Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
com/tl2030
Transportation &
Logistics 2030
Volume 4: Securing the
supply chain
Strategies to help
companies take an active
role in improving supply
chain security.
Acknowledgements
The editorial board of this issue of our Transportation & Logistics 2030 series consisted of the
following individuals:
We would like to thank the panellists who took part in the Delphi survey that underpins this
report. For confidentiality reasons their names will not be mentioned. We would also like
to thank Thorsten Neumann, chairman of TAPA EMEA, for his support and opening up his
network of security experts for this research.
We would like to express our appreciation for the expertise provided by the below listed
individuals: Dan Antonio, Jochen Schmidt and Otto Vermeulen.
For more information on the T&L 2030 series or a download of our four T&L 2030
publications, please visit www.pwc.com/tl2030.
2 PwC
Welcome
Supply chains must be secured against any form of man-made and natural disruption.
This certainly isn’t a new revelation. Some hundred years ago commercial shipping
was threatened by pirates and renegades like Anne Bonny, Sir Francis Drake or Klaus
Störtebeker, and so transport ships were equipped with cannons and crews ready for a
fight. Today piracy as a ‘business model’ is enjoying a remarkable renaissance. It’s but
one of many threats facing international logistics.
Freight and passenger transport facilities are frequently the target of attacks, whether
the motive be political or purely for profit. Natural disasters like the devastating
earthquake and tsunami in Japan show us only too clearly just how vulnerable our
transportation and logistics systems are, when, for example, key commercial harbours
are taken out of commission; not to mention the far graver human suffering such
events can cause. And with electronic data exchange becoming an ever more critical
part of interlinked value chains, worries about data security and industrial espionage
are becoming more pronounced.
Reason enough to focus the fourth volume of our thought leadership series
Transportation & Logistics 2030 (T&L 2030) on the topic of supply chain security. As
in previous studies, we’ve surveyed a global group of experts using the RealTime Delphi
method. They told us what elements of supply chain security they believe will be most
critical in the future.
Will we see more attacks on supply chains and logistics hubs in the future? Do the
experts foresee cyber attacks causing much damage in transportation and logistics?
What is the best way to guarantee security – advanced technology or security audits or
what else? Will these measures lead to huge extra costs and a slow-down of transport?
These are some of the questions we address in this report. We appreciate that you have
‘secured’ your copy of T&L 2030 Vol. 4 and hope it will help you secure your supply
chain, too.
The study also observes the new face of danger: cyber attacks. Today, entire countries
are already exposed to permanent virtual attacks. Every two seconds, the German
Internet is attacked. Logistics, as driver of globalisation, will become the focus of
offenders in the years to come. A hacker could infiltrate the flight control system,
for example, and randomly let airplanes fall from the sky. Or re-set the tracks in rail
traffic and let trains crash… What would we do then?
Based on the opinions of leading experts for supply chain security from academia,
business practice, technology development and politics, the study proves: It isn’t enough
to simply react. Supply chain security is not crisis management. Supply chain security
is proactive: It hinders attacks before they happen. Supply chain security will have
failed if such catastrophes start to occur.
Moreover, the study demonstrates that the future belongs to secure supply chains.
However, the one who would like to achieve this security with modern technology
builds on sand. The best scanner for explosive agents is useless if the security personnel
is not well-trained or if the communication processes within the supply chain do not
function.
4 PwC
Table of Contents
Executive Summary 6
Wildcards 30
Opportunities 38
Methodology 43
References 49
6 PwC
There are no easy answers, but the and air freight traffic moves through the
As the number of man-made urgent need to ask these questions is Hong Kong - Shenzhen freight cluster,
attacks on supply chains increases, clear. Threats from terrorism and piracy, so a disabling attack here would have
for example, are on the upswing. That’s a huge impact. Because logistics hubs
how will companies need to react?
already starting to have an impact on drive economic activity, successful
Where will the critical points supply networks. attacks could also threaten economic
on the supply chain be – and stability.
how can companies stay flexible Total direct costs of piracy in 2010
if situations heat up? How can are estimated to be between US$ 7 Chokepoints, geographic features where
companies make sure their people billion and US$ 12 billion.1 And when there’s only one narrow way across
you look at the indirect costs too, the a strait, valley or bridge, are another
and technology are up to the task
figure is much higher. Piracy damages potential weak point. Disrupting traffic
of securing the supply chain over the tourism industry, causes losses in through the Panama Canal, Suez
the next two decades? revenues for canal fees and the costs Canal or the Strait of Malacca, for
“loss of use” and “loss of man-hours” example, would slow down freight flows
while ships and their crew are held significantly.
hostage are also significant. Many
shipping companies are now either Ensuring secure passage
hiring special security, working together
with UN troops or altering their shipping We believe that transportation and
routes. logistics companies will need to take
security concerns into account when
Terrorism remains a concern too, choosing transport routes. They’ll need
particularly since there are a number of to take a close look at how dependent
locations that are particularly crucial to their business is on particular logistics
the smooth flow of supply chains – and hubs or chokepoints, and then assess
therefore potentially most vulnerable how they can reduce the impact
to attack. Logistics hubs and gateway of threats to particular locations.
regions are one concern. As just one Transportation and logistics companies
example, a full 14.8% of containerised will also need to be prepared to respond
quickly if risk levels change.
Man-made attacks
on supply chains
are increasing.
Transportation and
logistics companies
will need to take
security concerns into
account when choosing
transport routes.
8 PwC
Stricter standards and the Supply chain security is challenging, but
need to take the lead there are opportunities too. Companies
that are able to develop flexible, agile
And while they won’t need to go it systems that can respond quickly and
completely alone, transportation and appropriately to crises – and avoid
logistics companies shouldn’t expect threats when possible – will have a
government to pick up the slack. We competitive advantage.
believe that governments won’t take
a leading role in executing supply Note on methodology
chain security, although they will
continue to regulate security measures. This study is based on a multifaceted
Transportation and logistics companies analysis of the importance of supply
will need to work together with chain security for the transportation
governmental institutions to develop and logistics industry. Our methodology
new security standards that are not only draws upon a rigorous mix of desk
effective, but also efficient. research and the results of a Delphi
survey among 80 selected subject matter
We believe that security audits along experts from 25 countries around the
the entire supply chain will become world, including both emerging and
a requirement to maintain effective mature economies.
levels of security. But even with stricter
standards and better technology, no
supply chain will ever be 100 percent
secure. Technology can help increase
security, but people are needed too, to
provide human intelligence and good
governance.
No supply chain will
ever be 100 percent
secure – but better
technology and
well-trained people
can make a big
difference.
10 PwC
Introduction
Supply chains will face
more direct attacks.
Terrorist acts, also called man-made attacks, are nothing new. In the
70’s, 80’s and 90’s, the Irish Republican Army (IRA) conducted attacks
on British police and army, and Germany’s Red Army Faction (RAF)
organised bombings and assassinations, to name just two well-known
examples. In the past decade, though, media and public attention has
gone up dramatically around the world and the focus has shifted from
national to international threats. The 9/11 attacks on the World Trade
Center in New York and the Pentagon in Washington D.C. in 2001
marked one defining moment. There have been others too. A bomb set
off in Madrid in 2004 caused an explosion in a public train which killed
more than 190 people. And several explosions in underground trains
and busses in London killed and injured more than 200 people in 2005.
