Tag Archives: adulteration

Susanne Kuehne, Decernis
Food Fraud Quick Bites

Germany’s Food Warning Website

By Susanne Kuehne
No Comments
Susanne Kuehne, Decernis
Food fraud, Germany
Find records of fraud such as those discussed in this column and more in the Food Fraud Database. Image credit: Susanne Kuehne

Unapproved ingredients and allergens, whether added intentionally or unintentionally, were the third largest reason for recalls in Germany last year, behind microbiological contamination and impurities from foreign matter. The German food warning system by the BVL (Bundesamt fuer Verbraucherschutz und Lebensmittelsicherheit) is accessible by the public and provides detailed information of warnings considering food and beverages. The warnings issued per year are growing steadily, from 100 warnings in 2015 to 161 in 2017 to 198 warnings in 2019.

Resource

  1. WirtschaftsWoche (January 10, 2020) “Um Rueckruf wird gebeten”. Retrieved from WirtschaftsWoche3, 2020. Original source Bundesamt fuer Verbraucherschutz und Lebensmittelsicherheit
Craig Reeds
FST Soapbox

Cybersecurity for Food and Beverage Operational Technology (OT) Environments

By Craig Reeds
No Comments
Craig Reeds

Much of the attention that cybersecurity gets is on the IT or office network side of things, but recently people have begun paying more attention to operational technology (OT) systems that make up the country’s critical infrastructure. When people think of critical infrastructure, they automatically think of oil and gas, power generation, and water. Many people don’t realize that there are actually 16 critical infrastructure industries:

  • Energy
  • Financial
  • Dams
  • Defense
  • Critical Manufacturing
  • Water and Wastewater
  • Food and Agriculture
  • Healthcare
  • Government Facilities
  • Commercial Facilities
  • Transportation
  • Emergency Services
  • Chemical
  • Communications
  • Nuclear
  • Information Technology

One of the easily forgotten, but perhaps most important, is food and beverage manufacturing. A cyber attack on a food and beverage company might not result in the lights going out or clouds of toxic gas, but they could result in explosions, or tainted food. We need to start paying more attention to cybersecurity in the food and beverage industry. What would happen if a hacker got into the control system at a frozen foods distribution facility? They could raise the temperature in the freezers, thaw the food and then refreeze it. This could result in food poisoning for hundreds or thousands of people. Bad actors can do a lot of harm by targeting this sector.

Many companies are pushing to combine their IT and OT departments, something they call IT/OT convergence. This can be done, but you need to first understand that IT and OT have differing goals.

It is important to review the organizational structure. You will typically find that both IT and OT report organizationally to the CEO level. We also find senior management believes IT owns the industrial control system (ICS) networks and security—mainly because IT owns support, maintenance & operational budget for network and security (basically letting OT off the hook).

IT’s primary goals are confidentiality, integrity and availability, the CIA triad. While working toward these objectives IT also tries to make it possible for users to access the network from any location from which they are working, using whatever computing device they have with them. The goal is to make it as easy to work from an airport, hotel room or coffee shop as it is to work in the office itself. Technology is updated and replaced often. Service packs are loaded, new software releases are loaded, and bugs are fixed.

OT’s primary goals are availability, integrity and confidentiality—a complete reversal of the CIA triad. They strive to keep production running, be it an electric utility, an oil rig or a pop-tart factory 24/7/365. OT is all about what works, a “We’ve always done it that way” mentality. OT will always be reluctant to make any change that might bring down the production line. Remember, they are graded on widgets per minute. There must be trust and open communication between IT and OT if things are going to work properly.

When we are talking about OT cybersecurity, we usually use terms like secure or prevent, when we really should be thinking about words like containment. Securing the network and preventing attacks is important, but at some point, an attack will get past your defenses. Then it is a matter of containment: How do we keep the problem from spreading to other networks?

One thing to definitely avoid is the desire by IT to have bi-directional communications between the IT and OT networks—this should never happen. Also, avoid the desire to connect the ICS to the Internet so that you can control the process remotely. There is no reason for the plant manager to be able to go home, have a couple beers and then log on to see if he can make things run better. If the control system is going to be connected to the corporate IT or the Internet, it should only have out-going uni-directional data transmission to allow monitoring of the system.

