Food Safety
search
cart
facebook twitter linkedin
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Food Safety
  • NEWS
    • Latest News
    • White Papers
  • PRODUCTS
  • TOPICS
    • Contamination Control
    • Food Types
    • Management
    • Process Control
    • Regulatory
    • Sanitation
    • Supply Chain
    • Testing and Analysis
  • PODCAST
  • EXCLUSIVES
    • Food Safety Five Newsreel
    • eBooks
    • FSM Distinguished Service Award
    • Interactive Product Spotlights
    • Videos
  • BUYER'S GUIDE
  • MORE
    • ENEWSLETTER >
      • Archive Issues
      • Subscribe to eNews
    • Store
    • Sponsor Insights
  • WEBINARS
  • FOOD SAFETY SUMMIT
  • EMAG
    • eMagazine
    • Archive Issues
    • Editorial Advisory Board
    • Contact
    • Advertise
  • SIGN UP!

Food Company Proprietary Information: A Target for Cyber-based Adversaries

September 6, 2016

Food defense is a complicated set of processes, each responding to threats ranging from cyber vulnerabilities to secure food processes. Food production and processing decision makers may think of their companies in terms of the products they produce, which is a reasonable way to judge success: more products, more profit. They may also think in terms of the brand, essential for generating return customers. A good brand is a selling dividend—the best advertising investment available. A damaged brand yields only grief in terms of profitability and company wellbeing. Adversaries can target both products and brand and regularly do so, as most corporate security professionals would quietly attest. 

In the age of cyber-based threats and persistent threats,[1] an important new security consideration is the need to protect proprietary information. Proprietary information is the stuff that enables the corporation to produce the food and agriculture products that in turn are identified with the brand. Proprietary information—whether the settings on your equipment or the detailed processes or recipes, secret ingredients, etc., used in creating products—is highly valuable and, in a real sense, the foundation for all corporate assets and profit. Lose proprietary information and your company could lose its competitive edge or, or in a worst-case scenario, cease to exist.

The news on the issues of proprietary information is currently a mixed bag. The good news is that the U.S. Government increasingly views corporate espionage as a serious threat to market competitiveness and, ultimately, national and economic security. Prosecutions are increasing, but not enough to discourage adversaries. “Persistent threats” are named that for a reason—they are not likely to diminish in the foreseeable future. The bad news is that technological threats are emerging far more rapidly than we are able to develop defenses. Bad actors are also more agile at exploiting technology than the government, which is bogged down by bureaucratic and legal constraints. Our adversaries are not. So how, potentially, could new technologies be exploited by persistent threat actors to target proprietary information?

A Hypothetical Case in Point
This discussion will be circumspect and short on specific details, because we must adhere to the highest standards of operational security (OPSEC), meaning we don’t want to give adversaries any exploitable ideas.

Engineers at the University of Washington’s Sensor Laboratory and the Delft University of Technology have developed an amazing miniature device they call “WISP” (Wireless Identification and Sensing Platform).[2] Combining the capabilities of a sensor and a computing chip, the device requires no onboard power source (e.g., battery), instead converting radio waves to electricity. Similar to an RFID (radio frequency identification device) reader, the device has the capability to act as a sensor, gathering data and then transmitting it to a remote receiver. Although the device can’t yet be programmed wirelessly, that improvement is coming and will make it possible to use the device in hard-to-reach, restricted or dangerous environments and to control the device remotely. When wireless programming capability does come, the device could be and extremely valuable part of future food defense and food safety programs.

So how could this marvelous technology be exploited to steal proprietary information? Think of this device as just a miniature computer, capable of gathering information on equipment settings or processes and then transmitting that data to another remote device. Adversaries, persistent and otherwise, know well how to use computers to get what they want from corporations. Chances of detection diminish dramatically if an adversary can deliver a small device that defies detection. Even if detected, the remote device would be exceedingly hard (though not impossible) to trace.

This is the kind of device at the center of countless spy movies and real espionage programs. Has the technology matured to the point it could actually be used in an espionage program designed to steal proprietary information? Not at the moment. This device—and others with capabilities beyond anything currently imagined—will eventually fall into the hands of adversaries, just as happened with computers and smart phones. The bad actors will attempt to exploit (and likely succeed) the technology, using its capabilities for ill purposes, rather than good.

So what is a food defense or food safety manager to do? The simple answer is to think like the adversary and counter potential threats by hardening defenses, making them strong enough to make the adversaries’ cost of doing business (stealing from you), not worth the effort. In other words, harden your defenses so the adversary goes elsewhere.  

How is this accomplished? Again, think in terms of OPSEC. In general, protect your information by making it exceedingly hard to find and access remotely. Think about new technological advances and the newly evolving threats that will undoubtedly accompany the realization of the “Internet of Things,”[3] whereby devices will be able to transmit operational information to users (or exploiters). Then act accordingly to minimize or neutralize the threat. 

