Counterfeiting is not a new term for electronic industry as counterfeit electrical and electronic products now occupy second place after pharmaceuticals estimated to range anywhere between US$11 billion to $20 billion worldwide
every year. However, counterfeit electronic parts have been much in the public eye in recent weeks. On March 28, 2014 one of Indian Air Force Aircraft (C-130J Super
Hercules) crashed near Gwalior city killing five crew members. There were controversial news reported
in media about the counterfeit electronics being the reason for C-130J air crash. Over the past several years the electronics industry has seen a marked increase in the
availability of counterfeit electronic components. Counterfeiters have attacked every commodity of electronics, from simple components such as capacitors,
to complex integrated circuits such as microprocessors. In expensive commercial devices, as well as high cost military components, have seen counterfeiting on the rise. This article highlights the serious risk, its impact and the possible proactive steps that can be taken to curb this menace.
Counterfeiting continues to be a major growing issue in the
automotive component industry. According to Motor Equipment Manufacturers Association (MEMA), USA the global automotive industry loses US $ 12 billion to counterfeiting. The Indian scenario is not a different
story. According to FICCI – CASCADE latest study (Grey market the invisible enemy) released in 2012, the Auto component industry loses 29.6% of its sales due to grey market, worth US $ 2 billion (`9198 crores out
of estimated size of ` 31,046) affecting the growth of economy, loss of jobs, brand owner goodwill as well as risk to public safety. The parts that tend to be counterfeited the most are frequent replaced parts such as brake pads, spark plugs, and various types of filters. Governments have a particularly critical role to play in this effort. All over world, they are doing their best creating the necessary legal infrastructure, educating police force, developing suitable laws to deter fraudulent behaviour. Businesses, however, must also do their part to prevent the production and sale of counterfeit products.
With the increase in counterfeiting, Authentication technologies plays an important role in supporting brand strategies, helping to reduce the risk of fraud by deterring criminals and enabling stakeholders to identify and track genuine products with fake one. This article is an overview of primarily used authentication technologies.
Counterfeiting is menace for brand owners and Government authorities. In over a decade the problem has expanded rapidly and is now not limited to luxury goods and developed economies. There are any numbers of reports available on internet discussing the loss to industry and people due to counterfeiting.
Over the years, in order to prevent counterfeiting from plaguing their business, brand owners started using authentication solutions. With the availability of various authentication solutions, companies and Government authorities are facing problem in selection of a specific authentication solution as the adoption of any given solution is a complex question involving issues, amongst others, of cost, compatibility, feasibility and reliability, and there are divergent views on which technologies should be adopted and the timing for their adoption. While these solutions can sometimes add to the problem, the right selection, usage & implementation of authentication solutions helps companies and authorities to keep them one step ahead of counterfeiting. The selection of an authentication1 solutions2 that protects a document or product is a complex process and necessitates review of a number of factors regarding the role and implementation of the technology. Not all authentication solutions and security features are appropriate for all applications. It is important to understand the strengths and limitations inherent to different technologies, as well as between similar features supplied by different manufacturers.The article explain, “Steps to identify authentication solutions to curb counterfeiting”.
The document discusses counterfeiting as a major global problem, providing statistics on the scale of counterfeiting in India and its impact. It outlines various forms of counterfeited goods in India, including medicines, liquor, and documents. The document proposes authentication solutions that combine physical and digital security features as the most effective way to combat counterfeiting and protect consumers, industries, and government tax revenue.
Dear Reader,
Welcome to the first edition of The Holography Times (THT) in year 2013.
This is our 20th edition and we would like to thank all our readers and members for overwhelming response and support.
We deeply valued the trust you have shown in us and ensure our endeavour to serve you better.
Currently brand owners / government authorities are facing problem in selection of authentication technologies. The International Standard Organisation (ISO) has solve the problem by releasing new standard ISO 12931 which provides the guidelines on how to protect brand and products from counterfeits.
Our current issue highlights on “Steps to identify authentication solutions to curb counterfeiting” along-with an article on ISO 12931. This issue also covers an interview of Mr. Anil Rajput, Chairman, FICCI CASCADE on anti-counterfeiting campaign running across the country.
Lastly on behalf of THT team, we look forward to 2013 with great hopes and wish all our reviewers, members, advertisers, advisers and above all, our readers a very happy and prosperous New Year.
C S Jeena
Editor
Authentication Solutions are a must to curb spurious medicines
There are a variety of solutions available, as per requirement, through member companies of ASPA. The Government of India has already taken steps to protect medicines that are exported. Now it is time to protect medicines that are being distributed and consumed within India.
TAX Stamps have always been an important authentication solutions used by Government authorities to curb the illicit trade, protect consumer and to increase the excise revenue. It was only 20 years ago; due to the globalization many countries started using tax stamps for the first time, especially in the Eastern Europe and Former Soviet Union. Today across the globe, 81 countries are using approximately 130 billion cigarette tax stamps and 14 billion alcohol tax
stamps.
In India also, the revolution of first tax stamp was introduced by Tamilnadu State Excise Department in early eighties. Today, 22 States (including Union territories) are using approximately 11 billion tax stamps per annum. In contrast to globally, all these tax stamps are for alcohol, excluding cigarettes industry. The tax stamps were introduced in India
to prevent and minimizing the hooch tragedies, curbing the menace of duplication, as well as in increasing the excise revenue collection.
Our current cover story is on “Tax Stamp in India – An overview”. It also cover global expert view on “Product security solutions currently implemented in Turkey”. Apart from these, the issue also covers industry updates, ASPA and
member news, counterfeit seizure report and global patents.
Counterfeiting continues to be a major growing issue in the
automotive component industry. According to Motor Equipment Manufacturers Association (MEMA), USA the global automotive industry loses US $ 12 billion to counterfeiting. The Indian scenario is not a different
story. According to FICCI – CASCADE latest study (Grey market the invisible enemy) released in 2012, the Auto component industry loses 29.6% of its sales due to grey market, worth US $ 2 billion (`9198 crores out
of estimated size of ` 31,046) affecting the growth of economy, loss of jobs, brand owner goodwill as well as risk to public safety. The parts that tend to be counterfeited the most are frequent replaced parts such as brake pads, spark plugs, and various types of filters. Governments have a particularly critical role to play in this effort. All over world, they are doing their best creating the necessary legal infrastructure, educating police force, developing suitable laws to deter fraudulent behaviour. Businesses, however, must also do their part to prevent the production and sale of counterfeit products.
With the increase in counterfeiting, Authentication technologies plays an important role in supporting brand strategies, helping to reduce the risk of fraud by deterring criminals and enabling stakeholders to identify and track genuine products with fake one. This article is an overview of primarily used authentication technologies.
Counterfeiting is menace for brand owners and Government authorities. In over a decade the problem has expanded rapidly and is now not limited to luxury goods and developed economies. There are any numbers of reports available on internet discussing the loss to industry and people due to counterfeiting.
Over the years, in order to prevent counterfeiting from plaguing their business, brand owners started using authentication solutions. With the availability of various authentication solutions, companies and Government authorities are facing problem in selection of a specific authentication solution as the adoption of any given solution is a complex question involving issues, amongst others, of cost, compatibility, feasibility and reliability, and there are divergent views on which technologies should be adopted and the timing for their adoption. While these solutions can sometimes add to the problem, the right selection, usage & implementation of authentication solutions helps companies and authorities to keep them one step ahead of counterfeiting. The selection of an authentication1 solutions2 that protects a document or product is a complex process and necessitates review of a number of factors regarding the role and implementation of the technology. Not all authentication solutions and security features are appropriate for all applications. It is important to understand the strengths and limitations inherent to different technologies, as well as between similar features supplied by different manufacturers.The article explain, “Steps to identify authentication solutions to curb counterfeiting”.
The document discusses counterfeiting as a major global problem, providing statistics on the scale of counterfeiting in India and its impact. It outlines various forms of counterfeited goods in India, including medicines, liquor, and documents. The document proposes authentication solutions that combine physical and digital security features as the most effective way to combat counterfeiting and protect consumers, industries, and government tax revenue.
Dear Reader,
Welcome to the first edition of The Holography Times (THT) in year 2013.
This is our 20th edition and we would like to thank all our readers and members for overwhelming response and support.
We deeply valued the trust you have shown in us and ensure our endeavour to serve you better.
Currently brand owners / government authorities are facing problem in selection of authentication technologies. The International Standard Organisation (ISO) has solve the problem by releasing new standard ISO 12931 which provides the guidelines on how to protect brand and products from counterfeits.
Our current issue highlights on “Steps to identify authentication solutions to curb counterfeiting” along-with an article on ISO 12931. This issue also covers an interview of Mr. Anil Rajput, Chairman, FICCI CASCADE on anti-counterfeiting campaign running across the country.
Lastly on behalf of THT team, we look forward to 2013 with great hopes and wish all our reviewers, members, advertisers, advisers and above all, our readers a very happy and prosperous New Year.
C S Jeena
Editor
Authentication Solutions are a must to curb spurious medicines
There are a variety of solutions available, as per requirement, through member companies of ASPA. The Government of India has already taken steps to protect medicines that are exported. Now it is time to protect medicines that are being distributed and consumed within India.
TAX Stamps have always been an important authentication solutions used by Government authorities to curb the illicit trade, protect consumer and to increase the excise revenue. It was only 20 years ago; due to the globalization many countries started using tax stamps for the first time, especially in the Eastern Europe and Former Soviet Union. Today across the globe, 81 countries are using approximately 130 billion cigarette tax stamps and 14 billion alcohol tax
stamps.
In India also, the revolution of first tax stamp was introduced by Tamilnadu State Excise Department in early eighties. Today, 22 States (including Union territories) are using approximately 11 billion tax stamps per annum. In contrast to globally, all these tax stamps are for alcohol, excluding cigarettes industry. The tax stamps were introduced in India
to prevent and minimizing the hooch tragedies, curbing the menace of duplication, as well as in increasing the excise revenue collection.
Our current cover story is on “Tax Stamp in India – An overview”. It also cover global expert view on “Product security solutions currently implemented in Turkey”. Apart from these, the issue also covers industry updates, ASPA and
member news, counterfeit seizure report and global patents.
This article discusses the problem of tobacco counterfeiting and tax evasion, which costs governments and manufacturers significant lost revenue and damages brand reputation. Tobacco products are a lucrative target for counterfeiters due to high tax policies. The article proposes that holograms, as an anti-counterfeiting technology, could help tackle this problem. Holograms have been used globally for 15 years as an important authentication device on government tax stamps.
CompX International is a manufacturer of security products and recreational marine components based in Dallas, Texas. Their security products generate 87.7% of revenue, while marine components make up 12.3%. While security products are mature, marine components are seasonal. Relative valuation analysis finds CompX trading at lower multiples than industry averages, indicating it may be undervalued. The analyst recommends buying CompX stock.
Sample Global Adhesives and Sealants Market - Mordor intelligenceRohith Sampathi
The global adhesives and sealants market was valued at $40 billion in 2015 and is projected to reach $53.7 billion by 2020, growing at a CAGR of 6.05% for adhesives and 6.09% for sealants. Key end-use industries driving demand include building and construction, packaging, and transportation. Water-borne adhesives accounted for over 40% of the adhesives market in 2015. Stringent environmental regulations around VOC emissions present a restraint. The market is moving towards more environmentally friendly and bio-based adhesive technologies like Dow Chemical's RENUVA renewable resource technology.
Dear Reader,
Welcome to the 21st edition of The Holography Times.
Today, in India more than 300 State level industry-trade association exist representing more than 7,00,000* companies.
Each and every product has an industry trade association formed with an aim to facilitate the business environment for its member companies.
While they are playing an important role in modern and global economies, there are various hindrances which affect their industry / sector growth. Product counterfeiting is one of them. It is affecting all categories of products, but the impact is very high in sectors / product categories like fast moving consumer goods (FMCG), pharmaceuticals, electronics, automobile and aircraft parts, music, publishing, software, telecom, cosmetics, personal care, beverages, etc.
To fight this menace, a few of trade associations have come forwarded and have started playing a proactive role. Although, the number is very low, we are hopeful that other industry association will follow up the examples.
Our current issue highlights the Role of Industry Association in Curbing Counterfeiting. Apart from this, the issue also covers, industry updates including news, patents, financial analysis and much more.
Do send us your feedback / critics at info@aspaglobal.com
With Regards,
C S Jeena
Editor
Counterfeit electrical and electronic products are becoming a serious menace for legitimate manufacturers as well as for consumers and Government. The presentation focus on issue of counterfeit electrical and electronic products, its impact and steps to combat this problem. This is a part of HOMAI series of presentation against counterfeiting in various sectors. These presentations are intended for educational purposes to aware all stakeholders about counterfeiting and how we can fight counterfeiting.
Holography has evolved from security to packaging, since Glaxo used it in 1989. Again in 1994 Smithkline Beachem launches Aquafresh white toothpaste in USA in a carton covered in holographic laminate, the first time of holographic packaging has been used for branding.
The journey started by these companies is on its road to success with drastic developments in holography. The key is innovation and the approach is to stay one step ahead of counterfeiters. At this time of cut throat competition and global market conditions, companies have turned to new forms of packaging and intelligent labelling to ensure they get the attention of consumers to be successful in moving their product off the shelf and aid in helping consumers check for authenticity . Not every good packaging idea comes with a price tag. A little creative thinking is all that is needed. The article discuss the increasing use
of Holography in packaging and product promotion.
Brand Protection & Security of Engineering ComponentsBilcareltd
Bilcare Technologies provides anti-counterfeiting solutions using its nonClonableID technology. It applies unique fingerprint labels to engineering components that are prohibitively difficult to copy and can be used to authenticate components as they move through the supply chain. The technology helps combat counterfeiting by enabling real-time product verification, secure tracking, and increased supply chain visibility. This enhances brand protection, consumer safety, and supply chain management.
The document is a newsletter from The Holography Times that discusses various news and developments related to the holography industry. It includes articles about anti-counterfeiting solutions using holograms for events like the 2010 FIFA World Cup and targeting the pharmaceutical industry in India. It also discusses using holograms to celebrate successes, new hologram technologies, and interviews the managing director of Holoflex about the company's experience in the hologram industry. The newsletter aims to share information and create a forum for exchanging knowledge about all aspects of holography.
Food & beverage quality & safety is an important issue worldwide. The determination of food authenticity is a vital component of quality control. Its importance has been highlighted in recent years by various high-profile cases in the global supply chain. Europol OPSON VIII operation coordinated by Europol’s Intellectual Property Crime Coordinated Coalition and INTERPOL which ran from December 2018 through April 2019. Enforcement agencies, regulatory authorities, and private
sector partners from approximately 78 countries took part in this
operation resulted in more than 67,000 checks carried out at shops, markets, airports, seaports, and industrial estates. In total, 672 individuals were arrested during the Operation, around 16,000 tonnes, and 33 million litres of likely fake food and drink worth of €100 million seized.
Zero brand attack is an utopia. Brand owner can only take action in reducing the overall impact of brand attack.
Better management and use of effective brand protection solutions can result in brand owners getting better sales and market share; consumer getting the right products at the right price, government getting better revenues and a satisfied and loyal channel. Brand are under attack in various forms however main four are tampering, replication, diversion and recirculation. There is a need of authentication + tracking solutions to be used with proper communication to consumers.
In Rajasthan few departments and brand owners are adopting / using authentication solutions, however, there is the need to increase the awareness. For example, Rajasthan State Food & Civil Supplies Corporation is applying security hologram on daily household food items like Tea, Salt, Pulses, Spices, Atta etc. to secure life and health of people. Similar kind of solutions can easily be implemented to fight drug counterfeiting by putting high security hologram with 2D and alphanumeric codes on each individual blister pack, bottle or injectable vial.” The menace of counterfeit pharmaceutical drugs in Rajasthan can be easily addressed by the State Government and consumers, with the adoption of these consumer-friendly authentication solutions.
The document is the June 2008 issue of The Holography Times newsletter published by HoMAI. It includes the following key points:
1) The president of HoMAI welcomes readers to the third edition and discusses HoMAI's goal of further developing the holographic industry and promoting innovation.
2) News bytes highlight projects like the world's first holographic RFID tag, BMW's use of holograms for a vehicle tour, and an order for holographic tax stamps.
3) Corporate news items announce name changes for companies like Shriram Holographics and sales growth at Holostik.
This document discusses the impact of counterfeiting on international markets. It finds that counterfeiting results in billions of dollars in lost sales annually for legitimate businesses. It damages brands' reputations when customers receive low-quality counterfeit goods. Advances in technology, increased international trade, and emerging markets have all contributed to the growth of counterfeiting in recent decades. Measuring the scale of counterfeiting is difficult due to its clandestine nature. The International Chamber of Commerce estimates that the value of counterfeit goods was between $710-917 billion in 2013 and projects it could reach $991 billion by 2022 if trends continue.
ITMF-Survey about the impact of the Corona-pandemic on the global textile ind...AndyZhao29
The ITMF survey of 34 textile companies from around the world found that on average, current orders have dropped by 8% worldwide due to the coronavirus pandemic. Companies expect their 2020 turnover to be 10.5% lower than 2019 on average. Those companies surveyed earlier in March reported less negative impacts, as restrictions on public life in Europe and North America had not yet dramatically reduced offline textile and apparel consumption. The main challenges cited were ensuring worker safety, disrupted supply chains, lack of demand, and liquidity issues. Opportunities mentioned included producing medical textiles and streamlining processes to emerge stronger from the crisis.
The document discusses the rising issue of counterfeit auto parts in India and globally. It states that according to industry surveys, counterfeit parts account for around 35% of the Indian replacement auto parts market, valued at over $1 billion. Counterfeit parts threaten automaker profits but also endanger lives by failing to meet safety and performance standards. Common counterfeited parts include oil filters, brake pads, and windshields. The use of counterfeits can result in engine failure, fatal accidents from poor braking, and injury from non-shatterproof glass. Holograms and other authentication technologies are seen as ways to help distinguish genuine parts and protect brands and customers.
Armoured Vehicles India Market Report 2012 - 2022Sharmin Ahammad
This document summarizes a report on the future of Asia's armoured vehicle market over the next decade. A survey of 144 professionals found that survivability is the most important capability for Asian countries. While ballistic protection and reliability are also important requirements, Asian customers place less emphasis on protection compared to other regions and consider cost and mobility more relevant. The document analyzes responses to identify counter-IED capabilities and blast protection as the most critical attributes, though the IED threat is seen as less significant in Asia than globally.
E-Insurance is an electronic insurance system developed by ESKADENIA that replaces traditional communication methods between insurance companies and various stakeholders. It allows brokers to issue policies, endorsements, and quotations online. The system supports various types of insurance like medical, travel, and general insurance. It provides functionalities for policy management, claims processing, approvals, and communication through SMS.
There has been a wave in the global pharmaceutical industry over the past several years, driven by the need for battling the scourge of spurious medicines, which take thousands of live each year. This wave has led to the evolution of technology to help regulators ensure that only genuine medicines are distributed within or imported in any market, and to empower patient to verify that the medicines they are taking are indeed what they claim to be. Serialization is one of the most widely adopted technologies in the new wave, and in this article we present an overview of this technology and its applications.
It has been over three decades since India Today, one of India’s leading publication covered a story on the problem of
fake pesticides in Punjab and Haryana. In these last 35 years,
the predicament of farmers in India has worsened year by year, as they continue to fight a grim battle against fake pesticides. On the other hand, the fake pesticides industry in
India has been growing at an annual rate of 20 per cent and
now constitutes approximately 30 per cent of the total crop
protection market.
While fighting fake pesticides is a complex problem, the
adoption of new generation authentication solutions can greatly help various stakeholders in tackling this growing menace.
The article highlights this core issue and details on its various types along with the reasons for the increase in counterfeit pesticides. The story also brings to light the authentication solutions that can be implemented in India to curb this menace to a great extent in the interest of farmers, industry and country.
TAX Stamps have always been an important authentication solutions used by Government authorities to curb the illicit trade, protect consumer and to increase the excise revenue. It
was only 20 years ago; due to the globalization many countries started using tax stamps for the first time, especially in the Eastern Europe and Former Soviet Union. Today across
the globe, 81 countries are using approximately 130 billion cigarette tax stamps and 14 billion alcohol tax stamps. In India also, the revolution of first tax stamp was introduced by Tamilnadu State Excise Department in early eighties. Today, 22 States (including Union Territories) in India are using approximately 11 billion tax stamps per annum. In contrast to
globally, all these tax stamps are for alcohol, excluding cigarettes industry. The introduction of tax stamps has help State Excise Department in minimizing the hooch tragedies,
curbing the menace of duplication, as well as in increasing the excise revenue collection. This article is an overview of TAX STAMPS in INDIA.
Holograms have been used in India as an anti-counterfeit technology since 1990. The introduction of security holograms on India’s National Identity Voter Card provided recognition of the use of a hologram as a secure authentication device by both the authorities and by large numbers of consumers.
