SlideShare a Scribd company logo
1 of 8
Download to read offline
- 1 -
Counterfeiting and
Semiconductor Value
Chain Economics
Supply Chain Risk Insight
into Market Sense and
Respond Actions of
Counterfeiters
Rory King
Global Director, Supply Chain, IHS Inc.
321 Inverness Drive South
Englewood, Colorado, 80112
Abstract
Counterfeit parts have proliferated dramatically in recent years, presenting
huge challenges for electronics manufacturing and specifically military and
aerospace application. This session will offer unique new market trends,
observations, and best practices on the issue of economics, semiconductor
value chains, obsolescence, counterfeit electronics, and market impacts such as
fact-based insight into market indicators like correlation among counterfeits,
semiconductor factory utilization, component obsolescence, semiconductor
availability, price volatility, and supply-and-demand equilibrium.
- 2 -
1. Introduction
While counterfeiting is a decades old issue, growing safety and securing concerns as well as
scrutiny over supply chain and procurement practices around counterfeit or suspect counterfeit
electronics become widely known as a result of the November 8, 2011 hearing of the U.S.
Senate Armed Services Committee on Counterfeit Electronic Parts in the Department of
Defense Supply Chain. Subsequent to the hearing, the National Defense Authorization Act
(NDAA) of 2012 included Section 818, Counterfeit Detection & Avoidance. Generally
speaking, some key supply chain implications considered at all tiers of the global defense supply
chain included:
 Contractor responsibility for detecting and avoiding the use or inclusion of counterfeit
electronic parts or suspect counterfeit parts
 Contractor responsibility for any rework or corrective action that may be required to
remedy the use or inclusion of such parts
 Defense contracts no longer allowing the cost of counterfeit electronic parts and suspect
counterfeit electronic parts or the cost associated with rework or corrective action to
resolve the use or inclusion of such parts
 Qualification procedures and processes must be established to use trusted suppliers and
procure electronics from authorized suppliers
Cost is a major concern for the defense industry. As publicized at the U.S. Senate Armed
Services Committee (SASC) hearings in 2012, a single counterfeit incident – like that of the
THAAD missile system – can cost in excess of $2 million dollars. According to the Missile
Defense Agency, if the devices had failed, the THAAD missile itself would likely have failed.
“The cost of that fix was nearly $2.7 million,” stated Senator Carl Levin (D-MI).i
Human safety and national security also come to the forefront when the potential impact of
counterfeiting is assessed. Counterfeits not only pose an increasing risk to the safety of men and
women in uniform, but they also endanger civilians in other parts applications subject to
counterfeiting such as medical devices, consumer products, or perhaps automobiles.
Counterfeiting is a challenge to companies of all sizes and across all industries – from the small
domestic manufacturer to the global organization, and all entities in between. This paper
discusses supply chain risk and an apparent relationship between counterfeit supplier behaviours
to rapidly sense and respond to semiconductor market economic conditions, as measured
through counterfeit incident reports and component production, inventory, and obsolescence
insight -- over time.
2. Sophistication of Counterfeiters
As Vivek Kamath, Vice President for Supply Chain Operations for Raytheon Company stated,
“What keeps us up at night is the dynamic nature of this threat because by the time we’ve
figured out how to test for these counterfeits, they’ve figured out how to get around it. And it’s
literally on almost a daily basis they change and the sophistication of the counterfeiting is
amazing to us.”ii
To illustrate the apparent sophistication of counterfeiters to sense and respond to market
conditions, consider the Lehman Brothers bankruptcy filing in the United States and resultant
downturn of the global economy. As the largest bankruptcy filing in U.S. history, the incident –
which took place on September 15, 2008 – correlates with a pronounced decline in
- 3 -
semiconductor factory production. In Figure 1 you can see that semiconductor factory utilization
remained fairly steady until the economic collapse triggered by Lehman Brothers filing Chapter
11 bankruptcy, after which there was an immediate precipitous drop in semiconductor factory
utilization. This is the reaction of semiconductor producers to demand side weakness.
Figure 1 – Total Semiconductor Factory Utilization
Original Component Manufacturers (OCMs) responded to the event by trying to maintain
profitability in the face of big slashes in demand and cancellations of orders. They also started
issuing end of life (EOL) notices to discontinue their products. IHS tracks these notices and, as
you can see in Figure 2, the number of EOLs skyrocketed just after the filing by Lehman
Brothers, which at the time was holding over $600 billion in assets. This pronounced spike
illustrates how component manufacturers ultimately discontinued their products in an effort to
work smarter and leaner in the midst of a tumultuous business environment.
Figure 2—Manufacturer Product EOL vs. Total Semiconductor Factory Utilization
- 4 -
So how did counterfeiters respond to the bankruptcy filing and subsequent increase
in EOLs? As illustrated in Figure 3, counterfeiters responded to the event as an
opportunity supply counterfeit product to buyers, many of whom may not have been
aware of authentic product being discontinued by the OCMs.
Figure 3—Manufacturer Product EOL vs. Counterfeit Incidents
Now, much discussion over counterfeit parts is around obsolete components, but in
reality the problem runs much deeper. As reported by IHS, a total of 57 percent of
counterfeit-part reports from 2001 through 2012 have involved obsolete or end-of-
life (EOL) components, as presented in the figure below. Another 37 percent were
active parts.iii
If you look at Figure 4 you’ll see overall inventory trends (in the shaded areas of the
chart) and a line showing counterfeit products trending along with ebbs and flows in
inventory. This represents inventory of active, commercial electronic components.
Keep these points in mind as we move on to Figure 5.
Figure 4—Total Semiconductor Industry Inventory vs. Counterfeit Incidents
- 5 -
In Figure 5, you will notice that semiconductor factory utilization is the top line, but
instead of EOLs what you now see are the counterfeit trends. The interesting
correlation is how these trends fluctuate right along with the ups and downs of
semiconductor factory utilization. As utilization ebbs and flows, the counterfeiting