Future technological advances will likely give us significant opportunities for improvement in efficiency and profitability, while accompanied by some degree of risk. The important message here is to prepare for the future by planning to manage risk by guarding that which is essential to your corporation. First priority—start with guarding proprietary information. 

Robert A. Norton, Ph.D., is chair of the Auburn University Food System Institute’s Food and Water Defense Working Group (aufsi.auburn.edu/fooddefense). He is a long-time consultant to federal and state law enforcement agencies and is editor of Bob Norton’s Food Defense Blog (aufsi.auburn.edu/fooddefense/blog/). He can be reached at nortora@auburn.edu or by phone at 334.844.7562. 

References
1. A “persistent threat” is the term used by the U.S. government and military to describe specific countries that continually target information based in business, academia, government and the military through large collection efforts, most cyber related. Collection of proprietary information enables these adversarial nations to gain business advantage with little or no investment, making them more competitive in the world market.
2. arxiv.org/pdf/1512.04602v2.pdf.
3. thehackernews.com/2015/08/ssl-encryption-internet-of-things.html.


Author(s): Robert A. Norton, Ph.D.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
to unlock your recommendations.

Already have an account? Sign In

  • people holding baby chicks

    Serovar Differences Matter: Utility of Deep Serotyping in Broiler Production and Processing

    This article discusses the significance of Salmonella in...
    Contamination Control
    By: Nikki Shariat Ph.D.
  • woman washing hands

    Building a Culture of Hygiene in the Food Processing Plant

    Everyone entering a food processing facility needs to...
    Facilities
    By: Richard F. Stier, M.S.
  • graphical representation of earth over dirt

    Climate Change and Emerging Risks to Food Safety: Building Climate Resilience

    This article examines the multifaceted threats to food...
    Risk Assessment
    By: Maria Cristina Tirado Ph.D., D.V.M. and Shamini Albert Raj M.A.
Subscribe For Free!
  • eMagazine Subscription
  • Subscribe to eNewsletter
  • Manage My Preferences
  • Website Registration
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Food Safety Magazine audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Food Safety Magazine or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Deli Salads
    Sponsored byCorbion

    How Food Safety is Becoming the Ultimate Differentiator in Refrigerated and Prepared Foods

Popular Stories

recalled sysco and lyons imperial nutritional shakes

Listeria Outbreak Linked to Nutritional Shakes Served at Healthcare Facilities Causes 14 Deaths

Scientist inspecting food substance with microscope

FDA Announces ‘Proactive’ Post-Market Chemical Review Program to Keep Food Supply Safe

Image of fish on ice

Common Fish Food Poisoning Types and Prevention Methods

Events

June 12, 2025

Additive Bans Ahead: Your Guide to Avoiding Risk and Maintaining Agility

Live: June 12, 2025 at 12:00 pm EDT: From this webinar, attendees will learn how ingredient bans will impact product development, labeling, and sourcing.

View All

Products

Global Food Safety Microbial Interventions and Molecular Advancements

Global Food Safety Microbial Interventions and Molecular Advancements

See More Products
Environmental Monitoring Excellence eBook

Related Articles

  • Food and Beverage Industry Cyber Security Risk Management: Does a HACCP-Based Food Safety Culture Provide Solutions?

    See More
  • Food security

    Cyber as a Vital Element in Comprehensive Food Safety and Defense Programs

    See More
  • Oranco logo

    Oranco, Inc. to launch blockchain-based anti-counterfeiting laser recognition proprietary technology

    See More

Related Products

See More Products
  • 1119053595.jpg

    Food Safety for the 21st Century: Managing HACCP and Food Safety throughout the Global Supply Chain, 2E

  • 1119160553.jpg

    Food Safety: Innovative Analytical Tools for Safety Assessment

  • 1118396308.jpg

    High Throughput Analysis for Food Safety

See More Products

Related Directories

  • On Target Packaging

    On Target Packaging is a production/maintenance servicer for combination and check weighers. We do not sell or process food, but provide service/repairs, and equipment for the food industry
  • We R Food Safety Inc.

    Scalable, affordable and fully customizable software designed by industry experts and backed by a world-class team of consultants and support personnel. Our proprietary software modernizes your food safety systems, provides your staff real-time data and visibility. We have the ability to construct custom reporting providing you information that is important to your business.
  • Smart Food Safe

    Smart Food Safe is a leading and innovative software company specializing in providing state-of-the-art technology solutions for businesses to excel in Quality, Food Safety, Regulatory, and Traceability management. With a strong focus on empowering organizations, Smart Food Safe Software offers a comprehensive suite of customizable modules designed to streamline processes, ensure regulatory compliance, enhance product quality, and enable real-time visibility into operations.
×

Never miss the latest news and trends driving the food safety industry

eNewsletter | Website | eMagazine

JOIN TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Directories
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • Instagram
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing