Emerging technologies such as Blockchain and Big data analytics tools are changing the landscape of brand protection. Could they provide a valuable solution? What impact could this have on the tax stamp industry?
6. The Limitations of Technology
Tax verification, Tax stamp
authentication, Track & Trace /
Anti-Diversion
TaxRate
12345678
Encrypted
Codes
Serial Number
Overt Security and
Design Features
Security Features
(overt & covert)
Product authentication
Product Overt & Covert
Security Features
7. The Limitations of Technology
Unproven at industrial scale
Packaging
AccuracyCosts
Implementation
Privacy
8. Considerations on RFID
• The technology was established as an inventory and
distribution optimization technology – not illicit
trade
• Does your business issue apply to the technology?
• Does the product price and margin support the
higher cost?
• Can RFID be applied to the product packaging?
• Does the product have unique issues which limit
effectiveness?
9. Fundamentals
Identifier (Number or Alpha) unique
amongst all identifiers used for objects
for this specific purpose:
• Serial Numbers
• Random Numbers
• Allocated codes from central registry
UNIQUE ID (UID)
Process of determining the current
and past locations (and other
information) of a unique item or
property.
TRACK AND TRACE
Harvesting or analyzing very large
sets of unstructured, sometimes
unconnected and unrelated data
sets to detect patterns,
relationships, gain insights and
predict outcomes and behaviors.
BIG DATA
Tamper-proof continuous transaction
records, called blocks, which are linked,
encrypted and recorded on a
decentralized, distributed and public
digital ledger, across many computers
so that the record cannot be tampered
with or altered retroactively
BLOCKCHAIN
Tamper-proof continuous transaction
records, called blocks, which are linked,
encrypted and recorded on a
decentralized, distributed and public
digital ledger, across many computers
so that the record cannot be tampered
with or altered retroactively
BLOCKCHAIN
11. The Impact of Big Data
“Blind Spots”
Private Database
Public Database
Public Database
12. Best Practices on Big Data
• Inventory all existing government data sources
• Inventory other private databases, which might be
available to analyze and develop patterns
• Aggregate available government and public databases
before looking at additional databases
• Expand / integrate existing programs vs. starting new
• Clearly define the issue / question asked
17. Object from B
A
A
B
CD
E
Centralized
System
The Disruption Potential
18. A
B
CD
E 123
B A
Item 123
B A
Item 123
B A
Item 123
B A
Item 123
B A
Item 123
Item 123
at A
Item 123
at A
Item 123
at A
Item 123
at A
Item 123
at A
A D
Item 123
Item 123
at D
A D
Item 123
A D
Item 123
A D
Item 123
A D
Item 123
Item 123
at D
Item 123
at D
Item 123
at D
Item 123
at D
B A
Item 123
Item 123
at A
A D
Item 123
Item 123
at D
B A
Item 123
Item 123
at A
A D
Item 123
Item 123
at D
B A
Item 123
Item 123
at A
A D
Item 123
Item 123
at D
B A
Item 123
Item 123
at A
A D
Item 123
Item 123
at D
B A
Item 123
Item 123
at A
A D
Item 123
Item 123
at D
Blockchain
System
The Disruption Potential
19. 123
A
B
CD
E
123
B A
Item 123
B A
Item 123
B A
Item 123
B A
Item 123
Item 123
at A
Item 123
at A
Item 123
at A
Item 123
at A
A D
Item 123
Item 123
at D
A D
Item 123
A D
Item 123
A D
Item 123
Item 123
at D
Item 123
at D
B A
Item 123
Item 123
at A
A D
Item 123
Item 123
at D
Item 123
at D
Counterfeits or
Illicit Whites
The Disruption Potential
20. A
B
CD
E
123
B A
Item 123
B A
Item 123
B A
Item 123
B A
Item 123
Item 123
at A
Item 123
at A
Item 123
at A
Item 123
at A
A D
Item 123
Item 123
at D
A D
Item 123
A D
Item 123
A D
Item 123
Item 123
at D
Item 123
at D
B A
Item 123
Item 123
at A
A D
Item 123
Item 123
at D
Item 123
at D
Blockchain’s Impact on Illicit Trade
Diversion /
Smuggling
21. Impact of technology
Tax Stamp Forum - 9/14/14 21
Counterfeit /
Unauthorized
Production
Genuine
Production
Authorized
Retailer
Unauthorized
Distribution
Legal
Distribution
Unauthorized
Reseller
End
User
Legend:
Genuine
Product / Legal
Distribution
Genuine Product
/ Grey /
Smuggled
Illegal Product
SPHERE OF INFLUENCE FOR
TECHNOLOGY
22. Blockchain Strengths/Weaknesses
Strengths
• Public ledger creates “chain of
custody”
• Ledger cannot be tampered
• No central authority
• Significantly strengthens UIDs
Weaknesses
• Requires motivated entities
• Like other technologies does not
impact illicit trade outside
regulated channels
• Technology infrastructure required
23. Implications for the Industry
• Provides significant security to sophisticated
Departments of Revenue with motivated third
parties
• Can be added to existing stamps to add a layer of
authentication and tracking
• Significantly enhances security of UIDs
• Potentially reduces the need for costly overt and
covert security features
25. “We always overestimate the change
that will occur in the next two years
and underestimate the change that
will occur in the next ten.
Don’t let yourself be lulled into
inaction.”
