Jay Precision Security Awareness
CTPAT & Internal Conspiracies
Training
Sunil Gaikwad
compliance@jayprecision.co
m
Cell 7575003918
Overview
 CTPAT
 Role within Customs and
Border
Protection (CBP)
 Authorized Economic
Operator (AEO) Cooperation
 Supply Chain Security
Challenges
 Internal Conspiracies
 Tracking & Monitoring
 Policy vs. Practice
 In a day in 2017, CBP processed:
 78,137 truck, rail, and sea containers
 1,088,300 incoming international passengers (air, sea,
land)
 282,350 incoming privately owned vehicles
 Confiscated:
 5,863 kilos of narcotics
 $3.3 million in illegal/prohibited goods
 $265,205 in illicit or undeclared currency
Why CTPAT is Vital for
CBP
Statistical perspective.
CTPAT Membership &
Updates  Current Membership:
11,186
Certified Partner Accounts
 Importers: 4,131
 Mexican Carriers &
Manufacturers: 2,815
AEO Cooperation
 Key Joint Benefits
 Coordinated joint outreach events,
(conferences, seminars, and workshops, etc.).
 Joint validations
 Efficient allocation of resources, man-hours,
and travel expenses.
 Cross training for Specialists in both
programs.
Supply Chain Security Challenges
 Internal Conspiracies
 Definition
 When individuals or
groups work in accord to
commit an illegal act.
 Exists when its participants
utilize legal or illegal methods
to commit an illegal act.
 Motivation
 When the end result is
substantial for relatively
easy work.
Motivating Factors
 The use of internal conspiracies is viewed as the
most cost effective and simplest method to
smuggle narcotics by Drug Trade Organizations
(DTOs).
 The loss of a certain amount of narcotics is
acceptable
and seen as part of the business.
 The risk of being caught is minimal due to:
 The amount of cargo coming from regions
identified
as being high risk.
 Law enforcement authorities’ lack of
sufficient resources.
Profits
 Users in the US spent approximately $100
billion
annually over the past decade.
 Average cost of most common narcotics (in
USD):
 Marijuana: $15 per gram ($15,000 per kilo)
 Cocaine: $100-$120 per gram ($120,000
per kilo)
 Heroin: $15-$20 per dose - 0.1 grams
($200K
per kilo)
Other Gains
 Illegal export of weapons and
ammunition to criminal elements or
other threats (assault weapons, grenade
launchers, etc.).
 Profit made from illegal activities can be
utilized to create legitimate businesses, which
subsequently serve the purpose of continued
smuggling.
Who Loses?
 Legitimate businesses:
 Commodity and conveyances are
contaminated after being utilized in the
movement of illicit product.
 Economic cost and risk of negative publicity.
External Recruiter Tools
 Bribes
 Employees may accept bribes
for information and/or
company property.
 Security personnel, shipping
& receiving personnel, and
drivers have the highest risk,
including management staff.
 Silver or Lead
How your Employees are Recruited
 Conspirators collect employee information;
names, addresses, family members, etc.
 Conspirators familiarize themselves with employee
habits at work and personal lives. They focus on
discovering which employees have an immediate
need for money.
 Conspirators concentrate on employees who may
have known criminal backgrounds or low ethics.
Surveillance
 Collecting facility and
operational information
via surveillance.
 Take photographs of
entrances, personnel,
and commercial traffic.
 Determine level of
perimeter security.
 Conspirators evaluate
site illumination,
camera positions, and
shifts.
Surveillance
 By evaluating vulnerabilities within the company,
conspirators
may create the opportunity for a violation.
 Obtaining shipping procedures and/or loading plans also
facilitates the introduction of illicit materials.
 Transit routes and scheduled stops are of particular
interest.
Conspirator Tools
 Company systems:
