SlideShare a Scribd company logo
IP Fraud Protection




Author: Chris Jensen is a Vice President at New Momentum (Irvine, CA), a company that
provides brand/IP Protection software to the electronics industry.
Email: cjensen@newmo.com
Abstract
Outsourcing and globalization have numerous benefits, but there is a downside—the proliferation

of counterfeits and sales through unauthorized channels. In 2006 U.S. Customs recorded over 15

billion IC imports. With one out of ten IT products containing counterfeits, according to a study

by AGMA and KPMG, 1.5 billion of those imported ICs are likely counterfeit. Unfortunately,

most semiconductor manufacturers don’t realize the extent of their revenue and reputation lost to

counterfeits. This paper demonstrates the impact of counterfeits on electronics companies and

gives solutions for finding the violators as well as a four-step roadmap for recovering revenue lost

to counterfeits.
IP FRAUD PROTECTION
Do You Know What Counterfeits are Costing Your Company?



Outsourcing and globalization have numerous benefits, but they have a significant downside—the

proliferation of counterfeits and sales through unauthorized channels. Semiconductor

manufacturers are losing billions every year to counterfeits and the gray market. In 2006, U.S.

Customs recorded more than 15 billion IC imports‐‐about 500 every second. Results of a study

conducted by AGMA (Association for Abatement of Gray Market and Counterfeits) and KPMG

showed that one out of every ten IT products contains counterfeit semiconductors. That means

1.5 billion of those imported ICs are likely counterfeit…about 50 counterfeits every second

flooding into the US. Do you know how many of those 1.5 billion (and the number is growing all

the time) are yours? Most semiconductor manufacturers don’t realize the extent of their revenue

loss to counterfeits.



And, revenues are not all you are losing. Company and product reputations are being eroded, and

legitimate channel partners lost. Jobs are also being lost. Especially painful in today’s economy,

counterfeits are believed to have cost 750,000 jobs in the US alone. The goal of this paper is to

demonstrate the impact counterfeits have on electronics companies, as well as provide solutions

to stop these unauthorized sales. And most important, this paper will show you why electronic

component manufacturers need to take action now before revenues and reputation are eroded

even further.
Here’s how counterfeits have impacted five semiconductor companies

The Semiconductor Industry Association (SIA) recently formed an Anti‐Counterfeiting Task

Force that conducted a study with these results:

       Company A: Over 100 part numbers have been counterfeited in the past 5 years

       Company B: 19 cases reported with 97,000 units

       Company C: Since June 2006 there have been 4 US Customs seizures of counterfeits of

        our products by US Customs; units seized ranged from 6,000 to 60,000

       Company D: We estimate that 2‐3% of the purchases of our brand are counterfeit

       Company E: A broker website indicated 40,000 of our devices available, but our

        company had only made 200 units of that device with the specified date code. If all

        40,000 were available, it would result in a $34-million loss.
Can your company afford these kinds of losses? By the way, this is the activity these

companies found without using the advanced technologies discussed later in this paper, which

would give them even greater visibility into counterfeit activity.



Why is now the time to take action?

Once thought to be too complex and sophisticated for counterfeiters, semiconductors, electronics,

and IT (information technology) products are now hot-ticket items in counterfeit manufacturing.

Lost sales, however, only account for a fraction of what companies sacrifice when their

intellectual property (IP) is stolen and their products are illegally produced. Counterfeiters steal

IP backed by million‐dollar investments in research and development, marketing, and

manufacturing. Moreover, illegitimate or substandard chips present the company with additional

costs to repair or replace defective products carrying their brand name.
A number of factors have coalesced to create a business environment in which manufacturing

counterfeit IP is not only lucrative, but also much more attainable than ever before. Counterfeiters

are becoming increasingly tech savvy, and their ability to obtain more advanced manufacturing

machinery and techniques has been one of the most crucial factors in fueling the production of

illegal high tech goods.



During the past decade, billions of dollars in foreign direct investment (FDI) have flowed into a

number of developing countries, such as China, leading to the proliferation of sophisticated

manufacturing processes and capabilities to produce high tech products. Counterfeit components

have long been a problem in the electronics industry, but as of late, companies are finding

themselves increasingly challenged with having to deal with counterfeit semiconductor

components. A second contributing factor is the popularity of e‐commerce. Many counterfeiters

are using the Internet to reach potential buyers. Without regulatory bodies able to police and

govern all product‐listing sites or advertisements sent out over email, the Web has become a

bastion for illegal sales of counterfeit products.



Why is the problem becoming more serious for semiconductor

companies?

Remarking one of the biggest problems

In the SIA study, remarking was the most common method of counterfeiting. Remarking involves

scraping a label off a chip package and printing on a new label. This can involve a different and

higher-priced brand, or a faster chip speed, or a military grade lot number on a commercial chip.

Most of the problem is coming from Shenzhen China, located on the border with Hong Kong.

You can find anything in Shenzhen—original, fake, new, and old components. It’s common to
find shops making fake “Samsung, Motorola,” etc. labels. The Chinese vendors say that making

the labels is easy—they simply select the specific component maker’s label from the program

library and then modify the data. The label quality is excellent.



Other counterfeiting tricks include incorrect die, inferior packaging materials, reproduction of

chip designs, packages without die, different labels on packages, and false RoHS (Restriction on

Hazardous Substances) notifications. Inaccurate notifications of whether a chip has lead can

affect a semiconductor manufacturer in two different, yet significant ways. First, if the chip

contains lead but has a false RoHS notification, the semiconductor manufacturer may have

products restricted from sale in some countries, face a lawsuit, and experience significant bad

publicity. Of greater concern, however, is when a part does not contain lead and the counterfeiter

asserts that it does. Parts without lead have reliability problems when used in applications in outer

space such as satellites or NASA flights.



How can you solve this problem?

There are several key areas you can focus on to reduce your company’s revenue erosion from

counterfeits: legal, operational, and technology (web search, encryption, lock & key).



What can you do through the legal system?

While many big players in the IT industry are making headlines as they break up crime rings,

small to midsize enterprises face a tough fight in their struggle to protect their IP. A number of

internal and external issues challenge companies’ ability to find, identify, and persecute

transgressors. How about encouraging US Customs to make semiconductor counterfeiting a

priority? While it may be easier to spot counterfeit luxury goods, fake semiconductors can result

much more dangerous (even deadly in the case of medical devices) situations.
How about the operational approach?

One important step in reducing counterfeiting is to focus on illegal sales on the gray market.

While some gray market brokers are legitimate, the gray market is an excellent outlet for

counterfeits. AGMA suggests examining companies trying to enter distribution channels and

monitoring contract manufacturers and distributors already in the supply chain. The organization

recommends thoroughly interviewing companies and investigating their background before

allowing them to become resellers or distributors. Once they enter the supply chain, AGMA

advises organizations to establish strict contracts, perform extensive auditing, and maintain close

relationships with its outsourcing partnerships.



Though the listings may be hidden in the deep recesses of the Internet, a couple effective search

words can bring up product listing after product listing of both legitimate and counterfeit goods.



Technology web search

Many companies that have resorted to manually scouring the Web for unauthorized product

listings and counterfeit goods have found this process time-consuming, tedious, and ineffective.

The up‐and‐coming technology is based on the collection and organization of unstructured data.

