Tag Archives: food fraud

Susanne Kuehne, Decernis
Food Fraud Quick Bites

Sweet Things, Adulterated

By Susanne Kuehne
No Comments
Susanne Kuehne, Decernis
Food fraud, lavendar, honey
Find records of fraud such as those discussed in this column and more in the Food Fraud Database.
Image credit: Susanne Kuehne.

Honey is a popular item for adulteration, and honey with a specific botanical source is seen as a more valuable product. The Czech Agriculture and Food Inspection Authority took samples of organic Spanish lavender honey in a Czech supermarket, and analyzed the pollen. The analysis showed that the honey was from alternative botanical sources and certainly not lavender.

Resources

  1. Czech Agriculture and Food Inspection Authority (May 2, 2019). “Med z mořské levandule BIO tekutý”.

 

Susanne Kuehne, Decernis
Food Fraud Quick Bites

Things Are Smelling Fishy Yet Again

By Susanne Kuehne
No Comments
Susanne Kuehne, Decernis
Food Fraud, Decernis
Find records of fraud such as those discussed in this column and more in the Food Fraud Database. Image credit: Susanne Kuehne.

The nose knows: In case fish smells “fishy”, it is no longer fit for human consumption. A Canadian fish importing company pleaded guilty to the import of 9,000 pounds of rotten and partially decomposed fish into the United States. The potentially adulterated fish was sampled by the FDA, who declared it to be too spoiled to be sold in the country, hence refused its entry into the United States—but the fish was imported via a wrong shipment declaration anyway. The crime of importing refused food carries a prison sentence of up to a year.

Resource

  1. Department of Justice, The United States Attorney’s Office, Western District of Washington (October 18, 2019). “Canadian seafood wholesaler, and owner, plead guilty to illegally importing fish into U.S.
Susanne Kuehne, Decernis
Food Fraud Quick Bites

It Is Natural, So It Is Good For You – Or Not?

By Susanne Kuehne
No Comments
Susanne Kuehne, Decernis
Pills, food fraud
Find records of fraud such as those discussed in this column and more in the Food Fraud Database. Image credit: Susanne Kuehne.

In a large study of nearly 6000 products, more than a quarter (27%) of herbal medicines and foods sold in 37 countries on six continents was found to be deliberately or accidentally adulterated. In this study, the products, which came in a variety of forms such as softgels, tea and more, were analyzed with high throughput DNA sequencing and showed mislabeling, added fillers, substituted ingredients or contaminants. Such fraud can be a harmful to consumer health and safety, and must be monitored and tracked closely.

Resource

  1. Ichim, M.C. (October 24, 2019). “The DNA-Based Authentication of Commercial Herbal Products Reveals Their Globally Widespread Adulteration”. “Stejarul” Research Centre for Biological Sciences, National Institute of Research and Development for Biological Sciences, Piatra Neamt, Romania. Frontiers in Pharmacology. Retrieved from https://www.frontiersin.org/articles/10.3389/fphar.2019.01227/full.
magnifying glass

Food Fraud and Adulteration Detection Using FTIR Spectroscopy

By Ryan Smith, Ph.D.
No Comments
magnifying glass

Producers of food-based products are faced with challenges of maintaining the safety and quality of their products, while also managing rapid screening of raw materials and ingredients. Failure to adequately address both challenges can be costly, with estimated recall costs alone starting around $10 million, in addition to any litigation costs.1 Long-term costs can accumulate further as a result of damage to brand reputation. A vast array of methods has been employed to meet these challenges, and adoption continues to increase as technology becomes smaller, cheaper and more user friendly. One such technique is Fourier transform infrared (FTIR) spectroscopy, an analytical technique that is widely used for quick (typically 20–60 seconds per measurement) and non-destructive testing of both man-made and natural materials in food products. The uniformity and physical state of the sample (solid vs. liquid) will dictate the specifics of the hardware used to perform such analyses, and the algorithm applied to the identification task will depend, in part, on the expected variability of the ingredient.

Infrared spectral measurements provide a “compositional snapshot”— capturing information related to the chemical bonds present in the material. Figure 1 shows an example of a mid-infrared spectrum of peppermint oil. Typically, the position of a peak along the x-axis (wavenumber) is indicative of the type of chemical bond, while the peak height is related either to the identity of the material, or to the concentration of the material in a mixture. In the case of peppermint oil, a complex set of spectral peaks is observed due to multiple individual naturally occurring molecular species in the oil.

