Technology and Security: Countering Criminal Infiltrations in the Legitimate Supply Chain

Page 95

3.2 Technology solutions to address the risk scenarios Step 4. Selling of the bars: The associate operating in the neighbouring country sells the gold bars though their distributors and receives payment including VAT. After a few transactions, the gold bars are exported, and the VAT is reclaimed. Risk scenario 3: Infiltration of the Legal Industrial Refining Process An organized crime group realizes that infiltrating the legal industrial refining process of precious metals would provide a high return on investment at a lower level of risk compared to other more “traditional” crime sectors. The criminal group implements the following business model: Step 1. Illegal acquisition of catalysts and scrap metals: The criminal group steals products containing PGMs (such as catalytic converters, chemical catalysts and others). Step 2. Exportation of the stolen material: The criminal group does not have a licence to refine precious metals and scrap (which is requested by the regulatory framework of the country where the group operates). Therefore, criminals use a front import/export company to export the stolen products containing precious metals to another front company that operates in a different country. The latter is a well-established company and is owned/controlled by an affiliate of the main criminal group and is specialized in metal smelting and refining, including industrial platinum, palladium and rhodium. Step 3. Extraction of precious metals: The front refinery company crushes and mixes the stolen (but legally exported) products with spent catalysts and other material containing precious metals. It then extracts the precious metals (rhodium, palladium and platinum). Step 4. Selling the precious metals: The front refinery company legally sells the precious metals (rhodium, palladium and platinum) which have been melted and poured into various forms (buttons/bars), thereby concealing their origin.

3.2 Technology solutions to address the risk scenarios The supply chain of precious metals has its own peculiarities and any activity aimed at securing it will have to take into account specific issues, such as the metals’ sourcing, their purity, weight, and tampering, among others. Supply chain security solutions in this field have been developed keeping these elements in consideration, in view of minimizing threats deriving from infiltration, counterfeiting and smuggling, also looking at the sourcing phase of the product. In this regard, for instance, some of the tools available to guarantee responsible sourcing include multilayer approaches that are based on track and trace systems to monitor precious metal provenance and their subsequent handling, transformation, distribution and sale. Frequently, track and trace systems are combined with other features such as blockchain technology and third-party based auditing and certification. In the case of metal purity, analytical techniques include magnetic tests, acid tests on stone, ultrasonic tests, testing electrical properties, X-ray fluorescence (XRF) and spectrography. These techniques are used by stakeholders to corroborate the quality of the products, since for end-users the cost of these techniques is quite high, making it hardly affordable. As mentioned, one additional element to consider in the field of precious metal supply chain security is weighing. However, even if traditionally this has been a widely used method to avoid the commercialization of counterfeit metals, it is currently relatively simple to maintain a specific weight for metals and still use counterfeit products. One of the threats that is directly related to weighing is tampering. Tampering precious metals is done to artificially increase the product weight by the addition of less expensive materials through different methods. To minimize this risk, analytical techniques to combat purity concerns are used by stakeholders. Finally, to improve security measures for the customer, new mobile apps are being designed to corroborate authenticity through the scanning of visible or invisible codes. The codes can be linked to a traceability system. This technology option is frequently combined with traditionally used serial numbers to facilitate the tracking of the product through the supply chain and with certificates to validate the authenticity and quality of the product.

94


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

3.2 Technology solutions to address the risk scenarios

4hr
pages 95-195

3.1 Risk scenarios

6min
pages 93-94

2.5 Conclusions

15min
pages 88-92

2.3.5 Fourier Transform InfraRed (FTIR) spectroscopy, Optical- Photothermal InfraRed (O-PTIR) spectroscopy and X-ray Fluorescence spectroscopy (XRF

9min
pages 80-83

2.3.4 Using ion beam analytical techniques

6min
pages 77-79

2.4 Examples of technology targeting e-commerce fraud

10min
pages 84-87

2.3.3 Iso-elemental fingerprinting techniques

9min
pages 73-76

2.3.2 Accelerator Mass Spectrometry

8min
pages 69-72

2.2.6 Focus on authenticating, tracking and tracing ingredients

17min
pages 55-60

2.3 Nuclear and other analytical techniques

4min
pages 61-62

2.3.1 Focus on portable devices

14min
pages 63-68

2.2.5 Innovative marking methods and satellite integration

17min
pages 49-54

2.2.4 DNA ID, mass balance products’ flow reconciliation and satellite integration

17min
pages 43-48

2.2.2 Using metameric inks

10min
pages 33-36

2.2.3 Focus on labels – the “all in one label

15min
pages 37-42

2.2.1 Product authentication and track and trace: unique visual identity

14min
pages 27-32

b) Forensics

5min
pages 18-21

2.2 Supply Chain Security Solutions to address the risk scenarios

9min
pages 24-26

2.1 Risk scenarios

6min
pages 22-23

1.2 An introduction to the evolution of technology solutions for securing the products’ supply chain

5min
pages 11-12
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.