Technology and Security: Countering Criminal Infiltrations in the Legitimate Supply Chain

Page 77

2.3 Nuclear and other analytical techniques

Scenario 3: E-commerce: criminal infiltration of online supermarket chains for home delivery of fake food Step 1 – Control of legitimate e-operators. Step 2 – Selling fraudulent food as genuine through the controlled e-supermarkets.

The technology will be able to analyse the marketed products and determine if they are fraudulent and if they do not originate from the correct geographical location.

Step 3 – Expansion of e-commerce market through the creation of a Super E-food app. Step 4 – Creation of dedicated social network groups/pages to sell fraudulent products to final customers.

2.3.4 Using ion beam analytical techniques Technology submission 10 In this area, one solution uses ion beam analytical techniques such as PIXE (Particle-Induced X-ray Emission), RBS (Rutherford Backscattering Spectrometry), Ion Microprobe and MeV- SIMS (Secondary Ion Mass Spectrometry with MeV ions) as tools to find markers belonging to all components of a products like, for example, wine bottles. Tandem-type accelerators provide swift protons and other ions to be used for different analytical applications. PIXE (Particle-Induced X-ray Emission) is based on the detection of characteristic X-rays stemming from the target atoms. In this way, all elements present in the sample can be quantified, leading to the identifications of particular element markers. These markers will then be used to create the identity of an original product, leading to the possibility of identifying counterfeit ones. The analysis performed may allow for the identification of markers belonging to different materials which form the final product. The latter is seen as a whole set of elements composing it, including the product itself (organic material) and its packaging. Following this, and in the specific example of wine bottles, the analysis to find markers includes the beverage itself, the glass of the bottle, the labels and the cork used to seal the bottle. PIXE employs energetic ions (of the order of a few MeV) provided by particle accelerators as primary probes of the material under study. The energetic ions collide with the atoms of the material giving rise to ionization and subsequent de-excitation of the target atoms, which could take place through the production of characteristic X-rays. These X-rays are then detected by suitable detectors. The data is then processed by nuclear modular electronics and stored in computers as X-ray spectra. These spectra are analysed by specialized computer software in order to obtain the desired information and differentiate original products from counterfeit ones in the case in which an incident occurred or if the need for this type of control arose. Submission received by Ion Implantation Laboratory, Institute of Physics of the Federal University of Rio Grande do Sul.

76


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

3.2 Technology solutions to address the risk scenarios

4hr
pages 95-195

3.1 Risk scenarios

6min
pages 93-94

2.5 Conclusions

15min
pages 88-92

2.3.5 Fourier Transform InfraRed (FTIR) spectroscopy, Optical- Photothermal InfraRed (O-PTIR) spectroscopy and X-ray Fluorescence spectroscopy (XRF

9min
pages 80-83

2.3.4 Using ion beam analytical techniques

6min
pages 77-79

2.4 Examples of technology targeting e-commerce fraud

10min
pages 84-87

2.3.3 Iso-elemental fingerprinting techniques

9min
pages 73-76

2.3.2 Accelerator Mass Spectrometry

8min
pages 69-72

2.2.6 Focus on authenticating, tracking and tracing ingredients

17min
pages 55-60

2.3 Nuclear and other analytical techniques

4min
pages 61-62

2.3.1 Focus on portable devices

14min
pages 63-68

2.2.5 Innovative marking methods and satellite integration

17min
pages 49-54

2.2.4 DNA ID, mass balance products’ flow reconciliation and satellite integration

17min
pages 43-48

2.2.2 Using metameric inks

10min
pages 33-36

2.2.3 Focus on labels – the “all in one label

15min
pages 37-42

2.2.1 Product authentication and track and trace: unique visual identity

14min
pages 27-32

b) Forensics

5min
pages 18-21

2.2 Supply Chain Security Solutions to address the risk scenarios

9min
pages 24-26

2.1 Risk scenarios

6min
pages 22-23

1.2 An introduction to the evolution of technology solutions for securing the products’ supply chain

5min
pages 11-12
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.