Food Safety
search
Ask Food Safety AI
cart
facebook twitter linkedin
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Food Safety
  • NEWS
    • Latest News
    • White Papers
  • PRODUCTS
  • TOPICS
    • Contamination Control
    • Food Types
    • Management
    • Process Control
    • Regulatory
    • Sanitation
    • Supply Chain
    • Testing and Analysis
  • PODCAST
  • EXCLUSIVES
    • Food Safety Five Newsreel
    • eBooks
    • FSM Distinguished Service Award
    • Interactive Product Spotlights
    • Videos
  • BUYER'S GUIDE
  • MORE
    • ENEWSLETTER >
      • Archive Issues
      • Subscribe to eNews
    • Store
    • Sponsor Insights
    • ASK FSM AI
  • WEBINARS
  • FOOD SAFETY SUMMIT
  • EMAG
    • eMagazine
    • Archive Issues
    • Editorial Advisory Board
    • Contact
    • Advertise
  • SIGN UP!

Food Company Proprietary Information: A Target for Cyber-based Adversaries

September 6, 2016

Food defense is a complicated set of processes, each responding to threats ranging from cyber vulnerabilities to secure food processes. Food production and processing decision makers may think of their companies in terms of the products they produce, which is a reasonable way to judge success: more products, more profit. They may also think in terms of the brand, essential for generating return customers. A good brand is a selling dividend—the best advertising investment available. A damaged brand yields only grief in terms of profitability and company wellbeing. Adversaries can target both products and brand and regularly do so, as most corporate security professionals would quietly attest. 

In the age of cyber-based threats and persistent threats,[1] an important new security consideration is the need to protect proprietary information. Proprietary information is the stuff that enables the corporation to produce the food and agriculture products that in turn are identified with the brand. Proprietary information—whether the settings on your equipment or the detailed processes or recipes, secret ingredients, etc., used in creating products—is highly valuable and, in a real sense, the foundation for all corporate assets and profit. Lose proprietary information and your company could lose its competitive edge or, or in a worst-case scenario, cease to exist.

The news on the issues of proprietary information is currently a mixed bag. The good news is that the U.S. Government increasingly views corporate espionage as a serious threat to market competitiveness and, ultimately, national and economic security. Prosecutions are increasing, but not enough to discourage adversaries. “Persistent threats” are named that for a reason—they are not likely to diminish in the foreseeable future. The bad news is that technological threats are emerging far more rapidly than we are able to develop defenses. Bad actors are also more agile at exploiting technology than the government, which is bogged down by bureaucratic and legal constraints. Our adversaries are not. So how, potentially, could new technologies be exploited by persistent threat actors to target proprietary information?

A Hypothetical Case in Point
This discussion will be circumspect and short on specific details, because we must adhere to the highest standards of operational security (OPSEC), meaning we don’t want to give adversaries any exploitable ideas.

Engineers at the University of Washington’s Sensor Laboratory and the Delft University of Technology have developed an amazing miniature device they call “WISP” (Wireless Identification and Sensing Platform).[2] Combining the capabilities of a sensor and a computing chip, the device requires no onboard power source (e.g., battery), instead converting radio waves to electricity. Similar to an RFID (radio frequency identification device) reader, the device has the capability to act as a sensor, gathering data and then transmitting it to a remote receiver. Although the device can’t yet be programmed wirelessly, that improvement is coming and will make it possible to use the device in hard-to-reach, restricted or dangerous environments and to control the device remotely. When wireless programming capability does come, the device could be and extremely valuable part of future food defense and food safety programs.

So how could this marvelous technology be exploited to steal proprietary information? Think of this device as just a miniature computer, capable of gathering information on equipment settings or processes and then transmitting that data to another remote device. Adversaries, persistent and otherwise, know well how to use computers to get what they want from corporations. Chances of detection diminish dramatically if an adversary can deliver a small device that defies detection. Even if detected, the remote device would be exceedingly hard (though not impossible) to trace.

This is the kind of device at the center of countless spy movies and real espionage programs. Has the technology matured to the point it could actually be used in an espionage program designed to steal proprietary information? Not at the moment. This device—and others with capabilities beyond anything currently imagined—will eventually fall into the hands of adversaries, just as happened with computers and smart phones. The bad actors will attempt to exploit (and likely succeed) the technology, using its capabilities for ill purposes, rather than good.

So what is a food defense or food safety manager to do? The simple answer is to think like the adversary and counter potential threats by hardening defenses, making them strong enough to make the adversaries’ cost of doing business (stealing from you), not worth the effort. In other words, harden your defenses so the adversary goes elsewhere.  

How is this accomplished? Again, think in terms of OPSEC. In general, protect your information by making it exceedingly hard to find and access remotely. Think about new technological advances and the newly evolving threats that will undoubtedly accompany the realization of the “Internet of Things,”[3] whereby devices will be able to transmit operational information to users (or exploiters). Then act accordingly to minimize or neutralize the threat. 

Future technological advances will likely give us significant opportunities for improvement in efficiency and profitability, while accompanied by some degree of risk. The important message here is to prepare for the future by planning to manage risk by guarding that which is essential to your corporation. First priority—start with guarding proprietary information. 

