Food Fraud Advisors

  • Home
  • About Us
  • Our Services
  • Tools, Templates and Training
  • Learn about food fraud
  • Report a food crime
  • News
You are here: Home / Archives for vulnerability assessment

4th March 2026 by Karen Constable

Tomato paste scandal: Chinese origins in ‘Italian’ products exposed

In December 2024, allegations of forced labour in the tomato puree supply chains of major British retailers caused shockwaves in Europe.

On the surface, the allegations appeared massively shocking. Firstly, the purees were portrayed as the products of the torture and abuse of Chinese religious minorities. Secondly, the news coverage implied large-scale fraud with respect to the origin of the purees, many of which were marketed with the word ‘Italian’ on the pack.

It seemed that British and German supermarkets were selling ‘Italian’ tomato purees that contained Chinese tomato puree supplied by companies that relied on forced labour.

Shocking.

But when I sat down to share the news with you in Issue 168, I found the legal situation was so murky that I actually couldn’t pin a definite ‘food fraud’ label on any of it.

The BBC, reporting on the issue, used very careful language when referring to the allegations, saying “[some products] are likely to contain Chinese tomatoes” and asserting that “most Chinese tomatoes come from the Xinjiang region, where their production is linked to forced labour by Uyghur and other largely Muslim minorities.”

Most of the details that would have helped to reveal whether this was a case of food fraud were not shared publicly or were not known to the BBC at the time. For example, we weren’t told how much Chinese puree was in any of the products – were they 100% Chinese or only 50%, for example?

We could not decipher the degree of fraud (or not) related to the ‘Italian’ claims, since the BBC did not share the exact claims on the packs of products that were found to contain some Chinese tomatoes.

And finally, while the BBC published interviews with workers who had picked tomatoes under forced labour conditions in China, the information it published was not direct evidence of forced labour in the supply chain of any of the puree products mentioned in the story.

Aside: The most compelling part of the 2024 story, for me, was that one of the Italian manufacturers that supplied some British supermarkets, the company that made ten of the seventeen samples which contained Chinese tomatoes, had previously been accused of fraud by Italian authorities for falsely claiming its products contained ‘100% Italian tomato’.

That’s right, the Italian company supplying ‘Italian’ tomato puree that allegedly contained Chinese tomatoes had been accused of fraud by Italian food authorities three years prior.

Background checks, anyone? A simple Google search of the company name followed by the word tomato revealed instant red flags: two of the top three search results were stories about the company’s 2021 brush with Italian food fraud investigators.

After the BBC report, all seemed quiet on the tomato paste front.

Not so.

The tomato paste market underwent a huge upheaval following the BBC investigation. Suddenly, everyone was paying attention to the origin of their tomato paste. No one wanted tomato paste from China and the Italian paste suppliers who had been importing it for use in their products stopped buying it.

In the months that followed, Italian processors reduced imports of tomato concentrate from China by 76%, according to the CEO of Mutti, a leading Italian maker of tomato purée and passata, leaving China with a huge stockpile of 600,000 to 700,000 tonnes of tomato paste, equivalent to around 6 months of exports.

Tomato News reports that while Chinese tomato exports to Western Europe and Italy have fallen dramatically, the surplus is being taken up by countries in Eastern Europe, Central America, and the Far East. Production in China has also fallen dramatically, with less than half the volume of tomatoes expected this year compared to 2024.

So, with China no longer supplying major markets in Western Europe, where will those markets get their tomato paste – that all-important ingredient for pizzas, pastas, ready meals and soups?

Can Italian tomato growers step up production to meet demand? Or will the supply-demand gap be so large that fraud becomes almost inevitable?

Tomato paste production in Xinjiang ramped up rapidly to 11 million tonnes in 2024 and is projected to fall to 3.7 million tonnes in 2025

 

Food authenticity expert Professor Chris Elliott believes the current situation is ripe for fraud, suggesting the following scenarios are possible:

  1. The large stockpile of tomato paste in China could be transhipped or reprocessed in third countries to conceal its Chinese origins, making it palatable for Western European markets.
  2. Other false claims of origin could be made about tomatoes from other major growing areas such as Spain, Portugal, Chile and Iran.
  3. Lower-quality paste may be blended into higher-value pastes (noting this is not fraud unless accompanied by deceptive claims about quality or origin).
  4. Undeclared fillers and diluents, such as starches or sugars, could be used to extend the volume of scarce non-Chinese tomato paste.
  5. Undeclared and unauthorised colourants could be added to enhance the appearance of low-quality, diluted or age-degraded pastes.