activity reacts similarly.
In other words, the counterfeiters are sensing market demand and supply factors
much like the original manufacturers of components. Counterfeit suppliers
introduce a greater number of counterfeit products to market (as measured by
counterfeit incident reports) in concert with legitimate producers responding to an
uptick or forecast of semiconductor demand. As the market picks up, the counterfeit
incidents increase.
Figure 5—Total Semiconductor Utilization vs. Counterfeit Incidents Reported
3. Top Counterfeit Parts Classes
Counterfeiters are more prolific than ever in a handful of parts classes. Entering
2012, the top five commodities subject to counterfeiting according to IHS were:iv
 Transistors – 7.6%
 Programmable Logics Integrated Circuits – 8.3%
 Memory Integrated Circuits – 13.1%
 Microprocessor Integrated Circuits – 13.4%
 Analog Integrated Circuits – 25.2%
In Figure 6, using IHS iSuppli Application Market Forecast Tool (AMFT), one can
plot the counterfeit incidents by component classes against the semiconductor
application markets where those components are consumed. The top five
- 6 -
component families are listed on the left side of the chart while the relative
percentage distribution of where those products are used is reflected on the graphic’s
horizontal axis. For example, 14% of analog integrated circuits products are in the
industrial market; 17% in automotive; 21% in consumer; 29% in wireless; 6% in
wired; and 14% in compute. (It’s important to note that medical device, military and
civil aerospace components fall under the industrial market segment or the 14% of
the analog integrated circuits products.)
Cumulatively, analog integrated circuits are the biggest target for counterfeiters and
represent a roughly $47.7 billion semiconductor application market. It is possible to
imagine the potential risk and cost implications of issues associated with damages
resulting from those counterfeit parts. While a great deal of attention is placed on
defense supply chains, the issue plainly doesn’t just threaten the men and women in
armed services or national security, but it poses potential risk and disruption to
businesses and consumers who rely on products throughout these application
markets.
The potential challenges are apparent for other application markets. The consumer
electronics segment in 2011 consumed $9.8 billion worth of analog integrated
circuits, or 21 percent of the global market. Automotive electronics amounted to $8
billion, or 17 percent; computing represented $6.7 billion, or 14 percent; industrial
electronics was at $6.5 billion, or 14 percent; and wired communications was $2.9
billion, or 6 percent.
Figure 6—Percent Distribution of Total Market Revenue by Application Market for
Most Commonly Counterfeited Product Types in 2011
4. High-Risk Suppliers
Even in the face of increasing government regulation and scrutiny, the number of high-risk
suppliers abounds. These firms engage in high-risk, fraudulent, and suspect counterfeit product
or conduct, as identified by the U.S. government. There are literally tens of thousands of these
- 7 -
high-risk providers, and their numbers are growing daily. They push the issue of counterfeiting
well beyond just the production of fake parts. As you can see in Figure 7, we’re talking about
thousands of organizations emerging on an annual basis, and not just in an aggregated,
collective fashion either. The environment literally changes daily and impacts every link in the
supply chain.
Figure 7—High Risk Suppliers from 2002-2011
5. The Monetary Impacts of Counterfeiting
Concerns over the impact of counterfeits are well known throughout industry. One general
example draws from an IHS and Supply & Demand Chain Executive survey of 1,001
practitioners, executives, academics, vendors and other industry professionals. Summarized key
findings on the impact of counterfeits experienced or believed by these survey respondents
include those shown in Figure 8. As was apparent, counterfeits cause a wide range of potential
issues from serious financial and brand consequences to daily operational cost, service, and
safety disruption.
Figure 8—Significant Costs of Counterfeit Riskv
- 8 -
6. Conclusions
Counterfeiting concerns and impacts continue to be widely discussed, documented,
and shared throughout industry on a worldwide basis. Through unique information
and insight now available to plot real counterfeit incidents reported by industry
against semiconductor factory utilization, inventory, product lifecycle, and
application market forecasts one can begin to see the degree to which counterfeit
behaviours appear to correlate with semiconductor industry responses to
marketplace economics.
When this insight is analyzed, it seems apparent that counterfeiters sense and
respond to marketplace dynamics in a sophisticated manner, by taking such action as
supplying counterfeit product to market in concert with semiconductor factories
increasing capacity to do satisfy demand. While these correlations seem apparent,
other interesting questions that cannot be proved emerge as well – for instance,
could these factories (or their equipment or entire replicas thereof) be the sources of
illegitimate product entering the counterfeit supply chain?
In conclusion, some key points can be considered as organisation assess risk
vulnerabilities and implement counterfeit detection and avoidance measures:
 Counterfeiters are not simple individuals with rudimentary
capabilities; they are sophisticated operators and they are in tune
with the market.
 Counterfeiting is not exclusively a military and defense parts
issue, but rather counterfeit parts impact all commercial &
military markets.
 Counterfeiting is not restricted to old, obsolete components, but
rather counterfeiting impacts active components (in fact, nearly
half are active parts).
 Counterfeit detection and avoidance is not just a “cost burden,”
but counterfeit risk mitigation creates significant cost avoidance.
 Counterfeit mitigation is not just about “the parts,” but
counterfeit mitigation requires knowledge of high-risk suppliers.
i HEARING TO RECEIVE TESTIMONY ON THE COMMITTEE’S
INVESTIGATION INTO COUNTERFEIT ELECTRONIC PARTS IN THE
DEPARTMENT OF DEFENSE SUPPLY CHAIN, Tuesday, November 8, 2011, U.S.
SENATE COMMITTEE ON ARMED SERVICES, Washington, DC
ii HEARING TO RECEIVE TESTIMONY ON THE COMMITTEE’S
INVESTIGATION INTO COUNTERFEIT ELECTRONIC PARTS IN THE
DEPARTMENT OF DEFENSE SUPPLY CHAIN, Tuesday, November 8, 2011, U.S.
SENATE COMMITTEE ON ARMED SERVICES, Washington, DC
iii Rory King and Mark Snider, IHS Inc. with ERAI Inc., 2012
iv Rory King and Mark Snider, IHS Inc. with ERAI Inc., 2012
v Supply & Demand Chain Executive and IHS Inc., Benchmarking Counterfeits and
Inferior Grade Components, 2009