In authentication, the usage of holograms as excise seals is the biggest market in India. To date, around 22 of India states excise departments are using holograms to combat the illicit liquor trade and subsequently increasing the revenue of their departments. In India security holograms are gaining popularity as key element of authentication and used by almost every sector facing the menace of counterfeiting.
The industry is going strong on year to year basis, and is moving forward by combining security holograms with digital technologies. Recently, holographic features have been introduced for Financial Cards in India re-strengthening its position as one of the key visual authentication features.
This article discusses the problem of tobacco counterfeiting and tax evasion, which costs governments and manufacturers significant lost revenue and damages brand reputation. Tobacco products are a lucrative target for counterfeiters due to high tax policies. The article proposes that holograms, as an anti-counterfeiting technology, could help tackle this problem. Holograms have been used globally for 15 years as an important authentication device on government tax stamps.
CompX International is a manufacturer of security products and recreational marine components based in Dallas, Texas. Their security products generate 87.7% of revenue, while marine components make up 12.3%. While security products are mature, marine components are seasonal. Relative valuation analysis finds CompX trading at lower multiples than industry averages, indicating it may be undervalued. The analyst recommends buying CompX stock.
Sample Global Adhesives and Sealants Market - Mordor intelligenceRohith Sampathi
The global adhesives and sealants market was valued at $40 billion in 2015 and is projected to reach $53.7 billion by 2020, growing at a CAGR of 6.05% for adhesives and 6.09% for sealants. Key end-use industries driving demand include building and construction, packaging, and transportation. Water-borne adhesives accounted for over 40% of the adhesives market in 2015. Stringent environmental regulations around VOC emissions present a restraint. The market is moving towards more environmentally friendly and bio-based adhesive technologies like Dow Chemical's RENUVA renewable resource technology.
Dear Reader,
Welcome to the 21st edition of The Holography Times.
Today, in India more than 300 State level industry-trade association exist representing more than 7,00,000* companies.
Each and every product has an industry trade association formed with an aim to facilitate the business environment for its member companies.
While they are playing an important role in modern and global economies, there are various hindrances which affect their industry / sector growth. Product counterfeiting is one of them. It is affecting all categories of products, but the impact is very high in sectors / product categories like fast moving consumer goods (FMCG), pharmaceuticals, electronics, automobile and aircraft parts, music, publishing, software, telecom, cosmetics, personal care, beverages, etc.
To fight this menace, a few of trade associations have come forwarded and have started playing a proactive role. Although, the number is very low, we are hopeful that other industry association will follow up the examples.
Our current issue highlights the Role of Industry Association in Curbing Counterfeiting. Apart from this, the issue also covers, industry updates including news, patents, financial analysis and much more.
Do send us your feedback / critics at info@aspaglobal.com
With Regards,
C S Jeena
Editor
Counterfeit electrical and electronic products are becoming a serious menace for legitimate manufacturers as well as for consumers and Government. The presentation focus on issue of counterfeit electrical and electronic products, its impact and steps to combat this problem. This is a part of HOMAI series of presentation against counterfeiting in various sectors. These presentations are intended for educational purposes to aware all stakeholders about counterfeiting and how we can fight counterfeiting.
Holography has evolved from security to packaging, since Glaxo used it in 1989. Again in 1994 Smithkline Beachem launches Aquafresh white toothpaste in USA in a carton covered in holographic laminate, the first time of holographic packaging has been used for branding.
The journey started by these companies is on its road to success with drastic developments in holography. The key is innovation and the approach is to stay one step ahead of counterfeiters. At this time of cut throat competition and global market conditions, companies have turned to new forms of packaging and intelligent labelling to ensure they get the attention of consumers to be successful in moving their product off the shelf and aid in helping consumers check for authenticity . Not every good packaging idea comes with a price tag. A little creative thinking is all that is needed. The article discuss the increasing use
of Holography in packaging and product promotion.
Brand Protection & Security of Engineering ComponentsBilcareltd
Bilcare Technologies provides anti-counterfeiting solutions using its nonClonableID technology. It applies unique fingerprint labels to engineering components that are prohibitively difficult to copy and can be used to authenticate components as they move through the supply chain. The technology helps combat counterfeiting by enabling real-time product verification, secure tracking, and increased supply chain visibility. This enhances brand protection, consumer safety, and supply chain management.
The document is a newsletter from The Holography Times that discusses various news and developments related to the holography industry. It includes articles about anti-counterfeiting solutions using holograms for events like the 2010 FIFA World Cup and targeting the pharmaceutical industry in India. It also discusses using holograms to celebrate successes, new hologram technologies, and interviews the managing director of Holoflex about the company's experience in the hologram industry. The newsletter aims to share information and create a forum for exchanging knowledge about all aspects of holography.
Food & beverage quality & safety is an important issue worldwide. The determination of food authenticity is a vital component of quality control. Its importance has been highlighted in recent years by various high-profile cases in the global supply chain. Europol OPSON VIII operation coordinated by Europol’s Intellectual Property Crime Coordinated Coalition and INTERPOL which ran from December 2018 through April 2019. Enforcement agencies, regulatory authorities, and private
sector partners from approximately 78 countries took part in this
operation resulted in more than 67,000 checks carried out at shops, markets, airports, seaports, and industrial estates. In total, 672 individuals were arrested during the Operation, around 16,000 tonnes, and 33 million litres of likely fake food and drink worth of €100 million seized.
Zero brand attack is an utopia. Brand owner can only take action in reducing the overall impact of brand attack.
Better management and use of effective brand protection solutions can result in brand owners getting better sales and market share; consumer getting the right products at the right price, government getting better revenues and a satisfied and loyal channel. Brand are under attack in various forms however main four are tampering, replication, diversion and recirculation. There is a need of authentication + tracking solutions to be used with proper communication to consumers.
In Rajasthan few departments and brand owners are adopting / using authentication solutions, however, there is the need to increase the awareness. For example, Rajasthan State Food & Civil Supplies Corporation is applying security hologram on daily household food items like Tea, Salt, Pulses, Spices, Atta etc. to secure life and health of people. Similar kind of solutions can easily be implemented to fight drug counterfeiting by putting high security hologram with 2D and alphanumeric codes on each individual blister pack, bottle or injectable vial.” The menace of counterfeit pharmaceutical drugs in Rajasthan can be easily addressed by the State Government and consumers, with the adoption of these consumer-friendly authentication solutions.
The document is the June 2008 issue of The Holography Times newsletter published by HoMAI. It includes the following key points:
1) The president of HoMAI welcomes readers to the third edition and discusses HoMAI's goal of further developing the holographic industry and promoting innovation.
2) News bytes highlight projects like the world's first holographic RFID tag, BMW's use of holograms for a vehicle tour, and an order for holographic tax stamps.
3) Corporate news items announce name changes for companies like Shriram Holographics and sales growth at Holostik.
This document discusses the impact of counterfeiting on international markets. It finds that counterfeiting results in billions of dollars in lost sales annually for legitimate businesses. It damages brands' reputations when customers receive low-quality counterfeit goods. Advances in technology, increased international trade, and emerging markets have all contributed to the growth of counterfeiting in recent decades. Measuring the scale of counterfeiting is difficult due to its clandestine nature. The International Chamber of Commerce estimates that the value of counterfeit goods was between $710-917 billion in 2013 and projects it could reach $991 billion by 2022 if trends continue.
ITMF-Survey about the impact of the Corona-pandemic on the global textile ind...AndyZhao29
The ITMF survey of 34 textile companies from around the world found that on average, current orders have dropped by 8% worldwide due to the coronavirus pandemic. Companies expect their 2020 turnover to be 10.5% lower than 2019 on average. Those companies surveyed earlier in March reported less negative impacts, as restrictions on public life in Europe and North America had not yet dramatically reduced offline textile and apparel consumption. The main challenges cited were ensuring worker safety, disrupted supply chains, lack of demand, and liquidity issues. Opportunities mentioned included producing medical textiles and streamlining processes to emerge stronger from the crisis.
The document discusses the rising issue of counterfeit auto parts in India and globally. It states that according to industry surveys, counterfeit parts account for around 35% of the Indian replacement auto parts market, valued at over $1 billion. Counterfeit parts threaten automaker profits but also endanger lives by failing to meet safety and performance standards. Common counterfeited parts include oil filters, brake pads, and windshields. The use of counterfeits can result in engine failure, fatal accidents from poor braking, and injury from non-shatterproof glass. Holograms and other authentication technologies are seen as ways to help distinguish genuine parts and protect brands and customers.
Armoured Vehicles India Market Report 2012 - 2022Sharmin Ahammad
This document summarizes a report on the future of Asia's armoured vehicle market over the next decade. A survey of 144 professionals found that survivability is the most important capability for Asian countries. While ballistic protection and reliability are also important requirements, Asian customers place less emphasis on protection compared to other regions and consider cost and mobility more relevant. The document analyzes responses to identify counter-IED capabilities and blast protection as the most critical attributes, though the IED threat is seen as less significant in Asia than globally.
E-Insurance is an electronic insurance system developed by ESKADENIA that replaces traditional communication methods between insurance companies and various stakeholders. It allows brokers to issue policies, endorsements, and quotations online. The system supports various types of insurance like medical, travel, and general insurance. It provides functionalities for policy management, claims processing, approvals, and communication through SMS.
There has been a wave in the global pharmaceutical industry over the past several years, driven by the need for battling the scourge of spurious medicines, which take thousands of live each year. This wave has led to the evolution of technology to help regulators ensure that only genuine medicines are distributed within or imported in any market, and to empower patient to verify that the medicines they are taking are indeed what they claim to be. Serialization is one of the most widely adopted technologies in the new wave, and in this article we present an overview of this technology and its applications.
It has been over three decades since India Today, one of India’s leading publication covered a story on the problem of
fake pesticides in Punjab and Haryana. In these last 35 years,
the predicament of farmers in India has worsened year by year, as they continue to fight a grim battle against fake pesticides. On the other hand, the fake pesticides industry in
India has been growing at an annual rate of 20 per cent and
now constitutes approximately 30 per cent of the total crop
protection market.
While fighting fake pesticides is a complex problem, the
adoption of new generation authentication solutions can greatly help various stakeholders in tackling this growing menace.
The article highlights this core issue and details on its various types along with the reasons for the increase in counterfeit pesticides. The story also brings to light the authentication solutions that can be implemented in India to curb this menace to a great extent in the interest of farmers, industry and country.
