SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
- 1 -
Counterfeiting and
Semiconductor Value
Chain Economics
Supply Chain Risk Insight
into Market Sense and
Respond Actions of
Counterfeiters
Rory King
Global Director, Supply Chain, IHS Inc.
321 Inverness Drive South
Englewood, Colorado, 80112
Abstract
Counterfeit parts have proliferated dramatically in recent years, presenting
huge challenges for electronics manufacturing and specifically military and
aerospace application. This session will offer unique new market trends,
observations, and best practices on the issue of economics, semiconductor
value chains, obsolescence, counterfeit electronics, and market impacts such as
fact-based insight into market indicators like correlation among counterfeits,
semiconductor factory utilization, component obsolescence, semiconductor
availability, price volatility, and supply-and-demand equilibrium.
- 2 -
1. Introduction
While counterfeiting is a decades old issue, growing safety and securing concerns as well as
scrutiny over supply chain and procurement practices around counterfeit or suspect counterfeit
electronics become widely known as a result of the November 8, 2011 hearing of the U.S.
Senate Armed Services Committee on Counterfeit Electronic Parts in the Department of
Defense Supply Chain. Subsequent to the hearing, the National Defense Authorization Act
(NDAA) of 2012 included Section 818, Counterfeit Detection & Avoidance. Generally
speaking, some key supply chain implications considered at all tiers of the global defense supply
chain included:
 Contractor responsibility for detecting and avoiding the use or inclusion of counterfeit
electronic parts or suspect counterfeit parts
 Contractor responsibility for any rework or corrective action that may be required to
remedy the use or inclusion of such parts
 Defense contracts no longer allowing the cost of counterfeit electronic parts and suspect
counterfeit electronic parts or the cost associated with rework or corrective action to
resolve the use or inclusion of such parts
 Qualification procedures and processes must be established to use trusted suppliers and
procure electronics from authorized suppliers
Cost is a major concern for the defense industry. As publicized at the U.S. Senate Armed
Services Committee (SASC) hearings in 2012, a single counterfeit incident – like that of the
THAAD missile system – can cost in excess of $2 million dollars. According to the Missile
Defense Agency, if the devices had failed, the THAAD missile itself would likely have failed.
“The cost of that fix was nearly $2.7 million,” stated Senator Carl Levin (D-MI).i
Human safety and national security also come to the forefront when the potential impact of
counterfeiting is assessed. Counterfeits not only pose an increasing risk to the safety of men and
women in uniform, but they also endanger civilians in other parts applications subject to
counterfeiting such as medical devices, consumer products, or perhaps automobiles.
Counterfeiting is a challenge to companies of all sizes and across all industries – from the small
domestic manufacturer to the global organization, and all entities in between. This paper
discusses supply chain risk and an apparent relationship between counterfeit supplier behaviours
to rapidly sense and respond to semiconductor market economic conditions, as measured
through counterfeit incident reports and component production, inventory, and obsolescence
insight -- over time.
2. Sophistication of Counterfeiters
As Vivek Kamath, Vice President for Supply Chain Operations for Raytheon Company stated,
“What keeps us up at night is the dynamic nature of this threat because by the time we’ve
figured out how to test for these counterfeits, they’ve figured out how to get around it. And it’s
literally on almost a daily basis they change and the sophistication of the counterfeiting is
amazing to us.”ii
To illustrate the apparent sophistication of counterfeiters to sense and respond to market
conditions, consider the Lehman Brothers bankruptcy filing in the United States and resultant
downturn of the global economy. As the largest bankruptcy filing in U.S. history, the incident –
which took place on September 15, 2008 – correlates with a pronounced decline in
- 3 -
semiconductor factory production. In Figure 1 you can see that semiconductor factory utilization
remained fairly steady until the economic collapse triggered by Lehman Brothers filing Chapter
11 bankruptcy, after which there was an immediate precipitous drop in semiconductor factory
