Securing the Containerized Supply Chain: Analysis of Government Incentives for Private Investment

To mitigate the threat that terrorists smuggle weapons of mass destruction into the United States through maritime containers, the U.S. Bureau of Customs and Border Protection (CBP) inspects containers upon entry to domestic ports. Inspection-driven congestion is costly, and CBP provides incentives to firms to improve security upstream in the supply chain, thereby reducing the inspection burden at U.S. ports. We perform an economic analysis of this incentive program, called Customs-Trade Partnership Against Terrorism (C-TPAT), modeling in a game-theoretic framework the strategic interaction between CBP, trading firms, and terrorists. Our equilibrium results highlight the possibility that a properly run program can efficiently shift some of CBP's security burden to private industry. These results also suggest that CBP may have the opportunity to use strategic delay as an incentive for firms to join. Analysis of comparative statics shows that, with increasing capacity, membership in C-TPAT systematically declines.

[1]  Jennifer E. Lake,et al.  Border Security: Inspections Practices, Policies, and Issues , 2004 .

[2]  Sam Chiu,et al.  Detecting Nuclear Material in International Container Shipping : Criteria for Secure Systems , 2004 .

[3]  Ingram Olkin,et al.  A General Approach to Some Screening and Classification Problems , 1968 .

[4]  Stefan Voß,et al.  Container terminal operation and operations research - a classification and literature review , 2004, OR Spectr..

[5]  James L. McClelland On the time relations of mental processes: An examination of systems of processes in cascade. , 1979 .

[6]  Susan E. Martonosi,et al.  How Effective Is Security Screening of Airline Passengers? , 2006, Interfaces.

[7]  Richard Lugar,et al.  Lugar Survey on Proliferation Threats and Responses , 2005 .

[8]  Stephen L. Caldwell Maritime Security: Observations on Selected Aspects of the SAFE Port Act, Statement of Stephen L. Caldwell, Director Homeland Security and Justice, Testimony before the Subcommittee on Border, Maritime, and Global Counterterrorism; Committee on Homeland Security; House of Representatives , 2007 .

[9]  Noah Gans,et al.  Estimating the Operational Impact of Container Inspections at International Ports , 2010, Manag. Sci..

[10]  Wallace J. Hopp,et al.  Operations Systems with Discretionary Task Completion , 2006, Manag. Sci..

[11]  Christopher Conrad,et al.  Supply Chain Security: U.S. Customs and Border Protection has Enhanced its Partnership with Import Trade Sectors by Challenges Remain in Verifying Security Practices , 2008 .

[12]  Jun Zhuang,et al.  Balancing congestion and security in the presence of strategic applicants with private information , 2011, Eur. J. Oper. Res..

[13]  Lawrence M Wein,et al.  Preventing the importation of illicit nuclear materials in shipping containers. , 2006, Risk analysis : an official publication of the Society for Risk Analysis.

[14]  Hau L. Lee,et al.  Higher supply chain security with lower cost: Lessons from total quality management , 2005 .

[16]  Tom Fawcett,et al.  An introduction to ROC analysis , 2006, Pattern Recognit. Lett..

[17]  Wayne A. Wickelgren,et al.  Speed-accuracy tradeoff and information processing dynamics , 1977 .

[18]  Jon M. Huntsman,et al.  Wharton Risk Management and Decision Processes Center , 2002 .

[19]  Leigh B Boske,et al.  Port and Supply-Chain Security Initiatives in the United States and Abroad , 2006 .

[20]  Право SAFE Port Act , 2010 .

[21]  W. Whitt Uniform conditional stochastic order , 1980 .

[22]  Zheng Cao,et al.  The Optimal Spatiotemporal Deployment of Radiation Portal Monitors Can Improve Nuclear Detection at Overseas Ports , 2007 .

[23]  Susan E. Martonosi,et al.  Evaluating the Viability of 100 Per Cent Container Inspection at America's Ports , 2005 .

[24]  Michael D. Greenberg,et al.  Maritime Terrorism: Risk and Liability , 2006 .

[25]  Edieal J. Pinker An Analysis of Short-Term Responses to Threats of Terrorism , 2007, Manag. Sci..

[26]  Edieal J. Pinker,et al.  Gatekeepers and Referrals in Services , 2003, Manag. Sci..

[27]  Brian Tomlin,et al.  On the Value of Mitigation and Contingency Strategies for Managing Supply Chain Disruption Risks , 2006, Manag. Sci..

[28]  Germaine H. Saad,et al.  Managing Disruption Risks in Supply Chains , 2005 .

[29]  K. M. Ghylina,et al.  Two-component model of security inspection : application and findings , 2006 .

[30]  H. Kunreuther,et al.  Third‐Party Inspection as an Alternative to Command and Control Regulation , 2002, Risk analysis : an official publication of the Society for Risk Analysis.

[31]  Richard M. Stana Summary of Challenges Faced in Targeting Oceangoing Cargo Containers for Inspection Statement of , 2004 .

[32]  Robin,et al.  World at Risk: The Report of the Commission on the Prevention of WMD Proliferation and Terrorism , 2008 .

[33]  Eitan Altman,et al.  A survey on networking games in telecommunications , 2006, Comput. Oper. Res..

[34]  Angela Greiling Keane Where's the incentive? , 2005 .

[35]  Moshe Shaked,et al.  Stochastic orders and their applications , 1994 .

[36]  U. Beck WORLD AT RISK , 2008 .

[37]  Ronald W. Wolff,et al.  Stochastic Modeling and the Theory of Queues , 1989 .