12.12.2016 Views

ENFORCEMENT

eop_ipec_jointstrategicplan_hi-res

eop_ipec_jointstrategicplan_hi-res

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Office of the Intellectual Property Enforcement Coordinator<br />

users; or that the technology may prove difficult to scale<br />

and implement on a product-by-product basis. 19 For<br />

example, although a fake hologram may not fool the<br />

brand owner (or a well-trained law enforcement official),<br />

most untrained enforcement officials, supply chain<br />

intermediaries, retailers, and consumers are unlikely<br />

to be able to differentiate an authentic hologram from<br />

an imitation hologram any more than they may be<br />

able to readily distinguish a legitimate product from a<br />

sophisticated fake copy.<br />

A number of promising technology-based anticounterfeiting<br />

tools are emerging with expanded<br />

capacities and lower costs. For example, through<br />

funding by the National Science Foundation, the<br />

National Institutes of Health, the U.S. Army Research<br />

Office, and the U.S. Air Force, research is being<br />

conducted on the creation and use of micro-particles<br />

(FIG. 51), which are about 200 microns long and thus<br />

invisible to the naked eye, that may serve as unique<br />

product tags or micro-barcodes detectable by handheld<br />

a device, such as a smartphone. 20<br />

seeks to eliminate counterfeit ICs from the electronics<br />

supply chain by making counterfeiting too complex and<br />

time-consuming to be cost effective.<br />

The SHIELD program seeks to develop microscopic<br />

components that could be added into the packaging of<br />

an integrated circuit during manufacturing or in another<br />

trusted setting and later scanned from a handheld<br />

device such as a smartphone (or larger device for large<br />

shipments). These components, known as “dielets” (FIG.<br />

52), would send an encrypted message with information<br />

from embedded sensors to prove their authenticity<br />

and provide confirmation as to whether they have<br />

been subject to any tampering. Once these and other<br />

promising developments are realized, then an untrained<br />

operator at any place along the supply chain will be<br />

able to confirm the authenticity of any component in<br />

the military supply chain and commercial sector alike,<br />

receiving high-confidence results immediately, on site,<br />

securely, and at nominal cost. This is one example of<br />

emerging technologies that must serve as part of the<br />

solution to address illicit activity in the global era.<br />

FIG. 51: Glowing Stripes—Example of Micro-Barcodes Applied<br />

to Drug Packaging.<br />

FIG. 52: DARPA Concept—A high-frequency (HF) RFID silicon<br />

chip (“dielet”).<br />

Size on Display: At a size of 100x100 microns, the “dielet”<br />

fits on tip of Lincoln’s nose on a penny (L), and easily passes<br />

through the eye of a needle (R).<br />

A smartphone, equipped with a magnifying lens and<br />

infrared light source, acquires an image of the micro-barcodes<br />

embedded onto a pharmaceutical blister pack.<br />

Source: Lincoln Laboratory, MIT<br />

Similarly, the Defense Advanced Research Projects<br />

Agency (DARPA) is seeking modern, technologicalbased<br />

solutions to address the grave risks that<br />

counterfeit integrated circuits (ICs) pose to the security<br />

and integrity of electronic systems in the military supply<br />

chain. 21 DARPA’s Supply Chain Hardware Integrity for<br />

Electronics Defense (SHIELD) program, for example,<br />

When work on the project is completed in 2019, DARPA<br />

expects that the chip will be used to verify the authenticity<br />

of small electronics, including integrated circuits, used by<br />

both the defense and commercial industries.<br />

Industry’s partnership with law enforcement<br />

to develop, adopt, and implement innovative<br />

authentication technology is critical to frontline<br />

personnel’s ability to spot illicit goods amid the free<br />

flow of legitimate commerce. These technological<br />

breakthroughs not only have the potential to aid<br />

in interdiction efforts, but may also reduce overall<br />

SECTION 3<br />

103

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!