utilization. This is the reaction of semiconductor producers to demand side weakness.
Figure 1 – Total Semiconductor Factory Utilization
Original Component Manufacturers (OCMs) responded to the event by trying to maintain
profitability in the face of big slashes in demand and cancellations of orders. They also started
issuing end of life (EOL) notices to discontinue their products. IHS tracks these notices and, as
you can see in Figure 2, the number of EOLs skyrocketed just after the filing by Lehman
Brothers, which at the time was holding over $600 billion in assets. This pronounced spike
illustrates how component manufacturers ultimately discontinued their products in an effort to
work smarter and leaner in the midst of a tumultuous business environment.
Figure 2—Manufacturer Product EOL vs. Total Semiconductor Factory Utilization
- 4 -
So how did counterfeiters respond to the bankruptcy filing and subsequent increase
in EOLs? As illustrated in Figure 3, counterfeiters responded to the event as an
opportunity supply counterfeit product to buyers, many of whom may not have been
aware of authentic product being discontinued by the OCMs.
Figure 3—Manufacturer Product EOL vs. Counterfeit Incidents
Now, much discussion over counterfeit parts is around obsolete components, but in
reality the problem runs much deeper. As reported by IHS, a total of 57 percent of
counterfeit-part reports from 2001 through 2012 have involved obsolete or end-of-
life (EOL) components, as presented in the figure below. Another 37 percent were
active parts.iii
If you look at Figure 4 you’ll see overall inventory trends (in the shaded areas of the
chart) and a line showing counterfeit products trending along with ebbs and flows in
inventory. This represents inventory of active, commercial electronic components.
Keep these points in mind as we move on to Figure 5.
Figure 4—Total Semiconductor Industry Inventory vs. Counterfeit Incidents
- 5 -
In Figure 5, you will notice that semiconductor factory utilization is the top line, but
instead of EOLs what you now see are the counterfeit trends. The interesting
correlation is how these trends fluctuate right along with the ups and downs of
semiconductor factory utilization. As utilization ebbs and flows, the counterfeiting
activity reacts similarly.
In other words, the counterfeiters are sensing market demand and supply factors
much like the original manufacturers of components. Counterfeit suppliers
introduce a greater number of counterfeit products to market (as measured by
counterfeit incident reports) in concert with legitimate producers responding to an
uptick or forecast of semiconductor demand. As the market picks up, the counterfeit
incidents increase.
Figure 5—Total Semiconductor Utilization vs. Counterfeit Incidents Reported
3. Top Counterfeit Parts Classes
Counterfeiters are more prolific than ever in a handful of parts classes. Entering
2012, the top five commodities subject to counterfeiting according to IHS were:iv
 Transistors – 7.6%
 Programmable Logics Integrated Circuits – 8.3%
 Memory Integrated Circuits – 13.1%
 Microprocessor Integrated Circuits – 13.4%
 Analog Integrated Circuits – 25.2%
In Figure 6, using IHS iSuppli Application Market Forecast Tool (AMFT), one can
plot the counterfeit incidents by component classes against the semiconductor
application markets where those components are consumed. The top five
- 6 -
component families are listed on the left side of the chart while the relative
percentage distribution of where those products are used is reflected on the graphic’s
horizontal axis. For example, 14% of analog integrated circuits products are in the
industrial market; 17% in automotive; 21% in consumer; 29% in wireless; 6% in
wired; and 14% in compute. (It’s important to note that medical device, military and
civil aerospace components fall under the industrial market segment or the 14% of
the analog integrated circuits products.)
Cumulatively, analog integrated circuits are the biggest target for counterfeiters and
represent a roughly $47.7 billion semiconductor application market. It is possible to
imagine the potential risk and cost implications of issues associated with damages
resulting from those counterfeit parts. While a great deal of attention is placed on
defense supply chains, the issue plainly doesn’t just threaten the men and women in
armed services or national security, but it poses potential risk and disruption to
businesses and consumers who rely on products throughout these application
markets.