More Related Content

Viewers also liked

Hack the MOOC: alternative MOOC use
Hack the MOOC: alternative MOOC useHack the MOOC: alternative MOOC use
Hack the MOOC: alternative MOOC useInge de Waard
 
SEAT Mii - Mii time: Case Study
SEAT Mii - Mii time: Case StudySEAT Mii - Mii time: Case Study
SEAT Mii - Mii time: Case StudyNewsworks
 
Results of 2015 Summer GiveTogether
Results of 2015 Summer GiveTogetherResults of 2015 Summer GiveTogether
Results of 2015 Summer GiveTogetherErica Klinger
 
Open-source tools for querying and organizing large reaction databases
Open-source tools for querying and organizing large reaction databasesOpen-source tools for querying and organizing large reaction databases
Open-source tools for querying and organizing large reaction databasesGreg Landrum
 
GAMETIME Center, LLC. Exec.Summary
GAMETIME Center, LLC. Exec.SummaryGAMETIME Center, LLC. Exec.Summary
GAMETIME Center, LLC. Exec.SummaryRobert L Edwards
 
Unidad I Economia
Unidad I EconomiaUnidad I Economia
Unidad I Economiaeddith ruiz
 
Johnston Press' trasformation strategy
Johnston Press' trasformation strategyJohnston Press' trasformation strategy
Johnston Press' trasformation strategyiamrobertandrews
 
lafa.su презентация
lafa.su презентацияlafa.su презентация
lafa.su презентацияArtem Malyutin
 
حاتم اليوسف
حاتم اليوسفحاتم اليوسف
حاتم اليوسفhatem00
 
What Sphere Digital Recruitment Does
What Sphere Digital Recruitment DoesWhat Sphere Digital Recruitment Does
What Sphere Digital Recruitment DoesNiomi Cowling
 
LWV US VG Nov 2016 I Web final
LWV US VG Nov 2016 I Web finalLWV US VG Nov 2016 I Web final
LWV US VG Nov 2016 I Web finalSarah Robinson
 
Latin America
Latin AmericaLatin America
Latin AmericaMrO97
 
Wargaming.net: Secrets of YouTube
Wargaming.net: Secrets of YouTubeWargaming.net: Secrets of YouTube
Wargaming.net: Secrets of YouTubeDevGAMM Conference
 
Evaluation: Question 1- IN WHAT WAYS DOES YOUR MEDIA PRODUCT USE, DEVELOP OR ...
Evaluation: Question 1- IN WHAT WAYS DOES YOUR MEDIA PRODUCT USE, DEVELOP OR ...Evaluation: Question 1- IN WHAT WAYS DOES YOUR MEDIA PRODUCT USE, DEVELOP OR ...
Evaluation: Question 1- IN WHAT WAYS DOES YOUR MEDIA PRODUCT USE, DEVELOP OR ...ViPeRz16
 

Viewers also liked (17)

Hack the MOOC: alternative MOOC use
Hack the MOOC: alternative MOOC useHack the MOOC: alternative MOOC use
Hack the MOOC: alternative MOOC use
 
SEAT Mii - Mii time: Case Study
SEAT Mii - Mii time: Case StudySEAT Mii - Mii time: Case Study
SEAT Mii - Mii time: Case Study
 
Results of 2015 Summer GiveTogether
Results of 2015 Summer GiveTogetherResults of 2015 Summer GiveTogether
Results of 2015 Summer GiveTogether
 
Open-source tools for querying and organizing large reaction databases
Open-source tools for querying and organizing large reaction databasesOpen-source tools for querying and organizing large reaction databases
Open-source tools for querying and organizing large reaction databases
 
GAMETIME Center, LLC. Exec.Summary
GAMETIME Center, LLC. Exec.SummaryGAMETIME Center, LLC. Exec.Summary
GAMETIME Center, LLC. Exec.Summary
 
Trastorno de personalidad
Trastorno de personalidadTrastorno de personalidad
Trastorno de personalidad
 
Unidad I Economia
Unidad I EconomiaUnidad I Economia
Unidad I Economia
 
Johnston Press' trasformation strategy
Johnston Press' trasformation strategyJohnston Press' trasformation strategy
Johnston Press' trasformation strategy
 
Presentación1 mama
Presentación1 mamaPresentación1 mama
Presentación1 mama
 
lafa.su презентация
lafa.su презентацияlafa.su презентация
lafa.su презентация
 
Steve Jobs
Steve JobsSteve Jobs
Steve Jobs
 
حاتم اليوسف
حاتم اليوسفحاتم اليوسف
حاتم اليوسف
 
What Sphere Digital Recruitment Does
What Sphere Digital Recruitment DoesWhat Sphere Digital Recruitment Does
What Sphere Digital Recruitment Does
 
LWV US VG Nov 2016 I Web final
LWV US VG Nov 2016 I Web finalLWV US VG Nov 2016 I Web final
LWV US VG Nov 2016 I Web final
 
Latin America
Latin AmericaLatin America
Latin America
 
Wargaming.net: Secrets of YouTube
Wargaming.net: Secrets of YouTubeWargaming.net: Secrets of YouTube
Wargaming.net: Secrets of YouTube
 
Evaluation: Question 1- IN WHAT WAYS DOES YOUR MEDIA PRODUCT USE, DEVELOP OR ...
Evaluation: Question 1- IN WHAT WAYS DOES YOUR MEDIA PRODUCT USE, DEVELOP OR ...Evaluation: Question 1- IN WHAT WAYS DOES YOUR MEDIA PRODUCT USE, DEVELOP OR ...
Evaluation: Question 1- IN WHAT WAYS DOES YOUR MEDIA PRODUCT USE, DEVELOP OR ...
 

