16.08.2013 Views

High Performance Microchip Supply - Under Secretary of Defense ...

High Performance Microchip Supply - Under Secretary of Defense ...

High Performance Microchip Supply - Under Secretary of Defense ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

FINDINGS ___________________________________________________________________<br />

applications (confidentiality, integrity, or availability). Today,<br />

<strong>of</strong>fshore engineers design, develop, test, fabricate, remotely maintain,<br />

integrate, and upgrade some U.S. defense hardware and s<strong>of</strong>tware.<br />

Regrettably, the United States currently has no effective strategy to<br />

weigh the obvious cost and time advantages <strong>of</strong> outsourcing <strong>of</strong>fshore<br />

against the potential <strong>of</strong> component subversion. 33<br />

If real and potential adversaries’ ability to subvert U.S.<br />

microelectronics components is not reversed or technically mitigated,<br />

our adversaries will gain enormous asymmetric advantages that<br />

could possibly put U.S. force projection at risk. In the end, the U.S.<br />

strategy must be one <strong>of</strong> risk management, not risk avoidance. Even if<br />

risk avoidance were possible, it would be prohibited by cost. Factors<br />

affecting the risk management calculation are numerous,<br />

complicated, and interdependent. They include<br />

Ability <strong>of</strong> an adversary to gain life-cycle access and<br />

keep such access secret<br />

Given access, an adversary’s capability to alter a<br />

component such that the alteration is difficult to<br />

detect and to attribute<br />

The adversary’s willingness to exploit such an<br />

opportunity<br />

The benefit to the adversary<br />

The impact <strong>of</strong> a compromise on the United States<br />

Capability <strong>of</strong> the United States to detect a<br />

modification<br />

Capability <strong>of</strong> the United States to attribute the<br />

modification<br />

Consequence to the adversary if the modification is<br />

detected and attributed to them<br />

33. Some <strong>of</strong> these activities may be contrary to long-standing International Traffic in Arms<br />

Regulations (ITAR) export controls. While the U.S. has an extensive set <strong>of</strong> laws and<br />

regulations governing export <strong>of</strong> critical technologies, comprehension <strong>of</strong> their<br />

importance and application is not widespread.<br />

50 _________________________________________________________ DSB TASK FORCE ON

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!