TAX Stamps have always been an important authentication solutions used by Government authorities to curb the illicit trade, protect consumer and to increase the excise revenue. It
was only 20 years ago; due to the globalization many countries started using tax stamps for the first time, especially in the Eastern Europe and Former Soviet Union. Today across
the globe, 81 countries are using approximately 130 billion cigarette tax stamps and 14 billion alcohol tax stamps. In India also, the revolution of first tax stamp was introduced by Tamilnadu State Excise Department in early eighties. Today, 22 States (including Union Territories) in India are using approximately 11 billion tax stamps per annum. In contrast to
globally, all these tax stamps are for alcohol, excluding cigarettes industry. The introduction of tax stamps has help State Excise Department in minimizing the hooch tragedies,
curbing the menace of duplication, as well as in increasing the excise revenue collection. This article is an overview of TAX STAMPS in INDIA.
Holograms have been used in India as an anti-counterfeit technology since 1990. The introduction of security holograms on India’s National Identity Voter Card provided recognition of the use of a hologram as a secure authentication device by both the authorities and by large numbers of consumers.
In authentication, the usage of holograms as excise seals is the biggest market in India. To date, around 22 of India states excise departments are using holograms to combat the illicit liquor trade and subsequently increasing the revenue of their departments. In India security holograms are gaining popularity as key element of authentication and used by almost every sector facing the menace of counterfeiting.
The industry is going strong on year to year basis, and is moving forward by combining security holograms with digital technologies. Recently, holographic features have been introduced for Financial Cards in India re-strengthening its position as one of the key visual authentication features.
Dear Reader,
Welcome to the 26th edition of our newsletter “The Authentication Times”.
Various Government authorities across the globe consider drug counterfeiting to be a major issue and coming with various policy measures in order to fight against this menace. The Indian Government has also mandated for all pharmaceutical firms to build track and trace capability for exports using barcode technology at three levels of packaging: primary, secondary and tertiary. Although the Government is doing work at the policy level, there is a clear need to involve all stakeholders in the efforts in fighting this menace.
The mandates to serialize all pharmaceutical products is a challenge for pharmaceutical manufacturers. Keeping in view, we decided to cover a story highlighting “Overview on Pharmaceutical Serialisation”. The issue also covers our series of article on “Authentication Technologies”. The current article will give an overview of key available anti-counterfeiting technologies to be followed by anti-tamper technology and track and trace technologies. Apart from this the issue also covers the industry updates including news, counterfeit seizure report, appointment, global patents and upcoming events.
Do send us your feedback/critics at info@aspaglobal.com.
With Best Regards,
C S Jeena
Editor
Illicit tobacco trade and tobacco tax evasion are problems that costs governments and manufacturers dearly in terms of lost revenue and damage to brand reputation. Further, the high tax policies on tobacco products make them a lucrative target for counterfeiters. In this article, we
will find out how hologram, an anti-counterfeiting technology, could prove to be an important tool
in tackling this problem.
Dear Readers,
Welcome to the 30th edition of The Authentication Times.
In The Authentication Times, we continue to raise the issue of counterfeiting, which impacts the consumers and society by large. Our current edition focusses on the issue of milk adulteration in India. Managing food safety standards across a global supply chain is complex and challenging. However, steps must be taken to ensure safe and secure shipping,
and distribution of food products that end up in consumer's hands. To protect the 25 million babies born every year in India, it is essential to protect baby milk powders and other nutritional products from the scourge of counterfeiting.
According to a survey conducted by the Food Safety and Standards Authority of India (FSSAI) in 2011, 68.4 of per cent milk served throughout the country was found adulterated, which itself defines the grim situation and calls for strict rules over fake and adulterated milk.
The cover story highlights this challenging issue in detail covering aspects such as its impact, consequences and how this menace can be tackled with the help of technology – adopting authentication, and track and trace solutions.
In this issue, you will also find a new section “Questions raised in the Indian Parliament related to counterfeiting and Answers by the Members of Parliament against these.” Other than this, you will also find our regular sections such as reports from FICCI CASCADE, News Bytes, Counterfeit Seizure Report and Events in this issue.
We thank you for your continual support and look forward to receive your feedback.
Regards,
Editor - The Authentication Times
Everyone involved in the goods supply chain - manufacturers, distributors, consumers, taxation and
government authorities- has learnt the value of security holograms and will be reassured by their presence
on products and/or the packaging, recognising the benefits they provide. However, as coding and serialisation becomes mandated in various countries for products such
as medicines and tobacco products, the ability to incorporate QR, data matrix and other types of code in to
holograms further enhances the role they can play in supply chain control. Ian Lancaster, general secretary
of the International Hologram Manufacturers Association, highlights the latest developments.
Identity theft and ID counterfeiting are among the fastest growing types of crime, especially in highly industrialized
countries. According to FBI statistics, it is the fastest
growing crime in USA. The Federal Trade Commission
estimates that as many as 9 million Americans have
their identities stolen each year. The article highlight the issues related to document counterfeiting and the
importance of hologram in document protection.
Globally many countries are shifting or opted polymer banknotes in place of paper banknotes. The article analyses the brief history, pros and cons of polymer banknotes.
Dear Reader,
Welcome to the first issue of the year and wish you a Happy 2016!
We hope this year is filled with joyful learning, abundant opportunity, and success in all that you choose to do.
Coming to The Authentication Times, the current edition focuses on the issue of counterfeit pesticides that are being rampantly used in India. Agriculture industry, which is the backbone of our Indian economy, is facing multiple threats from the growth of these counterfeit pesticides. Though the problem is not a new one and exists since last 35 years, however, the situation has become worse in the last five years. The counterfeit pesticides industry in India is growing at an annual rate of 20 per cent. If not immediately addressed, it
can reach up to 40 per cent (approximately) share by value in the pesticides industry by 2019.
Our cover story highlights this core issue and details on its various types along with the reasons for the increase in counterfeit pesticides.
The story also brings to light the authentication solutions that can be implemented in India to curb this menace to a great extent in the interest of farmers, industry and country.
In this issue, you will also find an interesting interview with Pantec GS Systems and Arkansas Tobacco Control, various industry updates, news bytes, counterfeit seizure report and global patents.
We thank you for your continual support and look forward to receive your feedback.
Sincerely,
Chander S Jeena
Editor
The liquor industry is a major source of excise revenue for all States in India. In fact, it is the second largest
revenue contributor for many States after sales tax. More than two decade ago, Tamilnadu Government
took the revolutionary step and introduce fi rst holographic excise adhesive label (HEAL) in India. The step
taken by Tamilnadu was appreciated and further adopted by many other States in India. Today, more
than 17 States excise department are using HEAL. This has not only minimized the hooch tragedies
and duplication, but has also substantially increased the excise revenue collection in States. This article
highlights the role of HEAL as an effective anti-counterfeiting solution in securing tax revenue, protecting
consumer and curbing illicit liquor trade.
This document discusses the use of tax stamps and authentication technologies in India to increase liquor tax revenue and curb illegal liquor. It provides an overview of the Authentication Solution Providers' Association and how they have worked with state governments to implement hologram-based tax stamps. Implementation of these stamps has led to significant increases in tax revenue for states like Tamil Nadu, Madhya Pradesh, and Uttar Pradesh. The document advocates for expanding the use of track-and-trace technologies in tax stamps to all states by 2016 to further reduce illicit liquor and protect public health while growing government funds.
This document discusses how to select authentication solutions to combat counterfeiting according to your needs. It recommends conducting background work to understand the nature and causes of counterfeiting threats. It also stresses the importance of organizational commitment from senior leadership. The document then provides guidance on selecting appropriate authentication technologies and solutions based on your manufacturing processes. It emphasizes that solutions must be properly implemented, monitored and upgraded over time to successfully fight counterfeiting.
Security holograms provide authentication, identification and detection of counterfeits to curb illegal mining. They have been adopted by 5 Indian states - Uttar Pradesh, Jharkhand, Gujarat, Karnataka and Orissa - to mark transport permits for iron ore. Holograms offer multi-level security features that are difficult to copy, enabling visual authentication and tracing of permits to differentiate legal documents from fakes.
Holograms are used globally by excise department to increase government revenue as well as to stop tax evasion. As of 2007, more than 27 countries (46% of total using tax stamp) are using on their liquor stamps. The presentation explained importance of holographic excise adhesive label (HEAL) and statistics that its use has resulted in an impressive increase in revenue whenever it has been used.
The presentation highlight the work of HOMAI doing to promote holography industry in India and to protect consumers from ill effects of counterfeiting.
Counterfeiting continues to be a major growing issue in
the automotive component industry. According to Motor
Equipment Manufacturers Association (MEMA), USA
the global automotive industry loses US $ 12 billion
to counterfeiting. The Indian scenario is not a different
story. According to FICCI – CASCADE latest study
(Grey market the invisible enemy) released in 2012, the
Auto component industry loses 29.6% of its sales due
to grey market, worth US $ 2 billion (INR 9198 crores
out of estimated size of INR 31,046).
To combat this menace all Stakeholders need to fight
at their level. Governments have a particularly critical
role to play in this effort. All over world, they are doing
their best creating the necessary legal infrastructure,
educating police force, developing suitable laws to
deter fraudulent behaviour. Businesses, however, must
also do their part to prevent the production and sale of
counterfeit products.
Holograms are proposed as an effective solution to authenticate pharmaceutical products and combat counterfeiting. Holograms provide multi-layered security through overt, covert, and forensic features that are extremely difficult to copy. They can be easily integrated with packaging and allow for convenient authentication. As an established industry, holograms offer cost-effective security that scales well through a national logistics network of manufacturers supporting continuous innovation.
The document discusses various news items related to the holography industry. It begins with an announcement of Giesecke & Devrient's new Laser Personalized Patch technology, which integrates multiple security features including optically variable devices and personalized details to enhance protection of identity documents against counterfeiting. It also mentions Kurz's new Blackline Magnetic foil solutions and reports on new generation hologram ID cards being introduced in Poland and the UK in 2009. The document further provides updates on various companies and events related to the holography industry.
Counterfeiting and Semiconductor Value Chain Economics by Mr. Rory King - IH...Rory King
Counterfeit parts have proliferated dramatically in recent years, presenting huge challenges for electronics manufacturing and specifically military and aerospace application. This session will offer unique new market trends, observations, and best practices on the issue of economics, semiconductor value chains, obsolescence, counterfeit electronics, and market impacts such as fact-based insight into market indicators like correlation among counterfeits, semiconductor factory utilization, component obsolescence, semiconductor availability, price volatility, and supply-and-demand equilibrium.
Counterfeiting and Semiconductor Value Chain Economics - COG 2013, Mr. Rory KingIHS
Supply Chain Risk Insight into Market Sense and Respond Actions of Counterfeiters
Rory King
Global Director, Supply Chain, IHS Inc.
