PROACTIVE DEFENSE FOR EVOLVING SUPPLY CHAIN COUNTERFEITING
AIR COMMAND AND STAFF COLLEGE, AIR UNIVERSITY MAXWELL AFB United States
Pagination or Media Count:
The past decade has seen an increase in the development of proactive cyber defense methods that focus on anticipated future attack strategies and are integrated into the cyber defense designs. The historic co-evolution of the attacker counterfeiter and defender USAF provide a conceptual understanding on how policy has failed to adequately reduce the security risks that counterfeit electronic parts present to advanced weapon systems. The first part of this study provides the background and history of counterfeit electronics within the Unites States Department of Defense DOD. The second part of the study provides the current political, economic, social, technological and military analyses on electronic counterfeiting threats, risks and mitigation strategies associated with this phenomenon. The research concludes with a discussion on why the following four recommendations are needed to effectively mitigate the threat and associated risks 1 Increase funding to ensure anti-counterfeiting practices are built into weapon system designs and manufacturing 2 Support the reclassification and treatment of counterfeit electronics as a cyber-security insider threat 3 Increase threat awareness for leaders to effectively implement deterrence policy and strategies 4 Develop a proactive anti-counterfeiting framework that leverages predictive analytics modeling and computational criminology.
- Electrical and Electronic Equipment
- Logistics, Military Facilities and Supplies