determine the threat and sensitivity of the cargo, and its vulnerability.
They must also consider the mode of transportation in deciding the degree of
security required. The degree and type of security needed is determined by a
number of things.
a. Facility size and location.
b. Complexity of storage for shipment.
c. Volume/value of shipment.
d. Economic and geographic situation.
e. Security/law enforcement available.
f. Number and location of transit shipment.
g. Local crime statistics.
Cargo Security System.
a. During the movement of cargo, the terminal operation is the most
vulnerable place during the loading and unloading. The fact that the carrier
is at a stand still presents an opportunity for pilferage and sabotage. Both
loading and unloading should be done as quickly as possible. When loading is
complete, the carrier should be moved as soon as possible. Unloading should
begin as soon as the carrier arrives at its destination. Immediate handling
of cargo reduces the risk of loss.
b. Facility personnel who work with the cargo directly could be your
biggest asset or liability.
Personnel should be screened prior to
Once assigned, security education programs should be started,
These should stress the moral wrong of pilferaging and individual
responsibility for accounting for cargo. The following are guidelines within
the control of the security officer's influence:
(1) Require piece counts when cargo is moved to and from vehicles.
Require this also when cargo is moved in and out of storage areas, vessels,
Insist on clear identification of those who conduct such
These people include drivers, checkers, receiving personnel, or
other designated parties.
(2) Each person handling a shipment at each stage of transit should
be required to tally and sign certifying shipment intact.
(3) Verify identity of carrier and carrier employee.
c. False invoices and receipts for shipments present an area vulnerable
Blank government bills of lading and uncontrolled documents for
movement should be eliminated. Simple countermeasures such as the following,
may be used: