icon-carat-right menu search cmu-wordmark

A Proven Method for Identifying Security Gaps in International Postal and Transportation Critical Infrastructure

Technical Note
In this report, the authors describe a method of identifying physical security gaps in international mail processing centers and similar facilities.
Publisher

Software Engineering Institute

CMU/SEI Report Number
CMU/SEI-2013-TN-033
DOI (Digital Object Identifier)
10.1184/R1/6571733.v1

Abstract

The safety, security, and resilience of international postal, shipping, and transportation critical infrastructure are vital to the global supply chain that enables worldwide commerce and communications. But security on an international scale continues to fail in the face of new threats. Owners and operators of critical postal, shipping, and transportation operations need new methods to identify, assess, and mitigate security risks and gaps in the most effective manner possible. The U.S. Postal Inspection Service, in collaboration with the Universal Postal Union (UPU) and the CERT® Division at Carnegie Mellon University’s Software Engineering Institute, developed a physical security assessment method to identify gaps in the security of international mail processing centers and similar shipping and transportation processing facilities. This assessment method and its associated field instrument are designed to be repeatable, cost effective, scalable, accurate, meaningful, and transparent. Since the method uses UPU standards as its reference, it may be used by the international community to evaluate the security of postal administrations around the world. The method also can be applied to other types of critical transportation services, such as metropolitan transit systems. This report describes the history, development approach, field experiences, and benefits of this method.

Cite This Technical Note

Crabb, G., Allen, J., Curtis, P., & Mehravari, N. (2014, January 17). A Proven Method for Identifying Security Gaps in International Postal and Transportation Critical Infrastructure. (Technical Note CMU/SEI-2013-TN-033). Retrieved December 22, 2024, from https://doi.org/10.1184/R1/6571733.v1.

@techreport{crabb_2014,
author={Crabb, Greg and Allen, Julia and Curtis, Pamela and Mehravari, Nader},
title={A Proven Method for Identifying Security Gaps in International Postal and Transportation Critical Infrastructure},
month={{Jan},
year={{2014},
number={{CMU/SEI-2013-TN-033},
howpublished={Carnegie Mellon University, Software Engineering Institute's Digital Library},
url={https://doi.org/10.1184/R1/6571733.v1},
note={Accessed: 2024-Dec-22}
}

Crabb, Greg, Julia Allen, Pamela Curtis, and Nader Mehravari. "A Proven Method for Identifying Security Gaps in International Postal and Transportation Critical Infrastructure." (CMU/SEI-2013-TN-033). Carnegie Mellon University, Software Engineering Institute's Digital Library. Software Engineering Institute, January 17, 2014. https://doi.org/10.1184/R1/6571733.v1.

G. Crabb, J. Allen, P. Curtis, and N. Mehravari, "A Proven Method for Identifying Security Gaps in International Postal and Transportation Critical Infrastructure," Carnegie Mellon University, Software Engineering Institute's Digital Library. Software Engineering Institute, Technical Note CMU/SEI-2013-TN-033, 17-Jan-2014 [Online]. Available: https://doi.org/10.1184/R1/6571733.v1. [Accessed: 22-Dec-2024].

Crabb, Greg, Julia Allen, Pamela Curtis, and Nader Mehravari. "A Proven Method for Identifying Security Gaps in International Postal and Transportation Critical Infrastructure." (Technical Note CMU/SEI-2013-TN-033). Carnegie Mellon University, Software Engineering Institute's Digital Library, Software Engineering Institute, 17 Jan. 2014. https://doi.org/10.1184/R1/6571733.v1. Accessed 22 Dec. 2024.

Crabb, Greg; Allen, Julia; Curtis, Pamela; & Mehravari, Nader. A Proven Method for Identifying Security Gaps in International Postal and Transportation Critical Infrastructure. CMU/SEI-2013-TN-033. Software Engineering Institute. 2014. https://doi.org/10.1184/R1/6571733.v1