Technology and Security: Countering Criminal Infiltrations in the Legitimate Supply Chain

Page 55

2.2 Supply Chain Security Solutions to address the risk scenarios

Scenario 3: E-commerce: criminal infiltration of online supermarket chains for home delivery of fake food Step 1 – Control of legitimate e-operators. Step 2 – Selling fraudulent food as genuine through the controlled e-supermarkets.

Through the use of strong authentication measures in the product and then the control of its movements. The code provides an important security layer, which can be improved in the future if it includes encrypted information about the characteristics of the specific product that is linked to the blockchain protected traceability system. However, since in many cases the product is directly sold to the final consumer, avoiding any other intermediary passages, consumers may also have a role to play in this case. This requires the consumer to be fully aware of the authentication method and of how to identify a counterfeit.

Step 3 – Expansion of e-commerce market through the creation of a Super E-food app. Step 4 – Creation of dedicated social network groups/pages to sell fraudulent products to final customers.

2.2.6 Focus on authenticating, tracking and tracing ingredients Technology submission 6 One of the submissions received focuses on the application of an advanced Manufacturing Execution System (MES) that provides the ability to track the manufacturing of products and their movement through the supply chain anywhere in the world via a web-based tracking data management system. The solution secures products through tamper-proof labelling solutions that assign unique, serialized identities to each crop, ingredient, product, and batch. This is combined with total traceability and control throughout the food and beverage supply chain—from seed, to harvest, production, distribution, sale, and after sale. This technology option is based on assigning serialized identities to every product, starting in the field, providing stakeholders with a highly detailed record of every product’s genealogy. With a single scan, this detail can be instantly accessed by key stakeholders throughout the supply chain, providing insight into where a product came from, what ingredients were used, and who interacted with it at every stage of the supply chain. The solution creates and assigns unique codes (paired with security labelling). The codes are associated with all aspects of the process and items used in the process. It starts with the codes that are associated with raw materials and ingredients, product, and materials produced. The raw material and ingredient codes are embedded in the product along with other process data such as user information, operational data, and specific intrinsic data such as temperatures, pressures, and dwell times, among others. These codes are aggregated to pallets, skids, and cartons, allowing the solution to easily track the shipping information. By using the system, stakeholders can have a complete overview of what is produced, where it came from, and where it went.

54


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

3.2 Technology solutions to address the risk scenarios

4hr
pages 95-195

3.1 Risk scenarios

6min
pages 93-94

2.5 Conclusions

15min
pages 88-92

2.3.5 Fourier Transform InfraRed (FTIR) spectroscopy, Optical- Photothermal InfraRed (O-PTIR) spectroscopy and X-ray Fluorescence spectroscopy (XRF

9min
pages 80-83

2.3.4 Using ion beam analytical techniques

6min
pages 77-79

2.4 Examples of technology targeting e-commerce fraud

10min
pages 84-87

2.3.3 Iso-elemental fingerprinting techniques

9min
pages 73-76

2.3.2 Accelerator Mass Spectrometry

8min
pages 69-72

2.2.6 Focus on authenticating, tracking and tracing ingredients

17min
pages 55-60

2.3 Nuclear and other analytical techniques

4min
pages 61-62

2.3.1 Focus on portable devices

14min
pages 63-68

2.2.5 Innovative marking methods and satellite integration

17min
pages 49-54

2.2.4 DNA ID, mass balance products’ flow reconciliation and satellite integration

17min
pages 43-48

2.2.2 Using metameric inks

10min
pages 33-36

2.2.3 Focus on labels – the “all in one label

15min
pages 37-42

2.2.1 Product authentication and track and trace: unique visual identity

14min
pages 27-32

b) Forensics

5min
pages 18-21

2.2 Supply Chain Security Solutions to address the risk scenarios

9min
pages 24-26

2.1 Risk scenarios

6min
pages 22-23

1.2 An introduction to the evolution of technology solutions for securing the products’ supply chain

5min
pages 11-12
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.