Mid-infrared spectrum, peppermint oil
Figure 1. Mid-infrared spectrum of peppermint oil. The spectrum represents a “chemical snapshot” of the oil, as different peaks are produced as a result of different chemical bonds in the oil.

Once the infrared spectrum of an ingredient is measured, it is then compared to a reference set of known good ingredients. It is important that the reference spectrum or spectra are measured with ingredients or materials that are known to be good (or pure)—otherwise the measurements will only represent lot-to-lot variation. The comparative analysis can assist lab personnel in gaining valuable information—such as whether the correct ingredient was received, whether the ingredient was adulterated or replaced for dishonest gain, or whether the product is of acceptable quality for use. The use of comparative algorithms for ingredient identification also decreases subjectivity by reducing the need for visual inspection and interpretation of the measured spectrum.

Correlation is perhaps the most widely used algorithm for material identification with infrared spectroscopy and has been utilized with infrared spectra for identification purposes at least as early as the 1970s.2 When using this approach, the correlation coefficient is calculated between the spectrum of the test sample and each spectrum of the known good set. Calculated values will range from 0, which represents absolutely no match (wrong or unexpected material), to 1, representing a perfect match. These values are typically sorted from highest to lowest, and the material is accepted or rejected based on whether the calculated correlation lies above or below an identified threshold. Due to the one-to-one nature of this comparison, it is best suited to identification of materials that have little or no expected variability. For example, Figure 2 shows an overlay of a mid-infrared spectrum of an ingredient compared to a spectrum of sucrose. The correlation calculated between the two spectra is 0.998, so the incoming ingredient is determined to be sucrose. Figure 3 shows an overlay of the same mid-infrared spectrum of sucrose with a spectrum of citric acid. Notable differences are observed between the two spectra, and a significant change in the correlation is observed, with a coefficient of 0.040 calculated between the two spectra. The citric acid sample would not pass as sucrose with the measurement and algorithm settings used in this example.

Mid-infrared spectrum, sucrose
Figure 2. An overlay of the mid-infrared spectrum of sucrose and a spectrum of a different sample of sucrose.
Mid-infrared spectrium, sucrose, citric acid
Figure 3: An overlay of the mid-infrared spectrum of sucrose and a spectrum of citric acid.

When testing samples with modest or high natural variability, acceptable materials can produce a wider range of infrared spectral features, which result in a correspondingly broad range of calculated correlation values. The spread in correlation values could be of concern as it may lead to modification of algorithm parameters or procedures to “work around” this variation. Resulting compromises can increase the potential for false positives, meaning the incorrect ingredient or adulterated material might be judged as passing. Multivariate algorithms provide a robust means for evaluating ingredient identity for samples with high natural variability.

Click below to continue to page 2.

Susanne Kuehne, Decernis
Food Fraud Quick Bites

Keeping Food Safe, the U.S. Way

By Susanne Kuehne
No Comments
Susanne Kuehne, Decernis
Food fraud
Find records of fraud such as those discussed in this column and more in the Food Fraud Database. Image credit: Susanne Kuehne.

In the United States, the FDA is responsible for regulations and recommendations to protect public health, which includes the prevention of any type of food adulteration (unintentional contamination, intentional adulteration, and food fraud – or “economically motivated adulteration”). FSMA (the Food Safety Modernization Act) resulted in new regulations and guidance with strategies to reduce all types of risks in food facilities. It was the most comprehensive reform of FDA’s food safety regulations in more than 70 years.

Resource

  1. FSMA Rules & Guidance for Industry.

 

Susanne Kuehne, Decernis
Food Fraud Quick Bites

Keeping Food Safe, the German Way

By Susanne Kuehne
No Comments
Susanne Kuehne, Decernis
Food fraud, germany
Find records of fraud such as those discussed in this column and more in the Food Fraud Database. Image credit: Susanne Kuehne.

Governments are responsible for the regulatory framework and consumer food protection to keep their citizens safe. In Germany, the Federal Office of Consumer Protection and Food Safety is responsible for national food safety as well as cross-border trade and international information exchange. The German BLV is also the contact point for the EU’s Rapid Alert System for Food and Feed, RASFF. To ensure consumer safety, the Max Rubner-Institut employs some 200 scientists who research food safety, nutrition and food fraud.

