Counterfeits Inspection

Download Report

Transcript Counterfeits Inspection

Evolving Counterfeit Component
Threats and Industry Mitigation Efforts
Stephen Schoppe
Glenn Robertson
Process Sciences, Inc.
Leander, Texas
512.259.7070
www.process-sciences.com
Introduction


A growing problem in all industry sectors
Openings for counterfeiting
• High price components
• High demand/scarcity
• Obsolete/out of production

Potential for introducing malicious code
• Sabotage – immediate or future
• Potential espionage
Introduction

How do counterfeits enter the supply chain?
• Often starts with remarking of reclaim/eWaste






•
•
•
•
Refurbished used part represented as new
Altered date code
Consumer grade marked as mil
Upgrade to later/preferred/scarce part type
Low-grade passives marked as precision value
(low tolerance) type
Completely different part
Manufacturing defects diverted from scrap bin
Surplus production from OEM (“4th shift”)
Acquisitions/Purchase of surplus inventories
Return of mixed inventories to distributor
Mitigation Strategies - Users


Essential to establish Due Diligence
Establish supply chain policies
•
•
•
•
Evaluate risks from “lowest bidder”
Use authorized distributors where possible
Write purchase contract carefully
Supplier Qualification






History with reporting organizations - BBB, D&B, etc.
Google search, including street view of address
Memberships – ERAI, GIDEP, IDEA etc.
Certifications - ISO, IDEA-1010, CCAP-101, etc.
Quality systems for receiving inspection, ESD, etc.
Onsite audit if possible
Mitigation Strategies - Users



Access to industry database(s)
Decision process for authentication testing
and quarantine/reporting of suspect parts
Disposition
• Don’t just return to distributor inventory
• Destroy & verify?

Staff training/qualification
Mitigation Strategies - Distributors

Anti-Counterfeit Policies
•
•
•
•


Increased scrutiny of sources
Awareness of evolving counterfeiting methods
Use of industry resources – ERAI, GIDEP, IDEA
Establish incoming inspection procedures
Authentication testing – in house or
outsource
Staff training/qualification
Industry Mitigation Efforts

Counterfeits Databases
• Searchable databases of suspect components


Information from reports submitted online
Only members can access, anyone can submit report
• GIDEP (www.gidep.org)

Operated by US Government, established 1959
• ERAI (www.erai.com)


Privately held reporting and investigation service
Escrow and dispute resolution services
• IDEA (www.idofea.org)


Privately held association
Maintains extensive Membership Code of Ethics
Industry Mitigation Efforts

Standards Organizations
• SAE G19 Committee
“chartered to address aspects of preventing, detecting, responding to
and counteracting the threat of counterfeit electronic components”

AS5553 (released 2009, rev A in progress)
• Counterfeit avoidance requirements for OEMs and CMs
• Adopted by DOD

AS6081 (released December 2011)
• Similar to AS5553
• Prescriptive avoidance requirements for distributors

AS6171 (in preparation)
• Intended to standardize test methods
• Covers a variety of tests
• Includes sampling plans

ARP6178 (in preparation)
• Methods for risk assessment of distributors
Industry Mitigation Efforts

Standards Organizations (continued)
• IDEA (Independent Distributors of Electronics Assoc.)



IDEA-STD-1010B
Visual inspection practices and requirements
Includes acceptability criteria
• ISO (Europe)


PC 246 and TC 247 committees established (2009) to
develop standards related to combating fraud
Coordinating with ANSI in USA
• iNEMI Consortium


Develop and assess improved methods for data
exchange, authentication and traceability
Includes development of metrics to assess the
problem and measure program(s) effectiveness/cost
Industry Mitigation Efforts

Training & Certification Programs
• IDEA


Certification to IDEA quality standards
Inspector training and certification based on 1010B
• CTI CCAP Program


Counterfeit components avoidance and certification
program for Independent Distributors
Training addresses detection and prevention of
counterfeit components
• Seminars and Workshops from SMTA, CALCE,
and other organizations
Government Initiatives

International efforts to reduce supply
• Take-back laws


Divert eWaste to reuse/recycle
Varies by country/state
• Restrictions on eWaste disposal



Regulated under the Basel Convention on Hazardous
Waste (1992)
Includes 170 member countries, USA not a member
Regulated in USA under RCRA as “Hazardous Waste”
• Currently no provisions specific to eWaste
• Possible future updates
• Direct USA diplomatic initiatives
Government Initiatives



Increased US Customs Scrutiny
Congress hearings/proposed legislation
National Defense Authorization Act (FY ’12)
• Levin/McCain amendment provisions





Requires DOD to define “counterfeit part”
Increases counterfeiting penalties for DOD contracts
Requires improved counterfeit avoidance methodology
for DOD and its contractors
Mandatory counterfeits reporting (when discovered)
for military and DOD contractor personnel
Contractors are responsible for remediation cost when
counterfeits are discovered
Authentication Testing


The second line of defense
Non-Destructive (sampling or 100%)
•
•
•
•
Visual/Component data
Radiographic (X-ray)
X-ray Fluorescence (XRF)
Electrical test



DC
Functional
Destructive
• Reveals surface of Silicon chip
• Chemical Decapsulation or Mechanical Delid
Authentication Testing

External Visual Inspection
• Inspect external packaging materials and labels
• Compare appearance and font/symbology with
“Golden” part if available
• Inspect package for evidence of remarking:



Blacktopping
Sanding scratches
Discrepancies in surface texture
Authentication Testing

External Visual Inspection
• Inspect Lead Condition


Surface Appearance
Straightness and Coplanarity
• Marking permanency test



Mineral Spirits (JEDEC JESD22-B107C)
MEK, Acetone, Alcohol also used
Change in markings or
surface appearance/texture
Authentication Testing

Check component information
• Consult Manufacturers’ Data Sheets



OCMs data sheets/websites
Distributors
Other sources (e.g., prior inspections, customer data)
• Date/Lot Code histories
• Company histories


SC OEMs
Mergers, name changes, plant closings/relocations
Authentication Testing

Radiographic Inspection
•
•
•
•
•
•
Solder ball pattern
Chip size/count
Wire bond count/pitch
Flip chip bump count/pitch
No need to open package
Possible radiation damage – currently under
evaluation by G19 Radiological Inspection SG
Authentication Testing

XRF Testing
• Rapid semi-quantitative elemental analysis
• Typically used for:



RoHS compliance screening
Verify Pb-free lead finish, or presence where required
Ceramics analysis (typically caps)
Authentication Testing

Electrical testing
• Broad range of tests depending on component
type and level of risk
• DC testing (VOM, curve tracer) for discretes
• ICs/actives require specialized test equipment
and programming
• Basic functional test vs full specification range
Authentication Testing

Chemical Decapsulation
• Exposes surface of Silicon chip
• Used on epoxy packages
• Acid etching most common
Authentication Testing

Mechanical Delidding
• Metal or ceramic packages
• Diamond saw or Dremel
• Lid pry-off
Some Concerns

Increased direct and indirect costs
• Maintain process documentation/certifications
• Staffing/training
• Cost and time required for testing

Authentication testing issues
• Availability of historical data – date codes, etc.
• New remarking methods


New Blacktop material resistant to test solvents
Use of micro-sandblasting to remove original
markings – now under study by G19 SG
• Functional test challenges


Test equipment/fixtures availability and support
Availability of programming expertise
Some Concerns

Legal
• Clear agreed definitions for “counterfeit,”
“fraudulent,” “suspect,” etc.
• Clarify mandatory reporting requirements



By whom and to whom?
When required? – includes “suspect” parts?
Protection of customer/supplier confidentiality
• Define liabilities



Parts falsely identified as non-conforming (alpha risk)
Failure to identify counterfeits (beta risk)
Responsibilities for consequences of incorporation of
counterfeits into equipment
• Evaluate/maintain/demonstrate “Due Diligence”
Conclusions


Counterfeits constitute a serious and
growing threat for users of electronics
Government and industry mitigation
efforts are ongoing
• Procedural, communication, training, etc.
• Technical solutions

Users and distributors must assess their
risk and establish a comprehensive plan
•
•
•
•
Challenge to balance risks vs. costs
Counterfeit threats always evolving
Authentication testing for suspect components
Maintain awareness of legal requirements
Conclusions
“There is a flood of counterfeit microchips into the
military, including in critical weapons systems…
The counterfeiters are utterly ruthless, nimble,
and getting increasingly better at their copies.”
-
Dr. James A. Hayward, Applied DNA Sciences
“No one practice or combination of practices will
prevent counterfeit components from entering the
supply chain, but every element of the supply
chain must work together to solve the problem.”
-
Dan DiMase, G19 Committee Chairman
Some References





Defense Industrial Base Assessment:Counterfeit Electronics, report
available at www.bis.doc.gov
Best Practices in the Fight Against Global Counterfeiting,
report available at www.ansi.org
US Senate Passes Anti-Counterfeit Electronics Bill,
article available at www.circuitsassembly.com
China Counterfeit Parts in U.S. Military Boeing, L3 Aircraft,
article available at www.businessweek.com
Counterfeit Parts Control Plan Implementation,
presentation by Dan DiMase, available at
http://supplychain.gsfc.nasa.gov/SC2010%20-%20D.%20Dimase-rev.pdf




www.anticounterfeitingforum.org.uk, list of UK-based resources
ERAI, IDEA, GIDEP websites
LinkedIn anti-counterfeiting groups
Missile Defense Agency Will Fight Parts Defects, article available at
www.bloomberg.com/news/2011-12-29/u-s-missile-defense-agency-tocrack-down-on-poor-quality.html
Thank You!
Questions…?
Stephen Schoppe
[email protected]
Glenn Robertson
[email protected]