Food Fraud: Criminology and the Focus on Prevention

Similar documents
Detection of fraud in the food chain: mission impossible? Can food Producers cope with the challenge?

Tapan Ray Director General Organisation of Pharmaceutical Producers of India ALCAN PACKAGING UNIVERSITY OCT 8, LONAVALA

Food Fraud: What You Don t Know Can Hurt You

Supporting Consumers Facilitating Behaviour that Reduces Risky Behaviours. Professor Lynn J. Frewer. Food and Society Group

FOODINTEGRITY Ensuring the Integrity of the European food chain

Foresight Security Scenarios for Prepared Response to the Unplanned: Results from an EU Security Research Project and its Transatlantic Dimension

Counterfeit Medicines Toolkit 4. Information about the International Medical Products Anti-Counterfeiting Taskforce (IMPACT)

Authentication Solution for Currency Management

Questioned Documents. Forensic Science

To explore the meaning and use of graffiti as a form of criminal damage and vandalism, particularly in relation to the public transport network.

Security Features in Travel Documents to Prevent Fraud

FIRE INVESTIGATOR SCENE EXAMINATION

Science and Technology for Naval Warfare,

2013 IT Risk/Reward Barometer: Asia-Pacific Results. October Unless otherwise noted, n = 343

China s Government Choice against Technical Trade Barriers. Zhang Rui1, a

Challenges to human dignity from developments in AI

Management of Toxic Materials in DoD: The Emerging Contaminants Program

Polycarbonate Datapage Security: Hinge Construction

First Components Ltd, Savigny Oddie Ltd, & Datum Engineering Ltd. is pleased to provide the following

Counter-Terrorism Initiatives in Defence R&D Canada. Rod Schmitke Canadian Embassy, Washington NDIA Conference 26 February 2002

Curriculum Vitae. Altmetrics Score (Influence and dissemination score, 2/2017) Time- by MSU Unit

IMPLEMENTING HSPD-12: A PROGRAM MANAGER S PERSPECTIVE

Protection Augmentation Toughness and Alternatives of GNSS. Melaha 2016 Concord Al-Salam Hotel Cairo, April 25,2016 Refaat Rashad

Interagency Working Group on Import Safety. Executive Order July 18, 2007

Question and Response Guide to Issuing Certified Copies of Vital Records

B) Issues to be Prioritised within the Proposed Global Strategy and Plan of Action:

Machine Vision in Austria

The Sustainable Tourism Programme of the 10-Year Framework of Programmes on Sustainable Consumption and Production

How to complete the Tier 4 (General) Student visa application online

North Carolina Fire and Rescue Commission. Certified Fire Investigator Board. Course Equivalency Evaluation Document

Intellectual Property Initiatives

ProImage/Agfa Graphics Industrial Counterfeiting: Threats, Standards, and Market Opportunities

Jamaican Passport Application Form

Emerging Security Challenges Division NATO

ITI Comment Submission to USTR Negotiating Objectives for a U.S.-Japan Trade Agreement

Specialist Services Section

2 LEADING IN THE NEW IN PUBLIC SAFETY

Extreme space weather: Geomagnetic storms, GNSS disruptions and the impact on vital functions in society

Moving Industry 4.0 from Concept to Implementation and Value

Speed Innovation Happiness. Corporate Overview

A Hybrid Risk Management Process for Interconnected Infrastructures

Dermalog Gate. The next generation gate Made in Germany. v_1.0_171012

Access My Personal Learning Record

The Doctoral Space Revisited

1. HEROES OF THE STORM SOUTHEAST ASIA TEAM RULES AND REQUIREMENTS

PENANG THE SILICON ISLAND OF ASIA. DATO SERI LEE KAH CHOON Director of investpenang

the listed companies Title Agency Venue Date/Time Price: Members Price: Non- Members RM450 RM300 (Vouchers) 24 March 2010 / 9am to 5.

Secure Societies. Pauli Stigell, Pekka Rantala

POLICY BRIEF AUSTRIAN INNOVATION UNION STATUS REPORT ON THE. adv iso ry s erv ic e in busi n e ss & i nno vation

Meeting CEOC Int.-IFIA, 05 October Welcome at the CEOC premises!

What We Heard Report Inspection Modernization: The Case for Change Consultation from June 1 to July 31, 2012

A Smart Substantial Equivalence approach. Katherine Ciambrone SVP, Product Integrity & Compliance Chief Compliance Officer ITG Brands

Food Fraud Table Top Exercise. Pilot for the Food Related Emergency Exercise Bundle (FREE-B)

inemi Project on Metals Recycling

Guide to Tier 4 Online Visa Application: Inside the UK Visa Immigration Support and Advice Advice from the VISA Team

100% Online Combined Honours BA in Criminology and Policing Degree

Applications form: Standard / Enhanced Disclosure

Counterfeit, Falsified and Substandard Medicines

Non-Contact Vein Recognition Biometrics

Towards a common strategic European Technology non-dependence ETnD Conference, April, Budapest EDA Key Note, by Adam Sowa

1. Go to the following website:

Microsoft Trustworthy Computing 2013 Privacy Survey Results

Proposal # xxxxxxxxxxxx. Intercept Jammer. Date:

Justice Sub-Committee on Policing. Police Scotland s digital data and ICT strategy. Written submission from Police Scotland

COUNTERFEIT MEDICINES: IMPACT AND POTENTIAL SOLUTIONS

Systems. Professor Vaughan Pomeroy. The LRET Research Collegium Southampton, 11 July 2 September 2011

PROJECT-DRIVEN TECHNOLOGY STRATEGY: KNOWLEDGE <=> TECHNOLOGY

DRAFT (3 December 2005)

Examples of Public Procurement of R&D services within EU funded Security Research actions

SURVEY QUESTIONS If you prefer an electronic copy of the survey please contact the Thomas Law Firm by at:

Tier 4 Workbook - Tier 4 Online Application

TECHNOLOGY FOR HUMAN TRAFFICKING & SEXUAL EXPLOITATION TRACE PROJECT FINDINGS & RECENT UPDATES

Nurturing Talent Reinforcing the Interaction between Research, Innovation and Education

Photography Policy & Procedure

executives are often viewed to better understand the merits of scientific over commercial solutions.

Guide to completing the Tier 4 application form in the UK January 2017

SMARTPHONES: THE UBIQUITOUS MEAN TO DEFEAT COUNTERFEITING WHITE PAPER ABOUT A DARK INDUSTRY

Military Robotics - Emerging Trends and Future Outlook. Reference code: DF4580PR Published: July 2015 Single user price: US$1950

Wise Up to Counterfeiting

Henry Etzkowitz International Triple Helix Institute 1520 Sand Hill Road, Palo Alto

Tier 4 Workbook Tier 4 Online Application

Testimony of Professor Lance J. Hoffman Computer Science Department The George Washington University Washington, D.C. Before the

Acadia Pharmaceuticals Inc. (ACAD) - Pharmaceuticals & Healthcare - Deals and Alliances Profile

S&T Stakeholders Conference

NYC Birth Certificate Correction Checklist

FDA s Food Defense Program

Financing the Technology Innovation of SMEs in Korea. Hong Jae-Keun (Ph.D)

We would be delighted to discuss your needs and how we could support you, so please get in touch. Our contact details appear on the final page.

3rd SCAR Foresight. XXIV EURAGRI Members Conference 2010 Broadening the Agricultural Challenges to Green Growth. Helsinki, 6 7 September 2010

GLOBAL CATASTROPHIC RISKS SURVEY

Mindray Medical International Limited (MR) - Medical Equipment - Deals and Alliances Profile

ONLINE APPLICATION FORM GUIDE

ENTREPRENEURSHIP & ACCELERATION

Draft executive summaries to target groups on industrial energy efficiency and material substitution in carbonintensive

Wash your hands before you come to dinner! Lesson 3 Rules and Regulations

The importance of frontier SSH research for the EU agenda

(131st General Assembly) (Amended Substitute Senate Bill Number 61) AN ACT

Food Safety Culture what is it and can it be measured? Prof Carol Wallace

DRUG CONTAINER CLOSURE TESTING: IMPACT OF EXTRACTION AND ANALYSIS METHODOLOGY ON METAL CONTAMINANT QUANTIFICATION

o membership details including when you signed up to be a member and any date you decide to leave us;