Resources

  1. Bundesamt fuer Verbraucherschutz und Lebensmittelsicherheit (November 11, 2019). Retrieved from Federal Office of Consumer Protection and Food Safety, Germany, and Max Rubner-Institut, Federal Research Institute of Nutrition and Food.
Susanne Kuehne, Decernis
Food Fraud Quick Bites

The Hellcat of Pet Food

By Susanne Kuehne
No Comments
Susanne Kuehne, Decernis
Food Fraud, pet food, cat food
Find records of fraud such as those discussed in this column and more in the Food Fraud Database. Image credit: Susanne Kuehne.

Pet food is a highly profitable business. Global pet food sales hit a record $90 billion in 2018, and adulterated or mislabeled feed is not uncommon. In the United States, the FDA ensures correct labeling and adherence to quality standards in pet food. Over the course of six years, a processing facility in Texas shipped low quality, mislabeled ingredients such as feathers and by-products, labeled as premium single ingredients, to pet food manufacturers and distributors. The guilty party had to pay $4.5 millions in restitution to the fraud victims, and the defendant is on a five year probation.

Resources

  1. Department of Justice, U.S. Attorney’s Office, Western District of Missouri (October 24, 2019). “Texas Manager Pleads Guilty to Pet Food Fraud, Company Pays $4.5 Million Restitution”. Retrieved from The United States Department of Justice.
Karen Everstine, Decernis
Food Fraud Quick Bites

Public Food Standards

By Karen Everstine, Ph.D., Steven M. Gendel, Ph.D.
No Comments
Karen Everstine, Decernis

In 1995, a honey processing company was indicted on charges of adulterating industrial honey labeled “USDA Grade A” with corn syrup to increase profits. Ultimately, the jury found in favor of the honey processor, in part because there “weren’t enough regulations governing honey to make the charge stick.”

Honey is defined as “the natural sweet substance produced by honey bees” from the nectar of plants. However, there is not currently an FDA standard of identity for honey in the United States, which would further define and specify the allowed methods of producing, manufacturing and labeling honey (there is, however, a nonbinding guidance document for honey). Some of the details of honey production that a standard of identity might address include allowable timing and levels of supplemental feeding of bees with sugar syrups and the appropriate use of antibiotics for disease treatment.

In circumstances where strict regulatory standards for foods are not available, they may be created by other organizations.

What Is a Food Standard?

A food standard is “a set of criteria that a food must meet if it is to be suitable for human consumption, such as source, composition, appearance, freshness, permissible additives, and maximum bacterial content.”1

To ensure quality, facilitate trade, and reduce fraud, everyone in the supply chain must have a shared expectation of what each food or ingredient should be. Public standards set those expectations and allow them to be shared. They help ensure that stakeholders have a common definition of quality and purity, as well as the test methods and specifications used to demonstrate that quality and purity. Public standards help ensure fair trade, quality and integrity in food supply chains.

How Is a Standard Different from a Method?

A method is generally an analytical technique to assess a particular property of the content or safety of a food or food ingredient. For example, methods for detection of nitrates in meat products or baby food, coliforms in nut products, or high fructose syrups in honey. Methods are an important component of food standards.

A food standard goes a step further and provides an integrated set of components to define a substance and enable verification of that substance. Standards generally include a description of the substance and its function, one or more identification tests and assays (along with acceptance criteria) to appropriately characterize the substance and ensure its quality, a description of possible impurities and limits for those impurities (if applicable), and other information as needed (see Figure 1).

FCC Standard, USP
Figure 1. The Anatomy of an FCC Standard (Source: Food Science Program, Food Chemicals Codex, USP)

Figure 1. The Anatomy of an FCC Standard (Source: Food Science Program, Food Chemicals Codex, USP)

A standard defines both what a food or food ingredient should be and documents how to demonstrate compliance with that definition.

Public Standards and Food Fraud Prevention

Many of the foods prone to fraud are those that are not simple food ingredients, but agricultural products that can be more complex to characterize and identify (such as honey, extra virgin olive oil, spices, etc.). Milk products are an example of a commodity that is prone to fraud with a wide range of adulterants (for example, fluid cow’s milk is associated with 155 adulterants in the Food Fraud Database). Ensuring the quality and purity of a product link milk requires implementation of multiple analytical techniques or the development of non-targeted methods.

The creation of effective public standards with input by a range of stakeholders will be particularly important for ensuring the quality, safety and accurate labeling of these high value commodities in the future.