Building a good OT cybersecurity program, you need to do three things:

  • Get C-Level support and buy-in for the changes to be made.
  • Communicate with stakeholders and vendors.
  • Make decisions as a team, make sure all the stakeholders, IT, OT, engineering are all involved.

After you have set up the structure and started communicating, you need to begin cybersecurity awareness training for the OT staff. This training should be focused on educating plant personnel on what cybersecurity is, both at work and at home, and how to respond or escalate something that seems wrong. They need to be trained what needs to be dealt with immediately and what can wait. Consider doing tabletop exercises where you practice what to do when certain things occur. This can act as a stress test for your incident response plan and help find the holes in your plan and procedures. These tabletop exercises should involve C-suite individuals as well as people from the plant floor, so everyone understand their part in a cyber-attack response.

If these concepts are followed, you will be well on your way to creating a much more cyber-secure production environment.

Susanne Kuehne, Decernis
Food Fraud Quick Bites

What a Waste

By Susanne Kuehne
1 Comment
Susanne Kuehne, Decernis
Schweinerei, food fraud
Find records of fraud such as those discussed in this column and more in the Food Fraud Database. Image credit: Susanne Kuehne

The Netherlands Food and Consumer Product Safety Authority NVWA closed down an animal feed company that generated €4 million revenue selling contaminated feed with forged documents. Several thousand tons of waste, unsuitable to use in animal feed, was found at the facility, and three employees have been arrested.

Resources

  1. Byrne, J. (February 6, 2020). “Arrests in feed fraud cases in the Netherlands”. Feed Navigator.
  2. Also see Inval bij veevoederbedrijf in omgeving van Tilburg.
Susanne Kuehne, Decernis
Food Fraud Quick Bites

An ‘Egg-stra’ Splash Of Color

By Susanne Kuehne
No Comments
Susanne Kuehne, Decernis
Food fraud, eggs
Find records of fraud such as those discussed in this column and more in the Food Fraud Database. Image credit: Susanne Kuehne

Free-range country chicken eggs, often recognizable by their different color, fetch 30–40% more revenue than eggs from caged hens. Leghorns, a common type of chicken used for mass-production, lay white eggs. In this fraud case in India, leghorn eggs were colored by using water-based dyes, for example, made from tea. The eggs were confiscated and destroyed by the Food Safety and Standards Authority of India (FSSAI), and the vendors received a warning.

Resource

  1. Thomas, W. (February 3, 2020). “FSSAI destroys artificially coloured eggs”. The Hindu.
Karen Everstine, Decernis
Food Fraud Quick Bites

Fraud in Alcoholic Beverages

By Karen Everstine, Ph.D.
No Comments
Karen Everstine, Decernis

Recently, a group of researchers published a paper that documented unique chemical “fingerprints” left by whiskies after evaporation that could be used to identify the origin (specifically, American whiskeys in relation to Scotch and Irish whiskies.) Authentication of value-added label attributes in wine and spirits is important for protection of producers, brands and markets. Other examples include varietal fraud and geographic indication misrepresentation with wines and counterfeit production (intellectual property infringement) of a variety of spirits.

Food Fraud, wine
The Food Fraud Database has captured 220 incidents of fraud involving all alcoholic beverages and 63 specifically involving wines. (Source: Grape Wall of China)

Unfortunately, alcoholic beverages are also prone to fraud involving the addition of substances that can cause illness or death. This often happens at the local level, with the production of “moonshine” or other unlicensed spirits. Some of the substances used have included methanol, isopropyl alcohol and industrial-grade alcohol.
One notable incident from the 1980s had global implications and severe market effects. Diethylene glycol was added to Austrian wines, resulting in recalls around the world when the adulteration was detected. Fortunately, no illnesses or deaths were reported. Just a year later, methanol added to Italian wine caused both hospitalizations and deaths. More recently, incidents involving the addition of methanol to spirits have caused deaths in India, China and Malaysia.

Authentication and traceability for alcoholic beverages, and specifically wines, lend themselves to technology-enabled solutions such as blockchain. On a lighter note, take a look at some of the labels documented by reporters covering the wine market in China. In a high value marketplace such as the wine business, there is no end to creativity in labeling.