Both events dominated news headlines around the world.
And the threat isn’t letting up. The head only public transit systems that need to
of the Federal Service for Supervision of be vigilant – cargo transportation can
Transport in Russia recently announced also be used as a carrier to conduct a
that the number of terrorist attacks terrorist attack and to harm human life.
on Russia’s transport systems has So securing supply chains is vital. Supply
more than doubled between 2009 and chains and transport systems need to
2010.2 That jump may continue, if the incorporate measures to secure human
bomb explosion at Moscow’s airport lives and transportation infrastructure
Domodedovo in January 2011 is a sign into their design. Freight screening, risk
of things to come.3 Recent parcel bombs profiling of employees and the use of
sent from Yemen via Europe to the trusted shippers are some of the options
US have also received heavy coverage that can help.
from the international press. It’s not
Figure 1a Number of attacks including vehicles Figure 1b Number of attacks excluding vehicles
3500
3000
Number of attacks
2500 400
350
2000
300
Number of attacks
250
1500
200
150
1000
100
500 50
0
2004 2005 2006 2007 2008 2009 2010
0
2004 2005 2006 2007 2008 2009 2010
Train/Subway Aviation
12 PwC
There are far more attacks on vehicles But the differences don’t stop there. Whether they’re concerned or relaxed
than on other transport modes such Concerned experts seem to take a about the probability of an increase
as ships, trains/subways or attacks on more pessimistic position – but they’re in the number of attacks on supply
airlines and airports. The majority of actually less pessimistic and more chains, it comes as no surprise that the
vehicles attacked are cars, although willing to take risks to respond to the majority of experts see such a jump
there were also incidents involving threats posed to supply chains, as we’ll as highly undesirable. Interestingly,
buses. Buses and cars are nearby and show. there are some experts who actually
easy to access; you don’t need a lot of see an increase in the number of
planning to successfully attack them. What arguments do concerned experts attacks as a good thing. They argue
Airlines and airports or harbour regions use to support their view that supply that attacks mean organisations will
generally have much higher existing chain attacks will strongly increase? make it a priority to find solutions and
security standards, so you need some Some note that the number of attacks develop more secure supply chains.
level of professional organisation in on supply chains is already increasing. Organisations will be more motivated to
order to attack them successfully. Theft, pilferage, missing cargo and improve their security measures.
counterfeiting are issues that the supply
Many terrorist groups are focused on chain manager has to deal with on a Supply chains will come under
their home territory and often choose daily basis. Financial damages caused increasing attack, and companies
targets that are close to their operational by theft in European supply chains need to be aware and prepared. That
basis. When terrorist attacks involve exceed a value of EUR 8.2 billion per could mean rethinking their approach
political disputes over territory, they’re year.9 They’re also worried that rising to dealing with potential supply chain
often carried out in the relevant unemployment and an enlarging gap disruptions.
territory. between rich and poor countries and
individuals will drive even greater
Do experts believe that attacks on numbers of attacks on supply chains.
supply chains will be more common What impact will such jumps have?
in the future? To find out, we asked Concerned experts point to supply
our Delphi panel to assess our first chains as highly vulnerable and critical
projection: “2030 – The number of to the world economy. Attacks on those
attacks on supply chains has increased.” economic lifelines would destabilise
entire economic systems and cause
The results are surprising. The experts severe economic downturns. If supply
in our panel don’t agree about the chains come to a halt due to man-made
probability of a significant increase attacks, food and medical supplies might
in attacks on the supply chain in the run short. And the cost of fuel could
future. Instead, they fall into two distinct skyrocket, if man-made attacks force
camps. One group (‘concerned’ experts, a breakdown in international supply
60% of the total sample) believes that chains.
the number of supply chain attacks
will strongly increase in the future. The Not all the experts agree. The relaxed
other group (‘relaxed’ experts, 40% group considers an increase in attacks
of the total sample) doesn’t foresee a as not very likely. In contrast to the
significant increase in attacks on supply concerned group, they argue that
chains. For a more detailed analysis of supply chains are already sufficiently
panellists’ response behaviour, please secured against attacks, and they believe
see page 47. security levels will get better still. New
and innovative technologies will be
available to better track the movement
of physical goods and spot irregularities
in supply chains quicker. That would
mean many attacks on supply chains
could be avoided.
Where are global supply chains most at risk? Countries that are less
stable, either politically or economically are often hot spots. Gateway
regions where there are very large flows of cargo are particularly
important for global supply chains, and are therefore also of special
interest to those looking to disrupt them. And just like military troops,
goods often need to pass through certain chokepoints, geographic
features where there’s only one narrow way across a strait, valley or
bridge.
We’ve considered all three factors and Some geographical regions or individual
have developed risk maps which show countries are more attractive targets
graphically where supply chains may be than others. Figure 2 shows the relative
most vulnerable, looking first at country risk of terrorist attack or activities
risk factors, then gateway regions and in every country around the world,
lastly geographic chokepoints. as well as four major areas of piracy,
according to the International Maritime
Bureau’s. These piracy areas include
the Gulf of Aden, near Somalia and the
southern entrance to the Red Sea, the
Gulf of Guinea, near Nigeria and the
Niger River delta; the Malacca Strait
between Indonesia and Malaysia; and
Malacca Strait between Indonesia and
Malaysia; and the coast of Venezuela
and Columbia.10
14 PwC
The risk factor calculation takes into Pakistan is another hot spot, with an
account each country’s relevance for increase in unmanned vehicle strikes
terrorists, separatists and nationalists, with extreme violence and extremists
instability due to recently conducted or groups on the rise in the past years. The
ongoing revolutions and the number recent US mission resulting in the death
of kidnappings. Countries facing a of Osama Bin Laden may also prompt
severe threat include the Horn of Africa retaliatory unrest.
with Yemen and Somalia, Afghanistan,
Pakistan, India, and Iraq. Nearby India has a tense relationship
with Pakistan, exemplified by the 2008
Yemen and Somalia’s ‘severe threat’ Mumbai attacks, often referred to in
ranking is largely due to Islamic India as 26/11, where more than 10
extremist connections. Somalia was one coordinated shooting and bombing
of the nations where experts believed attacks across Mumbai were executed by
Islamic extremists might flee after 9/11, a Pakistan-based militant organisation.
and observers still see the country as a India also struggles with additional
possible haven. Yemen is the base for threats, from separatists, other religious
operations by Al Qaida in the Arabian extremists and individuals or groups
Peninsula (AQAP), including high profile pursuing their own interests.
