Technology and Security: Countering Criminal Infiltrations in the Legitimate Supply Chain

Page 88

2.5 Conclusions

Step 3 – Expansion of e-commerce market through the creation of a Super E-food app.

Big data analytics can be used to monitor apps, allowing the user to obtain an alert if an app is selling counterfeit goods.

Step 4 – Creation of dedicated social network groups/pages to sell fraudulent products to final customers.

Big data analytics can target social media as part of the constant monitoring of the e-commerce platforms. Groups and users selling fraudulent products can be eliminated or reported.

2.5 Conclusions The agro-food mafia risk scenarios presented some of the threats that can affect the integrity of the supply chain. Thanks to research conducted by UNICRI and the submissions we received from technology experts; it has been possible to assess how technology solutions may contribute to increase the security of the supply chain of these products while limiting related criminal activities. Existing technology solutions usually encompass one or several of these elements to protect the flow of products in the supply chain: Authentication technology: This option is defined by specific characteristics that allow the differentiation of a product to help the different stakeholders of the supply chain, which could possibly include consumers, to identify original products and, consequently, the presence of counterfeits. To define what an original product is, it is possible to refer to certain intrinsic features of the product itself or to apply specific technology on the product, which will provide for the distinction between original and counterfeit (a hologram or a code, for instance). The solutions can be overt (using the sensorial capability of the individual) or covert (that require a device or an additional tool to be revealed) or a combination of both. Track and trace systems: Frequently, authentication technology on the products is coupled with the implementation of track and trace systems that allow the monitoring of the authenticated goods throughout the different stages of the supply chain and secure the latter from infiltration of unauthorized products. This grants visibility to identify illicit activities related to the deviation of the products from the supply chain, including the use of expired or low-quality products that are repacked and relabelled with falsified dates, dosage and brand information. Traceability options can also use space technologies as a proof of origin as well as for monitoring purposes. Blockchain technology: This solution has been integrated to traceability systems. It can connect the different parties in the supply chain that have not established trusted relationships with each other, by ensuring transparency. Blockchain stores every transaction or exchange of data that occurs in the network, reducing the need for intermediaries by providing a means by which all the actors in the network may share access to the same information, including what is added to the data, by whom, and the date and time of the submission.2 Forensics: A product resulting from the supply chain process can be seen as the culmination of certain contingencies (nodes in the supply chain) and continuities (production methods) intrinsic in its manufacture. Forensics can be used to analyse a product which has already reached the market to verify if it is counterfeit or not. This evidence can even be brought in court to support allegations of counterfeiting since it may also serve as a tool to trace back the origin of the incident and to compare other counterfeits to verify if they have the same origin. In the case of food fraud, the following techniques can be used: stable isotope 2

Accenture. (2019, January 15). Tracing the Supply Chain. Retrieved August 23, 2020, from https://www.accenture.com/_acnmedia/ pdf-93/accenture-tracing-supply-chain-blockchain-study-pov.p

87


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

3.2 Technology solutions to address the risk scenarios

4hr
pages 95-195

3.1 Risk scenarios

6min
pages 93-94

2.5 Conclusions

15min
pages 88-92

2.3.5 Fourier Transform InfraRed (FTIR) spectroscopy, Optical- Photothermal InfraRed (O-PTIR) spectroscopy and X-ray Fluorescence spectroscopy (XRF

9min
pages 80-83

2.3.4 Using ion beam analytical techniques

6min
pages 77-79

2.4 Examples of technology targeting e-commerce fraud

10min
pages 84-87

2.3.3 Iso-elemental fingerprinting techniques

9min
pages 73-76

2.3.2 Accelerator Mass Spectrometry

8min
pages 69-72

2.2.6 Focus on authenticating, tracking and tracing ingredients

17min
pages 55-60

2.3 Nuclear and other analytical techniques

4min
pages 61-62

2.3.1 Focus on portable devices

14min
pages 63-68

2.2.5 Innovative marking methods and satellite integration

17min
pages 49-54

2.2.4 DNA ID, mass balance products’ flow reconciliation and satellite integration

17min
pages 43-48

2.2.2 Using metameric inks

10min
pages 33-36

2.2.3 Focus on labels – the “all in one label

15min
pages 37-42

2.2.1 Product authentication and track and trace: unique visual identity

14min
pages 27-32

b) Forensics

5min
pages 18-21

2.2 Supply Chain Security Solutions to address the risk scenarios

9min
pages 24-26

2.1 Risk scenarios

6min
pages 22-23

1.2 An introduction to the evolution of technology solutions for securing the products’ supply chain

5min
pages 11-12
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.