Susanne Kuehne, Decernis
Food Fraud Quick Bites

Getting Pinched by Imitation Lobsters

By Susanne Kuehne
No Comments
Susanne Kuehne, Decernis
Food fraud, lobster, white fish
Find records of fraud such as those discussed in this column and more in the Food Fraud Database.
Image credit: Susanne Kuehne

Seafood is a never-ending target for defrauding restaurant and store customers. At an Italian restaurant chain in the UK, a lobster and king prawn dish contained more than one-third white fish in addition to other filler ingredients to lower cost. The dish was shaped to represent lobster meat. No health or safety issues were reported, however, this is yet another example where significantly cheaper ingredients were used to defraud customers. The company made almost $4 million in revenue over the course of several years from this dish alone.

Resource

  1. Chris Wilson (January 14, 2020). “ASK restaurant fined over ‘misleading’ lobster dish”.  BBC.
Susanne Kuehne, Decernis
Food Fraud Quick Bites

Caught in the Whiskey Web

By Susanne Kuehne
No Comments
Susanne Kuehne, Decernis
Food fraud, whiskey
Find records of fraud such as those discussed in this column and more in the Food Fraud Database.
Image credit: Susanne Kuehne

When we talk about the identification of fraudulent foods and beverages, many elaborate methods are available in analytical chemistry and food labs. The method of using “whiskey webs” is quite unusual in its simplicity; it is based on the unique residue left behind by each beverage after evaporation. American Whiskey is matured in new charred oak barrels that transfer a number of water-insoluble components into the final product, allowing each whiskey to leave behind its own unique “fingerprint”.

Resource

  1. Wilson, C. (October 29, 2019). “American whiskey leaves behind a web-like ‘fingerprint’, finds study”. Decanter.

 

Susanne Kuehne, Decernis
Food Fraud Quick Bites

Malt, Hops, Water, Yeast…and Antifreeze

By Susanne Kuehne
No Comments
Susanne Kuehne, Decernis
Beer, food fraud
Find records of fraud such as those discussed in this column and more in the Food Fraud Database.
Image credit: Susanne Kuehne

Diethylene glycol (DEG) is a substance that is highly toxic to humans. It is used in a wide range of applications, such as brake fluid and as a raw material for resins, and it is often present in antifreeze. In Brazil, more than a dozen people were poisoned by beer containing DEG. The suspected products were recalled and the case is under investigation. It is not clear yet whether the DEG was intentionally added to commit fraud, or whether the contamination was unintentional. We are observing this case very closely, since diethylene glycol has been used for fraudulent purposes in beverages in the past.

Resource

News Desk (January 15, 2020). “Backer told to recall beer linked to poisoning in Brazil”.

 

Susanne Kuehne, Decernis
Food Fraud Quick Bites

Not Your Mother’s Meatloaf

By Susanne Kuehne
No Comments
Susanne Kuehne, Decernis
Food fraud, soy, minced beef
Find records of fraud such as those discussed in this column and more in the Food Fraud Database.
Image credit: Susanne Kuehne

Nearly 800 tons of minced meat worth more than $5.5 million was adulterated in a way where the meat was replaced with soy, beef fat, animal skin and starch. The meat was supplied from Poland and sold in France to charitable organizations like the Red Cross. The ingredients, which were of very low quality, did not pose a health risk, however, altered the taste and texture of the meat; an investigation is ongoing.

Resource

  1. Courrier Picard (June 7, 2019). “Du gras, de la peau, du soja… Tout sauf de la viande dans ces steacks livrés à des associations”.
Susanne Kuehne, Decernis
Food Fraud Quick Bites

In That Wine, There Is No Truth

By Susanne Kuehne
No Comments
Susanne Kuehne, Decernis
Wine, Decernis Food Fraud database
Find records of fraud such as those discussed in this column and more in the Food Fraud Database.
Image credit: Susanne Kuehne.

Booze bootleggers are still quite active since there is a lot of money exchanging hands in the high-end wine and liquor business. Fake premium Penfolds wines, which can fetch several hundred dollars per bottle, as well as acclaimed brands of adulterated whisky, were discovered and seized in a liquor store in Cambodia. Besides the fake beverages, the raid also uncovered fake labels and packaging materials.

Resource

  1. Australian Associated Press (November 28, 2019). “Fake Penfolds wine seized in raid on bootlegging operation in Cambodia”.The Guardian.