1996
Bill Gates,
The Road Ahead
IBM Quote may be misattributed: http://freakonomics.com/2008/04/17/our-daily-bleg-did-ibm-really-see-a-world-market-for-about-five-computers/
http://www.businessinsider.com/bosses-mocked-new-technologyand-got-it-wrong-2017-6#blockbuster-ceo-jim-keyes-on-streaming-video-1
IBM Quote may be misattributed: http://freakonomics.com/2008/04/17/our-daily-bleg-did-ibm-really-see-a-world-market-for-about-five-computers/
http://www.businessinsider.com/bosses-mocked-new-technologyand-got-it-wrong-2017-6#blockbuster-ceo-jim-keyes-on-streaming-video-1
IBM Quote may be misattributed: http://freakonomics.com/2008/04/17/our-daily-bleg-did-ibm-really-see-a-world-market-for-about-five-computers/
http://www.businessinsider.com/bosses-mocked-new-technologyand-got-it-wrong-2017-6#blockbuster-ceo-jim-keyes-on-streaming-video-1
https://www.hyperledger.org/about
Underlying technology to securely track and record – does not take away the actual tracking
If all players agree (esp code structure) could eliminate major central players (it’s a risk - how to mitigate)
Serialization / Unique ID (UID): Identifier (Number, Alpha, Symbols) guaranteed to be unique among all identifiers used for those objects and for a specific purpose:
Serial Numbers
Random Numbers
Allocated codes from a central registry
Track and Trace: Process of determining the current and past locations (and other information) of a unique item or property.
Big Data: Harvesting or analyzing very large sets of unstructured, potentially unconnected and sometimes unrelated data sets to detect patterns, relationships, gain insights and predict outcomes and behaviors.
Blockchain: Continuously growing list of transaction records, called blocks, which are linked, encrypted and recorded on a decentralized, distributed and public digital ledger, across many computers so that the record cannot be tampered with or altered retroactively
Without counterfeits, diversions, or illicit whites (explained later)
Just schematic of normal supply chain and what the current technology supplies – and what Blockchain attempts to do as well
Without counterfeits, diversions, or illicit whites (explained later)
Just schematic of normal supply chain and what the current technology supplies – and what Blockchain attempts to do as well
https://www.hyperledger.org/about
Underlying technology to securely track and record – does not take away the actual tracking
If all players agree (esp code structure) could eliminate major central players (it’s a risk - how to mitigate)
Blockchain can secure a supply chain by creating a more robust chain of custod
More points of data, more verification opportunities, checked at every point of movement
The chain’s data can be locked into the ledger, therefore secured.
Blockchain can secure a supply chain by creating a more robust chain of custod
More points of data, more verification opportunities, checked at every point of movement
The chain’s data can be locked into the ledger, therefore secured.
Strengths:
1.)
2.) The entire network would automatically know if a counterfeit product was introduced into the supply chain.
The ledger is always correct and verified, cannot be tampered or changed once sealed.
3.) Central authority rendered unnecessary because verification and record-keeping is built into the peer-to-peer network
The blockchain itself becomes the moderator.
4.) Visibility of records could be huge for industries using relatively opaque supply chains, such as pharmaceuticals
Weaknesses:
1.) Parties must be motivated to secure a supply chain
2.) Therefore does not prevent illegal activities that exist outside of the supply chain
Example: creating counterfeit drugs and selling on the black market
3.) must use aspects of unique ID, scanning, smart phones, law enforcement, and other technologies to secure supply chains
Not an overnight change – policy, infrastructure, technology, etc.
Problem today - Faking labels
Blockchain knows right away that this label is not in the system (takes away overt and covert system)
Sources:
1. https://www.nasdaq.com/article/blockchain-technology-can-help-reduce-flow-of-counterfeit-drugs-cm721230
2. https://www2.deloitte.com/content/dam/Deloitte/us/Documents/process-and-operations/us-blockchain-to-drive- supply-chain-innovation.pdf
3. https://www-01.ibm.com/common/ssi/cgi-bin/ssialias?htmlfid=93014193USEN&
https://www.hyperledger.org/about
Underlying technology to securely track and record – does not take away the actual tracking
If all players agree (esp code structure) could eliminate major central players (it’s a risk - how to mitigate)
Cutting edge technology for a range of industries
SafeChain – Real Estate Fraud Protection
Employs bank and identity verification through blockchain to prevent fraud wire transfers in the real estate industry
Able to close deals faster and more secure
Eliminates the needs for paper house titles and deeds
Watch out title agencies
Everledger – diamond tracker
Blockchain ledger to protect and verify valuable assets, such as diamonds
Collects purchase history, records, and asset characteristics to create a permanent entry in the ledger
This ledger is then used throughout the supply chain to verify authenticity
Provenance – food quality tracking ex. Wild fish
Implementing blockchain at every step of the supply chain for food
Software operates easily on mobile for scanning food labels, from producer to end consumer
A place to share information about food origin, including pictures, farm data, date of production, and all food standards implemented on the way
A tool not only for supply chain users, but for consumers to understand where their food is coming from.
A tool for food revolution.
Quote source:
https://www2.deloitte.com/content/dam/Deloitte/pl/Documents/Reports/pl_Blockchain-technology-and-its-potential-in-taxes-2017-EN.PDF
Bill Gates, The Road Ahead, 1996