Unstructured data is information collected from a number of electronic sources that hasn’t been

arranged or organized into an understandable form. In the context of seeking out product listings,

this data can come from a number of sources including market Web sources, XML data sources,

B2B sites, forums, auctions, and emails advertising gray market sales.



Software solutions like this bring a number of benefits to manufacturers. Not only do they

eliminate the significant number of man-hours and resources manual searching required, these
systems can tap into information sources previously out of reach by traditional search methods

and thereby increase the amount of “area” a company can keep a watch on the marketplace. They

also highlight other market activity exceptions, such as new sellers entering the market and an

unexpected amount of selling or buying in a particular geographical region. When looking for an

IP-protection solution, make sure all reports and data collected are accessible through a Web

portal and that the supplier is a Software as a Service (SaaS) supplier. This makes data

immediately without any extensive installation processes and, more important, without the

involvement of other departments that may slow the deployment down.



Case Study

One Tier 1 fabless semiconductor manufacturer has already deployed this kind of system and saw

an immediate return on investment. In the first 30 days, the manufacturer found 500 cases of

unauthorized sales or counterfeit products previously undetected by its traditional monitoring

systems. Over a year’s time, if 6,000 unapproved transactions were prevented, the manufacturer

could save itself millions of dollars in lost revenue.



Collecting data and reports, however, doesn’t necessarily result in a decrease in counterfeiting;

the information needs to be put into action. Often when companies manage to receive timely

data on counterfeits or illegal gray market sales, they simply don’t know what to do with it. The

above manufacturer handled one if its instances of unauthorized sales through an unconventional

route: It tried to turn unauthorized distributors into legitimate ones.



The benefit of this strategy is two‐fold. First, if the distributor agrees to join the manufacturer’s

authorized channels, the manufacturer can then more easily monitor buying and selling activities

and more effectively ensure the products distributed are authentic. Second, in the event the
distributor declines the offer, its managers know the company has been identified as a

    counterfeiter or an unauthorized sales channel and will likely stop selling the manufacturer’s

    product.



    How much revenue can a manufacturer expect to recover?




.

    The four steps to recovering revenue

    The roadmap to revenue recovery consists of visibility, plan development, plan

    implementation, and the measurement of results.



    Visibility – Step one on the map is a concentration on visibility. That means visibility into

    the counterfeit and gray markets that require seeing who is doing what where and how much.

    This search can isolate data that weeds out duplicate offerings, separates the players

    (counterfeit, gray, suspect, etc.) and formats this information into meaningful metrics.

    Typically, use of the advanced technologies mentioned earlier are combined with a

    company’s investigation team or a company that specializes in high tech counterfeit
investigations. The technology is used to drill down not like a Google search or other search

companies, but taking it to the next level, and takes it to a dashboard and beyond to

compilation. When companies are exposed to the extent of their counterfeiting problem, their

eyes are opened.



Visibility depends upon data analysis and consequently cost analysis. This means identifying the

scope of the violations, and the first step is to identify where and with whom your products are

being sold. This translates into identifying counterfeit activity and gray market activity and their

estimated loss to the enterprise. Part of the loss may be unquantifiable as the public perception of

a brand is critical. The accuracy and speed of this information is critical. The technology needs to

find the comprehensive and unstructured market data from websites, email, file transfers as it

incorporates the information from your ERP data, PLM data, transactions history and run it

though data filtering and cleansing. The right market intelligence will help your team focus on

where you will get the highest return on your efforts. You will need to incorporate specific

technology solutions that will allow you to load your products and prices, allow for data analysis,

identify the scope of the violations and be able to report the return on investment (ROI) to

management.



Plan – Step two in revenue recovery is to develop a plan. When investigators work with a client,

they expect them to subscribe to one of the new advanced technologies and thus establish the

means to having visibility and intelligent data structure for creating a plan.



Many organizations underestimate the significance of the proper plan development. The more

time and effort the enterprise places in creating a comprehensive plan, the better the

implementation and results. Like any strong plan, the enterprise will need to set goals and
measure frequently. Its goals need to be realistic and cover a one- to two-year time frame. A

concentration on due-diligence investigations comes next. Tom McWeeney, senior VP of a high

counterfeit investigation agency, Corporate Risk International (CRI), says, “Each company we

investigate for has a different system and we work back and forth with them in a customized

manner.” An enterprise will want to plan every aspect of its program including test purchases and

due diligence. After reviewing the data, they will decide exactly how they will go about

approaching the seller that can lead to a buy. Initial questions that need to be answered include: Is

this a massive problem? Is it long-term? How much does the enterprise want to buy it for? What

quantity will allow it to become evidence if the enterprise decides to take civil/criminal action?

Do they need to purchase at a certain price? Is there a price that will strengthen their role as

evidence in future civil/criminal action? Should they get customs, FBI, Customs and Border

Patrol (CBP), and Immigration & Customs Enforcement (ICE) involved?



How should they maintain the evidence and for what time period? A test purchase can lead to the

need for test purchase engineering examination and in time to either civil action or criminal

action, or both. The enterprise may need to set goals for each of its sellers. The goal does not

always need to be civil or criminal action. An enterprise’s goal may be to make life so difficult

for the counterfeiters that they drop their product and move on to something else.



Implement plan – The third revenue recovery step is an implementation plan that carries out the

conclusions of the planning process. During this activity Tom McWeeney says, “Actionable

intelligence from the technology solution leads to whether to do buys or not.” With the right

information as background, the implementation is ready to begin. In this phase, the enterprise will

need to prioritize targets, follow through on plan, and incorporate the ability to consistently add

new data that could alter the actions that are to be taken. The enterprise should not be afraid to

outsource certain parts of its implementation to corporate risk specialists to the extent that such a
decision makes sense. With a comprehensive plan in place, the manufacturer can start assigning

due-diligence investigations and conduct strategic under cover test purchases in regard to high-

volume targets. This process identifies whether the subject in question is legally registered, has a

history of counterfeiting, or has a questionable general business profile. This step also may

include engineering analysis, civil action, and criminal action. The enterprise may want to do

some of this work with inside capabilities, but outsourcing is a viable alternative. When doing a

test purchase, CRI recommends a wire transfer because it allows the enterprise to have access to

valuable data on the counterfeiter’s financial institution.



This information may be helpful when taking civil and criminal action. Engineering analyses of

test purchases may lead to civil actions (cease and desist letters, lawsuit, etc.). The outsourced

undercover purchase of a product or part may require setting an undercover company. When

engaging in pursuit of criminal action, there may be a liaison with FBI, or CBP and ICE or all

three. Whatever actions are taken need to be coordinated in-house and with outside counsel. In

the long run, purchasing may require re-purchasing to ensure that the counterfeiters have actually

ceased their illegal activity.




Measure results

Step four is measure the results. Revenue recovery happens by intelligent discovery or as a

famous detective once said, “Just the facts Ma’am.” The measurement of the revenue recovery is

an outtake, a result of the process undergone. Part of any revenue recovery program needs to

include a method to consistently measure results. On a weekly basis, for instance, an enterprise

has to determine the value of the product on and off the market. They will want to record the

amount recovered through test purchases and document progress. They will take note of the

criminal and civil actions taken and their results. The enterprise’s management team needs to take
an active role in the revenue recovery process -- continually reviewing results data and

determining changes when needed. Or as Tom McWeeney reminds us, “Not all sales in a gray

market reflect back upon the OEM or legitimate distributor. The price has to be seen in the

context of market price and manufactured price.”



