Technology and Security: Countering Criminal Infiltrations in the Legitimate Supply Chain

Page 61

2.3 Nuclear and other analytical techniques

Step 3 – Expansion of e-commerce market through the creation of a Super E-food app. Step 4 – Creation of dedicated social network groups/pages to sell fraudulent products to final customers.

2.3 Nuclear and other analytical techniques This part of the report is dedicated to analysing the potential contribution to the fight against food fraud and food counterfeiting which can be achieved by using technologies aimed at examining the composition of the food product itself. By looking into its organic and chemical properties, these technologies are capable of telling if the food product is genuine or not. If compared to supply chain security solutions, these technologies come into play at a different stage, when the supply chain has already been breached or when there is suspicion that a breach occurred. The result of the analysis can not only determine if the breach happened but can also provide important indications on the composition of the fraudulent product. The latter, when coupled with a series of analysis on suspect infringing goods, can help tracing back the origin of the fraud, while results can also be brought in court by forensic experts to provide evidence of who was responsible for the illegal actions. Also, in this case, the discussion on the possible use of these technologies will be done through concrete examples that were collected by UNICRI through its call for submissions. As will be presented in the next paragraphs, there is a wide range of technologies that can be used to analyse food composition for forensic purposes. These include a stable isotope analysis and X-ray fluorescence (XRF), Accelerator Mass Spectrometry (AMS), PIXE (Particle-Induced X-ray Emission), RBS (Rutherford Backscattering Spectrometry), Ion Microprobe and MeV- SIMS (Secondary Ion Mass Spectrometry with MeV ions), Fourier Transform InfraRed (FTIR) spectroscopy O-PTIR (Optical-Photothermal InfraRed) spectroscopy, portable Near InfraRed (NIR) or RAMAN spectrometers. Notwithstanding this, it is already possible to present some general interesting features which are intrinsic to these solutions, such as: Unique result of the analysis: Geographical and environmental conditions ultimately control the elemental and isotopic makeup of a product. Nuclear techniques can determine the intrinsic isotopic and elemental fingerprints in the samples, with greater detail and accuracy than conventional methods (i.e., morphological traits, fatty acid analysis, DNA profiling, etc.). Accountability: These techniques provide accountability through the analysis of the origin and quality of the product, which may act as a deterrent to fraudulent practices. Detection: In the case of non-targeted methods, they are particularly useful for the detection of food adulteration because of the high number of potential adulterants that a sample can contain and because they may be adulterated with compounds not yet discovered. New adulterants that were previously unknown can be discovered simply based on an aberration of the spectrum, that is then investigated to identify what caused the aberration. Accurate and well-established techniques: The methodology used by these techniques is highly sensitive, accurate and has been validated by a wide scientific literature. The use of the technology in other areas

60


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

3.2 Technology solutions to address the risk scenarios

4hr
pages 95-195

3.1 Risk scenarios

6min
pages 93-94

2.5 Conclusions

15min
pages 88-92

2.3.5 Fourier Transform InfraRed (FTIR) spectroscopy, Optical- Photothermal InfraRed (O-PTIR) spectroscopy and X-ray Fluorescence spectroscopy (XRF

9min
pages 80-83

2.3.4 Using ion beam analytical techniques

6min
pages 77-79

2.4 Examples of technology targeting e-commerce fraud

10min
pages 84-87

2.3.3 Iso-elemental fingerprinting techniques

9min
pages 73-76

2.3.2 Accelerator Mass Spectrometry

8min
pages 69-72

2.2.6 Focus on authenticating, tracking and tracing ingredients

17min
pages 55-60

2.3 Nuclear and other analytical techniques

4min
pages 61-62

2.3.1 Focus on portable devices

14min
pages 63-68

2.2.5 Innovative marking methods and satellite integration

17min
pages 49-54

2.2.4 DNA ID, mass balance products’ flow reconciliation and satellite integration

17min
pages 43-48

2.2.2 Using metameric inks

10min
pages 33-36

2.2.3 Focus on labels – the “all in one label

15min
pages 37-42

2.2.1 Product authentication and track and trace: unique visual identity

14min
pages 27-32

b) Forensics

5min
pages 18-21

2.2 Supply Chain Security Solutions to address the risk scenarios

9min
pages 24-26

2.1 Risk scenarios

6min
pages 22-23

1.2 An introduction to the evolution of technology solutions for securing the products’ supply chain

5min
pages 11-12
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.