Similar to Counterfeiting and Semiconductor Value Chain Economics - COG 2013, Mr. Rory King

Counterfeit components and the risks involved
Counterfeit components and the risks involvedCounterfeit components and the risks involved
Counterfeit components and the risks involvedDorine Vidal
 
Beware! Counterfeit Components Put Safety and Security at Risk
Beware! Counterfeit Components Put Safety and Security at RiskBeware! Counterfeit Components Put Safety and Security at Risk
Beware! Counterfeit Components Put Safety and Security at RiskDaren Saroop
 
Counterfeit parts prevention kristal snider and kevin beard
Counterfeit parts prevention   kristal snider and kevin beardCounterfeit parts prevention   kristal snider and kevin beard
Counterfeit parts prevention kristal snider and kevin beardKristal Snider
 
15 livingson-updated-cqsdi-baesystems-counterfeit-components
15 livingson-updated-cqsdi-baesystems-counterfeit-components15 livingson-updated-cqsdi-baesystems-counterfeit-components
15 livingson-updated-cqsdi-baesystems-counterfeit-componentsozgurv
 
Mitigating the Risk of Counterfeit ICT in the DoD Supply Chain
Mitigating the Risk of Counterfeit ICT in the DoD Supply ChainMitigating the Risk of Counterfeit ICT in the DoD Supply Chain
Mitigating the Risk of Counterfeit ICT in the DoD Supply ChainKyrl Erickson
 
Anti-Counterfeit Whitepaper
Anti-Counterfeit WhitepaperAnti-Counterfeit Whitepaper
Anti-Counterfeit WhitepaperShantalla
 
ERAI -Counterfeit Awareness-Avoidance Training
ERAI -Counterfeit Awareness-Avoidance Training ERAI -Counterfeit Awareness-Avoidance Training
ERAI -Counterfeit Awareness-Avoidance Training Kristal Snider
 
Suspect Counterfeit, Non-Conforming and High Risk Electronic Components Trends
Suspect Counterfeit, Non-Conforming and High Risk Electronic Components TrendsSuspect Counterfeit, Non-Conforming and High Risk Electronic Components Trends
Suspect Counterfeit, Non-Conforming and High Risk Electronic Components TrendsKristal Snider
 
ELECTRONICS INDUSTRY STUDY REPORT - Semiconductors and Defense Electronics
ELECTRONICS INDUSTRY STUDY REPORT - Semiconductors and Defense ElectronicsELECTRONICS INDUSTRY STUDY REPORT - Semiconductors and Defense Electronics
ELECTRONICS INDUSTRY STUDY REPORT - Semiconductors and Defense ElectronicsSVCAVET
 
The Threat of Counterfeit Devices: Complicity vs Vigilance
The Threat of Counterfeit Devices: Complicity vs VigilanceThe Threat of Counterfeit Devices: Complicity vs Vigilance
The Threat of Counterfeit Devices: Complicity vs VigilanceWaqas Tariq
 
Aon Retail & Wholesale Inperspective Nov 2016
Aon Retail & Wholesale Inperspective Nov 2016Aon Retail & Wholesale Inperspective Nov 2016
Aon Retail & Wholesale Inperspective Nov 2016Graeme Cross
 
Global teleprotection market insights, forecast to 2025
Global teleprotection market insights, forecast to 2025Global teleprotection market insights, forecast to 2025
Global teleprotection market insights, forecast to 2025Bertha000
 
Cybersecurity A Community Approach - 20151109
Cybersecurity A Community Approach - 20151109Cybersecurity A Community Approach - 20151109
Cybersecurity A Community Approach - 20151109Frank Backes
 
Whitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_enWhitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_enBankir_Ru
 
electronics-manufacturing-services.pdf
electronics-manufacturing-services.pdfelectronics-manufacturing-services.pdf
electronics-manufacturing-services.pdfShrikant Borkar
 
discuss how the types of threats discussed in the article.docx
discuss how the types of threats discussed in the article.docxdiscuss how the types of threats discussed in the article.docx
discuss how the types of threats discussed in the article.docxbkbk37
 
Product tracking and tracing with Blockchain and Internet of Things
Product tracking and tracing with Blockchain and Internet of ThingsProduct tracking and tracing with Blockchain and Internet of Things
Product tracking and tracing with Blockchain and Internet of ThingsMurali Venkatesh
 

Similar to Counterfeiting and Semiconductor Value Chain Economics - COG 2013, Mr. Rory King (20)

Counterfeit threat-for-electronics-industry-on-rise-plug-it
Counterfeit threat-for-electronics-industry-on-rise-plug-itCounterfeit threat-for-electronics-industry-on-rise-plug-it
Counterfeit threat-for-electronics-industry-on-rise-plug-it
 
Counterfeit components and the risks involved
Counterfeit components and the risks involvedCounterfeit components and the risks involved
Counterfeit components and the risks involved
 
Beware! Counterfeit Components Put Safety and Security at Risk
Beware! Counterfeit Components Put Safety and Security at RiskBeware! Counterfeit Components Put Safety and Security at Risk
Beware! Counterfeit Components Put Safety and Security at Risk
 
Counterfeit parts prevention kristal snider and kevin beard
Counterfeit parts prevention   kristal snider and kevin beardCounterfeit parts prevention   kristal snider and kevin beard
Counterfeit parts prevention kristal snider and kevin beard
 
15 livingson-updated-cqsdi-baesystems-counterfeit-components
15 livingson-updated-cqsdi-baesystems-counterfeit-components15 livingson-updated-cqsdi-baesystems-counterfeit-components
15 livingson-updated-cqsdi-baesystems-counterfeit-components
 
Mitigating the Risk of Counterfeit ICT in the DoD Supply Chain
Mitigating the Risk of Counterfeit ICT in the DoD Supply ChainMitigating the Risk of Counterfeit ICT in the DoD Supply Chain
Mitigating the Risk of Counterfeit ICT in the DoD Supply Chain
 
Anti-Counterfeit Whitepaper
Anti-Counterfeit WhitepaperAnti-Counterfeit Whitepaper
Anti-Counterfeit Whitepaper
 
ERAI -Counterfeit Awareness-Avoidance Training
ERAI -Counterfeit Awareness-Avoidance Training ERAI -Counterfeit Awareness-Avoidance Training
ERAI -Counterfeit Awareness-Avoidance Training
 
