Seaport Security: Different strategies for reaching similar objective

America’s seaports are taking several different paths toward providing shippers with safe and secure commerce, LM learned last week in a series of interviews.

By ·

America’s seaports are taking several different paths toward providing shippers with safe and secure commerce, LM learned last week in a series of interviews. And while some are more heavily reliant on sophisticated container screening systems, others are concentrating on vetting supply chain partners and intermediaries.


At the same time, all ports are mandated to comply with new U.S. regulatory rules while remaining poised to anticipate new changes in international law.

Any way you slice it, security will continue to be a market differentiator and competitive tool for our ocean cargo gateways well into the future.

However, since there are an estimated 360 seaports in the U.S., no single security solution fits every gateway, says American Association of Port Authorities (AAPA) spokesman, Aaron Ellis. “Some ports are dealing solely with bulk and break bulk cargo, so container scanning is not going to work,” he says. “And others may chiefly have roll-on/roll off and project cargo,” he adds. “But for the major container ports, the standards are fairly uniform.”

Joe Lawless, the Massachusetts Port Authority’s (Massport) director of maritime security, agrees with Ellis, adding that 100 percent container screening will have to be customized to be effective. “Some ports will concentrate on screening for radiation, while others will place a higher emphasis concentration on routine inspection,” he says. “In any case, it’s one of the critical pieces that’s only being worked out right now.”

Lawless, who also serves as chairman of the AAPA’s Port Security Committee, will be meeting with his colleagues in New Orleans this month to discuss other issues related to port protection. Seaports worldwide annually handle roughly 1.5 billion tons of cargo worth over $1 trillion, arriving in at least 11 million containers. They require deep-water access, sufficient land for staging and storage, and unrestricted access to highway, rail, inland waterway, and pipeline networks.

At this point in time, the Department of Defense (DoD) maintains only an informal business relationship with U.S. ports. However, the DoD plays a considerable role in the security plan to prevent attacks on the ports, prepare to respond to possible attacks, and to restore their services post attack.

“But the ports themselves have to help government determine what the priorities are,” says Lawless. “That’s why AAPA members must constantly network among ourselves and our overseas counterparts to share information.”

 


About the Author

Patrick Burnson, Executive Editor
Patrick Burnson is executive editor for Logistics Management and Supply Chain Management Review magazines and web sites. Patrick is a widely-published writer and editor who has spent most of his career covering international trade, global logistics, and supply chain management. He lives and works in San Francisco, providing readers with a Pacific Rim perspective on industry trends and forecasts. You can reach him directly at [email protected]

Subscribe to Logistics Management Magazine!

Subscribe today. It's FREE!
Get timely insider information that you can use to better manage your entire logistics operation.
Start your FREE subscription today!

Article Topics

All Topics
Latest Whitepaper
Logistics Network Analysis
Logistics network monitoring is an important step in understanding what actually occurs throughout your supply chain.
Download Today!
From the January 2018 Logistics Management Magazine Issue
Industry experts agree that costs across all sectors worldwide will continue to rise in 2018, and the most successful shippers will be those that are able to mitigate their impact on profitability. And, the right technology will play an increasingly vital role in driving efficiencies across the global logistics network.
The Future of Retail Distribution
Navigating the Reverse Supply Chain for Connected Devices
View More From this Issue
Subscribe to Our Email Newsletter
Sign up today to receive our FREE, weekly email newsletter!
Latest Webcast
IAM, IoT and the Connected Supply Chain
There are three primary models of Identity and Access Management (IAM) technology that CTOs, CSOs, and Supply Chain executives are using to enhance their trading partner communities. While each leverages IAM and the IoT as core components only an “Outside-in” approach truly connects people, systems and things reliably and securely across the supply chain.
Register Today!
EDITORS' PICKS
State of Global Logistics: Delivering above and beyond
Industry experts agree that costs across all sectors worldwide will continue to rise in 2018, and...
2018 Rate Outlook: Economic Expansion, Pushing Rates Skyward
Trade and transport analysts see rates rising across all modes in accordance with continued...

Building the NextGen Supply Chain: Keeping pace with the digital economy
Peerless Media’s 2017 Virtual Summit shows how creating a data-rich ecosystem can eliminate...
2017 NASSTRAC Shipper of the Year: Mallinckrodt; Mastering and managing complexity
An inside look at how a large pharmaceutical firm transformed its vendor and supplier relationships...