How to protect the IT supply chain from cyber attacks | Information Age

There is no doubt that the global IT security threat landscape has evolved over the last decade, with governments and big businesses increasingly becoming the targets of cyber attackers. … The problem is that any IT product can include tainted or counterfeit components, which may include vulnerabilities that can leave them wide-open for cyber attacks.  ... What is needed is a way of identifying trusted providers, component suppliers (hardware and software), integrators and resellers, so that customers know who is following the best practices and with whom they should partner. …”

More at Information Age.

And More on The Role of Traceability and Inspections, Tests and Other Methods in Counterfeit Electronic Part Avoidance (Part 3)

A reader of this blog approached me with an excellent question about my 24 March post More On The Role Of Traceability And Inspections, Tests And Other Methods In Counterfeit Electronic Part Avoidance. In this post, I stated that an organization could “(c) apply inspections, tests and other methods designed to intercept and avoid the use of counterfeits when unable to confirm traceability to the OCM or the OCM’s authorized distributors.” The reader, however, cannot find support for that contingency in DFARS 252.246-7007. I wish to share my response ….

Continue reading

U.S. Joint Chiefs drafting military cyber standards | Reuters

The chief U.S. weapons tester said on Tuesday he was working with the Joint Chiefs of Staff to draft military requirements to address widespread cyber vulnerabilities in nearly every arms program and military command. …

Moe at Reuters.

San Francisco Man And Company Indicted For Smuggling Sophisticated Electrical Components To Russian Federation | USAO-NDCA | Department of Justice

“… Many of the components alleged to have been wrongly smuggled into Russia were controlled dual-use programmable computer chips capable of operating in austere environments making them useful in both civilian and military applications. …”

More at Department of Justice.

FAR / DFAR Case Update (16 Mar 2015)

Status updates from the ‘Open Cases Reports’ …

Continue reading

Guide To Recycling Your Electronics

“If you want to get rid of electronic equipment that you no longer use and want to protect the environment …” [and reduce feedstock for counterfeiters] “… follow these steps …”

More at Recycle it Right – Electronics TakeBack Coalition.

Jiangsu authorities gather counterfeit goods to be destroyed, residents loot the stash – Shanghaiist

“More than 35.7 tons of knockoff products that were piled up and ready to be destroyed by authorities in Xuzhou, Jiangsu province were quickly snatched up by residents who ran off with boxes of goods before they were set ablaze on Tuesday.
The items to be destroyed included food, healthcare products, cosmetics and computer parts, and all together amounted to around 2.85 million yuan. … ”

More at Shanghaiist.

SMTA / CALCE Symposium on Counterfeit Parts and Materials

SMTA and CALCE University of Maryland are pleased to announce the 2015 Symposium on Counterfeit Parts and Materials. The symposium will be held June 23-25, 2015, at the College Park Marriott Hotel and Conference Center, College Park, MD, USA. Read More.

Pentagon to focus more on hack-proofing weapons — Reuters

Cyber attacks on U.S. weapons programs and manufacturers are a “pervasive” problem that requires greater attention, the top U.S. arms buyer said Thursday, saying that he would add cybersecurity to the Pentagon’s guidelines for buying weapons.

“It’s about the security of our weapons systems themselves and everything that touches them. It’s a pervasive problem and I think we have to pay a lot more attention to it,” Defense Undersecretary Frank Kendall told Reuters after a speech to the American Society of Naval Engineers in Washington. …

More at  Reuters.

Follow

Get every new post delivered to your Inbox.

Join 200 other followers