attacks in 2009 that prompted many
to urge the Yemeni government to take
direct action against AQAP.11
Terrorism Threat
Conditions
Low threat •
Guarded threat •
Elevated threat •
High threat •
Severe threat •
Piracy region •
Terrorism Threat
Conditions
Low threat •
Guarded threat •
Elevated threat •
High threat •
Severe threat •
Piracy region •
Gateway regions •
Source: Aon’s 2010 Terrorism Threat Map, The Geography of transport systems15,33
16 PwC
If you include China’s Pearl River Delta But could it happen? It’s certainly rebound quickly from any future attack
(with Guangzhou), then the region’s possible. There have been news reports as consequences for the global economy
share or world trade reaches 16.7%. that plutonium from former military could be catastrophic.24
Europe’s Rhine/Scheldt delta (from inventory ‘leaks’ on to black market, and
Amsterdam to Brussels) accounts for that there’s also a trade in nuclear bomb Logistics hubs are determined by trade
7.5% of global containerised and air blueprints.20,21 With nearly 9 million flows, but chokepoints such as channels,
freight volume. The most important containers entering the United States narrows and bridges are critical spots
North American gateway system is Los annually by ship, it’s not hard to imagine for global supply chains, and they’re
Angeles/ Long Beach system.16 someone successfully hiding a nuclear an unavoidable part of the landscape.
bomb in one of them.22 International shipping lanes pass
According to a report of the through around 200 passages, capes
Congressional Research Service (CRS) And the dangers aren’t confined to sea and straits. A handful of these are of
for the US Congress, the detonation of a freight. Last year, parcel bombs were strategic importance. Take the Panama
nuclear bomb, comparable with the one sent from Yemen and transhipped via Canal. Bypassing this man-made
from Hiroshima, in one of the world’s Europe to the USA. That drew attention channel would mean a vessel on its way
major gateway regions or harbours to air cargo traffic and prompted from Los Angeles to Barcelona would
would kill and injure a catastrophically US Homeland Security Secretary need to travel around Cape Horn, or
high number of people. In addition to Janet Napolitano to demand a closer through the Indian Sea – options which
the human cost, the economic impact cooperation between the EU and the would lengthen the overall travel time
would be huge. This type of event could US to protect critical air, land and sea 9-11 days.
cause US$ 50 to 500 billion in direct transportation hubs. She pointed out
property damage, US$ 100 to 200 that “regardless of where a potential Figure 4 shows primary and secondary
billion losses due to trade disruptions event might occur, the ripple effect of sea routes that connect the major
and additional US$ 300 billion to US$ a significant disruption of this global gateway regions. Many of the most
1.2 trillion of indirect costs17. Likewise, system could potentially impact the important sea routes pass certain
the costs associated with the closing of entire international community.”23 chokepoints. Some of them, such as the
US ports because of a bomb detonation Napolitano also said it is imperative that Suez Canal or the Strait of Malacca, are
in a harbour could amount to US$ 1 governments work together to ensure also marked on the supply chain risk
trillion.18,19 that the global supply chain is able to map.
Figure 4: Supply chain risk map – Maritime sea routes and crucial chokepoints
Bosphorus
Suez Canal
Strait of Hormuz
Panama Canal
Strait of Malacca
Terrorism Threat
Conditions
Low threat •
Guarded threat •
Elevated threat •
High threat •
Chokepoints
Severe threat •
Primary transport routes
Piracy region •
Secondary or alternative transport routes
Gateway regions •
Planned routes
Source: Aon’s 2010 Terrorism Threat Map, The Geography of transport systems, National Center for Ecological Analysis and Synthesis15,27,33
Restrictions by Turkey;
Bosporus 50,000 Ship size and length; 200 000dwt
navigation accidents
Panama Canal 14,323 65 000dwt After expansion: 116 000dwt Not significant
18 PwC
The panel also identified a number of percent of the total cargo traffic going Transportation and
factors that can influence the economic through Singapore continues on to
consequences of an attack: other regions, underlying its immense logistics companies
importance as a gateway region.26,27 An will need to take
• the size of the attacked region, attack on Singapore’s harbour could
have drastic consequences for the
security concerns into
• its importance for global trade, country’s economic prosperity – and also account when choosing
• its ability to absorb the attack
for the other regional economies which transport routes.
use the harbour as a transshipment
and
hub. Likewise, a piracy induced long- They’ll also need to be
• the level of support from other ranged rerouting of ships around the prepared to respond
Strait of Malacca directly to ports in
nations received during the
China, Indonesia and Japan would be
quickly if risk levels
recovery process.
significant for the local economy of this change.
And while there may be significant region.
disruptions at the regional level, the Temporary economic losses will Piracy and hijackings of ships causes
global impact can be mitigated by certainly hurt, but the impact of attacks severe problems for the maritime
efforts to make supply chains more on logistics infrastructure or vessels shipping industry. Total direct costs
resilient to disruptions. Recent pipeline might also be much far-reaching, if of piracy in 2010 are estimated to be
projects provide some good examples trade routes change permanently in between US$ 7 billion and US$ 12
where systems are designed to offset response. The EU and China are already billion.30 And when you look at the
the impact of possible disruptions to investigating transport routes along the indirect costs too, the figure is much
a critical chokepoint. The Habshan- Northern Russian Coast. As a result of higher. Piracy damages the tourism
Fujairah pipeline, from the Habshan the melting Arctic sea ice, such a route industry, causes losses in revenues for
onshore field in Abu Dhabi to Fujairah might become a valuable alternative canal fees and the costs “loss of use”
(United Arab Emirates), is planned to to the traditional sea ways (see Figure and “loss of man-hours” while ships
back up gas and oil transport in the 4), which are increasingly disturbed and their crew are held hostage are also
case of any disruption in the Strait of by acts of piracy.28 The route along significant.
Hormuz. The Sino-Burma pipeline the Russian coast would shorten the
aims to reduce tanker traffic through shipping route between Hamburg and The Gulf of Aden is currently the world’s
the Strait of Malacca by providing an Shanghai for example by about 5,000 hot spot in terms of pirate attacks. The
alternative transport route for oil and miles, i.e. at least 7 days of travel (see politically instable states of Somalia
gas to China.25 Although these projects Figure 6). So this route could save time and Yemen are located on either side
can be seen as targets as well, they as well as being more secure. Japan of the Gulf. To make matters worse, the
contribute to an improved resilience is also planning to cooperate with entry point to the Gulf, the Strait of Bab
of critical transport infrastructure, by Russia to transport uranium ore via el-Mandeb, is a chokepoint along the
creating more diverse routing options the Trans-Siberian Railway in order to heavily used Asia-Europe sea route.
