Fighting Food Fraud
Fighting Food Fraud
Fighting Food Fraud
5
A
A
A
Jeff Moore, senior scientific liaison, USP, said that the USP’s expert panel on food
adulteration spent one year discussing which problems the document would
address and one year writing it. The proposed guidance document is available on
the FCC website and is open for public comment until March 31, 2015. Moore
said that the comments received and the expert panel’s response to them will be
posted online this summer. If the committee needs more time to evaluate the
comments or requests additional information, the comment period may be
extended. The finalized document is scheduled to be published in appendix XVII
to the third supplement of the ninth edition of the FCC on September 1, 2015.
Calling it a first-of-its-kind guidance document dealing specifically with EMA of
food ingredients, Moore said that it is intended to help users develop a fraud
management system that prioritizes and focuses mitigation resources on
ingredients that not only carry the most vulnerability but also have potential for
detrimental consequences when fraud occurs.
The approach consists of four steps. The first three characterize the overall fraud
vulnerabilities of an ingredient by assessing factors contributing to fraud
occurrence and the potential public health and economic impacts when fraud does
occur, and the fourth provides guidance on how to use information from the first
three steps to develop a mitigation strategy. The document describes the factors to
be considered in each step and provides in-depth discussions of actual fraud cases
to illustrate the value of assessing the impact of those factors. The first step is to
conduct a vulnerability assessment addressing the following factors:
from a trusted supplier. The highest vulnerability is when ingredients are sourced
from multiple sources in an open market where there is limited knowledge about
the supplier and when the ingredient is handled by multiple parties and the source
identity is lost or not actively tracked, as when ingredients are blended. An
example is the supply chain aspects of the melamine-tainted pet food incident,
which involved the addition of low-purity melamine to inferior grade wheat gluten
and other protein-rich ingredients to boost the apparent protein content.
• Audit strategy. The vulnerability of a supply chain to food fraud depends on the
auditor’s qualifications, the type of audit (onsite or other), inclusion of anti-fraud
elements in audits, who conducts the audit (the ingredient customer, the supplier,
or an independent third party), the frequency of onsite auditing, and the use of
unannounced audits. An example is an incident involving the marketing of frozen
unsweetened orange juice concentrate that was adulterated with beet sugar using a
cleverly designed manufacturing facility to conceal the fraudulent practices. It
illustrates the extent of deception used to hide fraudulent practices and thereby the
strengths and weaknesses of different audit strategies as a way to prevent fraud.
specifications. One example is whey protein ingredients, for which the lack of
selectivity and specificity of the Kjeldahl nitrogen method for protein nitrogen
dramatically increases the vulnerability. Another example is a fruit juice
concentrate purchased on the basis of methods and specifications for only Brix,
pH, and visual color.
• Fraud history. This factor characterizes the potential for fraud in an ingredient,
based on the pattern and history of reported fraud issues. Examples are
adulteration of milk, for which criminals constantly develop new ways to
circumvent the latest adulteration detection methods; cassia oil, which is prone to
adulteration even when new detection methods are developed; and a false report
that street vendors in China were selling pork dumplings containing cardboard.
The examples illustrate how combining the information in the USP’s Food Fraud
Database (www.foodfraud.org) and the National Center for Food Protection and
Defense’s EMA Incidents Database (www.FoodShield.org) for a particular
ingredient can provide insight into the history of food fraud.
Enlarge this Image The second step is to assess the potential food
safety/public health and economic impacts of fraud. The
traditional food safety risks associated with food fraud
where the adulterant has the potential to cause illness or
death are the most obvious public health impact
concerns. While those who commit EMA do not intend
to cause illness or death, they do not always understand
Figure 2. Matrix used in
the potential harmful effects of the adulterating material.
step 1 for assessing
Melamine adulteration of dairy proteins, denatured
factors’ contribution to
rapeseed oil adulteration of olive oil, and methanol
vulnerability. Illustration
contamination of vodka are examples. The adulteration
courtesy of the U.S.
of foods that constitute the major, sole, or necessary
Pharmacopeial
component of a diet substantially raises the potential
Convention.
public health impact. Pet food, infant formula, and baby
food are examples as are foods that provide baseline nutrition for a sub-population.
The loss of consumer confidence illustrates that damage to a brand can be
expensive and long-lasting.
The third step is to combine steps one and two to generate an overall
characterization of vulnerabilities. And the fourth step is to develop an appropriate
mitigation strategy with three possible outcomes: 1) “new controls are optional,”
in which a user can decide that documentation of the assessment is all that is
necessary; 2) “new controls should be considered,” in which a user needs to
consider if the vulnerabilities are acceptable and, if not, determine where to apply
food fraud mitigation resources to yield an acceptable level of vulnerabilities; and
3) “new controls are strongly suggested.”