Data value requires close examination, and there are not necessarily experts in each part or

product. Companies need to look for sale prices that are not reasonable. They may do a buy, or

not, depending upon the discount. Is it a price that can lead to profit?



The results have to be presented to enterprise management. At the customer’s request, the

advanced technologies mentioned earlier can implement a monitoring process around an analysis

designed to produce a standard set of outputs that are “meeting” or “boardroom” ready. Armed

with these outputs, an intelligence group can attend high-level or even board-level meetings to

discuss changes in the gray market landscape, new brand, IP, or counterfeiting risks which may

be appearing. These risks can then be reduced with follow-up or ongoing legal action and an

overall strategy for setting priorities based on product families or technology groups. These

reports, which are provided in both a summary and detail level, consist of trending charts across

all product families; by customer assigned product family types showing change in market

activity; by individual part or part family within the product family; by geographical region for

quantity, number of buy/sell offers and number of new companies interested in the customer’s

products. The reports also include top-ten-style rankings of individual companies that trade in the

largest quantities of the customer’s products and that do the most number of transactions,

regardless of total quantity. All of the summaries and analytics above can always “drill” back to

the original open market buy/sell transaction that contributed to the total or summary. This data is

maintained historically and archived so that as patterns of activity or risk emerge in the analytics,

record-by-record research can be done back to the original time period where the pattern started.
An ongoing activity

Protecting brands and intellectual property from fraud is not a once in a lifetime event. It is an

ongoing activity. The steps above make it clear that an enterprise has to first understand its

problem and then it must develop a plan to mitigate the problem and this means getting a

management buy-in. Given the go-ahead, the plan must be implemented. After the findings and

action, the plan should be evaluated for its effectiveness.



But, the first and most critical step is to not underestimate the impact of counterfeits on revenues,

brand and distributor loyalty. A significant obstacle to successfully addressing counterfeiting

problems has been underestimating the problem due to the lack of dialogue and understanding of

the enormity of the problem in the electronics industry. Typically, companies grappling with

counterfeiting shy away from publicizing the problem. This relative silence has led many in the

industry to underestimate the enormity of counterfeiting and the amount of assets at stake. Now is

the time to take a stand against counterfeiting and push forward toward effective solutions to this

problem.

More Related Content

What's hot

CCPA: What You Need to Know
CCPA: What You Need to KnowCCPA: What You Need to Know
CCPA: What You Need to Know
IronCore Labs
 
Data Protection and Comnpliance with the GDPR Event 22 september 2016
Data Protection and Comnpliance with the GDPR Event 22 september 2016 Data Protection and Comnpliance with the GDPR Event 22 september 2016
Data Protection and Comnpliance with the GDPR Event 22 september 2016
Dr. Donald Macfarlane
 
E businessکسب و کار الکترونیکی
E businessکسب و کار الکترونیکیE businessکسب و کار الکترونیکی
E businessکسب و کار الکترونیکی
Hanieh Ghofrani
 
Mexico Registries Registrars Abuse Domains 030309
Mexico Registries Registrars Abuse Domains 030309Mexico Registries Registrars Abuse Domains 030309
Mexico Registries Registrars Abuse Domains 030309
Glenn McKnight
 
Electronic Business
Electronic BusinessElectronic Business
Electronic Business
joannaeagar
 
Blue Compliance Presentation#2 extended presentation (serif font)
Blue Compliance Presentation#2 extended presentation (serif font)Blue Compliance Presentation#2 extended presentation (serif font)
Blue Compliance Presentation#2 extended presentation (serif font)John Nicholson
 
Global Cyber-Laws and E-Commerce & Strategic Implication for E-Commerce
Global Cyber-Laws and E-Commerce & Strategic Implication for E-CommerceGlobal Cyber-Laws and E-Commerce & Strategic Implication for E-Commerce
Global Cyber-Laws and E-Commerce & Strategic Implication for E-Commercewelcometofacebook
 
Contact Center Compliance Webinar 10 26 11 Direct From The Ftc And Fcc
Contact Center Compliance Webinar 10 26 11 Direct From The Ftc And FccContact Center Compliance Webinar 10 26 11 Direct From The Ftc And Fcc
Contact Center Compliance Webinar 10 26 11 Direct From The Ftc And FccRyan Thurman
 
Apple could face heat from police on refusing data access, expert says
Apple could face heat from police on refusing data access, expert saysApple could face heat from police on refusing data access, expert says
Apple could face heat from police on refusing data access, expert says
fatacre7807
 
**JUNK** (no subject)
**JUNK** (no subject)**JUNK** (no subject)
**JUNK** (no subject)
Gaurav Kharb
 
Falls Church Chamber of Commerce - May 18, 2010
Falls Church Chamber of Commerce - May 18, 2010Falls Church Chamber of Commerce - May 18, 2010
Falls Church Chamber of Commerce - May 18, 2010erikpelton
 
Chinese Social Credit Score: Utopian Big Data Bliss Or Black Mirror On Steroids?
Chinese Social Credit Score: Utopian Big Data Bliss Or Black Mirror On Steroids?Chinese Social Credit Score: Utopian Big Data Bliss Or Black Mirror On Steroids?
Chinese Social Credit Score: Utopian Big Data Bliss Or Black Mirror On Steroids?
Bernard Marr
 
Faktor: GDPR (Kuik)
Faktor: GDPR (Kuik)Faktor: GDPR (Kuik)
Faktor: GDPR (Kuik)
Floris Metzner
 
PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011Kimberly Verska
 
ethical,social and poltical issues in E-commerce
ethical,social and poltical issues in E-commerceethical,social and poltical issues in E-commerce
ethical,social and poltical issues in E-commerce
raviteja reddy
 
GDPR Information
GDPR InformationGDPR Information
GDPR Information
Oxford City Council
 
E-commerce in Bangladesh
E-commerce in BangladeshE-commerce in Bangladesh
E-commerce in Bangladesh
RahatKabir6
 

What's hot (19)

CCPA: What You Need to Know
CCPA: What You Need to KnowCCPA: What You Need to Know
CCPA: What You Need to Know
 
Ch 4
Ch 4Ch 4
Ch 4
 
Data Protection and Comnpliance with the GDPR Event 22 september 2016
Data Protection and Comnpliance with the GDPR Event 22 september 2016 Data Protection and Comnpliance with the GDPR Event 22 september 2016
Data Protection and Comnpliance with the GDPR Event 22 september 2016
 
E businessکسب و کار الکترونیکی
E businessکسب و کار الکترونیکیE businessکسب و کار الکترونیکی
E businessکسب و کار الکترونیکی
 
Mexico Registries Registrars Abuse Domains 030309
Mexico Registries Registrars Abuse Domains 030309Mexico Registries Registrars Abuse Domains 030309
Mexico Registries Registrars Abuse Domains 030309
 
Electronic Business
Electronic BusinessElectronic Business
Electronic Business
 
Blue Compliance Presentation#2 extended presentation (serif font)
Blue Compliance Presentation#2 extended presentation (serif font)Blue Compliance Presentation#2 extended presentation (serif font)
Blue Compliance Presentation#2 extended presentation (serif font)
 
