Technical Library | 2011-09-26 13:53:30.0
On September 14, 2010, the late Shannon Wren, owner of VisionTech Components ("VisionTech"), and Stephanie McCloskey, VisionTech's Administrative Manager, were arrested during the execution of search and seizure warrants issued against the pair by the United States government after evidence connected them to the sale of counterfeit parts to the U.S. Navy, defense contractors and others. A ten-count indictment charged McCloskey with conspiracy, aiding and abetting in violation of Title 18 United States Code, Sections 371 and 2; trafficking in counterfeit goods, in violation of Title 18 United States Code, Section 2320; and mail fraud, in violation of Title 18 United States Code, Section 1341. McCloskey pled guilty to conspiracy and aiding and abetting for her role in the scheme.
Technical Library | 2022-10-04 16:54:38.0
Counterfeiting is growing in exponential proportions with respect to the types of: • Products being counterfeited • Industries affected • Potential consequences caused by counterfeits If this threat is not adequately addressed, counterfeit items have the potential to seriously compromise the safety and operational effectiveness of our products. The objective of this training is to raise awareness of: • The risks and impacts of counterfeit parts infiltrating the supply chain. • Best practices to eliminate or mitigate those risks • Lockheed Martin counterfeit prevention requirements for suppliers
Technical Library | 2021-10-12 18:05:09.0
The remarkable increase in counterfeit parts (a factor of 4 since 2009) [1] is a huge reliability and security concern in various industries ranging from automotive electronics to sensitive military applications increasing the possibility of premature failure in critical systems [2-5]. Counterfeit parts can also incur a great financial loss to legitimate electronics companies [6]. The issue is even more alarming as the counterfeiters use more sophisticated methods making counterfeit detection a much harder task [7-8]. Therefore, it is reasonable to develop more advanced counterfeit detection methods targeting a more efficient detection of sophisticated counterfeited parts.
Technical Library | 2014-09-04 17:43:19.0
The counterfeiting of electronic components has become a major challenge in the 21st century. The electronic component supply chain has been greatly affected by widespread counterfeit incidents. A specialized service of testing, detection, and avoidance must be created to tackle the worldwide outbreak of counterfeit integrated circuits (ICs). So far, there are standards and programs in place for outlining the testing, documenting, and reporting procedures. However, there is not yet enough research addressing the detection and avoidance of such counterfeit parts. In this paper we will present, in detail, all types of counterfeits, the defects present in them, and their detection methods. We will then describe the challenges to implementing these test methods and to their effectiveness. We will present several anti-counterfeit measures to prevent this widespread counterfeiting, and we also consider the effectiveness and limitations of these anti-counterfeiting techniques.
Technical Library | 2018-09-12 21:04:28.0
Counterfeit electronic components are finding their way into today’s defense electronics. The problem gets even more complex when procuring DMS (diminishing manufacturing source) parts. This paper will provide a brief introduction to counterfeit prevention and detection standards, particularly as they relate to the Aerospace and Defense sector. An analysis of industry information on the types and nature of counterfeit components will be discussed in order to illustrate those most likely to be counterfeited, followed a specific case at a major defense contractor.
Technical Library | 2012-03-08 20:08:57.0
You may have heard talk in the news lately regarding counterfeit electronic components making it into the US military supply chain. The U.S. Senate Armed Services Committee (SASC) recently reported in the Counterfeit Electronic Parts in the Defense Department Supply Chain hearing held on November 17, 2011, 1,800 cases of suspected counterfeit components that went into more than 1 million individual products. If you consider this number for the military, we can only imagine the number of counterfeits in our commercial yet high reliability products, such as life support or other critical systems. If you are the person within your electronics-based company who must perform risk analyses, counterfeiting is not a new concern, yet many do not realize just how good counterfeiters have become at their "trade".
Technical Library | 2012-05-31 21:10:26.0
ProSkill Consulting and Training Group “Current Strategies for Mitigating Counterfeit Components” By: Rick Stanton - PRO-STD-001 Course Director/Corporate VP of Quality It’s well known that counterfeiting has been linked to organized c
Technical Library | 2021-03-18 20:03:27.0
Much has been said and written about the accuracy of visual attribute inspections of potentially counterfeit components. The techniques and procedures being used to inspect counterfeit and reworked electronic components in the open marketplace can be quite effective in most cases.
Technical Library | 2010-03-11 19:33:47.0
Counterfeit products have been a growing problem worldwide, and the electronics industry has been no exception. Authentication of electronic components by electrical and physical testing can provide a cost-effective means of risk management, aimed at keeping counterfeits out of the supply chain. In this presentation, we will review sources of counterfeit components, and discuss the capabilities and limitations of test processes used for authentication. We will then present examples of component authentication using these tools.
Technical Library | 2014-02-20 15:59:17.0
In this chapter, we discuss the type of parts used to create counterfeits and the defects/degradations inherent in these parts due to the nature of the sources they come from, proposed inspection standards, and limitations of these standards. The processes used to modify the packaging of these parts to create counterfeits are then discussed along with the traces left behind from each of the processes. We then present a systematic methodology for detecting signs of possible part modifications to determine the risk of a part or part lot being counterfeit.