12.12.2016 Views

ENFORCEMENT

eop_ipec_jointstrategicplan_hi-res

eop_ipec_jointstrategicplan_hi-res

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Office of the Intellectual Property Enforcement Coordinator<br />

users; or that the technology may prove difficult to scale<br />

and implement on a product-by-product basis. 19 For<br />

example, although a fake hologram may not fool the<br />

brand owner (or a well-trained law enforcement official),<br />

most untrained enforcement officials, supply chain<br />

intermediaries, retailers, and consumers are unlikely<br />

to be able to differentiate an authentic hologram from<br />

an imitation hologram any more than they may be<br />

able to readily distinguish a legitimate product from a<br />

sophisticated fake copy.<br />

A number of promising technology-based anticounterfeiting<br />

tools are emerging with expanded<br />

capacities and lower costs. For example, through<br />

funding by the National Science Foundation, the<br />

National Institutes of Health, the U.S. Army Research<br />

Office, and the U.S. Air Force, research is being<br />

conducted on the creation and use of micro-particles<br />

(FIG. 51), which are about 200 microns long and thus<br />

invisible to the naked eye, that may serve as unique<br />

product tags or micro-barcodes detectable by handheld<br />

a device, such as a smartphone. 20<br />

seeks to eliminate counterfeit ICs from the electronics<br />

supply chain by making counterfeiting too complex and<br />

time-consuming to be cost effective.<br />

The SHIELD program seeks to develop microscopic<br />

components that could be added into the packaging of<br />

an integrated circuit during manufacturing or in another<br />

trusted setting and later scanned from a handheld<br />

device such as a smartphone (or larger device for large<br />

shipments). These components, known as “dielets” (FIG.<br />

52), would send an encrypted message with information<br />

from embedded sensors to prove their authenticity<br />

and provide confirmation as to whether they have<br />

been subject to any tampering. Once these and other<br />

promising developments are realized, then an untrained<br />

operator at any place along the supply chain will be<br />

able to confirm the authenticity of any component in<br />

the military supply chain and commercial sector alike,<br />

receiving high-confidence results immediately, on site,<br />

securely, and at nominal cost. This is one example of<br />

emerging technologies that must serve as part of the<br />

solution to address illicit activity in the global era.<br />

FIG. 51: Glowing Stripes—Example of Micro-Barcodes Applied<br />

to Drug Packaging.<br />

FIG. 52: DARPA Concept—A high-frequency (HF) RFID silicon<br />

chip (“dielet”).<br />

Size on Display: At a size of 100x100 microns, the “dielet”<br />

fits on tip of Lincoln’s nose on a penny (L), and easily passes<br />

through the eye of a needle (R).<br />

A smartphone, equipped with a magnifying lens and<br />

infrared light source, acquires an image of the micro-barcodes<br />

embedded onto a pharmaceutical blister pack.<br />

Source: Lincoln Laboratory, MIT<br />

Similarly, the Defense Advanced Research Projects<br />

Agency (DARPA) is seeking modern, technologicalbased<br />

solutions to address the grave risks that<br />

counterfeit integrated circuits (ICs) pose to the security<br />

and integrity of electronic systems in the military supply<br />

chain. 21 DARPA’s Supply Chain Hardware Integrity for<br />

Electronics Defense (SHIELD) program, for example,<br />

When work on the project is completed in 2019, DARPA<br />

expects that the chip will be used to verify the authenticity<br />

of small electronics, including integrated circuits, used by<br />

both the defense and commercial industries.<br />

Industry’s partnership with law enforcement<br />

to develop, adopt, and implement innovative<br />

authentication technology is critical to frontline<br />

personnel’s ability to spot illicit goods amid the free<br />

flow of legitimate commerce. These technological<br />

breakthroughs not only have the potential to aid<br />

in interdiction efforts, but may also reduce overall<br />

SECTION 3<br />

103

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!