for critical natural resources. avoid incidents in the Strait of Hormuz,
according to Asia News Networks.29 Some shipping companies have
The danger of significant disruption responded to the threat of piracy by
may be greater in smaller regions which Companies need to take a close look hiring special security troops or taking
are dependent on single hubs or only at how dependent their business advantage of protection offered by UN
a few critical infrastructural nodes. is on particular logistics hubs or troops. Others have already shifted their
For example, Singapore is proud to chokepoints, and then assess how they shipping routes, including A.P. Møller-
operate one of the world’s busiest and can reduce the impact of threats to Maersk, CMA CGM and dozens of other
most important intermediate hubs. 85 particular locations. carriers which have chosen to avoid the
Gulf of Aden and Suez.31 Egypt is losing
more than US$ 642 million a year due
to lost revenues from Suez Canal fees, as
ships are re-routed to avoid the Gulf.32
Figure 6: Distances and travel times for direct and alternative sea
routes
Route:
Departure Destination Distance Travel time
Direct (D) / Alternative (A)
Another route plagued by piracy is the out that transport routes are already
Strait of Malacca. It’s the shortest sea shifting e.g. changes to shipping routes
route between the Persian Gulf and as a result of piracy in Somalia or
the Asian market. 60,000 vessels use it concerns around political unrest in
each year, making it Asia’s most relevant Egypt and Tunisia. The Delphi panel
chokepoint. If this strait were blocked, also sees future levels of international
almost half of the world’s merchant fleet cooperation as likely to increase as the
would be forced to take the longer route US and other major developed nations
around Indonesia’s archipelago34, adding are less able to effect change. And
one more day to the total travel time. they think that some major emerging
economic powers, e.g. China will ‘buy’
When piracy drives shippers to change protection by supporting rogue regimes.
routes, it places a huge strain on
business, with longer delivery times. It Transportation and logistics
also drives up costs, as shippers need to companies will have to be much
spend more on gasoline, labour etc. That more flexible in their transportation
means in some cases only very large routing in order to avoid ‘hot spots’
shipping lines can afford to send ships that pose problems for security in
the long way round.35 transit. And supply chain managers
will need to take into account higher
The supply chain experts who transport costs, longer travel times
participated in our Delphi study and potential problems meeting
generally agree with the thesis ‘2030: schedules when alternative transport
Regional threats to security have caused routes are used.
shifts to transport routes. ‘Some point
20 PwC
Additional security The European Commission took a look transport times.’ They see time as a
at the correlation between increased more critical parameter for efficient
measures will result travel times and greater costs due logistics than cost. Increased security
in increased transport to new screening methods. Their means additional time for verification,
calculation focuses on the indirect costs searches, audit and the like. The
times. Business models which occur when cargo consignment experts argue for the development of
based on time-critical is delayed due to screening. The new performance criteria too. Once
deliveries may be EC estimates that extended transit shipping times increase, logistics service
time would result in an increase in providers may look to shift the focus
squeezed out of the inventory costs and delays in delivery from delivery times to other aspects of
market. which together would amount to more customer service. For example, they
than US$ 9.34 million per annum may develop new service offerings
The need to re-design global supply in additional costs for the shipping around ‘secure’ delivery. And delivery
chains due to security issues has a company. And a two day delay could to countries facing a severe threat
profound effect on transport times. have severe consequences in the case of may become a specialised service that
It doesn’t matter what the reason is – a just-in-time consignment which fails to only some carriers are willing to offer.
piracy, terrorism or other concerns – the meet the deadline.40 Nonetheless, time will still be a critical
outcome remains the same: a slowdown parameter for efficient logistics, so
in global supply. The impact increases if you consider any security measures that companies
transatlantic shipments. There could implement will need to be as quick to
We’ve already discussed how political be additional delays from longer dwell execute as possible.
turmoil in Egypt has brought up times when ships are waiting in port,
concerns about a potential blockage of increased turn-around time of feeder The relaxed group of Delphi panellists
the Suez Canal, and the consequences vessels or delays in inland transport sees advances in technology and security
that this could have for shipping.36,37 modes delivering to different state techniques as counter-techniques to
Other transport modes are facing boundaries. And that doesn’t take prevent a slowdown in global trade.
slowdowns, too. One major example into account potential shifts between They expect advanced technology
is the additional security measures transport modes.41 If additional security developments to lead to simpler
imposed on the airline industry, which measures slow down global transport procedures like quicker security checks,
are resulting in increased transport flows, business models might change or even safe lane procedures without
times. According to a recent PwC survey, too, as companies may struggle to additional interruptions. As global
German executives responsible for air adhere to just-in-time or time-definite transport flows shift eastwards, though,
freight shipments are strongly in favour delivery schedules. Transportation and not all countries worldwide may be
of more screening, but many believe logistics companies may find it difficult able to adapt the necessary ‘intelligent’
there will be enormous costs as a result. to predict when goods will arrive, solutions for security procedures quickly
One third estimate that the airline especially in transatlantic shipments. enough.
industry in Germany will face US$ 284
million in additional costs due to higher The majority of our Delphi panel It will be essential for companies to
security standards.38 And another source expects there will be an increase in handle security procedures effectively
estimates that new security measures transport times. The experts of the and efficiently. New kinds of customer
which mean an additional half-hour per concerned group are truly convinced services will develop which shift the
traveler in airports cost the American that in ‘2030: Additional security focus away from the time factor.
economy US$ 15 billion per year.39 measures have resulted in increased
NATO believes that cyber attacks are the “battlefield of the 21st
century”.42 IT systems are becoming more interdependent, as companies
connect across their supply chains. While this increases information
flow and efficiency, it also means that one successful cyber attack could
have disruptive, unpredictable, devastating effects on other systems
and companies and cause long-lasting consequences to economies.43
Large economies such as the US and Germany have already established
national cyber security divisions which are designed to counteract cyber
attacks.44
What can happen when one IT system deliberate malfunctions major damage
breaks down? In 2004, a minor short- could be the result.46
circuit hit British Telecom – with major In 2002, a passenger plane of the
consequences. Within minutes, 130,000 Russian airline Bashkirian Airlines
users’ telephone, fax and Internet collided with a cargo aircraft operated
systems broke down. 31 bank branches by logistics service provider DHL close
had to close since their connection to to Lake Constance. 71 people were
their data centre stalled, automated killed in the crash. Investigations have
teller machines collapsed, and even revealed that the tragedy was caused
emergency hotlines were inaccessible. by a problem in the telephone and
The damage of this minor short-circuit computer system of Switzerland’s air
was estimated at more than US$ 7 traffic control.47 Air traffic control was
million per day45. What if this short- unable to recognise the impending
circuit had been induced by a cyber collision. Claims for damage exceeded
attack? EUR 20 million.48 What if hackers could
manipulate air traffic control systems
Since also large technology-leading and cause similar events?49 And it’s not
companies, as Sony or Lockhead Martin, only air traffic that is at risk. A collision
become victims of cyber attacks, how of two cargo trains in 2010 caused
can logistics services providers protect economic damages of several million
themselves? euros.50 If criminals or terrorists gained
control over the command systems of a
The damage which can be caused major rail infrastructure operator, the
by cyber attacks isn’t only virtual. consequences could be disastrous. And if
Cyber attacks can also cause physical cyber attacks stopped GPS systems from
destruction. That’s because information working, the negative impact on the
systems also control vital functions like transport and logistics industry could be
air traffic control, so if commands cause immense.