The potential challenges are apparent for other application markets. The consumer
electronics segment in 2011 consumed $9.8 billion worth of analog integrated
circuits, or 21 percent of the global market. Automotive electronics amounted to $8
billion, or 17 percent; computing represented $6.7 billion, or 14 percent; industrial
electronics was at $6.5 billion, or 14 percent; and wired communications was $2.9
billion, or 6 percent.
Figure 6—Percent Distribution of Total Market Revenue by Application Market for
Most Commonly Counterfeited Product Types in 2011
4. High-Risk Suppliers
Even in the face of increasing government regulation and scrutiny, the number of high-risk
suppliers abounds. These firms engage in high-risk, fraudulent, and suspect counterfeit product
or conduct, as identified by the U.S. government. There are literally tens of thousands of these
- 7 -
high-risk providers, and their numbers are growing daily. They push the issue of counterfeiting
well beyond just the production of fake parts. As you can see in Figure 7, we’re talking about
thousands of organizations emerging on an annual basis, and not just in an aggregated,
collective fashion either. The environment literally changes daily and impacts every link in the
supply chain.
Figure 7—High Risk Suppliers from 2002-2011
5. The Monetary Impacts of Counterfeiting
Concerns over the impact of counterfeits are well known throughout industry. One general
example draws from an IHS and Supply & Demand Chain Executive survey of 1,001
practitioners, executives, academics, vendors and other industry professionals. Summarized key
findings on the impact of counterfeits experienced or believed by these survey respondents
include those shown in Figure 8. As was apparent, counterfeits cause a wide range of potential
issues from serious financial and brand consequences to daily operational cost, service, and
safety disruption.
Figure 8—Significant Costs of Counterfeit Riskv
- 8 -
6. Conclusions
Counterfeiting concerns and impacts continue to be widely discussed, documented,
and shared throughout industry on a worldwide basis. Through unique information
and insight now available to plot real counterfeit incidents reported by industry
against semiconductor factory utilization, inventory, product lifecycle, and
application market forecasts one can begin to see the degree to which counterfeit
behaviours appear to correlate with semiconductor industry responses to
marketplace economics.
When this insight is analyzed, it seems apparent that counterfeiters sense and
respond to marketplace dynamics in a sophisticated manner, by taking such action as
supplying counterfeit product to market in concert with semiconductor factories
increasing capacity to do satisfy demand. While these correlations seem apparent,
other interesting questions that cannot be proved emerge as well – for instance,
could these factories (or their equipment or entire replicas thereof) be the sources of
illegitimate product entering the counterfeit supply chain?
In conclusion, some key points can be considered as organisation assess risk
vulnerabilities and implement counterfeit detection and avoidance measures:
 Counterfeiters are not simple individuals with rudimentary
capabilities; they are sophisticated operators and they are in tune
with the market.
 Counterfeiting is not exclusively a military and defense parts
issue, but rather counterfeit parts impact all commercial &
military markets.
 Counterfeiting is not restricted to old, obsolete components, but
rather counterfeiting impacts active components (in fact, nearly
half are active parts).
 Counterfeit detection and avoidance is not just a “cost burden,”
but counterfeit risk mitigation creates significant cost avoidance.
 Counterfeit mitigation is not just about “the parts,” but
counterfeit mitigation requires knowledge of high-risk suppliers.
i HEARING TO RECEIVE TESTIMONY ON THE COMMITTEE’S
INVESTIGATION INTO COUNTERFEIT ELECTRONIC PARTS IN THE
DEPARTMENT OF DEFENSE SUPPLY CHAIN, Tuesday, November 8, 2011, U.S.
SENATE COMMITTEE ON ARMED SERVICES, Washington, DC
ii HEARING TO RECEIVE TESTIMONY ON THE COMMITTEE’S
INVESTIGATION INTO COUNTERFEIT ELECTRONIC PARTS IN THE
DEPARTMENT OF DEFENSE SUPPLY CHAIN, Tuesday, November 8, 2011, U.S.
SENATE COMMITTEE ON ARMED SERVICES, Washington, DC
iii Rory King and Mark Snider, IHS Inc. with ERAI Inc., 2012
iv Rory King and Mark Snider, IHS Inc. with ERAI Inc., 2012
v Supply & Demand Chain Executive and IHS Inc., Benchmarking Counterfeits and
Inferior Grade Components, 2009

