Food Fraud Advisors

  • Home
  • About Us
  • Our Services
  • Tools, Templates and Training
  • Learn about food fraud
  • Report a food crime
  • News
You are here: Home / Blog

16th November 2015 by foodfraudadvisors

Vulnerability assessments are a waste of time according to this investigator

Vulnerability assessments are a hot topic in food safety at the moment, with Global Food Safety Initiative (GFSI) food safety standards set to include requirements for documented food fraud vulnerability assessments in the near future.  Most food safety and food integrity experts believe that vulnerability assessments are an important first step towards preventing fraudulent foods from reaching consumers.   However, in an interview with Food Safety News, Mitchell Weinberg, food fraud investigator and CEO of Inscatech describes food fraud vulnerability assessments as “frankly… a little bit of a waste of time.”  Mr Weinberg says that a food fraud vulnerability assessment is essentially about recording what you already know.  He explains that if a business is sourcing a food ingredient from a developing country, they should already know that it is more likely to be affected by fraud than if sourced locally.  Likewise, high value and high volume materials are more attractive to fraudsters.  Weinberg tells the interviewer:

“Just use common sense, figure out where the problem is, check it out… trust but verify.“

Weinberg is right; creating documented risk assessments of any kind is simply an exercise in writing down what we already know.  And common sense should be at the core of any risk assessment.  So is there any value in a documented vulnerability assessment?  

Absolutely!

  • A documented assessment is a record of who thought of what and when they thought of it.  It is evidence that fraud has been considered; it can be used to check that common sense was used in that consideration.  It can be audited, reviewed and updated.  It can be shared.
  • The process of creating a documented assessment can serve as a prompt to identify gaps in knowledge and provide an incentive to ‘fill in the gaps’.
  • A documented vulnerability assessment can be used to transfer knowledge.  Weinberg says creating a written assessment is making a record of what you already know; that is exactly what is needed when the person who made the assessment changes jobs or has to explain supply chain risks to a stubborn Purchasing Manager.
  • Most food businesses manufacture hundreds of food products and many more hundreds of ingredients; comparing the vulnerability assessments of different products and materials is an effective way to prioritise fraud prevention actions.  While the ultimate aim is for no product to be compromised ever, we all have to start somewhere.

Read more about Vulnerability Assessments here.

To view the interview with Mitchell Weinberg, click here.

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to email a link to a friend (Opens in new window) Email

Filed Under: Food Fraud, VACCP, Vulnerability Assessments

28th October 2015 by foodfraudadvisors

Request a quote

    Your Name (required)

    Your Email (required)

    We will never supply your email address to anyone without your written permission

    Your Country (required)

    Subject

    Your Message

    Please enter the characters you see here captcha

    Share this:

    • Click to share on Facebook (Opens in new window) Facebook
    • Click to share on X (Opens in new window) X
    • Click to share on LinkedIn (Opens in new window) LinkedIn
    • Click to email a link to a friend (Opens in new window) Email

    Filed Under: Vulnerability Assessment Tools

    28th October 2015 by foodfraudadvisors

    Support and Feedback

    Food Fraud Advisors values your feedback

    We are here to help, just ask!
    We are here to help, just ask!

     

      Your Name (required)

      Your Email (required)

      We will never supply your email address to anyone without your written permission

      Subject


      Your Message

      Please enter the characters you see here captcha

      Filed Under: Vulnerability Assessment Tools

      28th October 2015 by foodfraudadvisors

      Help with your vulnerability assessment

      To access this content, please purchase the full version of the Vulnerability Assessment Helper.

       

      View Full Version

       

      Share this:

      • Click to share on Facebook (Opens in new window) Facebook
      • Click to share on X (Opens in new window) X
      • Click to share on LinkedIn (Opens in new window) LinkedIn
      • Click to email a link to a friend (Opens in new window) Email

      Filed Under: Vulnerability Assessment Tools

      28th October 2015 by foodfraudadvisors

      What next?

      Updated 30th April 2022

      Now you have a food fraud vulnerability assessment, what comes next?

       

      First, make a home for the vulnerability assessment documents so that they can easily be found for reviews and audits.  They should be incorporated into an existing quality manual or food safety manual, with correct document reference numbers and with review dates scheduled in the same way as other sections of the system.  If the business operates a risk register or an enterprise risk management system, talk to the owner of that register about whether it is appropriate to reference the documents in that system also.

      Second: communicate!

      If food fraud vulnerabilities have been identified the business will need to make a plan to

      prevent deter detect

      • Prevent the purchase of fraudulent ingredients or products
      • Deter fraudsters from adulterating materials that your business is going to purchase
      • Deter counterfeiters from copying or ‘faking’ your products
      • Detect fraudulent materials before they are used to make food
      • Detect fakes in the marketplace so enforcement action can be taken

      This is a job for the whole business, not just food safety or food quality personnel.  Communicating what has been found in the vulnerability assessment is the first step in engaging people from other parts of the food business.  Ideally the top levels of management of the food business are committed to preventing, deterring and detecting fraud and will be willing to implement changes to protect the business.  It may be necessary to make changes to purchasing policies, supply chain strategies and supplier contracts to help prevent fraudulent materials from reaching the doors of your factory.  Changes to sales agreements, sales channels and packaging might be needed to prevent food fraud from affecting your products after they have left your facility.  Personnel from purchasing, finance, marketing, sales and legal departments will need to be involved to implement changes within these business areas.   If the business has a Risk Officer or an Enterprise Risk Manager that person should also be involved in the prevention and mitigation planning process.  The result should be a cross-functional team with upper management support and a commitment to prevent food fraud, plus the resources to implement changes to policies, practices and programs.