With regard to other anti-fraud activities at the USP, Moore said that the USP is
developing a toolbox of methods for skim milk powder to deal with unknown
adulterants, not known adulterants, and standardized and validated methods for
unknown adulterants. The first tool is for detecting the non-protein nitrogen
content of skim milk powder. More tools are being developed but are not yet ready
for public comment, he said. They include such methods as non-targeted analysis
Moore said that the USP is continuing to improve its Food Fraud Database. A
compilation of scholarly and media reports on food ingredient fraud from 1980 to
2010, the database can be used to assess existing and emerging risks and trends for
EMA. It also includes a library of detection methods reported in peer-reviewed
journals. A large amount of new data is being vetted for validity and usefulness
and will be entered into the database in early to mid 2015.
Enlarge this Image The GFSI issued a position paper on mitigating the
public health risk of food fraud on July 14, 2014,
outlining steps that food businesses should take to
protect consumers from the consequences of food
adulteration, counterfeiting, and other illegal practices.
In its position paper, the GFSI proposed adding two key
Figure 3. Matrix used in
elements to its guidance document, available on the
step 2 for evaluating GFSI website. The first would require food companies
safety and economic to carry out a food fraud vulnerability assessment in
impacts. Illustration which information is collected at the appropriate points
courtesy of the U.S. along the supply chain (including raw materials,
Pharmacopeial ingredients, products, and packaging) and evaluated to
Convention. identify and prioritize significant vulnerabilities for food
fraud. The second would require food companies to put in place appropriate
control measures to reduce the risks from these vulnerabilities. These control
measures would include a monitoring strategy, a testing strategy, origin
verification, specification management, supplier audits, and anticounterfeit
technologies. A clearly documented control plan would outline when, where, and
how to mitigate fraudulent activities.
Elements of the food fraud guidance document were sent to technical experts in
the food industry last year, Kochenderfer said, and the document is undergoing
revision. The GFSI will incorporate the new elements, which address food safety
rather than EMA, in the next full revision of its guidance document to be released
in 2016.
May 31, 2016. The FDA intends to publish within six months after publication of
the final rule a guidance document to help businesses identify actionable process
steps and implement focused mitigation strategy requirements.
The FDA has created a software program called the Food Defense Plan Builder to
help companies develop customized plans to minimize the risk of intentional
adulteration, and on September 3, 2014, the agency posted training videos on how
to use the program. Users answer a series of questions about the food facility and
the food manufactured, processed, packed, or held there to develop a
comprehensive food defense plan, including a vulnerability assessment, broad and
focused mitigation strategies, and an action plan. The software and videos are
available free of charge on the FDA’s website.
In October 2014 the FDA posted an online learning module consisting of three
videos to help the seafood industry, retailers, and state regulators ensure that
seafood products are properly labeled. The module, “Fish and Fishery Products
Hazards and Controls Guidance—Learning Module Videos,” provides an
overview of the federal identity labeling requirements for seafood offered in
interstate commerce; a list of the specific laws, regulations, guidance documents,
and other materials pertinent to the proper labeling of seafood; a description of the
FDA’s role in ensuring the proper labeling of seafood; and tips for identifying
mislabeled seafood in the wholesale distribution chain or at the point of retail. It
also references the FDA’s DNA testing at the wholesale level to evaluate proper
labeling of seafood species.
• Olive Oil. Olive oil is often substituted or diluted with lower-cost oils.
• Fish and Seafood. Some higher-value fish and seafood are replaced
• Milk and Milk-Based Products. Milk from cows has been adulterated with milk
from sheep, buffalo, and goat antelope and with reconstituted milk powder, urea,
rennet, and other food and nonfood products.
• Honey, Maple Syrup, and Other Natural Sweeteners. Honey and maple
syrup have been adulterated with other syrups and sugars. Honey has also
contained unapproved antibiotics or other additives and heavy metals.
• Fruit Juices. Some juices, especially expensive ones like pomegranate juice,
have been diluted with water or a cheaper juice such as apple or grape.
• Coffee and Tea. Ground coffee might contain ground leaves and twigs as
well as roasted corn, ground roasted barley, and roasted ground parchment.
Instant coffee may include chicory, cereals, caramel, parchment, starch, malt, and
figs. Tea may contain leaves from other plants, color additives, and colored
sawdust.
• Spices. Saffron, the world’s most expensive spice, has been found to have added
glycerin, sandalwood dust, tartrazine, barium sulfate, and borax. Ground black
pepper has been shown to have added starch, papaya seeds, buckwheat, flour,
twigs, and millet. Vanilla extract, turmeric, star anise, paprika and chili powder are
also prone to fraud.
Related Content
Most Viewed
Wellness newsletter
Services Directory
GO