ENFORCEMENT
eop_ipec_jointstrategicplan_hi-res
eop_ipec_jointstrategicplan_hi-res
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Office of the Intellectual Property Enforcement Coordinator<br />
users; or that the technology may prove difficult to scale<br />
and implement on a product-by-product basis. 19 For<br />
example, although a fake hologram may not fool the<br />
brand owner (or a well-trained law enforcement official),<br />
most untrained enforcement officials, supply chain<br />
intermediaries, retailers, and consumers are unlikely<br />
to be able to differentiate an authentic hologram from<br />
an imitation hologram any more than they may be<br />
able to readily distinguish a legitimate product from a<br />
sophisticated fake copy.<br />
A number of promising technology-based anticounterfeiting<br />
tools are emerging with expanded<br />
capacities and lower costs. For example, through<br />
funding by the National Science Foundation, the<br />
National Institutes of Health, the U.S. Army Research<br />
Office, and the U.S. Air Force, research is being<br />
conducted on the creation and use of micro-particles<br />
(FIG. 51), which are about 200 microns long and thus<br />
invisible to the naked eye, that may serve as unique<br />
product tags or micro-barcodes detectable by handheld<br />
a device, such as a smartphone. 20<br />
seeks to eliminate counterfeit ICs from the electronics<br />
supply chain by making counterfeiting too complex and<br />
time-consuming to be cost effective.<br />
The SHIELD program seeks to develop microscopic<br />
components that could be added into the packaging of<br />
an integrated circuit during manufacturing or in another<br />
trusted setting and later scanned from a handheld<br />
device such as a smartphone (or larger device for large<br />
shipments). These components, known as “dielets” (FIG.<br />
52), would send an encrypted message with information<br />
from embedded sensors to prove their authenticity<br />
and provide confirmation as to whether they have<br />
been subject to any tampering. Once these and other<br />
promising developments are realized, then an untrained<br />
operator at any place along the supply chain will be<br />
able to confirm the authenticity of any component in<br />
the military supply chain and commercial sector alike,<br />
receiving high-confidence results immediately, on site,<br />
securely, and at nominal cost. This is one example of<br />
emerging technologies that must serve as part of the<br />
solution to address illicit activity in the global era.<br />
FIG. 51: Glowing Stripes—Example of Micro-Barcodes Applied<br />
to Drug Packaging.<br />
FIG. 52: DARPA Concept—A high-frequency (HF) RFID silicon<br />
chip (“dielet”).<br />
Size on Display: At a size of 100x100 microns, the “dielet”<br />
fits on tip of Lincoln’s nose on a penny (L), and easily passes<br />
through the eye of a needle (R).<br />
A smartphone, equipped with a magnifying lens and<br />
infrared light source, acquires an image of the micro-barcodes<br />
embedded onto a pharmaceutical blister pack.<br />
Source: Lincoln Laboratory, MIT<br />
Similarly, the Defense Advanced Research Projects<br />
Agency (DARPA) is seeking modern, technologicalbased<br />
solutions to address the grave risks that<br />
counterfeit integrated circuits (ICs) pose to the security<br />
and integrity of electronic systems in the military supply<br />
chain. 21 DARPA’s Supply Chain Hardware Integrity for<br />
Electronics Defense (SHIELD) program, for example,<br />
When work on the project is completed in 2019, DARPA<br />
expects that the chip will be used to verify the authenticity<br />
of small electronics, including integrated circuits, used by<br />
both the defense and commercial industries.<br />
Industry’s partnership with law enforcement<br />
to develop, adopt, and implement innovative<br />
authentication technology is critical to frontline<br />
personnel’s ability to spot illicit goods amid the free<br />
flow of legitimate commerce. These technological<br />
breakthroughs not only have the potential to aid<br />
in interdiction efforts, but may also reduce overall<br />
SECTION 3<br />
103