A Summary of Counterfeit Avoidance: Development & Impact


Reading time ( words)

Consumers are accustomed to finding China Compulsory Certification (CCC) or CE (European Conformity) markings on products. These markings provide a level of confidence that products displaying them meet certain industry standards; inspection and tests were performed to determine whether they met prescribed standards. Consumers might be surprised, however, to learn of a gaping hole when it comes to counterfeit components or knock-offs. Regardless of the markings displayed, these items aren’t covered.

For the average person, it’s difficult to determine if a product is authentic or bogus. Price alone isn’t a reliable indicator any longer because counterfeiters of luxury items have discovered that selecting a slightly discounted price, still better than an outlet store, will entice more people to buy their merchandise than a heavily discounted price. The thinking behind this logic may be that such a huge discount only serves to reveal the item as counterfeit.

Recently in the United States, a series of counterfeit avoidance measures to identify counterfeits, mitigate their impact, monitor their presence and design standards to prevent their infiltration were adopted by the Department of Defense (DoD). These standards, AS6081 and AS55553, compliment quality management programs already an essential part of the manufacturing, assembly and distribution processes. Although the implementation of counterfeit avoidance regulations improves efforts made against this rapidly growing epidemic, mitigation of this issue still remains in its infancy.

Roots of a Trillion-Dollar Problem

The International Chamber of Commerce estimates the total global value of counterfeit and pirated products could reach a $1.7 trillion by the year 2015. To help put this figure into perspective, the proposed DoD budget for 2015 is $495.6 billion. A $1.1 trillion spending bill recently passed by Congress further demonstrates the potential impact counterfeits represent.

Money from counterfeit sales fund criminal activities, terrorist organizations and destroys U.S. jobs; these are just a few examples of the impact. As Chairman of the United Sates National Committee/International Electro-technical Commission (USNC/ICEQ) and Secure Components CEO, I’ve worked with groups of individuals and organizations to safeguard not only U.S. consumers, but consumers worldwide. Although these efforts are growing every day, at the core of this community are people who’ve been in this scuffle from the beginning and continue to work diligently toward its eradication. Like so many now common commercial applications, these efforts can be traced back to the military complex. Recognizing the growing presence of counterfeit components in U.S. systems, tracking failures to substandard parts and the opportunity older systems presented, the government examined this silent menace to gauge its depth in the supply chain. The results were staggering. Afterward, discussions with industry leaders sought to develop an outline of how best to prevent the flow of suspect components into the supply chain. One of the items that came to light was the inadvertent impact toward fostering counterfeiting that the Federal Acquisition Streamlining Act (FASA)[3] contributed to fraudulent component growth in avionics defense high-reliability products (ADHP) by permitting the use of commercially available items for designated tasks performed. Another admirable intent of FASA was to reduce program costs inherently imposed as a result of U.S. Military-standard (Mil-Std) requirements.

Under the Mil-Std protocol, additional parts and processes were needed to satisfy inspection, testing and other sampling by third-party organizations creating an additional layer within the supply chain and increasing the cost of required parts. MIL-STDs tended to lag behind continuously evolving technology, preventing their use on government contracts. This was changed to allow comparable, commercial parts to be acquired for military systems. By default, this attribute opened the door to anyone with access to the consumer market or an abundance of discarded parts. Counterfeiters quickly seized upon new market segments.

Read The Full Article Here

Editor's Note: This article originally appeared in the March issue of SMT Magazine.

Share




Suggested Items

How Important Is Trust?

07/20/2022 | Randy Cherry, IPC
If you work for a U.S. defense prime contractor, do you have concerns that the controlled unclassified information (CUI) for your printed circuit boards, your printed circuit board assemblies, and your cable and wire harnesses is safe? What about the design and the development process for your products? Is the controlled technical information (CTI) safe and protected? Are the suppliers that your company selected maintaining a quality system, a supply chain risk management process, a security system to protect products and services from unauthorized access, and a Chain of Custody policy for electronic and physical materials?

Time to Get Serious About CMMC Readiness

07/13/2022 | I-Connect007 Editorial Team
Divyash Patel of MX2 Technology is a leading cybersecurity expert who’s sounding the alarm about getting your company into a state of readiness. But he’s not yelling fire in a theater. Whether it’s aligning with DoD’s CMMC, or just ensuring your company’s data and processes are protected, Divyash can see what’s coming. “This is a must-have compliance program,” he says. “It needs to be taken seriously and maintained.”

Exploring High Density With Axiom

05/06/2022 | I-Connect007 Editorial Team
Nolan Johnson and Barry Matties talk with Axiom’s Rob Rowland and Kevin Bennett about the current high-density challenges facing EMS manufacturing. In this interview, Bennett and Rowland zero in on component packaging and feeder technology as critical areas in need of improvement.



Copyright © 2022 I-Connect007. All rights reserved.