Weitere ähnliche Inhalte

Andere mochten auch

Gaming science, scientific games
Gaming science, scientific gamesGaming science, scientific games
Gaming science, scientific gamesMartha Henson
 
Starwood austria hungary
Starwood austria hungaryStarwood austria hungary
Starwood austria hungaryPhilipp h?l
 
The Essence of Creativity
The Essence of CreativityThe Essence of Creativity
The Essence of CreativityKristen Scobie
 
Playful Learning : how to turn any IP into a successful educational app or game
Playful Learning : how to turn any IP into a successful educational app or gamePlayful Learning : how to turn any IP into a successful educational app or game
Playful Learning : how to turn any IP into a successful educational app or gameMartha Henson
 
Creating compelling museum games (We Are Museums 2016)
Creating compelling museum games (We Are Museums 2016)Creating compelling museum games (We Are Museums 2016)
Creating compelling museum games (We Are Museums 2016)Martha Henson
 
How we got millions of people to play our games and learn stuff (Digital Shor...
How we got millions of people to play our games and learn stuff (Digital Shor...How we got millions of people to play our games and learn stuff (Digital Shor...
How we got millions of people to play our games and learn stuff (Digital Shor...Martha Henson
 
Rev arus&tegangan ac print
Rev arus&tegangan ac printRev arus&tegangan ac print
Rev arus&tegangan ac printKholil El Hanifi
 

Andere mochten auch (8)

Gaming science, scientific games
Gaming science, scientific gamesGaming science, scientific games
Gaming science, scientific games
 
Starwood austria hungary
Starwood austria hungaryStarwood austria hungary
Starwood austria hungary
 
The Essence of Creativity
The Essence of CreativityThe Essence of Creativity
The Essence of Creativity
 
Playful Learning : how to turn any IP into a successful educational app or game
Playful Learning : how to turn any IP into a successful educational app or gamePlayful Learning : how to turn any IP into a successful educational app or game
Playful Learning : how to turn any IP into a successful educational app or game
 
Creating compelling museum games (We Are Museums 2016)
Creating compelling museum games (We Are Museums 2016)Creating compelling museum games (We Are Museums 2016)
Creating compelling museum games (We Are Museums 2016)
 
How we got millions of people to play our games and learn stuff (Digital Shor...
How we got millions of people to play our games and learn stuff (Digital Shor...How we got millions of people to play our games and learn stuff (Digital Shor...
How we got millions of people to play our games and learn stuff (Digital Shor...
 
Konzeption
KonzeptionKonzeption
Konzeption
 
Rev arus&tegangan ac print
Rev arus&tegangan ac printRev arus&tegangan ac print
Rev arus&tegangan ac print
 

Ähnlich wie Counterfeiting and Semiconductor Value Chain Economics by Mr. Rory King - IHS Inc.

Counterfeit components and the risks involved
Counterfeit components and the risks involvedCounterfeit components and the risks involved
Counterfeit components and the risks involvedDorine Vidal
 
Beware! Counterfeit Components Put Safety and Security at Risk
Beware! Counterfeit Components Put Safety and Security at RiskBeware! Counterfeit Components Put Safety and Security at Risk
Beware! Counterfeit Components Put Safety and Security at RiskDaren Saroop
 
Counterfeit parts prevention kristal snider and kevin beard
Counterfeit parts prevention   kristal snider and kevin beardCounterfeit parts prevention   kristal snider and kevin beard
Counterfeit parts prevention kristal snider and kevin beardKristal Snider
 
15 livingson-updated-cqsdi-baesystems-counterfeit-components
15 livingson-updated-cqsdi-baesystems-counterfeit-components15 livingson-updated-cqsdi-baesystems-counterfeit-components
15 livingson-updated-cqsdi-baesystems-counterfeit-componentsozgurv
 
Mitigating the Risk of Counterfeit ICT in the DoD Supply Chain
Mitigating the Risk of Counterfeit ICT in the DoD Supply ChainMitigating the Risk of Counterfeit ICT in the DoD Supply Chain
Mitigating the Risk of Counterfeit ICT in the DoD Supply ChainKyrl Erickson
 
Anti-Counterfeit Whitepaper
Anti-Counterfeit WhitepaperAnti-Counterfeit Whitepaper
Anti-Counterfeit WhitepaperShantalla
 
ERAI -Counterfeit Awareness-Avoidance Training
ERAI -Counterfeit Awareness-Avoidance Training ERAI -Counterfeit Awareness-Avoidance Training
ERAI -Counterfeit Awareness-Avoidance Training Kristal Snider
 
Suspect Counterfeit, Non-Conforming and High Risk Electronic Components Trends
Suspect Counterfeit, Non-Conforming and High Risk Electronic Components TrendsSuspect Counterfeit, Non-Conforming and High Risk Electronic Components Trends
Suspect Counterfeit, Non-Conforming and High Risk Electronic Components TrendsKristal Snider
 
ELECTRONICS INDUSTRY STUDY REPORT - Semiconductors and Defense Electronics
ELECTRONICS INDUSTRY STUDY REPORT - Semiconductors and Defense ElectronicsELECTRONICS INDUSTRY STUDY REPORT - Semiconductors and Defense Electronics
ELECTRONICS INDUSTRY STUDY REPORT - Semiconductors and Defense ElectronicsSVCAVET
 