Global Cyber-Laws and E-Commerce & Strategic Implication for E-Commerce
Global Cyber-Laws and E-Commerce & Strategic Implication for E-CommerceGlobal Cyber-Laws and E-Commerce & Strategic Implication for E-Commerce
Global Cyber-Laws and E-Commerce & Strategic Implication for E-Commerce
 
Contact Center Compliance Webinar 10 26 11 Direct From The Ftc And Fcc
Contact Center Compliance Webinar 10 26 11 Direct From The Ftc And FccContact Center Compliance Webinar 10 26 11 Direct From The Ftc And Fcc
Contact Center Compliance Webinar 10 26 11 Direct From The Ftc And Fcc
 
Apple could face heat from police on refusing data access, expert says
Apple could face heat from police on refusing data access, expert saysApple could face heat from police on refusing data access, expert says
Apple could face heat from police on refusing data access, expert says
 
**JUNK** (no subject)
**JUNK** (no subject)**JUNK** (no subject)
**JUNK** (no subject)
 
Falls Church Chamber of Commerce - May 18, 2010
Falls Church Chamber of Commerce - May 18, 2010Falls Church Chamber of Commerce - May 18, 2010
Falls Church Chamber of Commerce - May 18, 2010
 
Chinese Social Credit Score: Utopian Big Data Bliss Or Black Mirror On Steroids?
Chinese Social Credit Score: Utopian Big Data Bliss Or Black Mirror On Steroids?Chinese Social Credit Score: Utopian Big Data Bliss Or Black Mirror On Steroids?
Chinese Social Credit Score: Utopian Big Data Bliss Or Black Mirror On Steroids?
 
Cybercrime issue
Cybercrime issueCybercrime issue
Cybercrime issue
 
Faktor: GDPR (Kuik)
Faktor: GDPR (Kuik)Faktor: GDPR (Kuik)
Faktor: GDPR (Kuik)
 
PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011
 
ethical,social and poltical issues in E-commerce
ethical,social and poltical issues in E-commerceethical,social and poltical issues in E-commerce
ethical,social and poltical issues in E-commerce
 
GDPR Information
GDPR InformationGDPR Information
GDPR Information
 
E-commerce in Bangladesh
E-commerce in BangladeshE-commerce in Bangladesh
E-commerce in Bangladesh
 

Viewers also liked

Recent learning of scrum and management
Recent learning of scrum and managementRecent learning of scrum and management
Recent learning of scrum and management
Jet Wang
 
Woman suffers
Woman suffersWoman suffers
Woman suffers
Harid Nattapong
 
Web Standards in FLOSS development
Web Standards in FLOSS developmentWeb Standards in FLOSS development
Web Standards in FLOSS development
fOSSa - Free Open Source Software Academia Conference
 
%Ba%b7%b7%d5%e8 2
%Ba%b7%b7%d5%e8 2%Ba%b7%b7%d5%e8 2
%Ba%b7%b7%d5%e8 2
Harid Nattapong
 
Hy solution사례(10)연금보험 연금저축사업비 비교
Hy solution사례(10)연금보험 연금저축사업비 비교Hy solution사례(10)연금보험 연금저축사업비 비교
Hy solution사례(10)연금보험 연금저축사업비 비교
valuasset
 
[HY Solution]글로벌경기 긴급진단
[HY Solution]글로벌경기 긴급진단[HY Solution]글로벌경기 긴급진단
[HY Solution]글로벌경기 긴급진단
valuasset
 
Hy solution사례(2)즉시연금고객제안사례
Hy solution사례(2)즉시연금고객제안사례Hy solution사례(2)즉시연금고객제안사례
Hy solution사례(2)즉시연금고객제안사례
valuasset
 
החזק הוא הרפה, פרשת שלח-לך
החזק הוא הרפה, פרשת שלח-לךהחזק הוא הרפה, פרשת שלח-לך
החזק הוא הרפה, פרשת שלח-לך
Nurit Eliram
 
Glasgow University Freshers' Week
Glasgow University Freshers' WeekGlasgow University Freshers' Week
Glasgow University Freshers' Week
Nick Wade
 
Metodos especiales ejercicio en clase
Metodos especiales ejercicio en claseMetodos especiales ejercicio en clase
Metodos especiales ejercicio en claseuis
 
Oss for undergraduate - fossa2010
Oss for undergraduate - fossa2010Oss for undergraduate - fossa2010
Outbound investments
Outbound investments  Outbound investments
Outbound investments Ashish Panday
 
Unwind your mind
Unwind your mindUnwind your mind
Unwind your mind
Marie Duffy
 
Eze sg meeting mitke overall progress-poland_30.06.2010
Eze sg meeting mitke overall progress-poland_30.06.2010Eze sg meeting mitke overall progress-poland_30.06.2010
Eze sg meeting mitke overall progress-poland_30.06.2010Eze
 
Dokumen yang Memanaskan Jakarta
Dokumen yang Memanaskan JakartaDokumen yang Memanaskan Jakarta
Dokumen yang Memanaskan Jakarta
Federation of Independent Media Workers Union
 

Viewers also liked (18)

Power of one
Power of onePower of one
Power of one
 
sns
snssns
sns
 
Recent learning of scrum and management
Recent learning of scrum and managementRecent learning of scrum and management
Recent learning of scrum and management
 
Woman suffers
Woman suffersWoman suffers
Woman suffers
 
Web Standards in FLOSS development
Web Standards in FLOSS developmentWeb Standards in FLOSS development
Web Standards in FLOSS development
 
%Ba%b7%b7%d5%e8 2
%Ba%b7%b7%d5%e8 2%Ba%b7%b7%d5%e8 2
%Ba%b7%b7%d5%e8 2
 
Hy solution사례(10)연금보험 연금저축사업비 비교
Hy solution사례(10)연금보험 연금저축사업비 비교Hy solution사례(10)연금보험 연금저축사업비 비교
Hy solution사례(10)연금보험 연금저축사업비 비교
 
[HY Solution]글로벌경기 긴급진단
[HY Solution]글로벌경기 긴급진단[HY Solution]글로벌경기 긴급진단
[HY Solution]글로벌경기 긴급진단
 
Hy solution사례(2)즉시연금고객제안사례
Hy solution사례(2)즉시연금고객제안사례Hy solution사례(2)즉시연금고객제안사례
Hy solution사례(2)즉시연금고객제안사례
 
החזק הוא הרפה, פרשת שלח-לך
החזק הוא הרפה, פרשת שלח-לךהחזק הוא הרפה, פרשת שלח-לך
החזק הוא הרפה, פרשת שלח-לך
 
Glasgow University Freshers' Week
Glasgow University Freshers' WeekGlasgow University Freshers' Week
Glasgow University Freshers' Week
 
L thn 4
L thn 4L thn 4
L thn 4
 
Metodos especiales ejercicio en clase
Metodos especiales ejercicio en claseMetodos especiales ejercicio en clase
Metodos especiales ejercicio en clase
 
Oss for undergraduate - fossa2010
Oss for undergraduate - fossa2010Oss for undergraduate - fossa2010
Oss for undergraduate - fossa2010
 
Outbound investments
Outbound investments  Outbound investments
Outbound investments
 