With tomato paste having a long shelf life, these fraud risks will remain for as long as surplus stock remains in China and while European market demand is unsatisfied. And that could be for years to come.

Key takeaway

We are currently in a perfect storm for tomato paste fraud. There is an oversupply of Chinese-made tomato paste and an undersupply of genuine Italian tomato paste. This creates vulnerabilities, particularly for products marketed with specific country of origin claims. Possible frauds include transhipping and reprocessing to disguise the true origin of Chinese pastes, other false origin claims, blending, dilution, addition of fillers and other adulterants to extend the volume or enhance the apparent value of low-quality pastes. Also note that Chinese-origin tomato pastes have been linked to labour violations and modern slavery.

 

Read more:

🍏 Tomato Puree Fraud by Big Name Retailers? | Issue 168 🍏

This article was originally published at The Rotten Apple  – weekly newsletter for food professionals.

Share this:

  • Share on Facebook (Opens in new window) Facebook
  • Share on X (Opens in new window) X
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Email a link to a friend (Opens in new window) Email

Filed Under: Food Fraud, Supply Chain

22nd June 2023 by foodfraudadvisors

HACCP, VACCP and TACCP

What do HACCP, VACCP and TACCP mean?

They are acronyms used in food safety.

HACCP has been around for decades, VACCP and TACCP were introduced in the 2010s.

VACCP and TACCP are no longer used by most food safety experts, and have been superseded by ‘food fraud programs’ and ‘food defense plans’.

 

What does HACCP stand for?

  • HACCP (Hazard Analysis Critical Control Point)  Pronounced ‘hassup’.  HACCP = keeping food safe from accidental and natural risks to food safety.

What does VACCP stand for?

  • VACCP (Vulnerability Assessment Critical Control Point) Pronounced ‘vassup’.  VACCP = prevention of food fraud.  Has been superseded by ‘food fraud prevention’.

What does TACCP stand for?

  • TACCP (Threat Assessment Critical Control Point) Pronounced ‘tassup’.  TACCP = prevention of malicious threats to food, such as sabotage, extortion or terrorism, sometimes called Intentional Adulteration within the US Food Safety Modernization Act.  Has been superseded by ‘food defense’.

What is HACCP?

  • HACCP is a set of principles designed to control and prevent food safety risks during food production.
  • HACCP is not enforced or regulated by any single organization.
  • The ideas of HACCP form the basis of every food safety management system standard that is in use today, including GFSI food safety standards.
  • The principles of HACCP are codified (written down) by the Food and Agriculture Organization of the United Nations (FAO), in a set of documents called the Codex Alimentarius , a latin phrase which translates to “Book of Food”.
  • FAO’s General Principles of Food Hygiene CXC 1-1969 contains the HACCP principles (sometimes called HACCP Codex).  Download the 2020 revision of the HACCP Code here: http://www.fao.org/fao-who-codexalimentarius/codex-texts/codes-of-practice/ (click the green check/tick mark on the right side of the page to download).

What is VACCP and TACCP?

  • VACCP and TACCP are terms that emerged during the 2010s as standards agencies, government regulators and industry groups started considering methods to prevent food fraud and malicious tampering.
  • VACCP is for food fraud.
  • TACCP is for food defense.
  • The acronyms VACCP and TACCP are designed to leverage the food industry’s familiarity with HACCP.  But they are unhelpful terms.  The controls in food fraud and food defense plans are nothing like the ‘critical control points’ in a HACCP plan.  The control points in a HACCP plan are operational steps in a food manufacturing process over which the food manufacturer has direct control.  Food fraud and food defense controls are different and they do not work the same way as ‘critical control points’ in HACCP.
  • The terms VACCP and TACCP are falling out of favor within the food safety industry.  They are not referenced specifically within any of the GFSI food safety standards, nor within the USA’s FSMA.

 

What to say instead of VACCP and TACCP?

  • Instead of ‘”VACCP” it is better to say food fraud prevention program.
  • Instead of “TACCP” it is better to say food defense plan.