Suspect Counterfeit, Non-Conforming and High Risk Electronic Components Trends
Suspect Counterfeit, Non-Conforming and High Risk Electronic Components TrendsSuspect Counterfeit, Non-Conforming and High Risk Electronic Components Trends
Suspect Counterfeit, Non-Conforming and High Risk Electronic Components Trends
 
ELECTRONICS INDUSTRY STUDY REPORT - Semiconductors and Defense Electronics
ELECTRONICS INDUSTRY STUDY REPORT - Semiconductors and Defense ElectronicsELECTRONICS INDUSTRY STUDY REPORT - Semiconductors and Defense Electronics
ELECTRONICS INDUSTRY STUDY REPORT - Semiconductors and Defense Electronics
 
The Threat of Counterfeit Devices: Complicity vs Vigilance
The Threat of Counterfeit Devices: Complicity vs VigilanceThe Threat of Counterfeit Devices: Complicity vs Vigilance
The Threat of Counterfeit Devices: Complicity vs Vigilance
 
Smart Grid and Consumers
Smart Grid and ConsumersSmart Grid and Consumers
Smart Grid and Consumers
 
Aon Retail & Wholesale Inperspective Nov 2016
Aon Retail & Wholesale Inperspective Nov 2016Aon Retail & Wholesale Inperspective Nov 2016
Aon Retail & Wholesale Inperspective Nov 2016
 
Global teleprotection market insights, forecast to 2025
Global teleprotection market insights, forecast to 2025Global teleprotection market insights, forecast to 2025
Global teleprotection market insights, forecast to 2025
 
Cybersecurity A Community Approach - 20151109
Cybersecurity A Community Approach - 20151109Cybersecurity A Community Approach - 20151109
Cybersecurity A Community Approach - 20151109
 
Whitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_enWhitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_en
 
electronics-manufacturing-services.pdf
electronics-manufacturing-services.pdfelectronics-manufacturing-services.pdf
electronics-manufacturing-services.pdf
 
discuss how the types of threats discussed in the article.docx
discuss how the types of threats discussed in the article.docxdiscuss how the types of threats discussed in the article.docx
discuss how the types of threats discussed in the article.docx
 
Get Prepared
Get PreparedGet Prepared
Get Prepared
 
Product tracking and tracing with Blockchain and Internet of Things
Product tracking and tracing with Blockchain and Internet of ThingsProduct tracking and tracing with Blockchain and Internet of Things
Product tracking and tracing with Blockchain and Internet of Things
 

More from IHS

Accelerate Procurement Performance
Accelerate Procurement PerformanceAccelerate Procurement Performance
Accelerate Procurement PerformanceIHS
 
IHS Material Price Outlook: A 2014 Buyer’s Guide
IHS Material Price Outlook: A 2014 Buyer’s GuideIHS Material Price Outlook: A 2014 Buyer’s Guide
IHS Material Price Outlook: A 2014 Buyer’s GuideIHS
 
Global Construction Outlook: Wage Growth, Labor Shortages and Implications
Global Construction Outlook: Wage Growth, Labor Shortages and Implications Global Construction Outlook: Wage Growth, Labor Shortages and Implications
Global Construction Outlook: Wage Growth, Labor Shortages and Implications IHS
 
Resilient Supply Chains: How to Dynamically Manage Risk, Opportunity, and Bus...
Resilient Supply Chains: How to Dynamically Manage Risk, Opportunity, and Bus...Resilient Supply Chains: How to Dynamically Manage Risk, Opportunity, and Bus...
Resilient Supply Chains: How to Dynamically Manage Risk, Opportunity, and Bus...IHS
 
Quantifying Sourcing Risk: Building Commodity Risk Ratings to Mitigate Geopol...
Quantifying Sourcing Risk: Building Commodity Risk Ratings to Mitigate Geopol...Quantifying Sourcing Risk: Building Commodity Risk Ratings to Mitigate Geopol...
Quantifying Sourcing Risk: Building Commodity Risk Ratings to Mitigate Geopol...IHS
 
Improve your Negotiating Position & Achieve Cost Savings with Supplier Cost I...
Improve your Negotiating Position & Achieve Cost Savings with Supplier Cost I...Improve your Negotiating Position & Achieve Cost Savings with Supplier Cost I...
Improve your Negotiating Position & Achieve Cost Savings with Supplier Cost I...IHS
 
Has china lost its low cost edge?
Has china lost its low cost edge?Has china lost its low cost edge?
Has china lost its low cost edge?IHS
 
Commodities Through 2013 : Buying Opportunities, or Buyer Beware?
Commodities Through 2013: Buying Opportunities, or Buyer Beware? Commodities Through 2013: Buying Opportunities, or Buyer Beware?
Commodities Through 2013 : Buying Opportunities, or Buyer Beware? IHS
 
From Subscriber to Silicon: Why end-to-end technology value chain insight is ...
From Subscriber to Silicon: Why end-to-end technology value chain insight is ...From Subscriber to Silicon: Why end-to-end technology value chain insight is ...
From Subscriber to Silicon: Why end-to-end technology value chain insight is ...IHS
 
Smart Grid Innovation, Interoperability, and Standards Management
Smart Grid Innovation, Interoperability, and Standards ManagementSmart Grid Innovation, Interoperability, and Standards Management
Smart Grid Innovation, Interoperability, and Standards ManagementIHS
 
Counterfeit Risk & New Defense Regulations
Counterfeit Risk & New Defense RegulationsCounterfeit Risk & New Defense Regulations
Counterfeit Risk & New Defense RegulationsIHS
 
Energy, Emissions, and Efficiency
Energy, Emissions, and EfficiencyEnergy, Emissions, and Efficiency
Energy, Emissions, and EfficiencyIHS
 
Supply Chain Risk Mitigation
Supply Chain Risk MitigationSupply Chain Risk Mitigation
Supply Chain Risk MitigationIHS
 
Panel Discussion - Counterfeit Electronics and the Defense Authorization Bill
Panel Discussion - Counterfeit Electronics and the Defense Authorization BillPanel Discussion - Counterfeit Electronics and the Defense Authorization Bill
Panel Discussion - Counterfeit Electronics and the Defense Authorization BillIHS
 