Transcription:

Fraud: Criminology and the Focus on Prevention Roy Fenoff, Ph.D., D-BFDE Assistant Professor, The Citadel MSU Fraud Initiative 4 th Asia-Pacific International Safety Conference Penang, Malaysia October 11, 2016 Today s briefing focuses on five objectives Defining food fraud Describing how it is different from food quality, food safety, and food defense Introducing the food fraud prevention system Discussing the criminology behind the system Illustrating how it works fraud defined Action: Deception using food for economic gain Including the FDA defined sub-category of Economically Motivated Adulteration Motivation: Economic gain Effect: Economic Threat Public health Vulnerability or Threat fraud is a collective term used to encompass the deliberate and intentional substitution, addition, tampering, or misrepresentation of food, food ingredients, or food packaging; or false or misleading statements made about a product, for economic gain.

Security The food protection risk matrix fraud includes Prevent by Understanding the Motivation All Fraud UK, EU, GFSI, China, ISO FDA/FR Economically Motivated Adulteration Quality Safety Unintentional Action Fraud Ac Defense Intentional Motivation Gain: Economic Harm: Public Health, Economic, or Terror Counterfeiting Over-Runs Dilution Unapproved Enhancements Substitution Fraud Mislabeling Contaminant Grey Market/ Theft/ Diversion Tampering Source: Fraud Think Tank Presentation, GFSI, 2012, 2013, 2014 The problem is large and growing fraud prevention system Incidents Estimate: the global food industry loses US $30 to $40 billion annually to food fraud (MSU FFI, 2014) Horizon Scanning Manage: Detect Deter Guardian & Hurdle Gaps The Fraud Opportunity Victim Enterprise-Wide Risk Assessment Initial Screening RANK A single food fraud incident can cost 2-15% of a company s annual revenue (GMA, 2010) Prevent Fraudster Adulterants Tampering Theft Over-runs Diversion Counterfeits Dilutions Countermeasures

fraud prevention system Horizon Scanning Manage: Detect Deter Guardian & Hurdle Gaps Incidents The Fraud Opportunity Victim Enterprise-Wide Risk Enterprise-Wide Assessment Risk Assessment Initial Vulnerability Screening Assessment RANK While criminology attempts to explain crime causation Crime science focuses on opportunity Prevent Fraudster Adulterants Tampering Theft Over-runs Diversion Counterfeits Dilutions Countermeasures Evaluating the fraud opportunity Established tenets of crime prevention theory guide our thinking The crime triangle identifies the basic elements that comprise any problem We must analyze and understand these elements in order to solve problems Are we disrupting the chemistry of the crime? Detect Deter Prevent Source: Center for Problem-Oriented Policing

Example: horsemeat in beef (EU) The horsemeat in beef crisis resulted in several countermeasures Laurence McAllister Red Lion Slaughterhouse (UK) Willy Selten Jan Fasen 14 companies throughout the EU 9 countries (Photo: Dimitar Hristov) An improved horse identification system in Europe (i.e., horse passports) Mandatory country of origin labeling for horse meat Companies Mandatory CCTV cameras inside slaughterhouses Governments Individuals along the supply chain Standards Agency (UK) Consumers Governments Companies Restriction of the Tripartite Agreement New problems emerge Incidents Counterfeit and forged horse passports were being targeted by the fraudsters So how does one obtain a fake identity document or horse passport? (Photo: Rio 2016/Alex Ferro)

Birth certificates can be used to obtain identity documents that give the holder access to various aspects of society Obtaining a horse passport ID ID So what does the food fraud prevention system tell us? Fenoff Report to ISO TC-247 Problems must be specifically and accurately defined The process must be data-driven The solution must be focused Assessment must be ongoing These principles can and should be applied to food fraud Questions and Comments Roy Fenoff, Ph.D., D-BFDE The Citadel rfenoff@citadel.edu www.fraud.msu.edu

Document Fraud Survey www.surveymonkey.com/r/document