  • Yeo, G., Pak, J., & Yang, Z. (2013). Analysis of dynamic effects on seaports adopting port security policy. Transportation Research Part A, 49, 285–301.

    Google Scholar 

  • Zin, C. T. (2007). US container screening bill slammed. Bunker World. http://www.bunkerworld.com/news/2007/08/68737.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xufan Zhang .

Rights and permissions

Reprints and permissions

Copyright information

© 2019 The Author(s)

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Zhang, X., Roe, M. (2019). Maritime Security Measures and the Container Security Initiative (CSI). In: Maritime Container Port Security. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-03825-0_2

Download citation

Publish with us

Policies and ethics