High Performance Microchip Supply - Under Secretary of Defense ...
High Performance Microchip Supply - Under Secretary of Defense ...
High Performance Microchip Supply - Under Secretary of Defense ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
INTRODUCTION _______________________________________________________________<br />
equipment and process know-how. Sophisticated process knowledge<br />
is now provided by equipment suppliers as part <strong>of</strong> equipment<br />
purchases. Scientists and engineers trained in U.S. graduate schools<br />
are free to move to other nations. In some cases, students may no<br />
longer seek education in the United States; for example, the number<br />
<strong>of</strong> engineering graduates in China is far outpacing U.S. totals so that<br />
students no longer have to come to the U.S. to attend school. The<br />
primary beneficiary countries <strong>of</strong> the foundry trend have been in the<br />
Far East (Taiwan, Singapore, People’s Republic <strong>of</strong> China, Korea, and<br />
Japan), some <strong>of</strong> whose future interests may not align with those <strong>of</strong><br />
the United States. Taiwan dominates global foundry production with<br />
about two-thirds <strong>of</strong> current capacity; China, a relatively new entrant<br />
with 8 percent <strong>of</strong> global capacity, is rapidly increasing its market<br />
share.<br />
Similar trends are evident in the mask-making and materials<br />
businesses that support integrated circuit fabrication. These ancillary<br />
industries, like that <strong>of</strong> integrated circuit fabrication, play critical roles<br />
in the integrity <strong>of</strong> the military microelectronic components supply.<br />
THE THREAT<br />
The changes underway in the integrated circuit supply structure<br />
are directly contrary to the best interests <strong>of</strong> the Department <strong>of</strong><br />
<strong>Defense</strong> with regard to non-COTS ICs. The shift from United States<br />
to foreign IC manufacture endangers the security <strong>of</strong> classified<br />
information embedded in chip designs; additionally, it opens the<br />
possibility that “Trojan horses” and other unauthorized design<br />
inclusions may appear in unclassified integrated circuits used in<br />
military applications. These surreptitious inclusions are similar to<br />
viruses, Trojan Horses, and worms 13 common in today’s public<br />
13. A Trojan horse is a program that disguises itself as another program. Similar to viruses,<br />
these programs are hidden and usually cause an unwanted effect, such as installing a<br />
back door in your system that can be used by hackers. Worms spread without any user<br />
interaction, typically by exploiting a flaw in popular s<strong>of</strong>tware. Once activated, they<br />
generally use the Internet or your LAN (local network) to self-propagate and <strong>of</strong>ten take<br />
advantage <strong>of</strong> vulnerabilities in email programs.<br />
22 _________________________________________________________ DSB TASK FORCE ON