M. PECHT
Open Access
BAE Systems and Platform Solutions found another problem
with 500 pieces of Linear Technology M38510/14802BXA
parts they bought from Electronic Components Inc., a broker in
2006. On visual inspection, it was found the parts to be laser-
marked rather than ink-stamped as is the case with Linear Te-
chnology’s parts. The die of the suspected part was compared
with that of a known good part and found to be 50% smaller.
Also the mask set and wire bonding material were found to be
different (Government-Industry Data Exchange Program, 2006).
On February 24, 2003, Maxim Integrated Products and its
wholly owned subsidiary, Dallas Semiconductor, posted an alert
on its website regarding counterfeit Maxim/Dallas Nonvolatile
Static Ram (NVSRAM) modules (DS1230, DS1245, DS1250)
being sold in Asia. The parts had been disguised and marketed
under the Dallas Semiconductor label, using Dallas Semicon-
ductor marked shipping tubes and boxes. The alert stated that
the customer returns for these imitation modules revealed a
wide variation of components and assembly techniques, quite
different from the authentic parts (Electronics Supply and Ma-
nufacturing, 2003).
In some cases, the copies of products had comparatively easy
to identify mistakes in their labels. On Sep 28, 2005 X-bit labs
reported that forged hard disk drives similar to Maxtor Corps
MaXline II HDDs were being sold in the Japanese markets. The
counterfeit hard disk drives had incorrect font on the label and
used lower case “X” letter in the brand name of MaXLine II
(Shilov, 2005). Similarly, in 2003, Agilent Technologies Inc.
had an experience with counterfeit parts when a customer re-
turned an optocoupler for failure analysis. The part, which was
bought through a broker, came under suspicion when the cus-
tomer found the word “Singapore” spelled incorrectly on the
part (Sullivan, 2003).
Examples of Scrap Salvaging
This section describes examples where defective or outdated
items meant for scrap have been salvaged and then re-circulated
into the supply chain. Electronic parts that are scrapped but not
destroyed are cleaned, reworked and returned to the supply
chain.
On September 28, 2004, GIDEP issued an alert regarding un-
authorized distribution of Philips Semiconductors Part number
PCD3311CT (musical tone generator IC) (Government-Indus-
try Data Exchange Program, 2004) after L-3 Communication
Sys tems—East of Camden, N.J. reported numerous failures.
Philips Semiconductors found that the parts appeared to be
scrap material that had somehow showed up on the gray market.
Philips also indicated that they have received other similar cus-
tomer complaints for parts with this part number purchased
from unauthorized resellers.
On April 15, 2003, GIDEP issued an alert about a precision
operational amplifier, LT1097S8 of Linear Technology Corp.
(LTC) with lot code 0103. Textron Systems had experienced a
high failure rate of these parts. LTC’s visual and destructive
physical analysis revealed the parts to be counterfeit. LTC also
noted that the top of some parts appeared to have been sanded
down and remarked; indicating that the parts were eight years
older than they actually were date coded (Government-Industry
Data Exchange Program, 2003).
In January 2005, Advanced Micro Devices (AMD), working
in cooperation with Taiwanese authorities, seized a total of
60,000 counterfeit AMD microprocessors worth US $9.46 mil-
lion during a raid on an electronics company in Tainan, south-
ern Taiwan. The raid turned up suspect AMD microprocessors,
including K7 [AMD Athlon XP] and K8 [AMD Athlon 64]
models. The defective microprocessors, which were meant for
scrap had been stolen from one of AMD’s three packaging
plants in Asia and shipped to Taiwan for remarking (Shilov,
2005).
On June 04, 2003, GIDEP issued an alert regarding the pres-
ence of a non-Cypress die within a Cypress military package
5962-8871305RA/PALC16L8-30DMB (a 20 pin CDIP, digital
memory, lot code TAH9949). This part had become obsolete in
1999, and Telephonics had purchased more than 100 parts from
two different brokers in April 2003. Since Telephonics engi-
neers could not program the part with the Cypress algorithm,
they performed a failure analysis that revealed a smaller die
than that of a similar part with lot code THA9916. Also, while
the THA9916 part had the Cypress logo, TAH9949 part had the
MMI logo. Cypress has since indicated that traceability desig-
nators for military parts were missing in the purchased parts
and that the “country of origin” code was wrong (TAH instead
of THA for Thailand) (Government-industry Data Exchange
Program, 2003).
Prevention Efforts
There are organizations that monitor and report on counter-
feit products. One of the most active is the US Department of
Defense Government-Industry Information Exchange Program
(GIDEP); others include the US Department of Energy (DoE)
Lessons Learned Program, the US Defense Industrial Supply
Center, the Electronic Resellers Association International (ERAI),
and the International Anti-Counterfeiting Coalition (IACC)
(Science Applications International Corporation, 2002). These
programs have been effective in alerting companies of known
counterfeit products, but do not solve the cause of the problem.
To stop counterfeit products being introduced into assembled
systems, manufacturers of critical systems must use checks and
safeguards to ens ure that the parts and modules contained within
their systems are not counterfeit. These safeguards can range
from specially designed tests, to aggressive overt and covert au-
thentication techniques. Such overt or covert product protection
makes counterfeiting harder and more expensive. Effective
overt authenticating technologies enable the public to recognize,
avoid, and report instances of counterfeiting, and covert tech-
nologies can alert company representatives and enforcement
authorities to counterfeiting activity. Anti-counterfeiting tech-
nologies also provide evidential support in a court of law,
where issues of product genuineness and liability may have to
be determined (Tiku, Das, & Pecht, 2004). Different types of
authentication techniques are available like data matrix codes,
RFID tags, photonic inks, and microtaggants which can be used
for rapid product authentication. We go over these techniques
briefly and understand their interesting features.
A tool for supply chain management and retail inventory
control is radio fr equency i dentific ation (R FID) ( SATO America,
2006). Radio Frequency Identification (RFID) is an automatic
identification method, relying on storing and remotely retriev-
ing data using devices called RFID tags or transponders. RFID
system consists of a tag, reader and a database. Chip-based
RFID tags contain microchip and an antenna and are used to
store and transmit authenticating data such as manufacturer
name, brand name, model and a unique serial number. RFID
tags are attached to or incorporated into a product for the pur-