      That is the theory anyway; without support from upper management and a cross-functional team, any fight against food fraud is going to be tough.  However there are some things that can be done by food safety personnel that are relatively quick to implement and do not require a lot of investment from other parts of the business.  These are listed below.

      Third: action!

      Create and implement a food fraud prevention and detection plan (‘control plan’).

      Here are some actions that can reduce your exposure to food fraud:

      1. Update your raw material specifications to include authenticity requirements.  Guidance for raw material specifications.
      2. Review your vendor approvals systems and revise questionnaires and requirements if required.  Consider implementing more stringent requirements for suppliers that provide vulnerable materials.
      3. (Re)assess vendors’ backgrounds: the financial stability of the vendor’s company, the legal status of the company (licensed? bankrupt?)
      4. Check vendors for previous prosecutions, fines and warnings from food authorities.
      5. Request certificates of analysis (CofA) from suppliers of vulnerable materials and make sure they include analyses that reflect authenticity attributes as described in your purchasing specifications.  This won’t actually prevent fraud but will help your business to enforce penalties if problems are found later.
      6. Incoming goods inspections.  Make sure they include: checking seals for evidence of tampering; verifying batch IDs on delivery documents; verifying relevant certificates.
      7. Begin analytical testing of vulnerable materials.
      8. Investigate the costs and benefits of supply chain audits, including whether ad-hoc, one-off visits to certain suppliers might be worthwhile.
      9. Request tamper-evident packaging and bulk container tamper seals for vulnerable raw materials.
      10. Ask suppliers of vulnerable materials to undertake a mass balance exercise at their facility or further upstream in the supply chain.
      11. Make a business case for switching suppliers of materials that prove to be consistently problematic and present it to your purchasing department.
      12. Make sure that senior staff in the business understand the risks posed by food fraud, by providing Food Fraud Awareness Training.
      13. Stay up to date with changes to commodity prices and supply issues (‘horizon scanning’).

      Need help with your food fraud control plans?  Get easy instructions and downloadable templates from our online training course.

      Check out our low-cost, self-paced, on-demand training courses

      Share this:

      • Click to share on Facebook (Opens in new window) Facebook
      • Click to share on X (Opens in new window) X
      • Click to share on LinkedIn (Opens in new window) LinkedIn
      • Click to email a link to a friend (Opens in new window) Email

      Filed Under: Learn, Prevention and Mitigation, VACCP

      28th October 2015 by foodfraudadvisors

      Materials and Supplier Reports

      The Raw Material Report page and the Supplier Report page each contain a special excel feature called a pivot table. The pivot table allows results to be filtered, organised and printed. The pivot tables on these pages are designed to produce a list of information about individual materials and suppliers. The pivot tables draw data from an inaccessible area of the spreadsheet file.

      Users have full editing rights to the pivot tables on these pages. The pivot table features, filters and criteria can be customised to suit your needs.

      If you want to learn more about pivot tables and how to use them, there are hundreds of free resources on the internet to help you learn pivot tables, including this one.

      Share this:

      • Click to share on Facebook (Opens in new window) Facebook
      • Click to share on X (Opens in new window) X
      • Click to share on LinkedIn (Opens in new window) LinkedIn
      • Click to email a link to a friend (Opens in new window) Email

      Filed Under: Vulnerability Assessment Tools

      6th October 2015 by foodfraudadvisors

      Food authenticity is my passion… death from inauthentic coconut drink

      Why am I passionate about authenticity in our food supply? Because when we get things wrong horrible tragedies can happen; in December 2013 an allergic child died from anaphylaxis because of undeclared dairy ingredient/s in his coconut drink.   His parents knew of his dairy allergy and checked the label to make sure that the ‘natural coconut drink’ did not contain cow’s milk before they gave it to him. Unfortunately the label was wrong.

      Tragedies like this are preventable.  It has taken almost two years and the near death of another child under similar circumstances for widespread action to be taken by the local food regulatory authorities here in Australia.

      The importer of the drink has pleaded guilty to charges of labelling in a way that falsely describes food and will be sentenced later this month.

      Coconut beverages are being tested and recalled right now, but I’m sad that it has taken such a long time for this to become a high priority for food law enforcement.

      For a full report  on this incident click here.

      Share this:

      • Click to share on Facebook (Opens in new window) Facebook
      • Click to share on X (Opens in new window) X
      • Click to share on LinkedIn (Opens in new window) LinkedIn
      • Click to email a link to a friend (Opens in new window) Email

      Filed Under: Adulteration, Authenticity, Impact of Food Fraud, Labelling

      • « Previous Page
      • 1
      • …
      • 14
      • 15
      • 16
      • 17
      • 18
      • 19
      • Next Page »

      MORE FROM FOOD FRAUD ADVISORS

      Olive Oil Fraud Update – Is the Crisis Over?

      When it comes to fraud-vulnerable foods, olive oil is a rockstar. When Food Fraud Advisors began in 2015, olive oil … [Read More...]

      What is a food fraud team? (and what to do if you can’t get one)

      A food fraud prevention team is a group of employees in a food business that is responsible for creating, implementing … [Read More...]

      Food Fraud Databases Compared

      Updated 30 April 2025 A food fraud database is a collection of information about food fraud incidents and food fraud … [Read More...]

      What to do About Food Fraud (USA)

      I was talking to a new client the other day.  They are based in the United States and had discovered their competitors' … [Read More...]

      Paprika, Chilli Powder and Sudan Dye Contamination

      Can paprika and chilli powder be “too red”? This post was originally published in The Rotten Apple … [Read More...]

      follow

      • View foodfraudadvice’s profile on Facebook
      • View karenconstable4’s profile on Twitter
      • LinkedIn

      © Copyright 2015 - 2025 Food Fraud Advisors · All Rights Reserved · Privacy Policy · Return and Refund Policy