Securing cargo for export

September 2018 Transport (Industry), Security Services & Risk Management

When cargo needs to be moved quickly to another country, the preferred method of transportation is via air. Delays in the supply chain can incur financial and reputational losses for exporters. Hi-Tech Security Solutions discusses the air cargo handling process.

According to the International Civil Aviation Organization (ICAO): “All those involved in these often complicated movements (of cargo) share the responsibility for ensuring the safety and security of the cargo and for operating within the law. In particular, they are responsible for ensuring that nothing contained in the cargo will endanger an aircraft and the lives of those travelling in it.”

David Alexander, general manager at Professional – a company providing risk assessment, training and security to the South African aviation sector – explains that South Africa is one of the 192 Member States of ICAO and as such is bound by its regulations and requirements with respect to exported cargo.

ICAO’s Member States have developed standards to support the implementation of a secure supply chain through the regulated agent and known consignor regimes. These entities are approved by the appropriate authority and may apply security controls, including screening, upstream in the air cargo supply chain.

In essence, these entities must ensure that the cargo to be carried on a commercial aircraft is protected from unauthorised interference from the point where screening or other security controls are applied, up until the departure of the aircraft. The implementation of the secure supply chain reduces the burden on aircraft operators, while simultaneously facilitating the processing of secure cargo when it arrives at an airport.

Protection procedures

Alexander points out that before cargo is loaded on to aircraft, it must be made secure. This occurs in two ways. Firstly, the cargo is delivered to the ground handling agent of the air carrier at the airport. The agent then screens the cargo using an X-ray machine or explosion-detection dogs to check for the presence of prohibited items such as improvised explosive devices.

“The key here is the prevention of acts of unlawful interference in the placement of an incendiary or explosive device. It must be noted that this procedure is not related to the security of cargo from a crime prevention perspective,” says Alexander.

Once the cargo is screened, it will be placed in a secure on-site warehouse that makes use of access control systems and surveillance cameras to ensure that no unlawful entry or tampering occurs. A security declaration will be issued which states that security control has been applied to this cargo and that it is safe for transport by air. The ramp handling agent will then ensure that the cargo is loaded on to the aircraft.

The second method of handling cargo within the secure supply chain is that a known consignor who is the originator of the cargo (the exporter or manufacturer), working in adherence with the approved Civil Aviation Authority (CAA) security manuals, would seal the cargo with a tamper-evident seal so that its integrity can be verified. They then send it to a regulated agent/freight forwarder. All of these parties are CAA-registered entities.

The cargo will be delivered with a security declaration to the regulated agent and then delivered to the ground handling agent. In this way there is an unbreakable and secure supply chain from the point of origination to the delivery point.

Any entity that renders cargo secure is obliged to issue a Consignment Security Declaration (CSD) which specifies the security status of the cargo and displays other important security information. This document (hard copy or electronic) is transmitted to each party involved later in the secure supply chain in order for them to apply the appropriate security measures to the consignment and protect it from unauthorised access.

Alexander explains that if one is a regulated agent, then it will not be legally necessary for the cargo to be screened again when it is received by the ground handling agent, since the implemented security measures are deemed to be sufficient. “However, what usually happens is that the ground handling agent will in any case X-ray the cargo as they are employed by the aircraft carrier and may have been instructed to do so. No charge may be raised for this security screening since, in theory, it is not required.”

It is important, says Alexander, that the staff of known consignors are carefully screened to ensure that they do not have a criminal record. The same criteria are applied to ground clearance employees and they additionally need to undergo aviation awareness and dangerous goods awareness training. In all cases there should be a designated official employed or contracted by the regulated agent who is responsible for all security screening and compliance of cargo.

Incoming

Alexander says that cargo coming into the country would be deemed secure if it has originated from one of the ICAO’s Member States that applies similar security measures. “Security measures are applied at the point of origin, not at the point of receipt. On arriving in South Africa, it will simply be subjected to our customs control procedures.

“In the case of what is deemed transit cargo, in other words, cargo that originates from a Member State but is bound for another country, the cargo is never actually unloaded from the aircraft and therefore will not be subject to either our customs controls or security measures. The onus is on the operator to ensure that cargo is secure, not the regulatory authority.”

He adds that with respect to transfer cargo, it would be placed in a bond warehouse which has an equivalent level of security and there would be rescreening of the cargo if there is any in doubt about its compliance with regulations, before onward carriage takes place.

Doing it right

Alexander points out that a secure supply chain potentially prevents delays in cargo being shipped out of the country. However, if the cargo has triggered an alarm when being screened by the X-ray machine or detection dogs, or the tape or seal is found to be damaged, then it will be held back and the entities responsible for its security will be alerted and instructed to ensure that the cargo is made secure.

“Often, the reason for a delay in transporting cargo via air is not a security one but rather one of safety compliance. There are 4 500 items defined as a Dangerous Goods by ICAO and the South African regulations and any cargo containing these items will only be considered safe to transport if the cargo is packed and shipped correctly. We find that because it costs more to transport these dangerous items, people may often be tempted not to declare them. However, once these items have been discovered and (1) the cargo has not been made secure and/or (2) there is no documentation stipulating that it qualifies as Dangerous Goods, then these goods will be returned for the attention of the responsible party for proper packaging and documentation,” Alexander explains.

This naturally causes delays in the shipping of the cargo and therefore in order to ensure that cargo is moved along the chain as quickly as possible, proper packaging and sealing procedures, in accordance with regulations, should be followed. In addition, if dangerous goods are to be shipped, this must be stipulated on the necessary documentation for review by the handling agent or the known consignor.

“Finally, one should be able to match the documentation with the contents of the cargo. Common sense, logic and integrity are basic attributes which people shipping goods via air should possess, thereby ensuring the expeditious delivery of their goods to the destination,” concludes Alexander.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

From the editor's desk: The beginning of the end
Technews Publishing News & Events
            As we come to the final issue of SMART Security Solutions, we can look back on a tough year: long decision-making cycles, squeezed budgets and the expectation of miracles on a shoestring. SMART Security ...

Read more...
AI and automation are rewriting the cloud security playbook
Technews Publishing AI & Data Analytics
Old-school security relied on rules-based systems that flagged only what was already known. AI flips the script: it analyses massive volumes of data in real-time, spotting anomalies that humans or static rules would miss.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Cybersecurity operations done right
LanDynamix SMART Security Solutions Technews Publishing Information Security
For smaller companies, the costs associated with acquiring the necessary skills and tools can be very high. So, how can these organisations establish and maintain their security profile amid constant attacks and evolving technology?

Read more...
Kaspersky finds security flaws that threaten vehicle safety.
News & Events Information Security Transport (Industry)
At its Security Analyst Summit 2025, Kaspersky presented the results of a security audit that exposed a significant security flaw enabling unauthorised access to all connected vehicles of one automotive manufacturer.

Read more...
Global hub for predictive road safety intelligence
News & Events Asset Management Transport (Industry)
One year since its formation, Netstar’s advanced Global Fleet Bureau is more than an operational facility for international fleet management, it has become a big-data nerve centre delivering unprecedented value to clients.

Read more...
Syndicates exploit insider vulnerabilities in SA
Information Security Security Services & Risk Management
Today’s cyber criminals do not just exploit vulnerabilities in your systems; they exploit your people, turning trusted team members into unwitting accomplices or deliberate collaborators in their schemes.

Read more...
Is your entrance security secure?
SMART Security Solutions Centurion Systems Technews Publishing News & Events Access Control & Identity Management Smart Home Automation
While Centurion Systems may be known as a leader in gate and door motors in 72 countries, the company has developed more than hardware and now offers an automation ecosystem for access control security.

Read more...
The impact of AI on security
Technews Publishing Information Security AI & Data Analytics
Today’s threat actors have moved away from signature-based attacks that legacy antivirus software can detect, to ‘living-off-the-land’ using legitimate system tools to move laterally through networks. This is where AI has a critical role to play.

Read more...
SABRIC Annual Crime Statistics 2024
News & Events Security Services & Risk Management Residential Estate (Industry)
SABRIC has released its Annual Crime Statistics for 2024, reflecting a significant decline in financial crime losses, but also warning of the growing threat posed by artificial intelligence (AI) in fraud schemes.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.