Tools and Techniques to Effectively Manage EHS Regulatory Compliance
Tools and Techniques to Effectively Manage EHS Regulatory ComplianceTools and Techniques to Effectively Manage EHS Regulatory Compliance
Tools and Techniques to Effectively Manage EHS Regulatory ComplianceIHS
 
Green Products and Supply Chain Disruption: Conflict Minerals in the Supply C...
Green Products and Supply Chain Disruption: Conflict Minerals in the Supply C...Green Products and Supply Chain Disruption: Conflict Minerals in the Supply C...
Green Products and Supply Chain Disruption: Conflict Minerals in the Supply C...IHS
 
Environmental Compliance, Risk and Product Stewardship
Environmental Compliance, Risk and Product StewardshipEnvironmental Compliance, Risk and Product Stewardship
Environmental Compliance, Risk and Product StewardshipIHS
 
Avoiding Counterfeit Risk: How to mitigate part and supplier risk
Avoiding Counterfeit Risk: How to mitigate part and supplier risk Avoiding Counterfeit Risk: How to mitigate part and supplier risk
Avoiding Counterfeit Risk: How to mitigate part and supplier risk IHS
 

More from IHS (18)

Accelerate Procurement Performance
Accelerate Procurement PerformanceAccelerate Procurement Performance
Accelerate Procurement Performance
 
IHS Material Price Outlook: A 2014 Buyer’s Guide
IHS Material Price Outlook: A 2014 Buyer’s GuideIHS Material Price Outlook: A 2014 Buyer’s Guide
IHS Material Price Outlook: A 2014 Buyer’s Guide
 
Global Construction Outlook: Wage Growth, Labor Shortages and Implications
Global Construction Outlook: Wage Growth, Labor Shortages and Implications Global Construction Outlook: Wage Growth, Labor Shortages and Implications
Global Construction Outlook: Wage Growth, Labor Shortages and Implications
 
Resilient Supply Chains: How to Dynamically Manage Risk, Opportunity, and Bus...
Resilient Supply Chains: How to Dynamically Manage Risk, Opportunity, and Bus...Resilient Supply Chains: How to Dynamically Manage Risk, Opportunity, and Bus...
Resilient Supply Chains: How to Dynamically Manage Risk, Opportunity, and Bus...
 
Quantifying Sourcing Risk: Building Commodity Risk Ratings to Mitigate Geopol...
Quantifying Sourcing Risk: Building Commodity Risk Ratings to Mitigate Geopol...Quantifying Sourcing Risk: Building Commodity Risk Ratings to Mitigate Geopol...
Quantifying Sourcing Risk: Building Commodity Risk Ratings to Mitigate Geopol...
 
Improve your Negotiating Position & Achieve Cost Savings with Supplier Cost I...
Improve your Negotiating Position & Achieve Cost Savings with Supplier Cost I...Improve your Negotiating Position & Achieve Cost Savings with Supplier Cost I...
Improve your Negotiating Position & Achieve Cost Savings with Supplier Cost I...
 
Has china lost its low cost edge?
Has china lost its low cost edge?Has china lost its low cost edge?
Has china lost its low cost edge?
 
Commodities Through 2013 : Buying Opportunities, or Buyer Beware?
Commodities Through 2013: Buying Opportunities, or Buyer Beware? Commodities Through 2013: Buying Opportunities, or Buyer Beware?
Commodities Through 2013 : Buying Opportunities, or Buyer Beware?
 
From Subscriber to Silicon: Why end-to-end technology value chain insight is ...
From Subscriber to Silicon: Why end-to-end technology value chain insight is ...From Subscriber to Silicon: Why end-to-end technology value chain insight is ...
From Subscriber to Silicon: Why end-to-end technology value chain insight is ...
 
Smart Grid Innovation, Interoperability, and Standards Management
Smart Grid Innovation, Interoperability, and Standards ManagementSmart Grid Innovation, Interoperability, and Standards Management
Smart Grid Innovation, Interoperability, and Standards Management
 
Counterfeit Risk & New Defense Regulations
Counterfeit Risk & New Defense RegulationsCounterfeit Risk & New Defense Regulations
Counterfeit Risk & New Defense Regulations
 
Energy, Emissions, and Efficiency
Energy, Emissions, and EfficiencyEnergy, Emissions, and Efficiency
Energy, Emissions, and Efficiency
 
Supply Chain Risk Mitigation
Supply Chain Risk MitigationSupply Chain Risk Mitigation
Supply Chain Risk Mitigation
 
Panel Discussion - Counterfeit Electronics and the Defense Authorization Bill
Panel Discussion - Counterfeit Electronics and the Defense Authorization BillPanel Discussion - Counterfeit Electronics and the Defense Authorization Bill
Panel Discussion - Counterfeit Electronics and the Defense Authorization Bill
 
Tools and Techniques to Effectively Manage EHS Regulatory Compliance
Tools and Techniques to Effectively Manage EHS Regulatory ComplianceTools and Techniques to Effectively Manage EHS Regulatory Compliance
Tools and Techniques to Effectively Manage EHS Regulatory Compliance
 
Green Products and Supply Chain Disruption: Conflict Minerals in the Supply C...
Green Products and Supply Chain Disruption: Conflict Minerals in the Supply C...Green Products and Supply Chain Disruption: Conflict Minerals in the Supply C...
Green Products and Supply Chain Disruption: Conflict Minerals in the Supply C...
 