Learn more

  • Go to our Acronymn Decoder post to discover what other acronyms and initialisms mean.
  • Visit our Food Fraud post to learn ‘What is Food Fraud?’
  • Click here to learn more about food fraud vulnerability assessments.
  • Take a free short course on food fraud here.

food safety food fraud

Share this:

  • Share on Facebook (Opens in new window) Facebook
  • Share on X (Opens in new window) X
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Email a link to a friend (Opens in new window) Email

Filed Under: Learn, TACCP, VACCP

26th June 2022 by Karen Constable

Investigating Susceptibility to Food Fraud

Updated 9 Feb 2026

Some foods are more susceptible than others to economically motivated adulteration, substitution and dilution.  Understanding the susceptibility of an ingredient or raw material type is an important part of every food fraud vulnerability assessment process.

A TWO-PART PROCESS

Susceptibility is investigated in two parts.

(1) General Susceptibility (is this type of food often affected by food fraud or not?)

You can estimate a food’s general susceptibility using publicly available information.

(2) Specific Susceptibility (is the food we purchase likely to be affected by food fraud?)

The specific food fraud attributes depend on your supply chain, management of the supply chain and testing and auditing activities.

STEP 1. GENERAL SUSCEPTIBILITY

To investigate the general susceptibility of a food or ingredient to food fraud, use publicly available information about incidences of fraud that have occurred in the past and that might occur in the future.

There are a few different ways to access information about previous incidents and emerging issues with a raw material type, as shown below.

1. Online databases – access to historical data:

A food fraud database provides a way to access historical information about food fraud.

A food fraud database is a collection of information about food fraud incidents and food fraud risks. There are a number of free and paid databases operated by governments, not-for-profits and private companies available worldwide.  The type of data varies from database to database, as does the cost and the features.  For a current list of food fraud databases, check out our post Food Fraud Databases Compared.

2. Email alerts via subscription service:

Email services provide near-to-real-time information about food fraud incidents as they occur. This can be a good way to keep on top of developing food fraud risks.   Below is a list of email subscriptions that can provide information about food fraud.

  • Food Forensics, a laboratory located in United Kingdom, offer a monthly horizon scanning risk newsletter to members in the United Kingdom.
  • FoodChainID Horizon Scan is a paid subscription service that provides alerts on adulteration and fraud, as well as food safety contamination events (global).
  • Some trade associations provide email services to members.
  • The Rotten Apple, by Karen Constable (of Food Fraud Advisors), is a weekly newsletter that includes trends and analysis as well as weekly food fraud incident reports.
  • Government-run food safety and food regulatory bodies in some jurisdictions send emails to interested parties.  Contact your local authority for more information.

3.  Direct intelligence:

Direct intelligence is another means of gathering information about the occurrence of food fraud for a given food or ingredient.

  • Information can be obtained by asking law enforcement officials and government departments.
  • Suppliers can provide information about their material types.
  • Trade associations can be approached for information on food fraud and emerging issues.
  • Conferences and webinars about food fraud and food defence are held regularly and these can be a good source of information.

STEP 2. SPECIFIC SUSCEPTIBILITY

In step one you considered the general likelihood of food fraud occurring for the food or ingredient you are assessing.

In step two you must consider the characteristics of your specific material as it is purchased by your food business.

Characteristics that should be considered include those associated with your supply chain, purchasing policies and the format of the material, for example whether it is a powder or liquid or solid.

Each characteristic should be considered with regards to how it could affect the degree to which a person may be motivated to fraudulently adulterate the material and how it could allow a person to:

a) gain access to the material,

b) commit fraud by adulterating, substituting or diluting the material or

c) avoid detection.

To ensure that all relevant characteristics are considered, it is best to use a checklist

Checklists help to ensure that all relevant information has been considered.

You can create your own checklist or use a checklist prepared by experts such as those found in a proprietary Vulnerability Assessment Tool.

There are a number of fraud assessment tools available on-line, with differing degrees of usefulness (some are really annoying to use!).  The most comprehensive checklist for food fraud vulnerability assessments can be found in Food Fraud Advisors’ Vulnerability Assessment Tools.

Need more help?  Get easy-to-use, comprehensive downloadable templates in our online training course.

