Management Research Paper On Accessing Container Security (Research Paper Sample)
The requirements of this paper include a cover sheet (using the 6 line undergraduate entry), 3-5 numbered pages of text, and a reference page. The research paper requires at least five references.
Accessing Container Security
Each year Millions of shipping containers arrive at American seaports each year. This does not include the millions of containers that cross International boards by truck and rail. With every crossing container there is a threat of drug trafficking and terrorism. Customs and Border Protection executed the Importer Security Filing and Additional Carrier Requirements to gather supplemental informative data for focusing on. I'm interested in how the information gathered and used for container security. How does cargo flow securely through US boarders?
The entry of contrabands into the country is a very serious issue that contributes negatively to the economy and pose direct threat to the lives of the citizens. Roughly 840 undocumented immigrants from Mexico are caught or stopped every day along the border (Kulish and Santos, 2017). More than a million kilos of illegal drugs being transported into the country were also caught as of December 2009 (U.S. Dept. of Justice, 2010). According to an April 3, 2017 report by the ABC News, 23 illegal immigrants from China were found huddling in a cargo container at Long Beach, California. The menace brought by drug and human trafficking, smuggling of goods and entry of items used in terroristic activities is very alarming. The threats at the U.S. borders are a very challenging tasks for the authorities designated to carry out the laws.
While the government is much focused on the land border crossing of goods and the arrival of the same via air transport, shipments into the country of goods through marine vessels are also given critical attention. On January 26, 2009, the U.S. government started enforcing the Import Security Filing (ISF), commonly known as “10+2” for cargo imports arriving in the United States by vessel. It must be submitted electronically to the U.S. Customs and Border Protection (CBP) at least 24 hours before lading. The programs gives the CBP the ability to identify high-risk shipments and helps in preventing smuggling while ensuring cargo safety and security (CBP, 2009).
With this, increased inspections resulting in cargo delays became common. But it was to the effect that the country and its citizens are placed on safer grounds. The ISF is enforced by the US Customs and Border Protection and is required for all containerized shipment to the country.
The ISF is dubbed as “10+2” because of the 10 required data elements relative to the cargo plus the 2 required data elements from the carrier.
The 10 required data elements are (DHS, 2008):
3.Importer of Record Number
6.Ship to party
7.Country of origin
8.Commodity Harmonized Tariff Schedule (HTS) number
9.Container stuffing location
Additional two elements from the carrier are (DHS,
- MGTA05 - Foundations of Business Management Fall 2017Description: This value which made the company what it is now is credited directly to Steve Jobs, Apple’s genius creator and former chief executive officer...3 pages/≈825 words| No Sources | APA | Management | Research Paper |
- What Is Holacracy, And How Long Has It Been Around?Description: Discuss at least 2-3 organizations who have attempted to implement the concept into their organization. Who was successful? Who failed?...3 pages/≈825 words| 2 Sources | APA | Management | Research Paper |
- Research Paper About CEO of Soutwest Airline Gary KellyDescription: Present the leadership qualities that Gary C. Kelly implements in the company through exploration of his personal, professional and management backgrounds....4 pages/≈1100 words| 3 Sources | APA | Management | Research Paper |