Environmental Compliance, Risk and Product Stewardship
Environmental Compliance, Risk and Product StewardshipEnvironmental Compliance, Risk and Product Stewardship
Environmental Compliance, Risk and Product Stewardship
 
Avoiding Counterfeit Risk: How to mitigate part and supplier risk
Avoiding Counterfeit Risk: How to mitigate part and supplier risk Avoiding Counterfeit Risk: How to mitigate part and supplier risk
Avoiding Counterfeit Risk: How to mitigate part and supplier risk
 

Recently uploaded

India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportMintel Group
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadAyesha Khan
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxMarkAnthonyAurellano
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionMintel Group
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
IoT Insurance Observatory: summary 2024
IoT Insurance Observatory:  summary 2024IoT Insurance Observatory:  summary 2024
IoT Insurance Observatory: summary 2024Matteo Carbone
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 

Recently uploaded (20)

India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample Report
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted Version
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
IoT Insurance Observatory: summary 2024
IoT Insurance Observatory:  summary 2024IoT Insurance Observatory:  summary 2024
IoT Insurance Observatory: summary 2024
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 

Counterfeiting and Semiconductor Value Chain Economics - COG 2013, Mr. Rory King

  • 1. - 1 - Counterfeiting and Semiconductor Value Chain Economics Supply Chain Risk Insight into Market Sense and Respond Actions of Counterfeiters Rory King Global Director, Supply Chain, IHS Inc. 321 Inverness Drive South Englewood, Colorado, 80112 Abstract Counterfeit parts have proliferated dramatically in recent years, presenting huge challenges for electronics manufacturing and specifically military and aerospace application. This session will offer unique new market trends, observations, and best practices on the issue of economics, semiconductor value chains, obsolescence, counterfeit electronics, and market impacts such as fact-based insight into market indicators like correlation among counterfeits, semiconductor factory utilization, component obsolescence, semiconductor availability, price volatility, and supply-and-demand equilibrium.
  • 2. - 2 - 1. Introduction While counterfeiting is a decades old issue, growing safety and securing concerns as well as scrutiny over supply chain and procurement practices around counterfeit or suspect counterfeit electronics become widely known as a result of the November 8, 2011 hearing of the U.S. Senate Armed Services Committee on Counterfeit Electronic Parts in the Department of Defense Supply Chain. Subsequent to the hearing, the National Defense Authorization Act (NDAA) of 2012 included Section 818, Counterfeit Detection & Avoidance. Generally speaking, some key supply chain implications considered at all tiers of the global defense supply chain included:  Contractor responsibility for detecting and avoiding the use or inclusion of counterfeit electronic parts or suspect counterfeit parts  Contractor responsibility for any rework or corrective action that may be required to remedy the use or inclusion of such parts  Defense contracts no longer allowing the cost of counterfeit electronic parts and suspect counterfeit electronic parts or the cost associated with rework or corrective action to resolve the use or inclusion of such parts  Qualification procedures and processes must be established to use trusted suppliers and procure electronics from authorized suppliers Cost is a major concern for the defense industry. As publicized at the U.S. Senate Armed Services Committee (SASC) hearings in 2012, a single counterfeit incident – like that of the THAAD missile system – can cost in excess of $2 million dollars. According to the Missile Defense Agency, if the devices had failed, the THAAD missile itself would likely have failed. “The cost of that fix was nearly $2.7 million,” stated Senator Carl Levin (D-MI).i Human safety and national security also come to the forefront when the potential impact of counterfeiting is assessed. Counterfeits not only pose an increasing risk to the safety of men and women in uniform, but they also endanger civilians in other parts applications subject to counterfeiting such as medical devices, consumer products, or perhaps automobiles. Counterfeiting is a challenge to companies of all sizes and across all industries – from the small domestic manufacturer to the global organization, and all entities in between. This paper discusses supply chain risk and an apparent relationship between counterfeit supplier behaviours to rapidly sense and respond to semiconductor market economic conditions, as measured through counterfeit incident reports and component production, inventory, and obsolescence insight -- over time. 2. Sophistication of Counterfeiters As Vivek Kamath, Vice President for Supply Chain Operations for Raytheon Company stated, “What keeps us up at night is the dynamic nature of this threat because by the time we’ve figured out how to test for these counterfeits, they’ve figured out how to get around it. And it’s literally on almost a daily basis they change and the sophistication of the counterfeiting is amazing to us.”ii To illustrate the apparent sophistication of counterfeiters to sense and respond to market conditions, consider the Lehman Brothers bankruptcy filing in the United States and resultant downturn of the global economy. As the largest bankruptcy filing in U.S. history, the incident – which took place on September 15, 2008 – correlates with a pronounced decline in
  • 3. - 3 - semiconductor factory production. In Figure 1 you can see that semiconductor factory utilization remained fairly steady until the economic collapse triggered by Lehman Brothers filing Chapter 11 bankruptcy, after which there was an immediate precipitous drop in semiconductor factory utilization. This is the reaction of semiconductor producers to demand side weakness. Figure 1 – Total Semiconductor Factory Utilization Original Component Manufacturers (OCMs) responded to the event by trying to maintain profitability in the face of big slashes in demand and cancellations of orders. They also started issuing end of life (EOL) notices to discontinue their products. IHS tracks these notices and, as you can see in Figure 2, the number of EOLs skyrocketed just after the filing by Lehman Brothers, which at the time was holding over $600 billion in assets. This pronounced spike illustrates how component manufacturers ultimately discontinued their products in an effort to work smarter and leaner in the midst of a tumultuous business environment. Figure 2—Manufacturer Product EOL vs. Total Semiconductor Factory Utilization
  • 4. - 4 - So how did counterfeiters respond to the bankruptcy filing and subsequent increase in EOLs? As illustrated in Figure 3, counterfeiters responded to the event as an opportunity supply counterfeit product to buyers, many of whom may not have been aware of authentic product being discontinued by the OCMs. Figure 3—Manufacturer Product EOL vs. Counterfeit Incidents Now, much discussion over counterfeit parts is around obsolete components, but in reality the problem runs much deeper. As reported by IHS, a total of 57 percent of counterfeit-part reports from 2001 through 2012 have involved obsolete or end-of- life (EOL) components, as presented in the figure below. Another 37 percent were active parts.iii If you look at Figure 4 you’ll see overall inventory trends (in the shaded areas of the chart) and a line showing counterfeit products trending along with ebbs and flows in inventory. This represents inventory of active, commercial electronic components. Keep these points in mind as we move on to Figure 5. Figure 4—Total Semiconductor Industry Inventory vs. Counterfeit Incidents