Unwind your mind
Unwind your mindUnwind your mind
Unwind your mind
 
Eze sg meeting mitke overall progress-poland_30.06.2010
Eze sg meeting mitke overall progress-poland_30.06.2010Eze sg meeting mitke overall progress-poland_30.06.2010
Eze sg meeting mitke overall progress-poland_30.06.2010
 
Dokumen yang Memanaskan Jakarta
Dokumen yang Memanaskan JakartaDokumen yang Memanaskan Jakarta
Dokumen yang Memanaskan Jakarta
 

Similar to Impact of counterfeits on electronics companies

Iron Mountain Training 3
Iron Mountain Training 3Iron Mountain Training 3
Iron Mountain Training 3Al Ewers
 
The Connected Business - An FT.com Report
The Connected Business  - An FT.com ReportThe Connected Business  - An FT.com Report
The Connected Business - An FT.com Report
Turlough Guerin GAICD FGIA
 
The Telephone And Telegraph Corporation
The Telephone And Telegraph CorporationThe Telephone And Telegraph Corporation
The Telephone And Telegraph Corporation
Lori Gilbert
 
2014 10 22 FT Report The Connected Business Page 1
2014 10 22 FT Report The Connected Business Page 12014 10 22 FT Report The Connected Business Page 1
2014 10 22 FT Report The Connected Business Page 1Patrick Lemoine
 
Exploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docxExploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docx
ssuser454af01
 
Scout - How Create Successful Brand Protection Program
Scout - How Create Successful Brand Protection ProgramScout - How Create Successful Brand Protection Program
Scout - How Create Successful Brand Protection ProgramFākR™
 
15 livingson-updated-cqsdi-baesystems-counterfeit-components
15 livingson-updated-cqsdi-baesystems-counterfeit-components15 livingson-updated-cqsdi-baesystems-counterfeit-components
15 livingson-updated-cqsdi-baesystems-counterfeit-components
ozgurv
 
Unpacking the Royalty Stack
Unpacking the Royalty StackUnpacking the Royalty Stack
Unpacking the Royalty Stack
Erik Oliver
 
Cybersecurity Compliance can Make or Break Your Business - DigiCert - Symantec
Cybersecurity Compliance can Make or Break Your Business - DigiCert - SymantecCybersecurity Compliance can Make or Break Your Business - DigiCert - Symantec
Cybersecurity Compliance can Make or Break Your Business - DigiCert - Symantec
RapidSSLOnline.com
 
power point 115.docx
power point 115.docxpower point 115.docx
power point 115.docx
write5
 
IBM IP Advisor with Watson White Paper
IBM IP Advisor with Watson White PaperIBM IP Advisor with Watson White Paper
IBM IP Advisor with Watson White Paper
Sue Hallen
 
How to Fight Product Counterfeiting with Investigative Strategies and Tactics
How to Fight Product Counterfeiting with Investigative Strategies and TacticsHow to Fight Product Counterfeiting with Investigative Strategies and Tactics
How to Fight Product Counterfeiting with Investigative Strategies and TacticsIntelCollab.com
 
SayanMitra.pdf
SayanMitra.pdfSayanMitra.pdf
SayanMitra.pdf
TanayMalhotra
 
Internet of Things- IoT Monetization Models
Internet of Things- IoT Monetization ModelsInternet of Things- IoT Monetization Models
Internet of Things- IoT Monetization Models
Subrahmanyam KVJ
 
Internet of Things in Reach Companies Rush Into Devices Li.docx
Internet of Things in Reach Companies Rush Into Devices Li.docxInternet of Things in Reach Companies Rush Into Devices Li.docx
Internet of Things in Reach Companies Rush Into Devices Li.docx
mariuse18nolet
 
Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...
Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...
Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...
Adler Law Group
 
The "Unproductive Bubble:" Unprofitable startups, small markets for new digit...
The "Unproductive Bubble:" Unprofitable startups, small markets for new digit...The "Unproductive Bubble:" Unprofitable startups, small markets for new digit...
The "Unproductive Bubble:" Unprofitable startups, small markets for new digit...
Jeffrey Funk
 
GDPR: A Threat or Opportunity? www.normanbroadbent.
GDPR: A Threat or Opportunity? www.normanbroadbent.GDPR: A Threat or Opportunity? www.normanbroadbent.
GDPR: A Threat or Opportunity? www.normanbroadbent.
Steven Salter
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
Patrick Bouillaud
 

Similar to Impact of counterfeits on electronics companies (20)

Iron Mountain Training 3
Iron Mountain Training 3Iron Mountain Training 3
Iron Mountain Training 3
 
The Connected Business - An FT.com Report
The Connected Business  - An FT.com ReportThe Connected Business  - An FT.com Report
The Connected Business - An FT.com Report
 
The Telephone And Telegraph Corporation
The Telephone And Telegraph CorporationThe Telephone And Telegraph Corporation
The Telephone And Telegraph Corporation
 
IE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReportIE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReport
 
2014 10 22 FT Report The Connected Business Page 1
2014 10 22 FT Report The Connected Business Page 12014 10 22 FT Report The Connected Business Page 1
2014 10 22 FT Report The Connected Business Page 1
 
Exploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docxExploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docx
 
Scout - How Create Successful Brand Protection Program
Scout - How Create Successful Brand Protection ProgramScout - How Create Successful Brand Protection Program
Scout - How Create Successful Brand Protection Program
 
15 livingson-updated-cqsdi-baesystems-counterfeit-components
15 livingson-updated-cqsdi-baesystems-counterfeit-components15 livingson-updated-cqsdi-baesystems-counterfeit-components
15 livingson-updated-cqsdi-baesystems-counterfeit-components
 
Unpacking the Royalty Stack
Unpacking the Royalty StackUnpacking the Royalty Stack
Unpacking the Royalty Stack
 
Cybersecurity Compliance can Make or Break Your Business - DigiCert - Symantec
Cybersecurity Compliance can Make or Break Your Business - DigiCert - SymantecCybersecurity Compliance can Make or Break Your Business - DigiCert - Symantec
Cybersecurity Compliance can Make or Break Your Business - DigiCert - Symantec
 
power point 115.docx
power point 115.docxpower point 115.docx
power point 115.docx
 
IBM IP Advisor with Watson White Paper
IBM IP Advisor with Watson White PaperIBM IP Advisor with Watson White Paper
IBM IP Advisor with Watson White Paper
 
How to Fight Product Counterfeiting with Investigative Strategies and Tactics
How to Fight Product Counterfeiting with Investigative Strategies and TacticsHow to Fight Product Counterfeiting with Investigative Strategies and Tactics
How to Fight Product Counterfeiting with Investigative Strategies and Tactics
 
SayanMitra.pdf
SayanMitra.pdfSayanMitra.pdf
SayanMitra.pdf
 
Internet of Things- IoT Monetization Models
Internet of Things- IoT Monetization ModelsInternet of Things- IoT Monetization Models
Internet of Things- IoT Monetization Models
 
Internet of Things in Reach Companies Rush Into Devices Li.docx
Internet of Things in Reach Companies Rush Into Devices Li.docxInternet of Things in Reach Companies Rush Into Devices Li.docx
Internet of Things in Reach Companies Rush Into Devices Li.docx
 
Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...
Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...
Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...
 
The "Unproductive Bubble:" Unprofitable startups, small markets for new digit...
The "Unproductive Bubble:" Unprofitable startups, small markets for new digit...The "Unproductive Bubble:" Unprofitable startups, small markets for new digit...
The "Unproductive Bubble:" Unprofitable startups, small markets for new digit...
 
GDPR: A Threat or Opportunity? www.normanbroadbent.
GDPR: A Threat or Opportunity? www.normanbroadbent.GDPR: A Threat or Opportunity? www.normanbroadbent.
GDPR: A Threat or Opportunity? www.normanbroadbent.
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
 

More from NEW Momentum

Importance of Combating Gray Market Activity
Importance of Combating Gray Market ActivityImportance of Combating Gray Market Activity
Importance of Combating Gray Market Activity
NEW Momentum
 
Understanding the Gray Market Strategy
Understanding the Gray Market StrategyUnderstanding the Gray Market Strategy
Understanding the Gray Market Strategy
NEW Momentum
 
Counterfeiting – a major threat to the brands
Counterfeiting – a major threat to the brandsCounterfeiting – a major threat to the brands
Counterfeiting – a major threat to the brands
NEW Momentum
 
Combat gray market sales today
Combat gray market sales todayCombat gray market sales today
Combat gray market sales today
NEW Momentum
 
The gray market effect on brand reputation
The gray market effect on brand reputationThe gray market effect on brand reputation
The gray market effect on brand reputationNEW Momentum
 
How to Stop Gray Market and Counterfeit Piracy
How to Stop Gray Market and Counterfeit PiracyHow to Stop Gray Market and Counterfeit Piracy
How to Stop Gray Market and Counterfeit Piracy
NEW Momentum
 
Intellectual Property Fraud Protection
Intellectual Property Fraud ProtectionIntellectual Property Fraud Protection
Intellectual Property Fraud Protection
NEW Momentum
 
Brand Protection
Brand Protection Brand Protection
Brand Protection
NEW Momentum
 
Brand protection business case
Brand protection business caseBrand protection business case
Brand protection business case
NEW Momentum
 
Ways to End Gray Market Sales & Its Effect
Ways to End Gray Market Sales & Its EffectWays to End Gray Market Sales & Its Effect
Ways to End Gray Market Sales & Its Effect
NEW Momentum
 
Strategies to combat grey market sales
Strategies to combat grey market salesStrategies to combat grey market sales
Strategies to combat grey market sales
NEW Momentum
 
New Momentum - Overview
New Momentum - OverviewNew Momentum - Overview
New Momentum - Overview
NEW Momentum
 
White paper stopping counterfeit pharmaceuticals 0309
White  paper stopping counterfeit pharmaceuticals 0309White  paper stopping counterfeit pharmaceuticals 0309
White paper stopping counterfeit pharmaceuticals 0309NEW Momentum
 
How to Stop Gray Market and Counterfeit Piracy
How to Stop Gray Market and Counterfeit PiracyHow to Stop Gray Market and Counterfeit Piracy
How to Stop Gray Market and Counterfeit Piracy
NEW Momentum
 
Impact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesImpact of counterfeits on electronics companies
Impact of counterfeits on electronics companies
NEW Momentum
 

More from NEW Momentum (15)

Importance of Combating Gray Market Activity
Importance of Combating Gray Market ActivityImportance of Combating Gray Market Activity
Importance of Combating Gray Market Activity
 
Understanding the Gray Market Strategy
Understanding the Gray Market StrategyUnderstanding the Gray Market Strategy
Understanding the Gray Market Strategy
 
Counterfeiting – a major threat to the brands
Counterfeiting – a major threat to the brandsCounterfeiting – a major threat to the brands
Counterfeiting – a major threat to the brands
 
Combat gray market sales today
Combat gray market sales todayCombat gray market sales today
Combat gray market sales today
 
The gray market effect on brand reputation
The gray market effect on brand reputationThe gray market effect on brand reputation
The gray market effect on brand reputation
 
How to Stop Gray Market and Counterfeit Piracy
How to Stop Gray Market and Counterfeit PiracyHow to Stop Gray Market and Counterfeit Piracy
How to Stop Gray Market and Counterfeit Piracy
 
Intellectual Property Fraud Protection
Intellectual Property Fraud ProtectionIntellectual Property Fraud Protection
Intellectual Property Fraud Protection
 
Brand Protection
Brand Protection Brand Protection
Brand Protection
 
Brand protection business case
Brand protection business caseBrand protection business case
Brand protection business case
 
Ways to End Gray Market Sales & Its Effect
Ways to End Gray Market Sales & Its EffectWays to End Gray Market Sales & Its Effect
Ways to End Gray Market Sales & Its Effect
 
Strategies to combat grey market sales
Strategies to combat grey market salesStrategies to combat grey market sales
Strategies to combat grey market sales
 
New Momentum - Overview
New Momentum - OverviewNew Momentum - Overview
New Momentum - Overview
 
White paper stopping counterfeit pharmaceuticals 0309
White  paper stopping counterfeit pharmaceuticals 0309White  paper stopping counterfeit pharmaceuticals 0309
White paper stopping counterfeit pharmaceuticals 0309
 
How to Stop Gray Market and Counterfeit Piracy
How to Stop Gray Market and Counterfeit PiracyHow to Stop Gray Market and Counterfeit Piracy
How to Stop Gray Market and Counterfeit Piracy
 
Impact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesImpact of counterfeits on electronics companies
Impact of counterfeits on electronics companies
 

Recently uploaded

How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 

Recently uploaded (20)

How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 

Impact of counterfeits on electronics companies

  • 1. IP Fraud Protection Author: Chris Jensen is a Vice President at New Momentum (Irvine, CA), a company that provides brand/IP Protection software to the electronics industry. Email: cjensen@newmo.com
  • 2. Abstract Outsourcing and globalization have numerous benefits, but there is a downside—the proliferation of counterfeits and sales through unauthorized channels. In 2006 U.S. Customs recorded over 15 billion IC imports. With one out of ten IT products containing counterfeits, according to a study by AGMA and KPMG, 1.5 billion of those imported ICs are likely counterfeit. Unfortunately, most semiconductor manufacturers don’t realize the extent of their revenue and reputation lost to counterfeits. This paper demonstrates the impact of counterfeits on electronics companies and gives solutions for finding the violators as well as a four-step roadmap for recovering revenue lost to counterfeits.
  • 3. IP FRAUD PROTECTION Do You Know What Counterfeits are Costing Your Company? Outsourcing and globalization have numerous benefits, but they have a significant downside—the proliferation of counterfeits and sales through unauthorized channels. Semiconductor manufacturers are losing billions every year to counterfeits and the gray market. In 2006, U.S. Customs recorded more than 15 billion IC imports‐‐about 500 every second. Results of a study conducted by AGMA (Association for Abatement of Gray Market and Counterfeits) and KPMG showed that one out of every ten IT products contains counterfeit semiconductors. That means 1.5 billion of those imported ICs are likely counterfeit…about 50 counterfeits every second flooding into the US. Do you know how many of those 1.5 billion (and the number is growing all the time) are yours? Most semiconductor manufacturers don’t realize the extent of their revenue loss to counterfeits. And, revenues are not all you are losing. Company and product reputations are being eroded, and legitimate channel partners lost. Jobs are also being lost. Especially painful in today’s economy, counterfeits are believed to have cost 750,000 jobs in the US alone. The goal of this paper is to demonstrate the impact counterfeits have on electronics companies, as well as provide solutions to stop these unauthorized sales. And most important, this paper will show you why electronic component manufacturers need to take action now before revenues and reputation are eroded even further.
  • 4. Here’s how counterfeits have impacted five semiconductor companies The Semiconductor Industry Association (SIA) recently formed an Anti‐Counterfeiting Task Force that conducted a study with these results:  Company A: Over 100 part numbers have been counterfeited in the past 5 years  Company B: 19 cases reported with 97,000 units  Company C: Since June 2006 there have been 4 US Customs seizures of counterfeits of our products by US Customs; units seized ranged from 6,000 to 60,000  Company D: We estimate that 2‐3% of the purchases of our brand are counterfeit  Company E: A broker website indicated 40,000 of our devices available, but our company had only made 200 units of that device with the specified date code. If all 40,000 were available, it would result in a $34-million loss.
  • 5. Can your company afford these kinds of losses? By the way, this is the activity these companies found without using the advanced technologies discussed later in this paper, which would give them even greater visibility into counterfeit activity. Why is now the time to take action? Once thought to be too complex and sophisticated for counterfeiters, semiconductors, electronics, and IT (information technology) products are now hot-ticket items in counterfeit manufacturing. Lost sales, however, only account for a fraction of what companies sacrifice when their intellectual property (IP) is stolen and their products are illegally produced. Counterfeiters steal IP backed by million‐dollar investments in research and development, marketing, and manufacturing. Moreover, illegitimate or substandard chips present the company with additional costs to repair or replace defective products carrying their brand name.
  • 6. A number of factors have coalesced to create a business environment in which manufacturing counterfeit IP is not only lucrative, but also much more attainable than ever before. Counterfeiters are becoming increasingly tech savvy, and their ability to obtain more advanced manufacturing machinery and techniques has been one of the most crucial factors in fueling the production of illegal high tech goods. During the past decade, billions of dollars in foreign direct investment (FDI) have flowed into a number of developing countries, such as China, leading to the proliferation of sophisticated manufacturing processes and capabilities to produce high tech products. Counterfeit components have long been a problem in the electronics industry, but as of late, companies are finding themselves increasingly challenged with having to deal with counterfeit semiconductor components. A second contributing factor is the popularity of e‐commerce. Many counterfeiters are using the Internet to reach potential buyers. Without regulatory bodies able to police and govern all product‐listing sites or advertisements sent out over email, the Web has become a bastion for illegal sales of counterfeit products. Why is the problem becoming more serious for semiconductor companies? Remarking one of the biggest problems In the SIA study, remarking was the most common method of counterfeiting. Remarking involves scraping a label off a chip package and printing on a new label. This can involve a different and higher-priced brand, or a faster chip speed, or a military grade lot number on a commercial chip. Most of the problem is coming from Shenzhen China, located on the border with Hong Kong. You can find anything in Shenzhen—original, fake, new, and old components. It’s common to
  • 7. find shops making fake “Samsung, Motorola,” etc. labels. The Chinese vendors say that making the labels is easy—they simply select the specific component maker’s label from the program library and then modify the data. The label quality is excellent. Other counterfeiting tricks include incorrect die, inferior packaging materials, reproduction of chip designs, packages without die, different labels on packages, and false RoHS (Restriction on Hazardous Substances) notifications. Inaccurate notifications of whether a chip has lead can affect a semiconductor manufacturer in two different, yet significant ways. First, if the chip contains lead but has a false RoHS notification, the semiconductor manufacturer may have products restricted from sale in some countries, face a lawsuit, and experience significant bad publicity. Of greater concern, however, is when a part does not contain lead and the counterfeiter asserts that it does. Parts without lead have reliability problems when used in applications in outer space such as satellites or NASA flights. How can you solve this problem? There are several key areas you can focus on to reduce your company’s revenue erosion from counterfeits: legal, operational, and technology (web search, encryption, lock & key). What can you do through the legal system? While many big players in the IT industry are making headlines as they break up crime rings, small to midsize enterprises face a tough fight in their struggle to protect their IP. A number of internal and external issues challenge companies’ ability to find, identify, and persecute transgressors. How about encouraging US Customs to make semiconductor counterfeiting a priority? While it may be easier to spot counterfeit luxury goods, fake semiconductors can result much more dangerous (even deadly in the case of medical devices) situations.
  • 8. How about the operational approach? One important step in reducing counterfeiting is to focus on illegal sales on the gray market. While some gray market brokers are legitimate, the gray market is an excellent outlet for counterfeits. AGMA suggests examining companies trying to enter distribution channels and monitoring contract manufacturers and distributors already in the supply chain. The organization recommends thoroughly interviewing companies and investigating their background before allowing them to become resellers or distributors. Once they enter the supply chain, AGMA advises organizations to establish strict contracts, perform extensive auditing, and maintain close relationships with its outsourcing partnerships. Though the listings may be hidden in the deep recesses of the Internet, a couple effective search words can bring up product listing after product listing of both legitimate and counterfeit goods. Technology web search Many companies that have resorted to manually scouring the Web for unauthorized product listings and counterfeit goods have found this process time-consuming, tedious, and ineffective. The up‐and‐coming technology is based on the collection and organization of unstructured data. Unstructured data is information collected from a number of electronic sources that hasn’t been arranged or organized into an understandable form. In the context of seeking out product listings, this data can come from a number of sources including market Web sources, XML data sources, B2B sites, forums, auctions, and emails advertising gray market sales. Software solutions like this bring a number of benefits to manufacturers. Not only do they eliminate the significant number of man-hours and resources manual searching required, these
  • 9. systems can tap into information sources previously out of reach by traditional search methods and thereby increase the amount of “area” a company can keep a watch on the marketplace. They also highlight other market activity exceptions, such as new sellers entering the market and an unexpected amount of selling or buying in a particular geographical region. When looking for an IP-protection solution, make sure all reports and data collected are accessible through a Web portal and that the supplier is a Software as a Service (SaaS) supplier. This makes data immediately without any extensive installation processes and, more important, without the involvement of other departments that may slow the deployment down. Case Study One Tier 1 fabless semiconductor manufacturer has already deployed this kind of system and saw an immediate return on investment. In the first 30 days, the manufacturer found 500 cases of unauthorized sales or counterfeit products previously undetected by its traditional monitoring systems. Over a year’s time, if 6,000 unapproved transactions were prevented, the manufacturer could save itself millions of dollars in lost revenue. Collecting data and reports, however, doesn’t necessarily result in a decrease in counterfeiting; the information needs to be put into action. Often when companies manage to receive timely data on counterfeits or illegal gray market sales, they simply don’t know what to do with it. The above manufacturer handled one if its instances of unauthorized sales through an unconventional route: It tried to turn unauthorized distributors into legitimate ones. The benefit of this strategy is two‐fold. First, if the distributor agrees to join the manufacturer’s authorized channels, the manufacturer can then more easily monitor buying and selling activities and more effectively ensure the products distributed are authentic. Second, in the event the