Reference

  1. A Dictionary of Food and Nutrition 2005, Oxford University Press.

Resources

  1. The Food Chemicals Codex is a source of public standards for foods and food ingredients. It was created by the U.S. FDA and the National Institute of Medicine in 1966 and is currently published by the nonprofit organization USP. The FCC contains 1250 standards for food ingredients, which are developed by expert volunteers and posted for public comment before publication.
  2. The Decernis Food Fraud Database is a continuously updated collection of food fraud records curated specifically to support vulnerability assessments. Information is gathered from global sources and is searchable by ingredient, adulterant, country, and hazard classification. Decernis also partners with standards bodies to provide information about fraudulent adulterants to support standards development.
Susanne Kuehne, Decernis
Food Fraud Quick Bites

Comparing Ceylon and Cassia

By Susanne Kuehne
No Comments
Susanne Kuehne, Decernis
Food fraud, cinnamon
Find records of fraud such as those discussed in this column and more in the Food Fraud Database. Image credit: Susanne Kuehne.

Cinnamon is in high demand worldwide, with Ceylon cinnamon or true cinnamon (Cinnamon verum) the most sought-after and higher priced variety. It is therefore tempting to “cut” Ceylon cinnamon with cheaper cassia cinnamon. Previous detection methods for such adulterations included HPLC testing or DNA barcoding, which was time consuming and could only be applied by experts. New FT-NIR (Fourier transform near-infrared) and FTIR (Fourier transform infrared) spectroscopic methods in combination with multivariate analysis enable quick detection of cinnamon adulteration.

Resources

  1. J. Yasmin, M.R. Ahmed, S. Lohumi, C. Wakholi, H. Lee, C. Mo, B.-K. Cho, Corresponding author: chobk@cnu.ac.kr, Quality Assurance and Safety of Crops & Foods: 11 (3)- Pages: 257 – 267 (25 April, 2019). “Rapid authentication measurement of cinnamon powder using FT-NIR and FT-IR spectroscopic techniques”. Retrieved from Wageningen Academic Publishers, wageningenacademic.com

Lessons Learned from Intentional Adulteration Vulnerability Assessments (Part I)

By Frank Pisciotta, Spence Lane
No Comments

Food defense is the effort to protect food from intentional acts of adulteration where there is an intent to cause harm. Like counterterrorism laws for many industries, the IA rule, which established a compliance framework for regulated facilities, requires that these facilities prepare a security plan—in this case, a food defense plan—and conduct a vulnerability assessment (VA) to identify significant vulnerabilities that, if exploited, might cause widescale harm to public health, as defined by the FDA. Lessons learned during the conduct of food defense vulnerability and risk assessments and the preparation of the required food defense plan are detailed throughout this three-part series of articles. Part I of this series is intended to assist facilities that have not yet conducted vulnerability assessments or wish to review those already conducted, by leveraging lessons learned from assessments conducted for the largest and most complex global food and beverage facilities.

Lesson 1: VA outcomes are greatly enhanced if a physical security professional is consulted. In support of this contention, there are several physical security mitigation strategies, which can be employed to support a food defense program, that are frequently under-utilized and are not optimally managed by non-security staff. Also, the FDA seems to promote the use of cameras even though this equipment is unlikely to prevent an incident of intentional adulteration. For organizations that choose to use video surveillance, a competent security professional can help organizations engineer and operate video surveillance for maximum benefits and to meet challenging record-keeping requirements when this mitigation strategy is included in a food defense plan.

Lesson 2: Given the focus by the FDA on the insider, a formal insider threat detection program is highly recommended. Trying to promote the common, “See Something, Say Something” strategy may not be enough. For example, if employees are not clearly told what to look for in terms of uniform requirements, how to identify persons who do not belong or changes to a coworker’s baseline behavior, which may indicate moving toward a path to violence or sabotage, then “See Something, Say Something” may end up being no more than a catchy slogan.

A key element of an insider threat detection program is the completion of effective background checks for all persons who will be allowed in the facility unescorted. This includes temporary employees and contractors. A common theme in many of the recent, serious intentional adulteration incidents was that the person responsible was involved in some sort of grievance observable to coworkers and supervisors. In all insider threat detection programs, the grievance becomes an important trip wire. The Carnegie Mellon University Software Engineering Institute has published a document titled, “Common Sense Guide to Mitigating Insider Threats, Sixth Edition”. In this document is some particularly helpful guidance that can be used to stand up an insider threat detection program, but this is an effort that can take some time to fully implement.