Counterfeit parts have proliferated dramatically in recent years, presenting huge challenges for electronics manufacturing and specifically military and aerospace application. This session will offer unique new market trends, observations, and best practices on the issue of economics, semiconductor value chains, obsolescence, counterfeit electronics, and market impacts such as fact-based insight into market indicators like correlation among counterfeits, semiconductor factory utilization, component obsolescence, semiconductor availability, price volatility, and supply-and-demand equilibrium.
Beware! Counterfeit Components Put Safety and Security at RiskDaren Saroop
The counterfeiting market has grown out of control and infiltrated all areas including the electronic components industry. This White Paper will unveil the risks involved and the financial and economic implications.
Counterfeit components and the risks involvedDorine Vidal
The counterfeiting market has grown out of control and infiltrated all areas including the electronic components industry. This White Paper will unveil the risks involved and the financial and economic implications.
Counterfeit parts prevention kristal snider and kevin beardKristal Snider
The document discusses counterfeit parts prevention and the role of industry standards like AS9100 and AS5553. It provides an overview of the counterfeit parts problem, how they enter the supply chain, their impact, and industry efforts to address it. Key points discussed include the definition of counterfeit parts, their origins in the e-waste industry in China, methods of entry into the supply chain, effects on the military, and the role of organizations like G-19 and standards like AS5553 in preventing counterfeits. It also examines how counterfeit part prevention can be audited under the AS9100 quality standard.
The Threat of Counterfeit Devices: Complicity vs VigilanceWaqas Tariq
Challenges that arise as a result of high mobile phone penetration in developing countries such as counterfeiting and increasing product complexity, have largely been tackled from the supply side. This study explores this issue from the demand side by investigating the relationship between socio-demographic characteristics and levels of Intellectual property vigilance as well as brand and quality awareness among urban mobile technology consumers in Botswana. Implications for both corporate and public policy are discussed at the end of this paper.
The document discusses observations from experiences detecting counterfeit electronic components. It finds that industry inspection methods are designed to verify authentic parts, not detect counterfeits. Many counterfeit cases trace back to sources in China through independent distributors. Effective detection requires visual, documentation, and electrical testing methods tailored to uncover various counterfeiting techniques like remarking, refurbishing, and bogus documentation. Authentic parts may show signs of prior testing or poor storage, so additional validation is needed to ensure reliability.
Electronics are built everywhere and they are big business. Counterfeit electronic components have become a significant problem that affects the whole electronics supply chain, down to the end product. There are some underused tools that can help manufacturers fight product piracy. IECQ is one of them.
Use Anti-Counterfeit Tech as Fatal Weapon to Combat Fakes in Electronics Indu...Alfons Futterer
Get insights into the latest traceability and brand protection technologies on Electronic industry
Through this webinar presentation you’ll learn about:
- Current situation and trends in Consumer Electronics
- Customized anti-counterfeiting solutions...
The economic impact of cybercrime and cyber espionageBee_Ware
The document discusses estimating the economic costs of cybercrime and cyber espionage. It identifies six components that contribute to these costs: loss of intellectual property, direct financial losses from cybercrime, loss of sensitive business information, opportunity costs from disruptions and security spending, reputational damage, and additional costs of securing networks and recovering from attacks. Previous estimates of total annual global losses vary widely from billions to hundreds of billions due to data limitations. The document attempts to break down cost components and uses analogies to other crimes to estimate a range of probable total global costs in the hundreds of billions of dollars annually, which would be a fraction of a percent of global GDP. It emphasizes further analysis is needed on the full effects on trade,
The worldwide semiconductor industry: Trends and opportunities 2016 The Broker Forum
The worldwide semiconductor industry: Trends and opportunities 2016
Today, the rapid pace of innovation and ever-expending use of technologically advanced devices including smartphones, tablets, flat-screen monitors, smart connected cars and medical devices is multiplying the number of semiconductor components being used around us every day. Digitization, connectivity and the internet of things (IOT) now promise solid growth for the global semiconductor market.
Discover how you can develop your business by looking at this market infographic from The Broker Forum.
The document outlines India's National Policy on Electronics from 2011. The key goals are:
1) To transform India into a global hub for electronics system design and manufacturing in order to meet growing domestic and global demand.
2) To develop core competencies in strategic sectors like defense, space, automotive and create an ecosystem that can cater to a domestic demand of $400 billion by 2020.
3) To promote indigenous manufacturing, exports, innovation and skills development in the electronics and technology sector in order to make it a major driver of the Indian economy.
The 2008 Batman movie "Dark Knight" is still remembered because of its many contributions to the superhero genre. The actors in this film are highly praised for their superb performances, the most famous of which is the late actor Heath Ledger. In addition, the high-tech weapons in the movie have also raised our expectations for action movies.
This document provides an analysis of the semiconductor industry and three semiconductor companies: Texas Instruments, Skyworks Solutions, and Avago Technologies. It includes an overview of the semiconductor industry, historical performance, current conditions, and future predictions. For each company, it provides an overview, history, qualitative assessment, ratio analysis, and intrinsic valuation. The intrinsic valuation for Texas Instruments ranges from $61.29 to $64.03 depending on the treasury rate used, indicating the stock is undervalued relative to its intrinsic value.
The document estimates the annual global cost of cybercrime to be between $375 billion and $575 billion. It notes that estimating this cost is challenging due to incomplete data and underreporting of cybercrime incidents. The cost includes direct losses as well as indirect costs like additional security spending and lost productivity. Countries with more IP-intensive economies tend to lose more. While developed countries face higher losses, developing countries are also increasingly at risk as internet access grows. The lack of standardized data means the estimate has significant uncertainty, but the overall impact of cybercrime on the global economy is substantial.
Ey semiconductor-supplies-hitting-vehicle-salesEYIndia1
How Supply Chain challenges can be effectively managed through Digital Technology & Solutions for planning
URL:- https://assets.ey.com/content/dam/ey-sites/ey-com/en_in/news/2021/03/ey-semiconductor-supplies-hitting-vehicle-sales.pdf
Similar to Counterfeit threat-for-electronics-industry-on-rise-plug-it (20)
The last few years have seen a shift by state excise departments towards using tax stamps, not only as tax collection instruments, but also as tools for authentication. With this in mind, many states have upgraded their stamps by combining the latest authentication features with digital technologies.
COVID-19 is affecting people in all corners of the world as we know it. At this critical point, concerns are increasing among the public including the news of getting fake Personal Protection Equipment's, including sanitizers & masks. Witnessing a scarcity of sanitizers and face masks since the COVID-19
outbreak, Counterfeiters and profiteers have offered the bogus public treatments and unfounded advice. These are ideal conditions for criminals to capitalize on people's fears by advertising falsified therapies and vaccines and spreading rumors of potential cures. In this challenging situation, being
vigilant is the most important thing.
This document discusses the role of tax stamps in implementing an ideal state excise policy in India. It notes that excise taxes on alcohol are an important source of state revenue. While revenue generation is important, excise policy must also consider public health and curb illicit trade. Tax stamps can help reduce consumption, generate revenue, and protect consumers by allowing for product authentication and monitoring supply chains. The document argues that tax stamps should be viewed not just as a tax collection tool but as a platform to meet policy goals like reducing consumption, securing revenue, and empowering consumers and industries.
Counterfeiting activities are increasing menace both in terms of value and magnitude. The Government must look into
the issue of counterfeit and pirated products’ trade and treat it on a national priority which will help in eliminating this threat.
“For the larger interest of the nation and to ensure that this issue gets the desired attention.
We often read, hear or see news related to counterfeit products, counterfeiting and counterfeiters. From knock-off tires to spurious brakes, counterfeit toys to fake medicines, duplicate luxury handbags to phony fragrances, the list seems endless. Counterfeit products pose a risk to consumers, manufacturers, government and other stakeholders. The figures related to counterfeiting on the national and global level have raised an alarm which should not be left unnoticed. The widespread sale of fake goods on the e-commerce portals has further deteriorated the situation. Today, it has become quite challenging for the consumer, manufacturer and authorities to tackle the problem of counterfeiting.
The use of serialization as an anti-counterfeiting measure has expanded across the world, and across sectors. This is especially true in the pharmaceutical sector, where more than 75% of the world’s pharmaceutical supply will be under serialization regulations by 2020. The United States, the European Union, Argentina, Turkey, Saudi Arabia, India and Russia, amongst others, already have or are in the process of implementing regulations. Several other countries are evaluating how best to protect their patients against the scourge of counterfeiting, one that takes hundreds of thousands of lives a year and causes billions of dollars of losses to industry (one estimate by the World Economic Forum put it at $200 bn annually ). Even without regulations, leading companies around the world are adopting serialization as a tool to protect their brands and secure their supply chains. Whether you are a brand owner or a regulator, taking those first steps in the serialization journey can be daunting. The article is an attempt to break it down into five steps view as being essential for success.
The article review the Cannabis in India & Canada. While India is fighting with the illicit Cannabis problem, Canada is expecting to generate $8 billion revenue with legalizing it. Recently, International Narcotics Control Board (INCB) released annual report, raises concerns over record levels of illicit cannabis herbs seized in India. While a debate must be is needed on socio-economic benefits of legalizing cannabis, it is known fact the country needs greater investments in the healthcare sector to enable better treatment and rehabilitation of drug users. The time is the best answer, is legalizing Cannabis benefit the socio-economic is the future ?
With almost a 1.32 billion population, India needs a robust, modernized agriculture sector to ensure the nutritional food security for its population. In order to meet the food requirement of the nation, the agricultural productivity and its growth needs to be sustained and further improved. Crop protection industry play a significant role in this and working hard in Research & Development, Technology Transfer by providing latest innovations to the farmers and helping to achieve the Honorable Prime Minister’s agenda of “Doubling Farmers’ Income by 2022” and “Nutritional Food Security” for the nation. There is also a remarkable share of non – genuine pesticide in Indian market, which can be illegal, counterfeit, spurious, adulterated or sub – standard. These products are unable to control the pests or control them efficiently and may cause considerable harm to soil and environment as well as production loss. The damage by these spurious products is multifold. The issue of spurious or counterfeit pesticides as also its adverse impact on the national economy needs to be highlighted and for this purpose Federation of Indian Chambers of Commerce and Industry (FICCI) with the help of Department of Chemicals & Petrochemicals and Department of Agriculture Cooperation & farmers Welfare, Government of India organized a Round Table Meeting on “Supporting Farmers with Quality Crop Protection Products : Challenges and Opportunities” on 15th February, 2019 at New Delhi.This presentation was delivered at the forum by Authentication Solution Providers' Association highlighting "How Authentication Technologies & Solutions are helping farmers, industry & Government across globe and same can be implemented in India".
