“Food Fraud 20 Questions”: Document Fraud – Concerns and Countermeasures

This is our second “Food Fraud 20 Questions” survey, which covers Document Fraud – Concerns and Countermeasures. This is a 5-10 minute online, confidential, anonymous survey. Please participate or forward it to others as you see fit. Your involvement will help by creating research and reports that help […]

“Food Fraud 20 Questions”: Document Fraud – Concerns and Countermeasures Read More »

Review – Final Rule for FSMA Intentional Adulteration (Food Defense) Regarding Food Fraud and EMA

This is a detailed, 22-page review of the Food Fraud aspects or requirements of the recently published Food Safety Modernization Act Intentional Adulteration (Food Defense) Final Rule (FSMA-IA). While there are no new Food Fraud requirements, there are tremendous insights on related FSMA compliance. This Intentional Adulteration Final

Review – Final Rule for FSMA Intentional Adulteration (Food Defense) Regarding Food Fraud and EMA Read More »

Publication – Book on Food Safety in China: Past, Present, and Future – Chapter on Food Fraud [published in China in Chinese]

This book was created by two of the top handful of Chinese food safety government advisors. Editor Dr. Joseph Jwu-shan Jen stated that this is a landmark publication that will establish the foundation for the state-of-the-art-of the science. They stated “It is the first comprehensive book that covers

Publication – Book on Food Safety in China: Past, Present, and Future – Chapter on Food Fraud [published in China in Chinese] Read More »

Request for Comments on the GFSI Guidance Document Issue 7 including Food Fraud (due 2/19/2016)

Three days ago on February 8th GFSI issued a public request for comments on the new Guidance Document Issue 7 including new Food Fraud requirements. It is open until February 19th. Instructions and links to provide comments are included below. Both FSMA and now the GFSI require food

Request for Comments on the GFSI Guidance Document Issue 7 including Food Fraud (due 2/19/2016) Read More »

Review: Final Rules for FSMA ‘Third-Party Certification,’ ‘Foreign Supplier Verification,’ and ‘Produce Rule’ Regarding Food Fraud and EMA

Three new US Food Safety Modernization Act (FSMA) rules are effective January 26, 2016 – are you compliant? What about for Food Fraud and EMA? Don’t worry, since compliance requirements are at least a year away… but you shouldn’t wait since there is a LOT to do. By

Review: Final Rules for FSMA ‘Third-Party Certification,’ ‘Foreign Supplier Verification,’ and ‘Produce Rule’ Regarding Food Fraud and EMA Read More »

Review: Final Rule for FSMA Preventative Controls Regarding Food Fraud and EMA – See 15-page Preliminary Report

This includes a link to our 15-page detailed, line-by-line review of the Food Fraud aspects of the FSMA Preventative Controls Final Rule in the previous blog post. Use this link to access the free report:   https://blog.foodfraudpreventionthinktank.com/wp-content/uploads/2021/02/FSMA-PC-Rule-regarding-Food-Fraud-v13-FFIR-FFPTT-v1-.pdf September 18, 2015 SUMMARY (150-word-brief): This is our review of the

Review: Final Rule for FSMA Preventative Controls Regarding Food Fraud and EMA – See 15-page Preliminary Report Read More »

ANNOUNCEMENT – Spink Awarded the 2015-2016 Foreign Expert Fellowship for the Chinese National Center for Food Safety Risk Assessment (CFSA) – to spend August in China

FOR IMMEDIATE RELEASE — Contact: Dr. John Spink, Director, Food Fraud Prevention Think Tank (FFPTT), www.FoodFraudPrevention.com, Phone: (517) 381-4491 // Dr. Spink was nominated for and awarded the 2015-2016 Fellowship to be a Foreign Subject Matter Expert for the Chinese National Center for Food Safety Risk Assessment (CFSA).

ANNOUNCEMENT – Spink Awarded the 2015-2016 Foreign Expert Fellowship for the Chinese National Center for Food Safety Risk Assessment (CFSA) – to spend August in China Read More »

Publication – Selection of Strategic Authentication and Tracing Programs

Authentication is a key to Food Fraud prevention and a critical part of the “detect-deter-prevent” continuum. Selecting authentication countermeasures that contribute to prevention is often complex and challenging. This challenge was the subject of my chapter on “The Selection of Strategic Authentication and Tracing Programs ” in the book

Publication – Selection of Strategic Authentication and Tracing Programs Read More »

Scroll to Top