Lesson 3: The FDA has made it abundantly clear that they believe the focus for the food and beverage industry should be the radicalized insider. A closer look at all the recently publicized contamination events suggests that there are other profiles that need to be considered. A good foundational model for building profiles of potential offenders can be found in the OSHA definitions for workplace violence offenders, which has been expanded to address ideologically based attacks. Table I applies those descriptions to the food and beverage industry, with an asterisk placed by those offender profiles that exist in recent incidents and discussed later in the text.

Class OSHA Workplace Violence Offender Description Motivation Translated to the Food and Beverage Industry
1 The offender has no legitimate relationship to the business or its employee(s). Rather, the violence is incidental to another crime, such as robbery, shoplifting, trespassing or seeking social media fame. Behavioral Health Patient *
Social Media Fame Seeker *
Copycat *
Extortion *
Economic motivation *
2 The violent person has a legitimate relationship with the business—for example, the person is a customer, client, patient, student, or inmate—and becomes violent while being served by the business, violence falls into this category. My load isn’t ready, you are costing me money
3 The offender of this type of violence could be a current employee or past employee of the organization who attacks or threatens other employee(s) in the workplace. I am upset with a coworker and adulterate to create problems for that person *
I am upset with the company and adulterate as retribution and to harm the brand *
Youthful stupidity
I am not paid enough *
4 The offender may or may not have a relationship with the business but has a personal (or perceived personal) relationship with the victim. I am upset with an intimate partner/ coworker and adulterate to create problems for that person
5 Ideological workplace violence is directed at an organization, its people, and/or property for ideological, religious or political reasons. The violence is perpetrated by extremists and value-driven groups justified by their beliefs. Radicalized Insider
Table I. A description of OSHA workplace violence offenders and how it can be applied to the F&B industry.

A supermarket in Michigan recalled 1,700 lbs. of ground beef after 111 people fell ill with nicotine poisoning. The offender, an employee, mixed insecticide into the meat to get his supervisor in trouble. In Australia, the entire strawberry industry was brought to its knees after a disgruntled supervisor “spiked” strawberries with needles. There were more than 230 copycat incidents impacting many companies. A contract employee in Japan, apparently disgruntled over his low pay, sprayed pesticide on a frozen food processing line resulting in illnesses to more than 2,000 people. A contract worker upset with a union dispute with the company at a food manufacturing plant videoed himself urinating on the production line, then uploaded the video to the Internet. Be cognizant of any grievances in the workplace and increase monitoring or take other proactive steps to reduce the risk of intentional adulteration.

Lesson 4: The IA Rule requires that every point, step and procedure be analyzed to determine if it is an actionable process step (APS). The Hazard Analysis Critical Control Point flow charts are a good starting point to comply with this element of the law but cannot be counted on completely to achieve the standard of analyzing every point, step or procedure. Critical thinking and persons familiar with the production process need to be involved to ensure that no steps are missed. Oftentimes companies modify the HACCP flow diagrams after a VA.

Lesson 5: The FDA states in the second installment of guidance (here’s the full copy) to the industry that, “There are many possible approaches to conducting a VA. You may choose an approach based on considerations such as the time and resources available and the level of specificity desired. You have the flexibility to choose any VA approach, as long as your VA contains each required component (21 CFR 121.130).”

The FDA further states that the Key Activity Type, or KAT method, is an appropriate method for conducting a VA because it reflects consideration of the three required elements and the inside attacker. Using this methodology alone, however, can result in substantially more APS’s, which might otherwise be ruled out for practical purposes such as a lack of accessibility or a lack of feasibility to contaminate the product at a point, step or procedure. We have experienced up to a 90% decline in APS’s by utilizing another FDA recommended assessment approach, the hybrid approach, which assesses each point, step or procedure as first whether it is a KAT. Then to qualify as an APS, it must also trigger positively for public health impact, accessibility and feasibility to contaminate the product.

Organizations who have yet to execute vulnerability assessments (due July 26, 2020) or who may wish to reflect back on their existing VA’s in an effort to eliminate unnecessary APS’s should find these strategies helpful to focus limited resources to the areas where they can have the greatest effect. The next two articles in this series will cover more information on electronic access, the value of site tours, comparisons to drinking water security strategies, dealing with multi-site assessments and more. Read Part II of this series on intentional adulteration.