The presentation is from Authentication Solution Providers’ Association (ASPA) & Indian Printing Packaging and Allied Machinery Manufacturers Association (IPAMA) recent workshop organized during PRINTPACK 2019. It covers recent initiatives & latest trends in physical authentication technologies. ASPA’s latest project “Counterfeit News Repository”, a unique repository providing a record of incidents of counterfeiting, theft and illegal diversion of products worldwide. Examples of innovation in Anti-Counterfeiting industry including irreversible holographic effect for medicine carton, NFC chip based Tamper Evident Label for medical Auto-injectors, high security holographic cap seal with digital authentication, use of special film on spot registration feature for carton packaging etc. etc and steps in developing Anti-counterfeiting strategy. The key learning from presentation is to integrate physical anti-counterfeiting technologies with traceability technologies to make customized authentication solutions. The future will be Current Labelling integration with innovative authentication solutions will lead to Smart Packaging Solutions which will ensure efficient supply chain, revenue enhancement , consumer safety and loyalty towards products, brands and authorities.
Integration of anti-counterfeiting solutions, physical with digital technologies play a vital role in staying ahead of the counterfeiters. While the trade of counterfeit has dramatically increased, tackling counterfeits is not impossible. For that we need to create zero tolerance position towards illegal activities (strict policy with our business partners and expect their full support in fighting any kind of illegal activities). There is a need to implemented a global strategy to efficiently combat production, trade and use of counterfeit and illegal products including awareness, training and development of anti-counterfeiting solutions.
In 2015, FICCI estimates that the non-genuine pesticides market in India is estimated at Rs 3200 crore (25% by value) and expected to grow 20% per year and by 2019 40%.
According to recent study by FICCI, the domestic market increased with CAGR 3.5% for period 2013-16, and expected to grow 6.4% by 2022. The presentation focus on Anti-Counterfeiting solutions and role of technology in helping crop protection industry for consumer protection, brand protection and revenue enhancement.
Wlook like today, compared to what it used to look like… and
what it may look like tomorrow? What are the drivers that have shaped the modern tax stamp and what are the individual parts of that stamp that make up the whole?
These are the questions addressed in this special feature, devoted to the evolution in the design, as well as in the
security features and functionality of tax stamps – since all these elements are inextricably linked.
The document summarizes the evolution of diffractive optically variable devices (DOVIDs) on banknotes over several decades. Some key milestones include the first DOVIDs appearing on banknotes in Austria and Australia in 1988, the widespread adoption of DOVIDs following the introduction of the Euro in 2002, and continued technological advances such as the introduction of windows, volume holograms, and improved demetallization processes. DOVIDs have become one of the most common and effective security features used on banknotes worldwide as the technology has advanced.
Banknote design management should invest in user needs. When cash is no longer an attractive payment instrument,
banknotes will disappear. User needs will lead to other design requirements as applied today. Furthermore, banknote
designers should focus first of all on the User Interface Functions, instead of spending their creativity to User
Experience Functions like connecting to a main image.
Combating illicit tobacco trade is an issue that is being seriously
addressed by not only those in the tobacco industry but also governments around world and international bodies such
as World Health Organisation (WHO) and Interpol. According to an estimate by WHO, eliminating the illicit trade in tobacco would generate an annual tax of US $ 31 billions for governments. In Indian scenario, as per media sources, illegal Cigarette trade comprising international smuggled and locally manufactured tax-evaded cigarettes accounts for as much as 1/4th of the Cigarette Industry in India. According to studies by FICCI CASCADE (Committee against Smuggling and Destroying Economy), the grey market in the tobacco industry has grown significantly since 2010 and has grown from 15.7 percent in 2010 to 20.2 percent in 2012 - an increase of 28.7 percent. Government of India alone bears the losses
INR 13 billion per annum because of illicit tobacco trade. Based on the current tax rates on cigarettes, it is estimated that the
Government loses Rs. 13,000 crores per annum because of illegal cigarette trade.Taking a positive step in curbing illicit
tobacco trade, on 2-May-2018, The Union Cabinet Chaired by Prime Minister Shri Narendra Modi has given approval to
accede to the Protocol under World Health O rg a n i z a t i o n ( W H O ) F r a m e w o r k Convention on tobacco control to eliminate illicit trade in tobacco products. This is a welcome step and in view of this development, the article review the issue and solutions for combating it.
Blockchain technology is being used in a pilot project to improve tuna traceability from catch to plate in the Pacific Islands tuna industry. The project, led by WWF Australia, Fiji, and New Zealand along with technology partners, will track tuna using RFID and QR codes recorded on the blockchain to provide transparency into the supply chain and help curb illegal fishing. The blockchain record will follow tuna at various stages - from tagging when caught to processing to final packaging. This level of traceability has the potential to strengthen sustainability and ethics in the global tuna industry.
Drug counterfeiting is a significant public health threat and is rapidly increasing with dozens of new cases being reported throughout the world every day. In the past few months, various
news has been reported in media referring the ongoing activities of counterfeiters making fake and sub-standard medicines in
different parts of India. The article is on need of anti-counterfeit secured packaging solutions like tamper evident and serialization.
The article provide an comparative analysis of evolution of basic and additional security features in ordinary passports, during the last two decades from 1996 to 2016, based on the information held in the Keesing Reference database.
Astrid Mitchell has a 30-year commercial career with companies within the banknote, authentication and holographic industries, including De La Rue, Applied Optical Technologies and
Bundesdruckerei. She joined the Reconnaissance Board in
2002 and, in addition to her role as Managing Director, is primarily responsible for the company’s activities in currency (including Currency News, The Coin Conference and various directories and reports through Reconnaissance’s joint venture Currency Publications Ltd.). The article provides an overview of trends and development in currency in 2017.
In India, security holograms are extremely relevant device for authentication and revenue protection. Almost, 22 billion tax stamps are used per annum in India protecting tax revenue worth approximate INR 600 billion. The presentation will give you an overview of holographic tax stamps trends and developments in India. Most of the tax stamps used in India fall into three categories: full polyester-based security holograms; paper labels with a holographic portion; and plain paper or BOPP-based labels.The vast majority of stamps used, however, are full polyester-based security holograms, which are quite unlike the paper-based variety mainly preferred in the rest of the world.
More from Authentication Solution Providers' Association (ASPA) (20)
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMHODECEDSIET
Time Division Multiplexing (TDM) is a method of transmitting multiple signals over a single communication channel by dividing the signal into many segments, each having a very short duration of time. These time slots are then allocated to different data streams, allowing multiple signals to share the same transmission medium efficiently. TDM is widely used in telecommunications and data communication systems.
### How TDM Works
1. **Time Slots Allocation**: The core principle of TDM is to assign distinct time slots to each signal. During each time slot, the respective signal is transmitted, and then the process repeats cyclically. For example, if there are four signals to be transmitted, the TDM cycle will divide time into four slots, each assigned to one signal.
2. **Synchronization**: Synchronization is crucial in TDM systems to ensure that the signals are correctly aligned with their respective time slots. Both the transmitter and receiver must be synchronized to avoid any overlap or loss of data. This synchronization is typically maintained by a clock signal that ensures time slots are accurately aligned.
3. **Frame Structure**: TDM data is organized into frames, where each frame consists of a set of time slots. Each frame is repeated at regular intervals, ensuring continuous transmission of data streams. The frame structure helps in managing the data streams and maintaining the synchronization between the transmitter and receiver.
4. **Multiplexer and Demultiplexer**: At the transmitting end, a multiplexer combines multiple input signals into a single composite signal by assigning each signal to a specific time slot. At the receiving end, a demultiplexer separates the composite signal back into individual signals based on their respective time slots.
### Types of TDM
1. **Synchronous TDM**: In synchronous TDM, time slots are pre-assigned to each signal, regardless of whether the signal has data to transmit or not. This can lead to inefficiencies if some time slots remain empty due to the absence of data.
2. **Asynchronous TDM (or Statistical TDM)**: Asynchronous TDM addresses the inefficiencies of synchronous TDM by allocating time slots dynamically based on the presence of data. Time slots are assigned only when there is data to transmit, which optimizes the use of the communication channel.
### Applications of TDM
- **Telecommunications**: TDM is extensively used in telecommunication systems, such as in T1 and E1 lines, where multiple telephone calls are transmitted over a single line by assigning each call to a specific time slot.
- **Digital Audio and Video Broadcasting**: TDM is used in broadcasting systems to transmit multiple audio or video streams over a single channel, ensuring efficient use of bandwidth.
- **Computer Networks**: TDM is used in network protocols and systems to manage the transmission of data from multiple sources over a single network medium.
### Advantages of TDM
- **Efficient Use of Bandwidth**: TDM all
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSIJNSA Journal
The smart irrigation system represents an innovative approach to optimize water usage in agricultural and landscaping practices. The integration of cutting-edge technologies, including sensors, actuators, and data analysis, empowers this system to provide accurate monitoring and control of irrigation processes by leveraging real-time environmental conditions. The main objective of a smart irrigation system is to optimize water efficiency, minimize expenses, and foster the adoption of sustainable water management methods. This paper conducts a systematic risk assessment by exploring the key components/assets and their functionalities in the smart irrigation system. The crucial role of sensors in gathering data on soil moisture, weather patterns, and plant well-being is emphasized in this system. These sensors enable intelligent decision-making in irrigation scheduling and water distribution, leading to enhanced water efficiency and sustainable water management practices. Actuators enable automated control of irrigation devices, ensuring precise and targeted water delivery to plants. Additionally, the paper addresses the potential threat and vulnerabilities associated with smart irrigation systems. It discusses limitations of the system, such as power constraints and computational capabilities, and calculates the potential security risks. The paper suggests possible risk treatment methods for effective secure system operation. In conclusion, the paper emphasizes the significant benefits of implementing smart irrigation systems, including improved water conservation, increased crop yield, and reduced environmental impact. Additionally, based on the security analysis conducted, the paper recommends the implementation of countermeasures and security approaches to address vulnerabilities and ensure the integrity and reliability of the system. By incorporating these measures, smart irrigation technology can revolutionize water management practices in agriculture, promoting sustainability, resource efficiency, and safeguarding against potential security threats.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
1. www.homai.org 9
The Holography Times
Vol. 8, Issue 24
Cover Story
Counterfeit threat for
electronic industry on
rise: plug it
Introduction:
Imagine incidents such as
an aircraft crashing due to
malfunctioning counterfeit
parts, a medical equipment
blurs off in the middle of the
surgery, a missile misses the
target and hits the own camp
and a heavily invested satellite
fails reaching its destiny or a
fake mobile battery exploding
even as one is using the phone.