22 PwC
Is the danger even greater than that Companies will need to increase supply chains in the future, they argue
posed by physical attacks? We asked investments in security programmes that there’s no evidence of such a trend
the Delphi panellists for their views, and IT personnel to secure their for attacks induced by competitors. In
and once again, opinions were sharply technologies from cyber attacks PwC’s Global Economic Crime Survey,
divided. Concerned experts believe that and to minimise the risk of major the transportation and logistics industry
by 2030 cyber attacks may cause more incidents. reported the fifth highest number of
damage than physical ones. In our 2011 fraud incidents out of more than 15
Global Information Security Survey, industries we investigated.55 Most of
PwC found that 20% of respondents these crimes fall under the categories
had experienced financial losses from Sabotage and of asset misappropriation, accounting
security events, 15% reported theft industrial espionage fraud and bribery and are perpetrated
of intellectual property and 14% by staff members, though. Sabotage and
experienced compromises to brands or
will affect supply espionage aren’t reported to be playing
reputations.51 Relaxed experts consider chains, but competitors a prominent role for the transportation
it unlikely that damage from cyber and logistics sector.
won’t be the primary
attacks will exceed that from physical
attacks. They argue that an increasing source of attacks. We should also note that cyber attacks
number of cyber attacks on supply are on the increase, and they often can’t
chains would motivate the development A large number of attacks on supply be traced back to their perpetrators.
of effective measures to minimise the chains, including thefts by employees Today’s sabotage, espionage and
potential for future cyber attacks and or criminals outside of the organisation, manipulation attacks may in many cases
their negative consequences. While the are conducted for individual profit. be classified as ‘cyber attacks’, rather
number of cyber attacks is increasing, But sabotage, industrial espionage than being counted as attacks made by
global spending on IT security is going and manipulation, carried out by competitors. Indeed, one expert notes
up too. It’s estimated to rise to US$ 60 competitors, represent another growing that it may become increasingly difficult
billion in 2014.52 By 2030 there may be area in economic crime. in the future to differentiate between
adequate counter attack mechanisms in an offense by a competitor and any
place to ward off cyber attacks. A recent study revealed that the number other type of attack. Nevertheless, most
of attacks by competitors is underrated. experts expect competitors to focus
Supply chains are increasingly Only 18.9 percent of almost 7,500 their efforts on competing rather than
dependent on ICT. In Transportation surveyed companies stated that they resorting to such tactics. They assume
& Logistics 2030, Volume 2: Transport had at least one incident of industrial more potential attacks will have other
infrastructure – Engine or hand brake for espionage within the last year. But more motivations.
global supply chains? we found that a than four times as many – 80 percent
variety of innovations in ICT are likely – of the surveyed companies assume Does this mean sabotage and
to maximise the capacity and effective that there is a much higher level of industrial espionage are not an issue
use of transport infrastructure. As espionage, just “not in my company”.54 in the transportation and logistics
systems like flow control for highways industry? Typical victims of industry
and public transport are implemented, Logistics operations increasingly depend espionage are companies in industries
the potential damage that can be caused on ICT and attackers are increasingly where innovation and research and
by cyber attacks rises dramatically, using the Internet for this kind of crime. development are even more critical
too. More frequent use of tracking and But our expert panel does not believe success factors than price or efficiency.
tracing systems and real-time control that the number of attacks on supply Technological leaders in e.g. the
applications with web interfaces also chains by competitors, for example automotive or pharmaceutical industry
provide new and growing weak points to in the form of sabotage, industrial need to protect their product and
be attacked by cyber criminals. espionage or manipulation, will increase production technologies, formulations
until 2030. Instead respondents and other kinds of know-how and
The increasing threat of cyber attacks argue that the main trend in industry innovation from competitors’ attacks.
for supply chains has motivated many development is collaboration. According Such incidents are still rare in
high-tech suppliers to team up and to to the experts, competition is seen as transportation and logistics. But that
develop measures to fight cyber crime. healthy and as an important way to may change as logistics operators
Boeing, Cisco, IBM, Microsoft, NASA increase efficiency in the sector. As long continue to invest in innovation. Many
and the US Department of Defence are as there are no significant changes in are now developing and incorporating
working to develop an internationally- the global economy and its structure, new technologies into their service
accepted framework to secure supply the risk of being “named and shamed” offerings as a way to differentiate from
chains from cyber attacks. The new will prevent companies from turning to the competition.
standard should help prevent cyber crimes against competitors. One expert
criminals from introducing security believes that there could eventually Sabotage and industrial espionage
vulnerabilities into IT equipment as it be a backlash, if a guilty company that among competitors aren’t key
passes through the supply chain.53 isn’t brought to justice causes a wave of concerns for transport and logistics
revenge attacks. companies, although that could
change as the sector becomes more
While the experts do assume there will innovative.
be an increasing number of attacks on
24 PwC
Investing in a more
secure future
Increasing security means cranking up
investment, but the returns are many.
Many companies have not yet invested business benefits of investing in supply
in improving security beyond the chain security efforts. Areas positively
minimum level due to difficulty in influenced by security efforts include
justifying security investments.63 supply chain visibility (50% increase
Companies may not yet see the benefits in access to supply chain data, 30%
of enhanced security or may be unable increase in timeliness of shipping
to make an adequate business case for information), improvements in
security implementation. That’s because inventory management (14% reduction
penalties for non-compliance with new in excess inventory, 12% increase
security standards are minimal or non- in reported on-time delivery), more
existent – and the benefits are hard to efficient customs clearance processes
measure.64 (49% reduction in cargo delays,
48% reduction in cargo inspections/
However, supply chain security examinations) and in the long-term
management is not a black hole. We benefiting the customer relationship
believe that secure supply chains do (20% increase in new customers and
provide a return on investment for 26% reduction in customer attrition).65
transportation and logistics companies.
Research has quantified the tangible
26 PwC
Some of the initiatives taken by the
US government to assess and minimise
the risk involved in international
transportation of goods, include,
amongst others, the Container Security
Initiative (CSI), the Customs-Trade
Partnership Against Terrorism (C-TPAT),
the Advanced Manifest Rule (AMR)/
Advanced Cargo Information (ACI) and
the Free and Secure Trade initiative
(FAST).68
28 PwC
Will technology be the best way to A supply chain is only as strong as its The experts note that a move towards
guarantee security by 2030? Our weakest link. One supply chain partner security audits has already begun, as
Delphi panel has mixed views once may have excellent internal security reflected by trusted shipper elements
again, with concerned and relaxed efforts, but if others in the supply chain in supply chain security. Those shippers
experts again showing markedly are lacking adequate security efforts, almost certainly require some type of
different responses. For the concerned, or if there isn’t sufficient coordination auditing. The question some pose is not
technology is the best solution and the between supply chain partners, those whether audits will happen, but rather
way to move forward in supply chain efforts may be for naught.80 Supply whether the trusted shipper concept will
security management. Some even chain security management needs to be reach back as far as the raw material
prefer to replace personnel-intensive all-encompassing and supported by all stage. The trend towards government-
solutions with electronic monitoring players in the supply chain. Long-term mandated security programmes is
devices, ‘hack-proof’ systems and cooperation with supply chain partners another sign that audits will be one
other technologies allowing a broader is a necessary first step, but securing of the main measures to provide
coverage. This group sees the human the supply chain will require an even international and national security.
