High Performance Microchip Supply - Under Secretary of Defense ...
High Performance Microchip Supply - Under Secretary of Defense ...
High Performance Microchip Supply - Under Secretary of Defense ...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
FINDINGS ___________________________________________________________________<br />
applications (confidentiality, integrity, or availability). Today,<br />
<strong>of</strong>fshore engineers design, develop, test, fabricate, remotely maintain,<br />
integrate, and upgrade some U.S. defense hardware and s<strong>of</strong>tware.<br />
Regrettably, the United States currently has no effective strategy to<br />
weigh the obvious cost and time advantages <strong>of</strong> outsourcing <strong>of</strong>fshore<br />
against the potential <strong>of</strong> component subversion. 33<br />
If real and potential adversaries’ ability to subvert U.S.<br />
microelectronics components is not reversed or technically mitigated,<br />
our adversaries will gain enormous asymmetric advantages that<br />
could possibly put U.S. force projection at risk. In the end, the U.S.<br />
strategy must be one <strong>of</strong> risk management, not risk avoidance. Even if<br />
risk avoidance were possible, it would be prohibited by cost. Factors<br />
affecting the risk management calculation are numerous,<br />
complicated, and interdependent. They include<br />
Ability <strong>of</strong> an adversary to gain life-cycle access and<br />
keep such access secret<br />
Given access, an adversary’s capability to alter a<br />
component such that the alteration is difficult to<br />
detect and to attribute<br />
The adversary’s willingness to exploit such an<br />
opportunity<br />
The benefit to the adversary<br />
The impact <strong>of</strong> a compromise on the United States<br />
Capability <strong>of</strong> the United States to detect a<br />
modification<br />
Capability <strong>of</strong> the United States to attribute the<br />
modification<br />
Consequence to the adversary if the modification is<br />
detected and attributed to them<br />
33. Some <strong>of</strong> these activities may be contrary to long-standing International Traffic in Arms<br />
Regulations (ITAR) export controls. While the U.S. has an extensive set <strong>of</strong> laws and<br />
regulations governing export <strong>of</strong> critical technologies, comprehension <strong>of</strong> their<br />
importance and application is not widespread.<br />
50 _________________________________________________________ DSB TASK FORCE ON