  • 10. distributor declines the offer, its managers know the company has been identified as a counterfeiter or an unauthorized sales channel and will likely stop selling the manufacturer’s product. How much revenue can a manufacturer expect to recover? . The four steps to recovering revenue The roadmap to revenue recovery consists of visibility, plan development, plan implementation, and the measurement of results. Visibility – Step one on the map is a concentration on visibility. That means visibility into the counterfeit and gray markets that require seeing who is doing what where and how much. This search can isolate data that weeds out duplicate offerings, separates the players (counterfeit, gray, suspect, etc.) and formats this information into meaningful metrics. Typically, use of the advanced technologies mentioned earlier are combined with a company’s investigation team or a company that specializes in high tech counterfeit
  • 11. investigations. The technology is used to drill down not like a Google search or other search companies, but taking it to the next level, and takes it to a dashboard and beyond to compilation. When companies are exposed to the extent of their counterfeiting problem, their eyes are opened. Visibility depends upon data analysis and consequently cost analysis. This means identifying the scope of the violations, and the first step is to identify where and with whom your products are being sold. This translates into identifying counterfeit activity and gray market activity and their estimated loss to the enterprise. Part of the loss may be unquantifiable as the public perception of a brand is critical. The accuracy and speed of this information is critical. The technology needs to find the comprehensive and unstructured market data from websites, email, file transfers as it incorporates the information from your ERP data, PLM data, transactions history and run it though data filtering and cleansing. The right market intelligence will help your team focus on where you will get the highest return on your efforts. You will need to incorporate specific technology solutions that will allow you to load your products and prices, allow for data analysis, identify the scope of the violations and be able to report the return on investment (ROI) to management. Plan – Step two in revenue recovery is to develop a plan. When investigators work with a client, they expect them to subscribe to one of the new advanced technologies and thus establish the means to having visibility and intelligent data structure for creating a plan. Many organizations underestimate the significance of the proper plan development. The more time and effort the enterprise places in creating a comprehensive plan, the better the implementation and results. Like any strong plan, the enterprise will need to set goals and
  • 12. measure frequently. Its goals need to be realistic and cover a one- to two-year time frame. A concentration on due-diligence investigations comes next. Tom McWeeney, senior VP of a high counterfeit investigation agency, Corporate Risk International (CRI), says, “Each company we investigate for has a different system and we work back and forth with them in a customized manner.” An enterprise will want to plan every aspect of its program including test purchases and due diligence. After reviewing the data, they will decide exactly how they will go about approaching the seller that can lead to a buy. Initial questions that need to be answered include: Is this a massive problem? Is it long-term? How much does the enterprise want to buy it for? What quantity will allow it to become evidence if the enterprise decides to take civil/criminal action? Do they need to purchase at a certain price? Is there a price that will strengthen their role as evidence in future civil/criminal action? Should they get customs, FBI, Customs and Border Patrol (CBP), and Immigration & Customs Enforcement (ICE) involved? How should they maintain the evidence and for what time period? A test purchase can lead to the need for test purchase engineering examination and in time to either civil action or criminal action, or both. The enterprise may need to set goals for each of its sellers. The goal does not always need to be civil or criminal action. An enterprise’s goal may be to make life so difficult for the counterfeiters that they drop their product and move on to something else. Implement plan – The third revenue recovery step is an implementation plan that carries out the conclusions of the planning process. During this activity Tom McWeeney says, “Actionable intelligence from the technology solution leads to whether to do buys or not.” With the right information as background, the implementation is ready to begin. In this phase, the enterprise will need to prioritize targets, follow through on plan, and incorporate the ability to consistently add new data that could alter the actions that are to be taken. The enterprise should not be afraid to outsource certain parts of its implementation to corporate risk specialists to the extent that such a
  • 13. decision makes sense. With a comprehensive plan in place, the manufacturer can start assigning due-diligence investigations and conduct strategic under cover test purchases in regard to high- volume targets. This process identifies whether the subject in question is legally registered, has a history of counterfeiting, or has a questionable general business profile. This step also may include engineering analysis, civil action, and criminal action. The enterprise may want to do some of this work with inside capabilities, but outsourcing is a viable alternative. When doing a test purchase, CRI recommends a wire transfer because it allows the enterprise to have access to valuable data on the counterfeiter’s financial institution. This information may be helpful when taking civil and criminal action. Engineering analyses of test purchases may lead to civil actions (cease and desist letters, lawsuit, etc.). The outsourced undercover purchase of a product or part may require setting an undercover company. When engaging in pursuit of criminal action, there may be a liaison with FBI, or CBP and ICE or all three. Whatever actions are taken need to be coordinated in-house and with outside counsel. In the long run, purchasing may require re-purchasing to ensure that the counterfeiters have actually ceased their illegal activity. Measure results Step four is measure the results. Revenue recovery happens by intelligent discovery or as a famous detective once said, “Just the facts Ma’am.” The measurement of the revenue recovery is an outtake, a result of the process undergone. Part of any revenue recovery program needs to include a method to consistently measure results. On a weekly basis, for instance, an enterprise has to determine the value of the product on and off the market. They will want to record the amount recovered through test purchases and document progress. They will take note of the criminal and civil actions taken and their results. The enterprise’s management team needs to take
  • 14. an active role in the revenue recovery process -- continually reviewing results data and determining changes when needed. Or as Tom McWeeney reminds us, “Not all sales in a gray market reflect back upon the OEM or legitimate distributor. The price has to be seen in the context of market price and manufactured price.” Data value requires close examination, and there are not necessarily experts in each part or product. Companies need to look for sale prices that are not reasonable. They may do a buy, or not, depending upon the discount. Is it a price that can lead to profit? The results have to be presented to enterprise management. At the customer’s request, the advanced technologies mentioned earlier can implement a monitoring process around an analysis designed to produce a standard set of outputs that are “meeting” or “boardroom” ready. Armed with these outputs, an intelligence group can attend high-level or even board-level meetings to discuss changes in the gray market landscape, new brand, IP, or counterfeiting risks which may be appearing. These risks can then be reduced with follow-up or ongoing legal action and an overall strategy for setting priorities based on product families or technology groups. These reports, which are provided in both a summary and detail level, consist of trending charts across all product families; by customer assigned product family types showing change in market activity; by individual part or part family within the product family; by geographical region for quantity, number of buy/sell offers and number of new companies interested in the customer’s products. The reports also include top-ten-style rankings of individual companies that trade in the largest quantities of the customer’s products and that do the most number of transactions, regardless of total quantity. All of the summaries and analytics above can always “drill” back to the original open market buy/sell transaction that contributed to the total or summary. This data is maintained historically and archived so that as patterns of activity or risk emerge in the analytics, record-by-record research can be done back to the original time period where the pattern started.
  • 15. An ongoing activity Protecting brands and intellectual property from fraud is not a once in a lifetime event. It is an ongoing activity. The steps above make it clear that an enterprise has to first understand its problem and then it must develop a plan to mitigate the problem and this means getting a management buy-in. Given the go-ahead, the plan must be implemented. After the findings and action, the plan should be evaluated for its effectiveness. But, the first and most critical step is to not underestimate the impact of counterfeits on revenues, brand and distributor loyalty. A significant obstacle to successfully addressing counterfeiting problems has been underestimating the problem due to the lack of dialogue and understanding of the enormity of the problem in the electronics industry. Typically, companies grappling with counterfeiting shy away from publicizing the problem. This relative silence has led many in the industry to underestimate the enormity of counterfeiting and the amount of assets at stake. Now is the time to take a stand against counterfeiting and push forward toward effective solutions to this problem.