The Threat of Counterfeit Devices: Complicity vs Vigilance
The Threat of Counterfeit Devices: Complicity vs VigilanceThe Threat of Counterfeit Devices: Complicity vs Vigilance
The Threat of Counterfeit Devices: Complicity vs VigilanceWaqas Tariq
 
Aon Retail & Wholesale Inperspective Nov 2016
Aon Retail & Wholesale Inperspective Nov 2016Aon Retail & Wholesale Inperspective Nov 2016
Aon Retail & Wholesale Inperspective Nov 2016Graeme Cross
 
Global teleprotection market insights, forecast to 2025
Global teleprotection market insights, forecast to 2025Global teleprotection market insights, forecast to 2025
Global teleprotection market insights, forecast to 2025Bertha000
 
Cybersecurity A Community Approach - 20151109
Cybersecurity A Community Approach - 20151109Cybersecurity A Community Approach - 20151109
Cybersecurity A Community Approach - 20151109Frank Backes
 
Whitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_enWhitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_enBankir_Ru
 
electronics-manufacturing-services.pdf
electronics-manufacturing-services.pdfelectronics-manufacturing-services.pdf
electronics-manufacturing-services.pdfShrikant Borkar
 
discuss how the types of threats discussed in the article.docx
discuss how the types of threats discussed in the article.docxdiscuss how the types of threats discussed in the article.docx
discuss how the types of threats discussed in the article.docxbkbk37
 
Product tracking and tracing with Blockchain and Internet of Things
Product tracking and tracing with Blockchain and Internet of ThingsProduct tracking and tracing with Blockchain and Internet of Things
Product tracking and tracing with Blockchain and Internet of ThingsMurali Venkatesh
 

Ähnlich wie Counterfeiting and Semiconductor Value Chain Economics by Mr. Rory King - IHS Inc. (20)

Counterfeit threat-for-electronics-industry-on-rise-plug-it
Counterfeit threat-for-electronics-industry-on-rise-plug-itCounterfeit threat-for-electronics-industry-on-rise-plug-it
Counterfeit threat-for-electronics-industry-on-rise-plug-it
 
Counterfeit components and the risks involved
Counterfeit components and the risks involvedCounterfeit components and the risks involved
Counterfeit components and the risks involved
 
Beware! Counterfeit Components Put Safety and Security at Risk
Beware! Counterfeit Components Put Safety and Security at RiskBeware! Counterfeit Components Put Safety and Security at Risk
Beware! Counterfeit Components Put Safety and Security at Risk
 
Counterfeit parts prevention kristal snider and kevin beard
Counterfeit parts prevention   kristal snider and kevin beardCounterfeit parts prevention   kristal snider and kevin beard
Counterfeit parts prevention kristal snider and kevin beard
 
15 livingson-updated-cqsdi-baesystems-counterfeit-components
15 livingson-updated-cqsdi-baesystems-counterfeit-components15 livingson-updated-cqsdi-baesystems-counterfeit-components
15 livingson-updated-cqsdi-baesystems-counterfeit-components
 
Mitigating the Risk of Counterfeit ICT in the DoD Supply Chain
Mitigating the Risk of Counterfeit ICT in the DoD Supply ChainMitigating the Risk of Counterfeit ICT in the DoD Supply Chain
Mitigating the Risk of Counterfeit ICT in the DoD Supply Chain
 
Anti-Counterfeit Whitepaper
Anti-Counterfeit WhitepaperAnti-Counterfeit Whitepaper
Anti-Counterfeit Whitepaper
 
ERAI -Counterfeit Awareness-Avoidance Training
ERAI -Counterfeit Awareness-Avoidance Training ERAI -Counterfeit Awareness-Avoidance Training
ERAI -Counterfeit Awareness-Avoidance Training
 
Suspect Counterfeit, Non-Conforming and High Risk Electronic Components Trends
Suspect Counterfeit, Non-Conforming and High Risk Electronic Components TrendsSuspect Counterfeit, Non-Conforming and High Risk Electronic Components Trends
Suspect Counterfeit, Non-Conforming and High Risk Electronic Components Trends
 
