Food Fraud Advisors

  • Home
  • About Us
  • Our Services
  • Tools, Templates and Training
  • Learn about food fraud
  • Report a food crime
  • News
You are here: Home / Food Fraud / Vulnerability assessments are a waste of time according to this investigator

16th November 2015 by foodfraudadvisors

Vulnerability assessments are a waste of time according to this investigator

Vulnerability assessments are a hot topic in food safety at the moment, with Global Food Safety Initiative (GFSI) food safety standards set to include requirements for documented food fraud vulnerability assessments in the near future.  Most food safety and food integrity experts believe that vulnerability assessments are an important first step towards preventing fraudulent foods from reaching consumers.   However, in an interview with Food Safety News, Mitchell Weinberg, food fraud investigator and CEO of Inscatech describes food fraud vulnerability assessments as “frankly… a little bit of a waste of time.”  Mr Weinberg says that a food fraud vulnerability assessment is essentially about recording what you already know.  He explains that if a business is sourcing a food ingredient from a developing country, they should already know that it is more likely to be affected by fraud than if sourced locally.  Likewise, high value and high volume materials are more attractive to fraudsters.  Weinberg tells the interviewer:

“Just use common sense, figure out where the problem is, check it out… trust but verify.“

Weinberg is right; creating documented risk assessments of any kind is simply an exercise in writing down what we already know.  And common sense should be at the core of any risk assessment.  So is there any value in a documented vulnerability assessment?  

Absolutely!

  • A documented assessment is a record of who thought of what and when they thought of it.  It is evidence that fraud has been considered; it can be used to check that common sense was used in that consideration.  It can be audited, reviewed and updated.  It can be shared.
  • The process of creating a documented assessment can serve as a prompt to identify gaps in knowledge and provide an incentive to ‘fill in the gaps’.
  • A documented vulnerability assessment can be used to transfer knowledge.  Weinberg says creating a written assessment is making a record of what you already know; that is exactly what is needed when the person who made the assessment changes jobs or has to explain supply chain risks to a stubborn Purchasing Manager.
  • Most food businesses manufacture hundreds of food products and many more hundreds of ingredients; comparing the vulnerability assessments of different products and materials is an effective way to prioritise fraud prevention actions.  While the ultimate aim is for no product to be compromised ever, we all have to start somewhere.

Read more about Vulnerability Assessments here.

To view the interview with Mitchell Weinberg, click here.

Share this:

  • Share on Facebook (Opens in new window) Facebook
  • Share on X (Opens in new window) X
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Email a link to a friend (Opens in new window) Email

Filed Under: Food Fraud, VACCP, Vulnerability Assessments

MORE FROM FOOD FRAUD ADVISORS

A packaged meat product with its false USDA number highlighted by a red circule.

A faked inspection mark prompts a recall in the US

While food fraud can result in food safety problems, it’s very rare to see a recall for food fraud that is initiated … [Read More...]

Unlabelled food cans are stacked on top of one another.

Tip-truck to table: waste diversion fraud

Organised crime groups are funnelling relabelled food back onto shelves I’ve been wondering … what exactly happened to … [Read More...]

Two shots of clear golden tequila served in traditional small glasses, gainst a solid black background.

Case study: Double brokering leads to disappearing tequila

A food fraud case study In the past, I've told you that food-waste-diversion crimes are being detected at unprecedented … [Read More...]

Tomato paste scandal: Chinese origins in ‘Italian’ products exposed

In December 2024, allegations of forced labour in the tomato puree supply chains of major British retailers caused … [Read More...]

Fraud Risks for Cocoa and Confectionery Businesses

Chocolate’s supply chain is vulnerable to changes in weather, farming practices, and global trade networks. It is a … [Read More...]

follow

  • View foodfraudadvice’s profile on Facebook
  • View karenconstable4’s profile on Twitter
  • LinkedIn

© Copyright 2015 - 2026 Food Fraud Advisors · All Rights Reserved · Privacy Policy · Return and Refund Policy