The counterfeit electronic parts
are available everywhere from
sophisticated semi-conductors
and chips used in commercial
and military electronics as well
as the normal day to day used
electronics items, and they
represent a serious hazard if
used in critical systems such as
aircraft navigation, life support,
military equipment, or space
vehicles.
After the crash of the C-130J
Super Hercules near Gwalior
there were controversial news
reported in the media about
counterfeit electronics being
the reason for this unfortunate
incident. Actually, certain
avionics displays fitted in this
aircraft as original equipment
were manufactured by L3
Display Systems Corporation, a
US Company1
. In November 2010,
the company become aware
that its in house failure rate
for a chip installed on display
units used in C-130J and C-27J
had more than tripled from 8.5
percent to 27 percent. When
sent for testing, the parts were
found as suspected counterfeit.
Although, the company did not
give any recall notice, But when
this matter became known to
the public, the US Senate Armed
Services Committee decided
to investigate the matter and
released its report on May 21,
2012. The report admitted that
counterfeit electronics parts
were breaking into the defense
supply chain and could endanger
the lives of troops and allies.
While the report focuses on the
risks posed to military systems,
there is no reason to believe that
the risks are any different for
non-military systems2
.
Author: Author is Secretary of Hologram Manufacturers
Association of India (HoMAI) since 2006 and also serves as
Editor of The Holography Times.
C S Jeena
Brief Abstract:
Counterfeiting is not a new term for
electronic industry as counterfeit
electrical and electronic products
now occupy second place after
pharmaceuticals estimated to
range anywhere between US$11
billion to $20 billion worldwide
every year. However, counterfeit
electronic parts have been much
in the public eye in recent weeks.
On March 28, 2014 one of Indian
Air Force Aircraft (C-130J Super
Hercules) crashed near Gwalior city
killing five crew members. There
were controversial news reported
in media about the counterfeit
electronics being the reason for
C-130J air crash. Over the past
several years the electronics industry
has seen a marked increase in the
availability of counterfeit electronic
components. Counterfeiters
have attacked every commodity
of electronics, from simple
components such as capacitors,
to complex integrated circuits such
as microprocessors. In expensive
commercial devices, as well as high
cost military components, have seen
counterfeiting on the rise. This article
highlights the serious risk, its impact
and the possible proactive steps that
can be taken to curb this menace.
1. “Did IAF’s ‘US-made’ C-130J Super Hercules that crashed have fake Chinese parts?,” Chidanand Rajghatta,TNN | Mar 30, 2014 available at
http://timesofindia.indiatimes.com/india/Did-IAFs-US-made-C-130J-Super-Hercules-that-crashed-have-fake-Chinese-parts/articleshow/
32977838.cms
2. “Inquiry into Countefeit Electronic Parts in the Department of Defense Supply Chain: Report of the Committee on Armed Services United
States Senate” hereinafter the “SAAC report,” available at http:// www.armed-services. senate.gov/Publications/ Counterfeitpercent20
Electronic20percent20Parts.pdf.
2. www.homai.org10
The Holography Times
Vol. 8, Issue 24
Cover Story
Size of counterfeit
electronic components
problem:
The making of counterfeit
electronic parts has become
a very big business. In fact,
counterfeit electrical and
electronic products now
occupy second place after
pharmaceuticals. Worldwide
counterfeiting of electrical
products is estimated to range
anywhere between US$11
billion to $20 billion annually.
In North America alone, the
electrical product counterfeiting
is estimated to be in the $300
million to $400 million range
and rapidly growing3
. Research
from the Mobile Manufacturers
Forum (MMF) says around
148 million counterfeit or
substandard mobile phones
were sold worldwide in 2013,
mostly in developing countries4
.
Although not much has been
done in India to assess the
impact of counterfeit electrical
components, there is a study
by FICCI CASCADE that focused
on computer hardware and
mobile phones. According to
this study counterfeit computer
hardware constitutes 26.4%,
or ` 47.25 billion by value, of
the total market size estimated
at ` 179.01 billion for 2012.
Similarly, the Grey market for
Mobile Phone constitute 20.8%,
or ` 90.42 billion by value, out
of total market size estimated
at ` 434.09 billion in 20125
. (See
Table 1).
Most commonly
counterfeited
electronics items
From components such as fuses,
cables and circuit breakers
to household equipment,
professional work tools and
automotive and aviation spare
parts, nothing is safe from
counterfeiting. While the
appearance and packaging can
be very convincing, the products
themselves are often sub-
standard and may represent a
severe safety hazard, causing
accidents and costing lives. (See
table 2 and Table 3)
Reason / factor
for increase in
electronic components
counterfeiting:
The problem is, increasing
because of various factors,
including global as well as local
such as;
Table 1: Counterfeit Computer Hardware and Mobile Phone in India
Particulars Computer Hardware Mobile Phones
Estimated sales to Industry Grey Market (percentage) 26.4 20.8
Sales loss INR 47.25 billion INR 90.42 billion
Estimated tax loss to the Government Direct tax loss 470 million 4.96 billion
Indirect tax loss 11.87 billion 26.78 billion
Tax loss to the exchequer 12.34 billion 31.74 billion
*The loss has been calculated for the year 2012
3. “Sharks in the Water,” By John Estey, National Electrical Manufacturers Association, T&D World Magazine (May 2007) available at http://
tdworld.com/business/sharks-water
4. “Counterfeit/Substandard Mobile Phones, A resource guide for Government,” White paper published by Mobile manufactures Forum available
at http://www.mmfai.org/public/docs/eng/MMF_CounterfeitPhones_EN.pdf
5. “Socio-Economic Impact of Counterfeiting, Smuggling and Tax Evasion in Seven Key Indian Industry Sector,” published by FICCI Committee
Against Smuggling and Counterfeiting Destroying Economy (CASCADE) available at http://www.ficci.com/spdocument/20190/Executive-
Summary-invisible-enemy-aug-8-2013.pdf
3. www.homai.org 11
The Holography Times
Vol. 8, Issue 24
Cover Story
1. Global number of illegal
manufacturing due to
shortcoming of existing
legislation: According
to Electronic Industries
Association of India ELCINA,
the component industry
has suffered because duty-
free imports of about 217
categories of electronic
components like capacitors,
resistors and transformers
were allowed from 2005
under an information
technology agreement with
theWorldTradeOrganization
(WTO-ITA1). Many of India’s
more than 1,000 small
companies manufacturing
electronic components
have shut operations6
. In
an investigation spanning
six months, the Directorate
of Revenue Intelligence
has found that for over
3,673 items brought from
China, the importers usually
declared 1-9 percent of the
actual value of the goods7
.
2. Easy availability of
material due to global
E-Waste handling: China
may be a principal source
of counterfeit parts, but
the United States and other
countries in the developed
world generate the
electronic waste (“e-waste”)
from which semi-conductors
and other micro-electronic
parts are extracted by
counterfeiters. The parts
recovered from the
salvaged electronics waste
which are non-functional
are processed by the
counterfeiters to give a look
of an original component8
.
3. Inadequate surveillance
efforts by brand owner
to identify counterfeit
products;
4. Tampering/Repackaging:
Counterfeit electronic
component enter the
supply chain through local
manufacturing, importing
from China in the form of
fake packaging or in original
packaging sourced from
mechanics or service stations;
5. Higher margins: In
comparison to genuine
electronic component
makers, a counterfeiter earns
anywhere from 35 percent
to 75 percent on selling
counterfeit electronic parts.
6. Consumer Education: Lack
of consumer education to
identify authentic electronic
Table 3. Top 5 Most Counterfeited
Semiconductors in 2011
(Percentage of Counterfeit
Part Reports)
Rank Commodity % of reported
Type Incidents
1 Analog IC 25.20%
2 Microprocessor 13.40%
IC
3 Memory IC 13.10%
4 Programmable 8.30%
Logic IC
5 Transistor 7.60%
Source: IHS Parts Management 2012
6. “Dragon on the Rampage: A flood of cheaper Chinese goods, sometimes better than their Indian counterparts, is forcing small manufacturers
to shut shop and turn into traders,” by Taslima Khan, Edition: Mar 2, 2014 published by Business Today available at http://businesstoday.
intoday.in/story/chinese-imports-hitting-india-msme-sector/1/203041.html
7. MP3 player for Rs 2, LED torch for Rs 8: Undervalue Chinese imports, make a killing, C Unnikrishnan, TNN.
8. “U.S. e-waste drives counterfeit components problem,” by Victoria Fraza Kickham, published by Global Purchasing available at http://
globalpurchasing.com/latest-news/us-e-waste-drives-counterfeit-components-problem
Table 2: Percentage of Market Revenue for Most Commonly Counterfeited Product Types by Application Market in 2011
(Percentage Share of Revenue in Millions of U.S. Dollars)
Part Type Industrial Automotive Consumer Wireless Wired Computer Other
Analog IC 14% 17% 21% 29% 6% 14% 0%
Microprocessor IC 4% 1% 4% 2% 3% 85% 0%
Memory IC 3% 2% 13% 26% 2% 53% 1%
Programmable Logic IC 30% 3% 14% 18% 25% 11% 0%
Transistor 22% 12% 25% 8% 10% 22% 0%
Source: IHS iSuppli March 2012
4. www.homai.org12
The Holography Times
Vol. 8, Issue 24
Cover Story
parts and about the ill effects
of counterfeit parts.
Impact of counterfeit
electronic component =
huge social and financial
liability:
When counterfeit electrical
devices, components and spare
parts enter manufacturing supply
chains, they can add fire, shock
and explosion risks that may cost
workers their lives, cause serious
property damage and involve
unpredictable financial liability.
One fake component can void
guarantees for entire systems and
installations, resulting in severe
financial losses and liabilities.
Manufacturers, installers,
specifiers and employers can be
heldresponsibleforincidentsand
accidents linked to counterfeit
components. Counterfeit
electrical products do not comply
with performance and safety
specifications; they are not tested
or approved. Counterfeit aviation
parts, for example pose a serious
risk to the safety of military,
civil and commercial aviation
industry.
Steps in combating
electronic counterfeiting9
Several studies have been done
to measure the impact of the
problem, but suggested solution
has invariably focused primarily
on enhanced effectiveness of law
enforcement. It is important that
a holistic solution is developed
in this fight. The solution to this
ever-growing menace lies at the
very core of the product, i.e. a
dire need to create an end-to-
end holistic brand protection
strategy10
;
As a first step, every CEO or
Brand owner should take head
on the threat of brand attack
and prepare a Brand Risk
Management (BRM) plan as
an intrinsic part of the overall
business plan, review and report.