Visit our training academy today

Share this:

  • Share on Facebook (Opens in new window) Facebook
  • Share on X (Opens in new window) X
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Email a link to a friend (Opens in new window) Email

Filed Under: Food Fraud, Learn, Vulnerability Assessments

20th June 2021 by foodfraudadvisors

Food Fraud Online Training Course

Food fraud requirements of BRC, SQF, FSSC and other food safety standards

How to meet the food fraud prevention requirements of major food safety standards

This course will make audit preparation a breeze.  It contains step-by-step instructions, worked examples and downloadable templates to help you meet the food fraud requirements of all major food safety standards.

sqf edition 8 food fraud

 

  • Learn about food fraud and how it can put your brand and your consumers at risk
  • Hear food fraud stories that will surprise you and learn ways to protect your business
  • Get step-by-step instructions for food fraud vulnerability assessments and food fraud mitigation plans, using real life examples
  • Download templates for vulnerability assessments, mitigation plans and food fraud prevention procedures
  • Proceed at your own pace; skip forward and back through the lessons, start and stop at your convenience*

The content is a mix of written words and short video clips, plus downloadable worked examples.

Ask the trainer a question at any time.

What’s included?

  • Food Fraud Commonly Affected Foods Ebook
  • Food Fraud Vulnerability Assessment template
  • Food Fraud Prevention Procedure template
  • Food Fraud Mitigation Plan template
  • Vulnerability assessment document – worked example
  • Raw Material Specification template
  • Food Fraud Team Job Descriptions
  • Top tips for audit preparation
  • Special 40% discount code for use on www.foodfraudadvisors.com
  • Optional exam and Certificate of Competency

Duration: 3.5 hours

Visit our training academy today

* course is available for 6 months after commencement

Share this:

  • Share on Facebook (Opens in new window) Facebook
  • Share on X (Opens in new window) X
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Email a link to a friend (Opens in new window) Email

Filed Under: Food Fraud, Learn

23rd June 2019 by foodfraudadvisors

Beyond vulnerability assessments

How to verify a food defense plan

The USA FSMA Intentional Adulteration Rule deadline is fast approaching, with implementation required by 26th July.  Food defense plans are our most requested service this month, and not just for companies in the United States.  Businesses that export to the US are also affected.

The Intentional Adulteration (IA) rule

The Intentional Adulteration (IA) rule requires food businesses to identify vulnerable parts of their food manufacturing processes, implement strategies to reduce the vulnerabilities and monitor and verify that those strategies are working.  As part of the verification processes, some experts are recommending that food businesses challenge their food defense system on a regular basis.  Food safety management system standards, including SQF Edition 8, also require that manufacturing facilities challenge their food defense system.  What exactly does it mean to ‘challenge’ a food defense system, and how is that different to monitoring and verification of the system?

Monitoring vs verification vs challenge testing

Monitoring, verification and challenge testing are different, but the terminology can be confusing when used with food defense plans.  Some commentators and trainers are using the three words almost interchangeably; however, the three words actually refer to different elements of a food defense plan.

Monitoring means, at its most basic level, to check that procedures are being followed and that processes are happening as they should.  The checking process must be documented.  So, the act of monitoring is documenting in real time the actions taken to follow a given procedure or the measured outputs of a specific process.

Within a food safety plan, an example of monitoring would be checking the internal temperature of three pies from each batch after a cooling step and recording the temperature on a form.  Within a food defense system, a mitigation strategy might be the implementation of a procedure to lock all external doors, or to leave all external doors locked.  For this procedure, the monitoring activity could be a once-per-shift process of checking and recording the lock/unlock status of each door.

Verification is the process of making sure that monitoring has been done properly.  When cooling pies, for example, verification could include a once-per-shift check by a supervisor or manager that the cooled pie temperatures are being recorded AND that appropriate action has been taken if the temperature has exceeded critical limits.  Verification also includes internal audits; the internal auditor checks that the managers have been signing off the monitoring records, that the records are complete and available for all shifts and that corrective actions have been properly recorded.

In our food defense example, verification could include a check of the door lock monitoring records by a manager or supervisor.  The manager would review the records to see that they were completed on time, at the correct frequency and that any deviations, such as a broken lock, have been identified and actioned correctly.  Verification of door lock status could also be included in a weekly plant walk-through by a manager.  Internal audits would check that all these activities were being done and recorded properly.

