The Channel logo

News

By | Phil Muncaster 31st October 2012 06:05

China fingered as counterfeit parts flood tech supply chain

IHS warns all tiers to tighten supplier scrutiny

The number of ‘high risk’ suppliers, including some flogging counterfeit products to US government, military and commercial channels has grown by almost two-thirds since 2002, with China pegged as a key player, according to market watcher IHS iSuppli.

The firm urged all parts of the supply chain to tighten procurement and supplier monitoring – warning that 78,217 potentially dodgy suppliers were reported in the period 2002-2011.

The analyst warned last May that 2011 was a record year for fake parts, with 1363 ‘counterfeit incidents’ reported and Asian countries led by China implicated in the majority of reports.

Much of the problem is due to a breakdown in supply traceability and the use of untrustworthy or unauthorised sources for critical components, IHS argued.

In recognition of such issues, the US government implemented the US National Defense Authorization Act (NDAA), which requires suppliers to subcontractors to vet their own suppliers more carefully.

NASA has also been active in the past few years in trying to crack down on the increasing volume of counterfeit parts making their way into the aerospace industry, the market watcher said. It was the first agency to adopt the SAE International AS5553 standard – Counterfeit Electronic Parts: Avoidance, Detection, Mitigation, and Disposition.

IHS analyst Rory King warned that the falsification of key markings make it difficult to accurately identify the origin of counterfeit items and added that industry needs to work harder to improve traceability and identify the location of counterfeit perpetrators.

“The data in the news release I shared covers reports of counterfeits from supplier to buyer. This is the very last entity to provide parts to a given customer. The customer could be an OEM, EMS provider, or even another distributor,” he told The Reg.

“The data in the news release shows that the United States and China are the top two locations where suppliers are located who then engage in fraudulent, high risk or suspect counterfeit transactions. My point is, this is what data you see, and it does not address the issue of where parts are really originating from, nor traversing through.” ®

comment icon Read 10 comments on this article alert Send corrections

Opinion

Chris Mellor

Drives nails forged with Red Hat iron into VCE's coffin
Sleep Cycle iOS app screenshot

Trevor Pott

Forget big-spending globo biz: it's about the consumer... and he's desperate for a nap
Steve Bennet, ex-Symantec CEO

Chris Mellor

Enormo security firm needs to get serious about acquisitions

Features

Windows 8.1 Update  Storeapps Taskbar
Chinese Buffet self-service
Chopping down the phone tree to scrump low-hanging fruit
An original member of the System/360 family announced in 1964, the Model 50 was the most powerful unit in the medium price range.
Big Blue's big $5bn bet adjusted, modified, reduced, back for more
Microsoft CEO Satya Nadella
Redmond needs to discover the mathematics of trust