 Conspirators attempt to access company systems
without authorization in order to manipulate
manifests, shipping documents, invoices, loading
plans, etc.
 Conspirators may add erroneous information or alter
shipping data to facilitate the introduction of illicit
materials to legitimate cargo.
 Social Media Outlets:
 Facebook, Twitter, company web page, etc. to
obtain company and employee information.
Recruitment Success
 Once a Relationship is Established
 Conspirators show interest in job functions, make
unusual questions about cargo flow or shipping
methods.
 Ask about GPS systems, documentation processing,
etc.…to facilitate their motives.
Obtaining Company Property
 Uniforms
 Company Identification
 Electronic Access Badge
 Codes
 Seals (new or used)
 Company Packaging
Material
Testing Your Security Procedures
 Employees show up on days off.
 Enter restricted/unauthorized zones with or without
adequate identification.
 Drivers deviate from predetermined routes to test GPS.
 Attempt to enter shipping area with unauthorized
articles (backpacks, gym bags, etc.)
 Arrange shipping a package/bag not related to
cargo.
Testing Your Security Procedures
 Test documentation review process by entering
erroneous information in shipment data.
 Attempt to pick-up cargo without documentation or
proper identification.
 Activate alarms to determine response times.
 Place unique markings on boxes with legitimate
product.
Contributing Factors
 Collusion between shipping personnel and drivers.
 Collusion between security guards and shipping
personnel.
 Collusion between drivers and criminals, to transport
contraband in conveyances.
 Criminals impersonating law enforcement to
compromise shipments during a ‘routine’ stop.
 Corrupt law enforcement entities compromising
shipments
during routine stops.
Contributing Factors
 Lack of supervision and/or too much complacency.
 Not following policies and/or procedures.
 Lack of adequate physical access controls.
 Failure to segregate critical areas of operation from
other areas.
 Failure to adequately secure critical documents
and/or
electronic information.
 Inadequate business partner screening process,
particularly those not related to supply chains.
Pallet Service Provider
Preventing Internal Conspiracies
 Contracting unrelated security companies for
multiple functions to discourage collusion.
 Segregating employee/public parking from
shipping areas.
 Sufficient cameras in adequate locations.
 Inspect personnel at entrances/exits.
 Segregating critical areas – shipping, production,
etc.
 Follow conveyances randomly.
 Supervisor presence during loading and seal
application.
Preventing Internal Conspiracies
 Evaluate level of awareness/alertness for security guards
and employees through security scenarios.
 Adequate illumination in yards, facilities, etc.
 Video record conveyance inspections and seal application.
 Audit recordings and GPS reports to detect
suspicious behavior.
Supply Chain Security Challenges
 Tracking & Monitoring
 Outdated GPS Technology
 Improper Use or Not Full
Potential
 Lack of Monitoring After
Normal Working Hours in
Required Areas
 Lack of Auditing Procedures
Tracking & Monitoring Fail
Supply Chain Security Challenges
 Policy vs. Practice
 Policy not in place.
 Policy not updated.
 Policy does not match
practice.
 Policy not reviewed/approved
by corporate staff.
Supply Chain Security Challenges
 Practice Not
Efficient
 Inadequate Training
 Lack of Oversight
 Inadequate/
Incorrect
Equipment
Inadequate Equipment
Compromised Equipment
Where is it?
Discovery
Where is it?
Discovery
Where is it?
Proactive vs. Reactive
Approach
Proactive vs. Reactive
Approach
Discussion and Questions
• Sunil Gaikwad
Supply Chain Compliance Specialist
Customs-Trade Partnership Against
Terrorism

More Related Content

PDF
Vendor ctpat securityawareness2010
PPTX
CTPAT-MSR.pptx- Presentation Slides for trainees
PDF
Supply Chain Security
PDF
Customs-Trade Partnership Against Terrorism (C-TPAT): Supply Chain Security
PDF
Warehouse security best practices ctpat.pdf
PPTX
CTPAT PPTX Presentation.pptx - minimum security
PPTX
Threat awareness program for employee.pptx
PDF
Iwla best practices
Vendor ctpat securityawareness2010
CTPAT-MSR.pptx- Presentation Slides for trainees
Supply Chain Security
Customs-Trade Partnership Against Terrorism (C-TPAT): Supply Chain Security
Warehouse security best practices ctpat.pdf
CTPAT PPTX Presentation.pptx - minimum security
Threat awareness program for employee.pptx
Iwla best practices

Similar to Internal Conspiracies JP (1).pptx security (20)

PPT
CTPAT Training For our Employees at .ppt
PDF
Take a Stand and Deliver – Proactive Security Defeats Organized Criminals
DOCX
CHAPTER 9Transportation Risk Management1Transportation
PDF
Supply Chain Security A Comprehensive Approach 1st Edition Arthur G. Arway
PDF
Supply Chain Security A Comprehensive Approach 1st Edition Arthur G. Arway
DOCX
Trapping exception and failure stories in hub operation quality issues.
DOCX
Analysis and prediction of shipment load in festive seasons
PPTX
Importer Compliance Risk Assessment
PDF
Seeing Red In Your Future?
PDF
1. c tpat minimum security criteria
PDF
Mitigating Risk Within Your Supply Chain
PPT
CTPAT PRESENTATION.ppt
PPTX
CTPAT v5.0 Cyber24x7.pptx
PPTX
Part 3 escort, carry and store valuable items
PPTX
Prevention and response shared copy
PDF
Proven ways to steal stock from the dc
PDF
Logisticsandsupplychainmanagement napm-wichita-140121142320-phpapp02
PPT
The impact of implementing CSI and C-TPAT security initiatives on Supply Chai...
DOCX
Create a 11-13 power point slides (with speaker notes) in which you .docx
PPTX
wms ppt.pptxcsfcsdsdssdsjnkjnjknjnjnjnjj
CTPAT Training For our Employees at .ppt
Take a Stand and Deliver – Proactive Security Defeats Organized Criminals
CHAPTER 9Transportation Risk Management1Transportation
Supply Chain Security A Comprehensive Approach 1st Edition Arthur G. Arway
Supply Chain Security A Comprehensive Approach 1st Edition Arthur G. Arway
Trapping exception and failure stories in hub operation quality issues.
Analysis and prediction of shipment load in festive seasons
Importer Compliance Risk Assessment
Seeing Red In Your Future?
1. c tpat minimum security criteria
Mitigating Risk Within Your Supply Chain
CTPAT PRESENTATION.ppt
CTPAT v5.0 Cyber24x7.pptx
Part 3 escort, carry and store valuable items
Prevention and response shared copy
Proven ways to steal stock from the dc
Logisticsandsupplychainmanagement napm-wichita-140121142320-phpapp02
The impact of implementing CSI and C-TPAT security initiatives on Supply Chai...
Create a 11-13 power point slides (with speaker notes) in which you .docx
wms ppt.pptxcsfcsdsdssdsjnkjnjknjnjnjnjj
Ad

More from surnil7785 (20)

PPTX
Cyber Security Training Module 2025.pptx
PPTX
Digital & SIP Training Security Training Module.pptx
PPTX
FACILITY-SECURITY-PLAN-training pptx.pptx
PPTX
JPPIPL Carbon awareness Footprint Training.pptx
PPTX
shra-awareness performance-appraisal.pptx
PPTX
781544553-HSE-awareness Induction-Template.pptx
PPTX
Cyber security-awareness-training security-.pptx
PDF
Chemical Safety Tool Box Talk. safety pdf ppt
PPTX
Environment Protection Awareness Training.pptx
PPTX
Code of Conduct & Workplace Ethics - JP.pptx
PPT
Dining Etiquette - JP.ppt awareness training
PPTX
posh_pink__blue-archies.pptx awareness training
PPTX
CyberSecurityPPT_V3_1.pptx training module
PPTX
Parenting Style.pptx training for parents
PPTX
Parental Support.pptx training for paremts
PPTX
cyber-security-training-presentation-q320.pptx
PPTX
Chemical Storage & handling training ppt.pptx
PPTX
GRIEVANCE PROCEDURE PPT HINDI JP 2024.pptx
PPTX
grievanceitshandlingprocedure-171027101500.pptx
PPTX
Professional-Workplace-Culture-Employees.pptx
Cyber Security Training Module 2025.pptx
Digital & SIP Training Security Training Module.pptx
FACILITY-SECURITY-PLAN-training pptx.pptx
JPPIPL Carbon awareness Footprint Training.pptx
shra-awareness performance-appraisal.pptx
781544553-HSE-awareness Induction-Template.pptx
Cyber security-awareness-training security-.pptx
Chemical Safety Tool Box Talk. safety pdf ppt
Environment Protection Awareness Training.pptx
Code of Conduct & Workplace Ethics - JP.pptx
Dining Etiquette - JP.ppt awareness training
posh_pink__blue-archies.pptx awareness training
CyberSecurityPPT_V3_1.pptx training module
Parenting Style.pptx training for parents
Parental Support.pptx training for paremts
cyber-security-training-presentation-q320.pptx
Chemical Storage & handling training ppt.pptx
GRIEVANCE PROCEDURE PPT HINDI JP 2024.pptx
grievanceitshandlingprocedure-171027101500.pptx
Professional-Workplace-Culture-Employees.pptx
Ad