Challenge testing is real-world scenario testing of a system’s efficacy.  A challenge test aims to validate whether procedures are effective when implemented as expected, as well as highlighting any failures in implementation.  A challenge test is different to a verification process because it would usually test the implementation and effectiveness of many food defense mitigation strategies rather than focussing on one element such as door locks.

What is the weakest link in your food defense plan?

 

How to conduct a food defense challenge

  1. Decide on a challenge action. For example, a common food defense challenge test is a penetration test, in which an unauthorised person attempts to gain access to a sensitive area.
  2. Create a food defense challenge report. In the report document exactly what you plan to do in the challenge test.  Include what, when, how, who and next steps.

For example: A person unknown to staff (Ms Jane Doe, of Acme Services) will attempt to get from the main reception area into ingredient weighing area A.  She will be wearing a business suit covered by a lab coat.  Once there, she will remain for up to twenty minutes unless challenged by an employee.  She will then leave.

If the intruder is challenged, she will claim to be a new food safety consultant/pest control account manager/new human resources manager and attempt to remain in the area.

  1. Include written contingency plans in case of escalation, for example, what will be done if police are called.
  2. Get approval for the plan from senior management.
  3. In the report record the following:
    • Name of Senior manager who has signed off on this plan.
    • Names of people who have been informed of the challenge test
    • Names of people who will be working in the affected areas at the time of the challenge, have they been trained in food defense?
    • A description of what staff are supposed to do in this scenario; what procedures should be followed.
  4. Define and document the criteria for failure and success; what will happen if the food defense procedures are working 100% correctly; what will happen if the food defense procedures are working only partially; and finally, how might the scenario progress if there is a complete fail of procedures and systems?

For example, if the ‘intruder’ is able to remain in the ingredient weighing area for 20 minutes without being challenged by an employee this could be considered a complete fail of the food defense system.  If the intruder is challenged but can convince the employee to allow them to remain in the area unattended, this could be considered a partial fail; if the employee chooses to remain with the intruder to ‘keep an eye on them’ this could be considered a better outcome than leaving the intruder unattended.

  1. Run the challenge. Have a trusted staff member observe from a discreet distance.
  2. Describe in the report what happened.
  3. Convene a meeting of the food defense team and analyse the results of the challenge test.
  4. Perform root cause analyses and raise corrective action/s for any failures in the system.
  5. Close out corrective action/s
  6. Take action to prevent a scenario like this from reoccurring, based on the root cause analyses.

Learn more about food defense

Register your interest in learning more about food defense by entering your email address in the box below.

We will never supply your email address to anyone without your written permission. View our privacy policy.


 

Share this:

  • Share on Facebook (Opens in new window) Facebook
  • Share on X (Opens in new window) X
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Email a link to a friend (Opens in new window) Email

Filed Under: Food Defense, Learn

  • 1
  • 2
  • Next Page »

MORE FROM FOOD FRAUD ADVISORS

Unlabelled food cans are stacked on top of one another.

Tip-truck to table: waste diversion fraud

Organised crime groups are funnelling relabelled food back onto shelves I’ve been wondering … what exactly happened to … [Read More...]

Two shots of clear golden tequila served in traditional small glasses, gainst a solid black background.

Case study: Double brokering leads to disappearing tequila

A food fraud case study In the past, I've told you that food-waste-diversion crimes are being detected at unprecedented … [Read More...]

Tomato paste scandal: Chinese origins in ‘Italian’ products exposed

In December 2024, allegations of forced labour in the tomato puree supply chains of major British retailers caused … [Read More...]

Fraud Risks for Cocoa and Confectionery Businesses

Chocolate’s supply chain is vulnerable to changes in weather, farming practices, and global trade networks. It is a … [Read More...]

food vulnerability assessment

Food Safety Standards Compared (2025)

  There are many different food safety management system standards (FSMS), and they all have different … [Read More...]

follow

  • View foodfraudadvice’s profile on Facebook
  • View karenconstable4’s profile on Twitter
  • LinkedIn

© Copyright 2015 - 2026 Food Fraud Advisors · All Rights Reserved · Privacy Policy · Return and Refund Policy