factor as being the weakest link in the greater commitment. We believe that Though the Delphi panel believes that
chain historically and remaining so in a supply chain security strategy which security audits will be implemented,
the future. Their solution is to substitute is cross-institutional and international, they argue for individual customisation.
technological equipment wherever including all players of the supply chain That means analysing the specific
possible. is absolutely critical. nature of the threat involved, which
differs among industries. The Delphi
The relaxed experts attribute a much How can you control and verify that panel argues that security audits might
lower probability to technology as the supply chain partners are keeping become obligatory only for certain
only reliable lever to guarantee security. their end of the bargain? Security commodities, and for certain shipping
They see the future in a combination audits are one valid option. Several methods, e.g. aviation. But protection
of technology, trained personnel and companies already offer such a service of the vast majority of commodities
policies. This group argues that even to their customers, based on C-TPAT will remain to be seen. It’s important
the most state-of-the-art technology requirements or individually developed to remember that a very high audit
currently in place doesn’t prevent checklists addressing both physical and check could hamper trade and have a
successful attacks on supply chains from personnel security.81,82 significant financial impact. That means
happening. Companies will need to tailor systems developing a system where the weakest
to their individual needs, though. links in the supply chain get the most
Technology alone can’t secure the Those who only complete the minimum attention makes good sense.
supply chain. People are needed too, obligatory requirements are unlikely
to provide human intelligence and to have effectively secured transport Companies should work together with
good governance. services and logistics from disruption. standard setters to develop generally
Transportation and logistics companies accepted security principles.
also need to include crisis management
and contingency planning for man-made
Security audits along catastrophes, as well as natural ones.
the entire supply chain
What will the regulatory situation in
are a requirement to 2030 look like? Will security audits be
maintain effective compulsory along the whole supply
chain, from raw material delivery up to
levels of security.
point of sale? This time the answer from
our Delphi panel is an emphatic yes –
Global trade is no longer just about
and the experts see that as a good thing.
moving goods quickly and efficiently,
They rated this thesis with both highest
it is also about moving goods securely.
probability and the highest desirability
As many as 25 different parties are
scores.
involved in the global movement of just
one container79. The chain encompasses
different representatives of buyers,
sellers, inland freighters, shipping
companies, intermediaries, financiers,
governments, and the list goes on. With
so many different supply chain operators
involved, the risk of supply chain
disruptions and vulnerability to external
intervention increases.
30 PwC
In the previous chapters of this study we’ve taken a systematic look at
Expect the unexpected the future and have identified a number of trends that look likely to
continue. Surveying a group of experts by using the Delphi method
helps identify the probable outlook for the transportation and logistics
industry. These views can help decision makers to make appropriate
decisions and to prepare their organisations for future developments.
We believe that any ‘look into the That’s why organisations need to
future’ should not be limited to the most understand their business environment,
probable scenarios though. Unlikely and the social and economic systems in
events do sometimes happen – and can which they operate. Careful observation
have a huge impact on both society and can often turn up early indicators that
the economy. Such low-probability, a wildcard might be in the offing. And
high-impact events can be termed good planning is nearly always more
‘wildcards’. Sudden and unique events effective than scrambling to react after
may represent the turning point of the fact.83
long-term trends, or even of an entire
social system – as in the fall of the Berlin For transportation and logistics
Wall in 1989. Their occurrences may companies, supply chain security is
happen at any time and are difficult to one area where we think there are a
predict, and the potential impact may be number of potential wildcards that
enormous. should already be on companies’ radar.
Our list of suggestions is only a starting
And while it’s impossible to consider point. They are designed to prompt you
all possible wildcards – their number to think about how such events might
is literally endless – it is possible to affect your organisation. What would
identify some of the areas where the financial consequences be? How
wildcards could occur. Take the eruption vulnerable is your business model? How
of the Eyjafjallajoekull volcano in quickly can you adapt?
2010. While it came as a surprise and
was highly disruptive, the possibility Most wildcards have potentially
of volcanic activity in the region had disastrous impacts, but it is important
long been noted. Or the terrorist attack to remember that some wildcards may
of 9/11 which shook the world and actually change the course of the future
transformed the notion of “homeland in a positive way. In those cases, too,
security.” The specific type of attack good planning will mean making the
was a shock, but the increasing anti- most of the new status quo.
American sentiment behind it had been
building in the Islamic world for quite
some time.
What if
terrorist
attacks shut
down logistics
networks?
How quickly can you react? Tomorrow Next Month Next Year
32 PwC
How could it affect your business? A self-assessment checklist.
taking notice: How quickly can you react? Tomorrow Next Month Next Year
• Increasing number of
terrorist attacks
• Increasing number of
natural disasters
Shippers have to pay
tens of thousands of
dollars a day in extra
“war insurance” to
What if cross dangerous
routes
insurance Source: Wall Street Journal (2009)
stop covering
major risks?
transit points
are blocked?
34 PwC
The most expensive
computer virus to
date caused damage
which exceeded
$8.7 bn
What if a
Source: Heise (2008)
super-virus
paralyses
large ICT
systems?
How quickly can you react? Tomorrow Next Month Next Year
What if
cryptography
doesn’t work
anymore?
How quickly can you react? Tomorrow Next Month Next Year
36 PwC
How could it affect your business? A self-assessment checklist.
How adaptable is your business model? Set in Stone We can change, but it takes effort Flexible
How quickly can you react? Tomorrow Next Month Next Year
Homeland Security
is testing the next
generation of
security screening
— a scanner that
can read your body’s
signals and sense
your intentions
Source: CNN (2008)
What if you
know about
the crime
before it
happens?
