Cargo Theft, Loss Prevention, and Supply Chain Security

Book description

You need to determine your company's risk and mitigate their losses.  There's little information out there that tells you how to do this, on which methods of predicitve cargo theft modeling to use, and how to develop prevention solutions. Part history of cargo theft, part analysis and part how-to guide, this book is the one source you need to in order to understand every facet of cargo theft and take steps to prevent losses.  It supplies a massive amount of cargo theft statistics and provides solutions and best practices to supply chain security. Providing you with cutting-edge techniques so you can prevent losses, this book will help you ensure that your cargo is secure at every stage along the supply chain.



• Outlines steps you can take to identify the weakest links in the supply chain and customize a security program to help you prevent thefts and recover losses

• Offers detailed explanations of downstream costs in a way that makes sense — including efficiency losses, customer dissatisfaction, product recalls and more — that dramatically inflate the impact of cargo theft incidents.

• Provides a complete methodology for use in creating your own customized supply chain security program as well as in-depth analysis of commonly encountered supply chain security problems.

Table of contents

  1. Cover Image
  2. Table of Contents
  3. Title Page
  4. Copyright
  5. Dedication
  6. Preface
  7. Foreword
  8. Acknowledgments
  9. About the Author
  10. Part 1. Understanding the Problem
    1. 1. Cargo Theft 101
      1. Evolution of Cargo Theft
      2. Targeting
      3. Downstream Costs
      4. Cargo Theft Prevention
      5. Lack of In-Transit Security
      6. Cargo Theft and Customs–Trade Partnership Against Terrorism (Theft Prevention vs Supply Chain Security)
      7. Key Points
    2. 2. Cargo Theft Defined
      1. What Is Cargo Theft?
      2. Theft of a Trailer
      3. Warehouse Burglaries
      4. Other Forms and Modes of Cargo Theft
      5. Key Points
    3. 3. Risk vs. Reward
      1. Why Cargo?
      2. Bank Robbery vs. Cargo Theft (Electronics)
      3. Cargo Theft vs. Bank Robbery
      4. Identity Theft vs. Cargo Theft
      5. Cargo Theft Sentencing
      6. U.S. Sentencing Guidelines for Cargo Theft
      7. Crime of Opportunity
      8. Key Points
    4. 4. Organized Criminal Groups
      1. Cargo Theft: 2006–2011
      2. The Broker
      3. Key Points
    5. 5. The Black Market
      1. E-fencing
      2. Export
      3. Secondary Wholesale Market
      4. Anchoring
      5. Recessionary Impact
      6. Key Points
    6. 6. International Cargo Theft
      1. Europe
      2. Mexico
      3. Central and South America
      4. Africa
      5. Asia
      6. Conclusion
      7. Key Points
    7. 7. Product Targeting
      1. Product Demand
      2. Active Targeting vs. Pot Luck
      3. Components of Active Targeting
      4. Key Points
    8. 8. High Tech
      1. Background
      2. 2006 through 2010
      3. Most Targeted Items
      4. Key Points
    9. 9. Pharmaceuticals
      1. History
      2. 2006 through 2010
      3. Consumer Care Products
      4. Complex Supply Chain
      5. Beyond Full Truckload
      6. Reputation
      7. Key Points
    10. 10. The True Impact of Cargo Theft
      1. Product Replacement
      2. Employee Time and Expense
      3. Market Share
      4. Customer Retention and Retrieval
      5. Loss of Sales
      6. Additional Costs for Other Sectors
      7. Pharmaceutical Sector
      8. Insurance
      9. Summary
      10. Key Points
  11. Part 2. Developing a Solution
    1. 11. Determining Risk
      1. The Complexity of Assessing Risk
      2. Product Type and Value
      3. Location of Facility
      4. Routing
      5. Frequency of Shipments
      6. Mode of Transportation
      7. In-Transit Policies and Procedures
      8. Demographics
      9. Other Factors
      10. Security Assessments and Site Surveys
      11. Key Points
    2. 12. Roles and Responsibilities
      1. Corporate Security and Logistics
      2. Policies and Procedures
      3. Collaboration
      4. Insurance Companies
      5. Third-Party Security Providers
      6. Law Enforcement
      7. Key Points
    3. 13. Physical Security
      1. Levels of Security
      2. Administrative Information
      3. Site Security Management
      4. Contact Persons
      5. Risk Assessments
      6. Cargo Crime Intelligence
      7. Applicant and Employee Screening
      8. Perimeter Security
      9. Physical Security
      10. Access Control
      11. Key Control
      12. Closed Circuit Television
      13. Lighting
      14. Alarms (Intrusion Detection Systems)
      15. High-Value Cage
      16. Security Officers
      17. Trash Collection and Disposal
      18. Shipping and Receiving
      19. Trailer Storage/Yard Security
      20. Maintenance and Services
      21. Key Points
    4. 14. In-Transit Security
      1. Driver Controls
      2. Transportation Provider Selection
      3. Background Investigations
      4. Security Awareness Training
      5. Preloaded and Staged Trailers
      6. Routing
      7. Trip Duration
      8. Security Seals
      9. Stopping Procedures
      10. Overnight Stops/Drop Trailer
      11. Transportation Provider Compliance
      12. Supply Chain Security Company Selection
      13. Physical Escorts
      14. Electronic Escorts and Monitoring
      15. In-Transit Security Hardware
      16. Security Hardware Uses and Limitations
      17. Key Points
    5. 15. Active Monitoring
      1. Origin and Destination
      2. Routing
      3. Administrative Processes
      4. Geofences and Georoutes
      5. Beyond Location Tracking
      6. Immediate Notification of Route Deviation or Theft
      7. Recovery Process
      8. Impact on Driver Behavior
      9. Key Points
    6. 16. Air Cargo Security
      1. Cargo Theft and the Air Industry
      2. Government Regulation and Air Cargo
      3. Security Considerations and the Air Industry
      4. Key Points
    7. 17. Rail and Pipeline Security
      1. Cargo Theft and the Rail System
      2. Product Targeting
      3. Hot Spots
      4. Security Considerations and the Rail Industry
      5. Pipeline Security
      6. Theft and the Pipeline System
      7. Key Points
    8. 18. Cargo Theft Task Forces and Organizations
      1. Miami-Dade Tactical Operations Multi-Agency Cargo Anti-Theft Squad
      2. California Cargo Theft Task Forces
      3. New Jersey State Police
      4. Memphis TAMCATs
      5. Midwest Cargo Theft Unit
      6. Georgia Bureau of Investigations
      7. Technology Asset Protection Association
      8. Nation Cargo Theft Task Force
      9. Pharmaceutical Cargo Security Coalition
      10. CargoNet
      11. Supply Chain–Information Sharing and Analysis Center
      12. Transportation Security Councils
      13. Key Points
    9. 19. Beyond Security
      1. Operational Efficiencies
      2. Key Points
  12. Resources
  13. Glossary
  14. FreightWatch International 2011 U.S. Cargo Theft Report
    1. Introduction
    2. Summary
    3. Major Trends
    4. By State
    5. By Value
    6. By Date
    7. By Product Type
    8. By Theft Type and Location
  15. FreightWatch International Global Threat Assessment
    1. Global Cargo Theft Risk
    2. About FreightWatch
    3. North America
    4. Europe
    5. Africa
    6. Asia
  16. Index

Product information

  • Title: Cargo Theft, Loss Prevention, and Supply Chain Security
  • Author(s): Dan Burges
  • Release date: June 2012
  • Publisher(s): Butterworth-Heinemann
  • ISBN: 9780123914682