Technology and Security: Countering Criminal Infiltrations in the Legitimate Supply Chain

Page 11

1.2 An introduction to the evolution of technology solutions for securing the products’ supply chain ‘Covert’ security elements were traditionally restricted to authorized stakeholders such as producers, brand owners, or enforcement officials, yet an increasing number of security elements can be authenticated by smartphones (for example, digital watermarks, copy detection patterns, Near Field Communication (NFC)). As a result, it has become common practice to let consumers, as well as other supply chain intermediaries and retailers, verify the authenticity of covert authentication elements. The above technologies mainly serve the purpose of authenticating a product or, more often, its packaging, telling if it is genuine or not. To control products’ movements along the supply chain, track and trace technologies are needed and the combination of authentication and track and trace may serve as a more effective barrier to the infiltration of fake and illegitimate products within the legal supply chain. Several types of authentication elements can be used to distinguish authentic goods from phony items, including holograms, colour-shifting inks, security threads, QR codes, data matrix codes, micro-printing, anti-forgery inks, bar-code technology, digital watermarks and copy detection patterns, to mention a few. On the other hand, tracking and tracing mainly relies on two identification methods: optical barcodes (e.g. QR codes, data matrix) and radio frequency identification (RFID), which can be applied either separately or jointly and with optical identification methods being more widespread. QR codes and data matrix codes may however be used for authentication if used in combination with an authentication element which is verified simultaneously.11 Operationally, and for both optical and RFID technology, the process of securing and controlling the movement of products with authentication and track and trace may start as early as the manufacturing stage and may continue in the distribution and retail phases, depending on the type of product, the producer/government’s requirements, and the relevant regulations in place12.

1.2 An introduction to the evolution of technology solutions for securing the products’ supply chain The technological evolution in supply chain security mechanisms has been combined with the progressive transformation of industries which were facing the need to quickly circulate mass market products globally while controlling their location and protecting from a series of evolving threats posed by criminals to the integrity of the supply chain. Two examples can be briefly mentioned to show how technology evolved in the area of supply chain security. The first one relates to rapid technology evolution in relation to tools to authenticate and subsequently track and trace products. The second one refers to the possibility of adapting tools initially created for specific purposes (tax collection in this specific case) to a modified criminal environment, where the purpose of collecting taxes progressively met the purpose of protecting the integrity of the supply chain.

11

For more information see: The European Observatory on Infringements of Intellectual Property Rights (EUIPO). (2021). AntiCounterfeiting Technology Guide. Retrieved from https://euipo.europa.eu/tunnel-web/secure/webdav/guest/document_library/ observatory/documents/reports/2021_Anti_Counterfeiting_Technology_Guide/2021_Anti_Counterfeiting_Technology_Guide_en.pdf

12

A complete overview of these elements can be found in the 2016 report “Ensuring supply chain security: the role of anticounterfeiting technologies”. The report was published in 2016, consequently, the information presented might not consider the latest developments in technology. The present report focuses on current risks and possible responses, including the presentation of innovative submissions based on up-to-date technology solutions. To access the previous report, see: UNICRI (2016), “Ensuring supply chain security: the role of anti-counterfeiting technologies”, http://www.unicri.it/index.php/ensuring-supply-chains-securityrole-anti-counterfeiting-technologies

10


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

3.2 Technology solutions to address the risk scenarios

4hr
pages 95-195

3.1 Risk scenarios

6min
pages 93-94

2.5 Conclusions

15min
pages 88-92

2.3.5 Fourier Transform InfraRed (FTIR) spectroscopy, Optical- Photothermal InfraRed (O-PTIR) spectroscopy and X-ray Fluorescence spectroscopy (XRF

9min
pages 80-83

2.3.4 Using ion beam analytical techniques

6min
pages 77-79

2.4 Examples of technology targeting e-commerce fraud

10min
pages 84-87

2.3.3 Iso-elemental fingerprinting techniques

9min
pages 73-76

2.3.2 Accelerator Mass Spectrometry

8min
pages 69-72

2.2.6 Focus on authenticating, tracking and tracing ingredients

17min
pages 55-60

2.3 Nuclear and other analytical techniques

4min
pages 61-62

2.3.1 Focus on portable devices

14min
pages 63-68

2.2.5 Innovative marking methods and satellite integration

17min
pages 49-54

2.2.4 DNA ID, mass balance products’ flow reconciliation and satellite integration

17min
pages 43-48

2.2.2 Using metameric inks

10min
pages 33-36

2.2.3 Focus on labels – the “all in one label

15min
pages 37-42

2.2.1 Product authentication and track and trace: unique visual identity

14min
pages 27-32

b) Forensics

5min
pages 18-21

2.2 Supply Chain Security Solutions to address the risk scenarios

9min
pages 24-26

2.1 Risk scenarios

6min
pages 22-23

1.2 An introduction to the evolution of technology solutions for securing the products’ supply chain

5min
pages 11-12
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.