  • 5. - 5 - In Figure 5, you will notice that semiconductor factory utilization is the top line, but instead of EOLs what you now see are the counterfeit trends. The interesting correlation is how these trends fluctuate right along with the ups and downs of semiconductor factory utilization. As utilization ebbs and flows, the counterfeiting activity reacts similarly. In other words, the counterfeiters are sensing market demand and supply factors much like the original manufacturers of components. Counterfeit suppliers introduce a greater number of counterfeit products to market (as measured by counterfeit incident reports) in concert with legitimate producers responding to an uptick or forecast of semiconductor demand. As the market picks up, the counterfeit incidents increase. Figure 5—Total Semiconductor Utilization vs. Counterfeit Incidents Reported 3. Top Counterfeit Parts Classes Counterfeiters are more prolific than ever in a handful of parts classes. Entering 2012, the top five commodities subject to counterfeiting according to IHS were:iv  Transistors – 7.6%  Programmable Logics Integrated Circuits – 8.3%  Memory Integrated Circuits – 13.1%  Microprocessor Integrated Circuits – 13.4%  Analog Integrated Circuits – 25.2% In Figure 6, using IHS iSuppli Application Market Forecast Tool (AMFT), one can plot the counterfeit incidents by component classes against the semiconductor application markets where those components are consumed. The top five
  • 6. - 6 - component families are listed on the left side of the chart while the relative percentage distribution of where those products are used is reflected on the graphic’s horizontal axis. For example, 14% of analog integrated circuits products are in the industrial market; 17% in automotive; 21% in consumer; 29% in wireless; 6% in wired; and 14% in compute. (It’s important to note that medical device, military and civil aerospace components fall under the industrial market segment or the 14% of the analog integrated circuits products.) Cumulatively, analog integrated circuits are the biggest target for counterfeiters and represent a roughly $47.7 billion semiconductor application market. It is possible to imagine the potential risk and cost implications of issues associated with damages resulting from those counterfeit parts. While a great deal of attention is placed on defense supply chains, the issue plainly doesn’t just threaten the men and women in armed services or national security, but it poses potential risk and disruption to businesses and consumers who rely on products throughout these application markets. The potential challenges are apparent for other application markets. The consumer electronics segment in 2011 consumed $9.8 billion worth of analog integrated circuits, or 21 percent of the global market. Automotive electronics amounted to $8 billion, or 17 percent; computing represented $6.7 billion, or 14 percent; industrial electronics was at $6.5 billion, or 14 percent; and wired communications was $2.9 billion, or 6 percent. Figure 6—Percent Distribution of Total Market Revenue by Application Market for Most Commonly Counterfeited Product Types in 2011 4. High-Risk Suppliers Even in the face of increasing government regulation and scrutiny, the number of high-risk suppliers abounds. These firms engage in high-risk, fraudulent, and suspect counterfeit product or conduct, as identified by the U.S. government. There are literally tens of thousands of these
  • 7. - 7 - high-risk providers, and their numbers are growing daily. They push the issue of counterfeiting well beyond just the production of fake parts. As you can see in Figure 7, we’re talking about thousands of organizations emerging on an annual basis, and not just in an aggregated, collective fashion either. The environment literally changes daily and impacts every link in the supply chain. Figure 7—High Risk Suppliers from 2002-2011 5. The Monetary Impacts of Counterfeiting Concerns over the impact of counterfeits are well known throughout industry. One general example draws from an IHS and Supply & Demand Chain Executive survey of 1,001 practitioners, executives, academics, vendors and other industry professionals. Summarized key findings on the impact of counterfeits experienced or believed by these survey respondents include those shown in Figure 8. As was apparent, counterfeits cause a wide range of potential issues from serious financial and brand consequences to daily operational cost, service, and safety disruption. Figure 8—Significant Costs of Counterfeit Riskv
  • 8. - 8 - 6. Conclusions Counterfeiting concerns and impacts continue to be widely discussed, documented, and shared throughout industry on a worldwide basis. Through unique information and insight now available to plot real counterfeit incidents reported by industry against semiconductor factory utilization, inventory, product lifecycle, and application market forecasts one can begin to see the degree to which counterfeit behaviours appear to correlate with semiconductor industry responses to marketplace economics. When this insight is analyzed, it seems apparent that counterfeiters sense and respond to marketplace dynamics in a sophisticated manner, by taking such action as supplying counterfeit product to market in concert with semiconductor factories increasing capacity to do satisfy demand. While these correlations seem apparent, other interesting questions that cannot be proved emerge as well – for instance, could these factories (or their equipment or entire replicas thereof) be the sources of illegitimate product entering the counterfeit supply chain? In conclusion, some key points can be considered as organisation assess risk vulnerabilities and implement counterfeit detection and avoidance measures:  Counterfeiters are not simple individuals with rudimentary capabilities; they are sophisticated operators and they are in tune with the market.  Counterfeiting is not exclusively a military and defense parts issue, but rather counterfeit parts impact all commercial & military markets.  Counterfeiting is not restricted to old, obsolete components, but rather counterfeiting impacts active components (in fact, nearly half are active parts).  Counterfeit detection and avoidance is not just a “cost burden,” but counterfeit risk mitigation creates significant cost avoidance.  Counterfeit mitigation is not just about “the parts,” but counterfeit mitigation requires knowledge of high-risk suppliers. i HEARING TO RECEIVE TESTIMONY ON THE COMMITTEE’S INVESTIGATION INTO COUNTERFEIT ELECTRONIC PARTS IN THE DEPARTMENT OF DEFENSE SUPPLY CHAIN, Tuesday, November 8, 2011, U.S. SENATE COMMITTEE ON ARMED SERVICES, Washington, DC ii HEARING TO RECEIVE TESTIMONY ON THE COMMITTEE’S INVESTIGATION INTO COUNTERFEIT ELECTRONIC PARTS IN THE DEPARTMENT OF DEFENSE SUPPLY CHAIN, Tuesday, November 8, 2011, U.S. SENATE COMMITTEE ON ARMED SERVICES, Washington, DC iii Rory King and Mark Snider, IHS Inc. with ERAI Inc., 2012 iv Rory King and Mark Snider, IHS Inc. with ERAI Inc., 2012 v Supply & Demand Chain Executive and IHS Inc., Benchmarking Counterfeits and Inferior Grade Components, 2009