Technology and Security: Countering Criminal Infiltrations in the Legitimate Supply Chain

Page 18

1.3 From supply chain security to the collection of forensic evidence

b) Forensics Forensic science works off of the physical remnants of past criminal activity, and, therefore has certain native and non-native principles that guide its operation, application, and interpretation. One of the implicit precepts in this view of forensic science is that the production history of mass-produced goods is embedded in the finished product. This production history sets in large part the specificity and resolution of the evidentiary significance of that item. In some cases, certain evidence types are analysed without a concrete focus on the product’s origins or production history, which could be essential to identify critical information. Supply chains can generate numerous variations encountered in most mass-produced items, therefore, the foundation for the potential significance of those items encountered as evidence in forensic investigations and casework.28 In the field of supply chain management, forensic science has been able to identify the particular parameters of any product to determine how or if it can be differentiated from other similar products. A product resulting from the supply chain process can be seen as the culmination of certain contingencies (nodes in the supply chain) and continuities (production methods) intrinsic in its manufacture.29 The techniques used to analyse the goods occasionally overlap with chemistry methods that are employed by the supply chain stakeholders to verify the quality and security standards of the products. In this regard, forensics can be used to analyse a product which has already reached the market to verify if it is counterfeit or not. The comparison of the physical and chemical characteristics of a suspected counterfeit product can determine if the analysed good is, in effect, a counterfeit. This evidence can even be brought in court to support allegations of counterfeiting since it may also serve as a tool for tracing back to the origin of the incident. In addition, it is possible to trace back the composition to its source or compare other counterfeits to verify if they have the same origin.

28

Houck, M. M. (2010). An Investigation into the Foundational Principles of Forensic Science (doctoral dissertation). Curtin University of Technology. Retrieved 2020, from https://espace.curtin.edu.au/bitstream/handle/20.500.11937/1568/146239_Houck%20M%20 2010%20Full.pdf?sequence=2

29 Ibid

17


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

3.2 Technology solutions to address the risk scenarios

4hr
pages 95-195

3.1 Risk scenarios

6min
pages 93-94

2.5 Conclusions

15min
pages 88-92

2.3.5 Fourier Transform InfraRed (FTIR) spectroscopy, Optical- Photothermal InfraRed (O-PTIR) spectroscopy and X-ray Fluorescence spectroscopy (XRF

9min
pages 80-83

2.3.4 Using ion beam analytical techniques

6min
pages 77-79

2.4 Examples of technology targeting e-commerce fraud

10min
pages 84-87

2.3.3 Iso-elemental fingerprinting techniques

9min
pages 73-76

2.3.2 Accelerator Mass Spectrometry

8min
pages 69-72

2.2.6 Focus on authenticating, tracking and tracing ingredients

17min
pages 55-60

2.3 Nuclear and other analytical techniques

4min
pages 61-62

2.3.1 Focus on portable devices

14min
pages 63-68

2.2.5 Innovative marking methods and satellite integration

17min
pages 49-54

2.2.4 DNA ID, mass balance products’ flow reconciliation and satellite integration

17min
pages 43-48

2.2.2 Using metameric inks

10min
pages 33-36

2.2.3 Focus on labels – the “all in one label

15min
pages 37-42

2.2.1 Product authentication and track and trace: unique visual identity

14min
pages 27-32

b) Forensics

5min
pages 18-21

2.2 Supply Chain Security Solutions to address the risk scenarios

9min
pages 24-26

2.1 Risk scenarios

6min
pages 22-23

1.2 An introduction to the evolution of technology solutions for securing the products’ supply chain

5min
pages 11-12
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.