Recently uploaded (20)

PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
PPTX
B.Sc. DS Unit 2 Software Engineering.pptx
PDF
Empowerment Technology for Senior High School Guide
PDF
advance database management system book.pdf
PPTX
History, Philosophy and sociology of education (1).pptx
PDF
Uderstanding digital marketing and marketing stratergie for engaging the digi...
PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PDF
HVAC Specification 2024 according to central public works department
PDF
Hazard Identification & Risk Assessment .pdf
PDF
Environmental Education MCQ BD2EE - Share Source.pdf
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PPTX
Computer Architecture Input Output Memory.pptx
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
PPTX
TNA_Presentation-1-Final(SAVE)) (1).pptx
PDF
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
Unit 4 Computer Architecture Multicore Processor.pptx
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
B.Sc. DS Unit 2 Software Engineering.pptx
Empowerment Technology for Senior High School Guide
advance database management system book.pdf
History, Philosophy and sociology of education (1).pptx
Uderstanding digital marketing and marketing stratergie for engaging the digi...
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
LDMMIA Reiki Yoga Finals Review Spring Summer
HVAC Specification 2024 according to central public works department
Hazard Identification & Risk Assessment .pdf
Environmental Education MCQ BD2EE - Share Source.pdf
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
Computer Architecture Input Output Memory.pptx
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
TNA_Presentation-1-Final(SAVE)) (1).pptx
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf

Internal Conspiracies JP (1).pptx security

  • 1. Jay Precision Security Awareness CTPAT & Internal Conspiracies Training Sunil Gaikwad compliance@jayprecision.co m Cell 7575003918
  • 2. Overview  CTPAT  Role within Customs and Border Protection (CBP)  Authorized Economic Operator (AEO) Cooperation  Supply Chain Security Challenges  Internal Conspiracies  Tracking & Monitoring  Policy vs. Practice
  • 3.  In a day in 2017, CBP processed:  78,137 truck, rail, and sea containers  1,088,300 incoming international passengers (air, sea, land)  282,350 incoming privately owned vehicles  Confiscated:  5,863 kilos of narcotics  $3.3 million in illegal/prohibited goods  $265,205 in illicit or undeclared currency Why CTPAT is Vital for CBP Statistical perspective.
  • 4. CTPAT Membership & Updates  Current Membership: 11,186 Certified Partner Accounts  Importers: 4,131  Mexican Carriers & Manufacturers: 2,815
  • 5. AEO Cooperation  Key Joint Benefits  Coordinated joint outreach events, (conferences, seminars, and workshops, etc.).  Joint validations  Efficient allocation of resources, man-hours, and travel expenses.  Cross training for Specialists in both programs.
  • 6. Supply Chain Security Challenges  Internal Conspiracies  Definition  When individuals or groups work in accord to commit an illegal act.  Exists when its participants utilize legal or illegal methods to commit an illegal act.  Motivation  When the end result is substantial for relatively easy work.
  • 7. Motivating Factors  The use of internal conspiracies is viewed as the most cost effective and simplest method to smuggle narcotics by Drug Trade Organizations (DTOs).  The loss of a certain amount of narcotics is acceptable and seen as part of the business.  The risk of being caught is minimal due to:  The amount of cargo coming from regions identified as being high risk.  Law enforcement authorities’ lack of sufficient resources.
  • 8. Profits  Users in the US spent approximately $100 billion annually over the past decade.  Average cost of most common narcotics (in USD):  Marijuana: $15 per gram ($15,000 per kilo)  Cocaine: $100-$120 per gram ($120,000 per kilo)  Heroin: $15-$20 per dose - 0.1 grams ($200K per kilo)
  • 9. Other Gains  Illegal export of weapons and ammunition to criminal elements or other threats (assault weapons, grenade launchers, etc.).  Profit made from illegal activities can be utilized to create legitimate businesses, which subsequently serve the purpose of continued smuggling.
  • 10. Who Loses?  Legitimate businesses:  Commodity and conveyances are contaminated after being utilized in the movement of illicit product.  Economic cost and risk of negative publicity.
  • 11. External Recruiter Tools  Bribes  Employees may accept bribes for information and/or company property.  Security personnel, shipping & receiving personnel, and drivers have the highest risk, including management staff.  Silver or Lead
  • 12. How your Employees are Recruited  Conspirators collect employee information; names, addresses, family members, etc.  Conspirators familiarize themselves with employee habits at work and personal lives. They focus on discovering which employees have an immediate need for money.  Conspirators concentrate on employees who may have known criminal backgrounds or low ethics.
  • 13. Surveillance  Collecting facility and operational information via surveillance.  Take photographs of entrances, personnel, and commercial traffic.  Determine level of perimeter security.  Conspirators evaluate site illumination, camera positions, and shifts.
  • 14. Surveillance  By evaluating vulnerabilities within the company, conspirators may create the opportunity for a violation.  Obtaining shipping procedures and/or loading plans also facilitates the introduction of illicit materials.  Transit routes and scheduled stops are of particular interest.
  • 15. Conspirator Tools  Company systems:  Conspirators attempt to access company systems without authorization in order to manipulate manifests, shipping documents, invoices, loading plans, etc.  Conspirators may add erroneous information or alter shipping data to facilitate the introduction of illicit materials to legitimate cargo.  Social Media Outlets:  Facebook, Twitter, company web page, etc. to obtain company and employee information.
  • 16. Recruitment Success  Once a Relationship is Established  Conspirators show interest in job functions, make unusual questions about cargo flow or shipping methods.  Ask about GPS systems, documentation processing, etc.…to facilitate their motives.
  • 17. Obtaining Company Property  Uniforms  Company Identification  Electronic Access Badge  Codes  Seals (new or used)  Company Packaging Material
  • 18. Testing Your Security Procedures  Employees show up on days off.  Enter restricted/unauthorized zones with or without adequate identification.  Drivers deviate from predetermined routes to test GPS.  Attempt to enter shipping area with unauthorized articles (backpacks, gym bags, etc.)  Arrange shipping a package/bag not related to cargo.
  • 19. Testing Your Security Procedures  Test documentation review process by entering erroneous information in shipment data.  Attempt to pick-up cargo without documentation or proper identification.  Activate alarms to determine response times.  Place unique markings on boxes with legitimate product.
  • 20. Contributing Factors  Collusion between shipping personnel and drivers.  Collusion between security guards and shipping personnel.  Collusion between drivers and criminals, to transport contraband in conveyances.  Criminals impersonating law enforcement to compromise shipments during a ‘routine’ stop.  Corrupt law enforcement entities compromising shipments during routine stops.
  • 21. Contributing Factors  Lack of supervision and/or too much complacency.  Not following policies and/or procedures.  Lack of adequate physical access controls.  Failure to segregate critical areas of operation from other areas.  Failure to adequately secure critical documents and/or electronic information.  Inadequate business partner screening process, particularly those not related to supply chains.
  • 23. Preventing Internal Conspiracies  Contracting unrelated security companies for multiple functions to discourage collusion.  Segregating employee/public parking from shipping areas.  Sufficient cameras in adequate locations.  Inspect personnel at entrances/exits.  Segregating critical areas – shipping, production, etc.  Follow conveyances randomly.  Supervisor presence during loading and seal application.
  • 24. Preventing Internal Conspiracies  Evaluate level of awareness/alertness for security guards and employees through security scenarios.  Adequate illumination in yards, facilities, etc.  Video record conveyance inspections and seal application.  Audit recordings and GPS reports to detect suspicious behavior.
  • 25. Supply Chain Security Challenges  Tracking & Monitoring  Outdated GPS Technology  Improper Use or Not Full Potential  Lack of Monitoring After Normal Working Hours in Required Areas  Lack of Auditing Procedures
  • 27. Supply Chain Security Challenges  Policy vs. Practice  Policy not in place.  Policy not updated.  Policy does not match practice.  Policy not reviewed/approved by corporate staff.
  • 28. Supply Chain Security Challenges  Practice Not Efficient  Inadequate Training  Lack of Oversight  Inadequate/ Incorrect Equipment
  • 38. Discussion and Questions • Sunil Gaikwad Supply Chain Compliance Specialist Customs-Trade Partnership Against Terrorism