38 PwC
So what can you do to stress-test and improve your supply chain
How to optimise your security? In this chapter, we take a comprehensive look across five
security profile dimensions of supply chain security (see Figure 7):
• Personnel security
• ICT security
• Process security
• Physical security
• Supply chain security partnerships
SCM Security
Standard Risk Profile
Partnerships Development
with Standard Security
Setters and Training
Authorities
Partnerships Security
with Suppliers Security Personnel Guidelines
Partnerships Security
Supply Security
Transport Chain Enabling
Equipment
Security Technologies
Physical ICT Security
Security
Access Vulnerabiliy
Control Process Check
Security
Inventory Accessibility
Security
Handling Transport
Security Security
40 PwC
Personnel Security
Security
Activity KPI Time horizon
dimension
Risk profile set up for job applicants and employees84 Percentage of screened job applicants and employees 2015 - 2020
Security code manual for employees Existence; level of familiarity 2011 - 2015
Security
Guidelines
Whistle blower management policy, hotline Number of security related whistle blows 2015 - 2020
ICT Security
Security
Activity KPI Time horizon
dimension
Percentage of supply chain activity covered by sensor
Sensor and actuator solutions for transportation assets 2015 - 2020
and actuator solutions
GPS, Zigbee connectivity with transport assets Percentage of supply chain activity covered by GPS 2020 - 2025
Ubiquitous RFID tags (active and passive) Percentage of supply chain activity covered by RFID 2020 - 2025
Security
Enabling Analytic sourcing tool for supplier risk, inspection at Number of suppliers that are screened and monitored
2015 - 2020
Technologies source and security through the sourcing tool
Intelligent, real time SCM security event management Number of intelligent applications used for decision
2025 - 2030
applications85 making for core end to end supply chain
Ubiquitous test attacks on ICT system Number of successful attacks 2011 - 2015
Worldwide information sharing of high risk shipments Performance results of tests conducted by external
2015 - 2020
Accessibility between customs and law enforcement authorities auditors
Encryption, protective firewall and coding of information Benchmark with leading technologies, scripts, etc 2011 - 2015
Process Security
Security
Activity KPI Time horizon
dimension
Real-time re-routing of ships sailing in dangerous waters
Number of piracy threats avoided 2020 - 2025
based on GPS signal
Armed crew members and special armoury stations in Number of armed crew and armouries of members on a
2015 - 2020
Transport transportation assets ship, aircraft or rail asset
Security
Insurance of transported goods when appropriate Percentage of goods insured 2011 - 2015
Record of employees activities in product construction Percentage of value-adding processes that can be
2015 - 2020
process traced back to the respective employee
Biometrics and personalised access control for Percentage of supply chain activities supported by
2015 - 2020
personnel biometrics or personalised access control
Specially designed locations within the logistics facility Size of fully secured space within the logistics facility 2011 - 2015
Access control
Intelligent camera systems with 3D facial recognition for
Number of intelligent cameras installed in a premises 2025 - 2030
identifying theft and pilferage
Percentage of personnel that have access to restricted
Controlled access to restricted areas or goods 2015 - 2020
areas or goods
Sealing of loading units Percentage of loading units being sealed 2011 - 2015
Security Partnerships
Security
Activity KPI Time horizon
dimension
Supplier security certifications mandatory Percentage of suppliers which have been certified 2015 - 2020
Ability to substitute suppliers Time required to shift from one supplier to another 2011 - 2015
Partnerships Full visibility over tiered supply network (suppliers’ Percentage of suppliers revealing their suppliers;
2015 - 2020
suppliers) percentage of suppliers from high-risk countries
with suppliers
Ability to track and trace value-adding processes of
Percentage of goods tracked while in supplier processes 2015 - 2020
suppliers
42 PwC
Methodology
44 PwC
Based on extensive desk research,
Figure 8: RealTime Delphi screen
expert consultations, and workshop
sessions, PwC and SMI developed 14
theses around the future of supply
chain security (see overview of theses in
Figure 12). Panellists rated each thesis’
probability of occurrence (0-100%),
the impact on the transportation and
logistics industry if it occurred (5-point-
Likert scale) and the desirability
(5-point-Likert scale). They were also
given the option to provide supporting
arguments for all answers. Once a
panellist finished giving answers for the
first round, the statistical group opinion
of all participants was calculated
immediately. Panellists were then shown
a second round screen (see Figure 8).
The final results of the RealTime
Delphi survey formed the framework to
analyse future opportunities. Our team
conducted additional expert workshops,
where we used both the extensive
qualitative survey data and the results
of desk research to better understand
future trends.
20%
69%
Science
Politics / Associations
11%
Industry
Represented Countries: Australia, Austria, Bahrain, Belgium, Canada, China, Czech Republic, Finland, France, Germany, India, Ireland, Italy, Malaysia,
Netherlands, Oman, Russia, Singapore, South Africa, South Korea, Sweden, Switzerland, UK, Ukraine, USA.
46 PwC
Figure 11: Response behaviour of ‘concerned’ versus ‘relaxed’ experts
Probability assessments
90%
80%
70%
Expected Probability
60%
50%
40%
30%
20%
10%
0%
T1 T2 T3 T4 T5 T6 T7 T8 T9 T10 T11 T12 T13 T14
Theses
1 The number of attacks on supply chains has increase 56% 34 3.7 1.4
6 Security has become one of the most important cost drivers for logistics 57% 30 3.5 2.2
8 Using advanced technology is the best way to guarantee security 59% 25 3.5 3.0
9 Regional threats to security have caused shifts to transport routes 61% 25 3.6 1.9
14 Additional security measures have resulted in increased transport times 64% 30 3.8 1.9
48 PwC
References
1 Eye for transport. (2011). Maritime piracy transport systems; second edition. New York:
costs global community up to $12 billion Routledge, 352 pages. ISBN 978-0-415-
a year. Retrieved 22, February 2011 from 48324-7
http://www.eyefortransport.com/content/
16 Hofstra University (2006). World’s Major
maritime-piracy-costs-global-community-12-
Gateway Systems, Retrieved 23, February
billion-year
2011 from http://people.hofstra.edu/
2 English News CN. (2011). Terror attacks geotrans/eng/ch2en/conc2en/map_
at Russian transport double in 2010. worldglobalgateways.html
Retrieved 05, March 2011 from http://news.
17 CRS Report for Congress. (2005). Terrorist
xinhuanet.com/english2010/world/2011-
Nuclear Attacks on Seaports: Threat and
03/02/c_13756267.htm
Response
3 BBC News. (2011). Moscow bombing:
18 Container Security. (2003) Expansion of
Carnage at Russia’s Domodedovo airport.
Key Customs Programs Will Require Greater
Retrieved 30, January 2011 from
Attention to Critical Success Factors. July
http://www.bbc.co.uk/news/world-
2003, GAO-03-770, US GAO.
europe-12268662
19 Dahlman et al. (2005). Container Security
4 Rudd, M. (2011). Terrorist attack on global
– A proposal for a comprehensive Code of
supply chain could threaten food, medical
Conduct
and fuel supplies.
20 BBC News. (2004). Kyrgyzstan ‘foils
5 Voice of America News. (12 January 2009) .
plutonium plot’. Retrieved 25, January 2011
Central Bank Says Bangkok Airport Closure
from http://news.bbc.co.uk/2/hi/asia-
Cost Economy $8 Billion
pacific/3695588.stm
6 ABC News. (2010). Icelandic Volcano
21 Guardian.co.uk. (2008). Nuclear bomb
Airline Costs Keep Climbing, April 16, 2010;
blueprints for sale world black market,
International Air Travel Association and U.S.
experts fear. Retrieved 31, January 2011 from
Travel Association
http://www.guardian.co.uk/world/2008/
7 Foodnavigator USA. (2005). Huge costs of may/31/nuclear.internationalcrime
terror attack on US milk supply
22 US Department of Homeland Security,
8 National Counter Terrorism Center. (2011). Bureau of Customs and Border Protection,
Worldwide Incidents Tracking System “Remarks by Commissioner Robert C. Bonner,
(WITS); Retrievd 07, June 2011 from https:// Council on Foreign Relations, New York, New
wits.nctc.gov/FederalDiscoverWITS/index. York,” January 11, 2005.