Robert A. Norton, Ph.D., is chair of the Auburn University Food System Institute’s Food and Water Defense Working Group (aufsi.auburn.edu/fooddefense). He is a long-time consultant to federal and state law enforcement agencies and is editor of Bob Norton’s Food Defense Blog (aufsi.auburn.edu/fooddefense/blog/). He can be reached at nortora@auburn.edu or by phone at 334.844.7562. 

References
1. A “persistent threat” is the term used by the U.S. government and military to describe specific countries that continually target information based in business, academia, government and the military through large collection efforts, most cyber related. Collection of proprietary information enables these adversarial nations to gain business advantage with little or no investment, making them more competitive in the world market.
2. arxiv.org/pdf/1512.04602v2.pdf.
3. thehackernews.com/2015/08/ssl-encryption-internet-of-things.html.


Author(s): Robert A. Norton, Ph.D.

Looking for quick answers on food safety topics?
Try Ask FSM, our new smart AI search tool.
Ask FSM →

Share This Story

Recommended Content

JOIN TODAY
to unlock your recommendations.

Already have an account? Sign In

  • people holding baby chicks

    Serovar Differences Matter: Utility of Deep Serotyping in Broiler Production and Processing

    This article discusses the significance of Salmonella in...
    Testing & Analysis
    By: Nikki Shariat Ph.D.
  • woman washing hands

    Building a Culture of Hygiene in the Food Processing Plant

    Everyone entering a food processing facility needs to...
    Personal Hygiene/Handwashing
    By: Richard F. Stier, M.S.
  • graphical representation of earth over dirt

    Climate Change and Emerging Risks to Food Safety: Building Climate Resilience

    This article examines the multifaceted threats to food...
    Risk Assessment
    By: Maria Cristina Tirado Ph.D., D.V.M. and Shamini Albert Raj M.A.
Manage My Account
  • eMagazine Subscription
  • Subscribe to eNewsletter
  • Manage My Preferences
  • Website Registration
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Food Safety Magazine audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Food Safety Magazine or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Salmonella bacteria
    Sponsored byThermoFisher

    Food Microbiology Testing Methods: Salmonella species

  • a diagram explaining indicator organisms
    Sponsored byHygiena

    How Proactive Listeria Testing Helps Prevent Six- and Seven-Figure Recalls

  • woman grocery shopping
    Sponsored byCorbion

    Designing Safety Into Every Bite: Proactive Risk Mitigation for Refrigerated Foods

Popular Stories

food Safety Assurance

eBook | Food Safety Assurance for Dairy and Low-Moisture Foods

hospital patient

Foodborne Illness Outbreaks and Serious Listeria Infections Rising in EU

baby eating bottle

Coalition Urges RFK Jr. to Fix Infant Formula Oversight Problems that Allowed Infant Botulism Outbreak

Events

May 11, 2026

The Food Safety Summit

Stay informed on the latest food safety trends, innovations, emerging challenges, and expert analysis. Leave the Summit with actionable insights ready to drive measurable improvements in your organization. Do not miss this opportunity to learn from experts about contamination control, food safety culture, regulations, sanitation, supply chain traceability, and so much more.

View All

Products

Global Food Safety Microbial Interventions and Molecular Advancements

Global Food Safety Microbial Interventions and Molecular Advancements

See More Products

Related Articles

  • Food and Beverage Industry Cyber Security Risk Management: Does a HACCP-Based Food Safety Culture Provide Solutions?

    See More
  • Food security

    Cyber as a Vital Element in Comprehensive Food Safety and Defense Programs

    See More
  • Recent Support of Proposition 65 Exemption for Coffee Reinforces Need for Science-Based Nutrition Information

    See More

Related Products

See More Products
  • 1119053595.jpg

    Food Safety for the 21st Century: Managing HACCP and Food Safety throughout the Global Supply Chain, 2E

  • 1118396308.jpg

    High Throughput Analysis for Food Safety

  • 1119160553.jpg

    Food Safety: Innovative Analytical Tools for Safety Assessment

See More Products

Related Directories

  • On Target Packaging

    On Target Packaging is a production/maintenance servicer for combination and check weighers. We do not sell or process food, but provide service/repairs, and equipment for the food industry
  • A&B Ingredients

    A&B Ingredients is a manufacturer and distributor of unique specialty ingredients to the food industry. We specialize in natural, clean-label, plant-based ingredients for food safety and shelf life extension in food and beverage products. Our CytoGUARD portfolio includes antimicrobials, yeast and mold inhibitors, natural preservatives, and antioxidants. We also provide turn-key solutions for sodium reduction with natural lower sodium sea salts.
  • We R Food Safety Inc.

    Scalable, affordable and fully customizable software designed by industry experts and backed by a world-class team of consultants and support personnel. Our proprietary software modernizes your food safety systems, provides your staff real-time data and visibility. We have the ability to construct custom reporting providing you information that is important to your business.
×

Never miss the latest news and trends driving the food safety industry

eNewsletter | Website | eMagazine

JOIN TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Directories
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • Instagram
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing