PROACTIVE DEFENSE FOR EVOLVING SUPPLY CHAIN COUNTERFEITING

reportActive / Technical Report | Accession Number: AD1040754 | Open PDF

Abstract:

The past decade has seen an increase in the development of proactive cyber defense methods that focus on anticipated future attack strategies and are integrated into the cyber defense designs. The historic co-evolution of the attacker counterfeiter and defender USAF provide a conceptual understanding on how policy has failed to adequately reduce the security risks that counterfeit electronic parts present to advanced weapon systems. The first part of this study provides the background and history of counterfeit electronics within the Unites States Department of Defense DOD. The second part of the study provides the current political, economic, social, technological and military analyses on electronic counterfeiting threats, risks and mitigation strategies associated with this phenomenon. The research concludes with a discussion on why the following four recommendations are needed to effectively mitigate the threat and associated risks 1 Increase funding to ensure anti-counterfeiting practices are built into weapon system designs and manufacturing 2 Support the reclassification and treatment of counterfeit electronics as a cyber-security insider threat 3 Increase threat awareness for leaders to effectively implement deterrence policy and strategies 4 Develop a proactive anti-counterfeiting framework that leverages predictive analytics modeling and computational criminology.

Security Markings

DOCUMENT & CONTEXTUAL SUMMARY

Distribution:
Approved For Public Release
Distribution Statement:
Approved For Public Release;

RECORD

Collection: TR
Identifying Numbers
Subject Terms