The team may comprise the CEO/
Brand owner, Brand Managers,
Head of Marketing, Product
Development, Sales, Logistic,
Packaging, Manufacturing or an
outside consultant accountable
for the brand. The idea is to curb
the penetration of counterfeits,
across levels.
The anti-counterfeiting strategy
can be broken into various stages
such as:
i. Anti-counterfeiting
policy and brand
protection program
By establishing and pursuing
an anti - counterfeiting
policy and brand protection
program a company is able to
provideproofthatallduecare
was taken to limit or reduce
counterfeiting and protect
trademarks and brands.
Together they provide a
shield for liability, and also
a protection against loss of
reputationandadversepublic
opinion.Thebrandprotection
programand a n t i -
counterfeiting policy should
list pro-active measures that
are put in place toidentify and
report fake products. They
help limit the negative effects
of counterfeiting and reduce
reaction time should such an
eventoccur.
Elements to consider include:
• supply chain processes,
inspection, audits and
quality control
• Identification and evaluation
of risks and threats
• Detection and reporting
processes, including handling
of counterfeit products
• Overall risk-management
and adequate response
procedures
The policy also needs to address
product labelling (including anti-
counterfeiting technologies)
and training of staff on how to
recognize counterfeit products.
Furthermore, it should provide
assistance and training
programs to officials tasked with
enforcing seizures of counterfeit
products. The latter because
only the manufacturer of the
genuine product knows whether
an item is fake or genuine. Part
of this may include the setting
up of a product database, online
reporting mechanisms, and
simple protocols that provide
investigators with tips on how to
spot fakes.
Table 4: Impact of counterfeit component components
Consumers Legitimate Manufacturers Government / Social
Loss of Life Loss of revenue Loss of revenue
Loss of Job Increases warranty costs and so the maintenance cost Funding of criminal enterprises
Financial Liability due to law suites
Loss of brand integrity and goodwill
Expected life of the product decreases
9. Brand Protection: Challenges and Solutions, Pradip Shroff, Published at The Holography Times, Volume 4, issue 13 available at http://www.
homai.org/AdminPanel/PDF/Issue13.pdf
10. ISO Standards 12931 “Performance criteria for authentication solutions used to combat counterfeiting of material goods”, http://www.iso.
org/iso/catalogue_detail?csnumber=52210
5. www.homai.org 13
The Holography Times
Vol. 8, Issue 24
ii. Register trademarks and
copyrights
Register trademarks in
all countries you sell,
manufacture, and license
or distribute products in.
This is essential to protect
trademarks and brands.
Also, apply for
patents and register designs.
For details and registration
procedures, consult a
trademark attorney.
iii. Adopt ISO standards and
Join trade associations
ISO has developed
new Standards 1293
“Performance criteria
for authentication tools
used in anti-counterfeiting
or material goods”: The
new ISO 12931 is already
published and would be
a very useful document
for any-one who wants to
follow globally accepted
standards and approach to
fighting against the
counterfeit.TheISOdocument
can be seen on http://www.
iso.org/iso/catalogue_
detail?csnumber=5221010
.
It is strongly recommended
that all brands who want to
have a safety net of a global
standard, should plan to
comply with this standard.
Similarly, SAE International,
a global association of more
than 138,000 engineers and
related technical experts in
the aerospace, automotive,
and commercial-vehicle
industries has come up
with the first revision
to its c o u n t e r f e i t
parts avoidance technical
standard “AS5553
Fraudulent/Counterfeit
Electronic Parts;Avoidance,
Detection, Mitigation, and
Disposition.11
” This new
revisioninparticularprovides
terminology references and
reporting mechanisms to
facilitate the flow-down of
the standard globally. Further,
try to join anti-counterfeiting
association or your local
chamber of commerce, such
as FICCI CASCADE, as these
national and international
trade bodies can guide and
provide best practices against
combating counterfeiting.
For example, The National
Electrical Manufacturers
Association is so concerned
aboutthisinfluxofcounterfeit
products that its board of
governors has made it one
of its top-three priorities
to focus the attention of
government, the supply
channel and the public on the
harm caused by counterfeit
electrical products12
. In India,
FICCI CASCADE13
is doing
similar work.
iv. When fake products are
found
After contacting the relevant
law enforcement authorities,
consider reaching out to a
memberoftheIECConformity
Assessment System14
(For
Indiaitis BIS).Theycandirect
you to one of the national
certification agencies and
laboratories who might be
abletohelpyousetupatesting
and inspection program to
avoid future problems, as
well as product training for
manufacturing staff and law
enforcement agencies.
v. Anti-counterfeiting
technologies15
There are a number of anti-
counterfeiting technologies
that can help better
protect and authenticate
products. And while they
can’t completely eliminate
counterfeiting, they can
make it less attractive
and less profitable,
increasing the level of risk
for the counterfeiters. Use a
secure, anti-counterfeiting
device comprising overt,
covert & forensic security
features like security
hologram seals and labels,
tamper evident security
films and light-sensitive
ink designs. While there
a number of technologies
available in the market, it is
advisable to choose smart
and at the right time while
keeping track of some basic
guidelines like:
• Instead of focusing on
features, find a vendor who
can provide you overt as well
as covert technologies as it is
important to select a solution
using multiple technologies.
• Seek help from an
established trade association
to select ethical vendor, best
practices and resources to
fight counterfeiting.
• Selectthetechnologyinterms
of the difficulty in replicating
and tamper evidence
offered, uniqueness,
availability of suppliers, ease
of identification and user
friendliness.
• Solutions should also have
feasibility of being integrated
with the automated
production/ packaging
line if required, especially
wherever the volumes are
very large
Try to combine low and
high security elements
to enhance protections,
for example, by integrating
sequential or unique
numbers in the solution.
vi. Market surveillance,
quality control, inspection
• Establish classical market
surveillance, including at
customs barriers and ports
• Obtain and test samples from
open markets, websites and
auction sites. Make it known
that you run such tests
• Keepadatabaseofcompanies
and manufacturers that
Cover Story
6. www.homai.org14
The Holography Times
Vol. 8, Issue 24
have been suspected to
counterfeit your products
• Send “Cease and
desist” letters for every
infringement to establish
brand and trademark
protection measures
• Tighten supply chain,
production and delivery
path of genuine products
• Establish factory, pre-
shipping and port of entry
inspections (as counterfeit
products sometimes hide in
genuineshipments)consider
involving an IEC Conformity
Assessment System member
for inspection and testing
pre-shipping and at market
entry point.
vii. Interception and
cooperation with law
enforcement
Registeredforcustomswatch
programs. Organizations
including Interpol, World
Trade Organisation, World
Customs Organization,
World Intellectual
Property Organization and
International Chamber of
Commerce are working
closely together to improve
international cooperation
and border enforcement
through increased customs
co-ordination and exchange
of information and best
practices. The IEC and its
Conformity Assessment
System members concretely
support these efforts on the
ground through inspection
and testing.
Conclusion:
While the trade of counterfeit
electronic parts has dramatically
increased, tackling counterfeits
is not impossible. Counterfeiting
is a problem that needs to be
addressed quickly and decisively.
Ideally, as a first move, more
effective partnerships should be
built between law enforcement
agencies and the private sector
with focus on intelligence
sharing, awareness and product
identification training.
• Manufacturers should create
a team that focuses on anti-
counterfeiting strategy
• Selection of right anti-
counterfeiting strategy
should be employedUse
first level of authentication
features to empower your
customers to identify your
genuine products
• Track supply chain at
distributor end
• Information to customer
In our view a company that
implements the suggestions
outlined in this article will
definitely see a marked
improvement in their fight
against counterfeiting. In case
you need more information,
please e-mail to us at info@
homai.org and we will be happy
to work with you to eliminate the
menace of counterfeiting.
Resources
1. “Counterfeit Electronic Parts: What
to do Before The Regulations
(and Regulators) Come?,”
Federal Contracts Report, 97
FCR???,6/21/2012, The Bureau
of National Affairs, Inc. (800-372-
1033) http://www.bna.com
2. “Counterfeit Chips on the Rise,”
IEEE Spectrum (June 2012),
available at http://spectrum.
ieee.org/computing/hardware/
counterfeit-chips-on-the-rise.
3. KPMG Study: Managing the Risks
of Counterfeits in the IT Industry
(on file with the authors) available
at:http://www.agmaglobal.
org/press_events/press_docs/
Counterfeit_WhitePaper_Final.pdf
(“No anticounterfeiting effort is
entirelyfoolproof,butthebetterones
can make a significant differences.”
4. ChinaWTO.com, “Trade
Regulations, Customs and
Standards,” at http://
chinawto.com/wto/index-e.
asp?sel=info&info=regulation.
5. “Counterfeit threats for electronic
parts,” by Nicole Faubert
(December 30, 2013) available at
http://thecounterfeitreport.com/
article/253/Counterfeit-threats-
for-electronic-parts.html
6. “The Counterfeit Repair Parts
Tsunami,” by Robert M.
Williamson available at http://
www.swspitcrew.com/articles/
Counterfeit%20Parts%200911.
pdf
7. “Counterfeit components: Methods
to protect against fake parts,”
avilable at http://www.eeherald.
com/section/sourcing-database/
component_sourcing_guide2.html
8. HOMAI–HologramManufacturers
Association of India, www.homai.
org
9. How to Select a Security Feature
- a Structured Guide for the
Selection of a Security Technology
for Documents and Items of Value,
Published in June 2009 by the
Document Security Alliance (DSA)
and North American Security
Products Organization (NASPO)
10. TheSeriousRisksFromCounterfeit
Electronic Parts, Forbes
11. “SAE International’s counterfeit electronic parts risk mitigation standards,” at www.sae.org
12. NEMA, Public Policy, Anti-Counterfeiting, https://www.nema.org/Policy/Anti-Counterfeiting/pages/default.aspx
13. FICCI Committee Against Smuggling and Counterfeiting Destroying Economy (CASCADE), http://www.ficci-cascade.com/
14. “Piracy in Electrical and electronic products: Anti-counterfeiting best practice and strategies,” International Electrotechnical Commission
available at http://www.iec.ch/about/brochures/pdf/conformity_assessment/IEC_Counterfeiting_brochure_LR.pdf
15. “Steps to Identify Authentication Solutions to Curb Counterfeiting,” C S Jeena, published at The Holography Times, Volume 7, Issue 20 available
at http://www.slideshare.net/cjhomai/steps-to-identifyauthenticationsolutionstocurbcounterfeiting
Cover Story