do?t=Records&N=0
23 Retrieved 11, January 2011 from http://
9 Transported Asset Protection Association. www.supplychaindigital.com/tags/supply-
(2011). Retrieved 05, March 2011 from chain/terrorist-attack-global-supply-chain-
http://www.tapaemea.com/public/ could-threaten-food-medical-and-fuel-
supplies
10 International Chamber of Commerce. (2011).
Retrieved 05, March 2011 from http://www. 24 Rudd, M. (2011). Terrorist attack on global
icc-ccs.org/piracy-reporting-centre/imb-live- supply chain could threaten food, medical
piracy-map and fuel supplies. 2011
11 Kaz Kotlow. (2011). Countering Extremism in 25 Retrieved 20, February 2011 from http://
Yemen: Beyond Interagency Cooperation www.eia.doe.gov/cabs/World_Oil_Transit_
Chokepoints/Full.html
12 Rafi Melnick, Rafi Eldor (2007).
Intelligence and Terrorism Information 26 China Daily. (2010). Shanghai may pass
Center at the Israel Intelligence Heritage Singapore as world’s busiest port. Retrieved
& Commemoration Center (IICC). Small 20, December 2010 from http://www.
investment, large returns: Terrorism, Media chinadaily.com.cn/bizchina/2010-07/14/
and the Economy content_10104780.htm
13 Department of Homeland Security. (2007). 27 National Center for Ecological Analysis and
Strategy to enhance international supply Synthesis. (2008). University of California,
chain security. Retrieved 10, January 2011 Santa Barbara. Retrieved 27, January
from http://www.dhs.gov/xlibrary/assets/ 2011 from http://www.nceas.ucsb.edu/
plcy-internationalsupplychainsecuritystrate globalmarine/impacts
gy.pdf
28 28 Department of EU International Relations
14 Online News Hours. (2002). On the and Diplomacy Studies. Issue 1 2011: The
waterfront. Retrieved 14, January 2011 from EU, China and new transport routes on the
http://www.pbs.org/newshour/bb/economy/ top of the world. Retrievd 07, June 2011
july-dec02/docks_09-19.html from www.coleurope.eu/file/content/
studyprogrammes/ird/research/pdf/
15 Jean-Paul Rodrigue, Claude Comtois and
EUChinaObserver/2011/EU%20China%20
Brian Slack. (2009). The Geography of
Observer%201_2011.pdf
50 PwC
Global T&L Contacts
Africa Central Indonesia South Africa
Vishal Agarwal Thomson Batubara Akhter Moosa
+254 20 2855581 +62 21 5289 0400 +27 12 429 0546
vishal.agarwal@ke.pwc.com thomson.batubata@id.pwc.com akhter.moosa@za.pwc.com
Australia Italy South and Central America
Joseph Carrozzi Luciano Festa Henrique Luz
+61 8266 1144 +39 6 57025 2465 +55 11 3674 3601
joseph.carrozzi@au.pwc.com luciano.festa@it.pwc.com henrique.luz@br.pwc.com
Belgium Japan South East Europe
Peter van den Eynde Yas Furusawa Momchil Vasilev
+32 3 259 33 32 +81 3 3546 8460 +359 2 9355 223
peter.van.den.eynde@be.pwc.com yasuhisa.furusawa@jp.pwc.com momchil.vasilev@bg.pwc.com
Brazil Luxembourg South Korea
Luciano Sampaio Anne Murrath Moon-Sub Song
+55 11 3674 2451 +352 4948 481 +822 709 0217
luciano.sampaio@br.pwc.com anne.murrath@lu.pwc.com moon-sub.song@kr.pwc.com
Canada Malaysia Spain
Stephen D. Shepherdson Azizan Zakaria Ignacio Rel Pla
+1 403 509 7486 +60 (3) 2173 0512 +34 963 032 064
stephen.d.shepherdson@ca.pwc.com azizan.zakaria@my.pwc.com ignacio.rel.pla@es.pwc.com
Central and Eastern Europe Mexico Sweden
Nick C. Allen Martha Elena Gonzalez Fredrik Göransson
+42251151330 +52 55 5263 5834 +46 31 793 11 46
nick.allen@cz.pwc.com martha.elena.gonzalez@mx.pwc.com fredrik.goransson@se.pwc.com
China & Hong Kong Middle East Switzerland
Alan Ng Alistair Kett Thomas Bruederlin
+852 2289 2828 +971 2694 6831 +41 58 792 5579
alan.ng.@hk.pwc.com a.kett@ae.pwc.com thomas.bruederlin@ch.pwc.com
Cyprus New Zealand Taiwan
Liakos Theodorou Karen Shires Charles Lai
+357 25 555 160 +64 4 462 7667 +886 (0) 2 27296666 25186
liakos.m.theodorou@cy.pwc.com karen.f.shires@nz.pwc.com charles.lai@tw.pwc.com
Denmark Norway The Netherlands
Bo Schou-Jacobsen Rita Granlund Jeroen Boonacker
+45 3945 3639 +47 95 26 02 37 +31 88 792 3673
bo.schou-jacobsen@dk.pwc.com rita.granlund@no.pwc.com jeroen.boonacker@nl.pwc.com
France Philippines Turkey
Vincent Gaide Anjji M. Gabriel Cenk Ulu
+33 1 56 57 8391 +632 459 3005 +90 212 3266060
vincent.gaide@fr.pwc.com anjji.m.gabriel@ph.pwc.com cenk.ulu@tr.pwc.com
Germany Portugal United Kingdom
Klaus-Dieter Ruske Jorge Costa Clive Hinds
+49 211 981 2877 +351 213 599414 +44 1727 892379
klaus-dieter.ruske@de.pwc.com jorge.costa@pt.pwc.com clive.p.hinds@uk.pwc.com
Greece Russia United States of America
Socrates Leptos-Bourgi Alexander Sinyavsky Kenneth Evans
+30 210 4284000 +7 495 2325469 +1 305 375 6307
socrates.leptos.-.bourgi@gr.pwc.com alexander.sinyavsky@ru.pwc.com kenneth.evans@us.pwc.com
India Singapore
Bharti Gupta Ramola Kok Leong Soh
+91 124 3306020 +65 6236 3788
bharti.gupta.ramola@in.pwc.com kok.leong.soh@sg.pwc.com
www.pwc.com/tl2030
© 2011 PwC. All rights reserved. Not for further distribution without the permission of PwC. “PwC” refers to the network of member firms of PricewaterhouseCoopers
International Limited (PwCIL), or, as the context requires, individual member firms of the PwC network. Each member firm is a separate legal entity and does not act as
agent of PwCIL or any other member firm. PwCIL does not provide any services to clients. PwCIL is not responsible or liable for the acts or omissions of any of its
member firms nor can it control the exercise of their professional judgment or bind them in any way. No member firm is responsible or liable for the acts or omissions of
any other member firm nor can it control the exercise of another member firm’s professional judgment or bind another member firm or PwCIL in any way. These
materials are for general information purposes only, and are provided “as is”, with no guarantee of completeness, accuracy, timeliness or of the results obtained from
the use of this information, and without warranty of any kind, express or implied, including, but not limited to warranties of performance, merchantability and fitness for a
particular purpose.