ELECTRONICS INDUSTRY STUDY REPORT - Semiconductors and Defense Electronics
ELECTRONICS INDUSTRY STUDY REPORT - Semiconductors and Defense ElectronicsELECTRONICS INDUSTRY STUDY REPORT - Semiconductors and Defense Electronics
ELECTRONICS INDUSTRY STUDY REPORT - Semiconductors and Defense Electronics
 
The Threat of Counterfeit Devices: Complicity vs Vigilance
The Threat of Counterfeit Devices: Complicity vs VigilanceThe Threat of Counterfeit Devices: Complicity vs Vigilance
The Threat of Counterfeit Devices: Complicity vs Vigilance
 
Smart Grid and Consumers
Smart Grid and ConsumersSmart Grid and Consumers
Smart Grid and Consumers
 
Aon Retail & Wholesale Inperspective Nov 2016
Aon Retail & Wholesale Inperspective Nov 2016Aon Retail & Wholesale Inperspective Nov 2016
Aon Retail & Wholesale Inperspective Nov 2016
 
Global teleprotection market insights, forecast to 2025
Global teleprotection market insights, forecast to 2025Global teleprotection market insights, forecast to 2025
Global teleprotection market insights, forecast to 2025
 
Cybersecurity A Community Approach - 20151109
Cybersecurity A Community Approach - 20151109Cybersecurity A Community Approach - 20151109
Cybersecurity A Community Approach - 20151109
 
Whitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_enWhitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_en
 
electronics-manufacturing-services.pdf
electronics-manufacturing-services.pdfelectronics-manufacturing-services.pdf
electronics-manufacturing-services.pdf
 
discuss how the types of threats discussed in the article.docx
discuss how the types of threats discussed in the article.docxdiscuss how the types of threats discussed in the article.docx
discuss how the types of threats discussed in the article.docx
 
Get Prepared
Get PreparedGet Prepared
Get Prepared
 
Product tracking and tracing with Blockchain and Internet of Things
Product tracking and tracing with Blockchain and Internet of ThingsProduct tracking and tracing with Blockchain and Internet of Things
Product tracking and tracing with Blockchain and Internet of Things
 

Kürzlich hochgeladen

2024 WRC Hyundai World Rally Team’s i20 N Rally1 Hybrid
2024 WRC Hyundai World Rally Team’s i20 N Rally1 Hybrid2024 WRC Hyundai World Rally Team’s i20 N Rally1 Hybrid
2024 WRC Hyundai World Rally Team’s i20 N Rally1 HybridHyundai Motor Group
 
原版1:1定制阳光海岸大学毕业证(JCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制阳光海岸大学毕业证(JCU毕业证)#文凭成绩单#真实留信学历认证永久存档原版1:1定制阳光海岸大学毕业证(JCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制阳光海岸大学毕业证(JCU毕业证)#文凭成绩单#真实留信学历认证永久存档208367051
 
原版1:1定制中央昆士兰大学毕业证(CQU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制中央昆士兰大学毕业证(CQU毕业证)#文凭成绩单#真实留信学历认证永久存档原版1:1定制中央昆士兰大学毕业证(CQU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制中央昆士兰大学毕业证(CQU毕业证)#文凭成绩单#真实留信学历认证永久存档208367051
 
15 Disadvantages of Automated Farming: Balancing Efficiency with Environment ...
15 Disadvantages of Automated Farming: Balancing Efficiency with Environment ...15 Disadvantages of Automated Farming: Balancing Efficiency with Environment ...
15 Disadvantages of Automated Farming: Balancing Efficiency with Environment ...CIOWomenMagazine
 
UNIT-III-TRANSMISSION SYSTEMS REAR AXLES
UNIT-III-TRANSMISSION SYSTEMS REAR AXLESUNIT-III-TRANSMISSION SYSTEMS REAR AXLES
UNIT-III-TRANSMISSION SYSTEMS REAR AXLESDineshKumar4165
 
UNIT-V-ELECTRIC AND HYBRID VEHICLES.pptx
UNIT-V-ELECTRIC AND HYBRID VEHICLES.pptxUNIT-V-ELECTRIC AND HYBRID VEHICLES.pptx
UNIT-V-ELECTRIC AND HYBRID VEHICLES.pptxDineshKumar4165
 
(办理原版一样)Flinders毕业证弗林德斯大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)Flinders毕业证弗林德斯大学毕业证学位证留信学历认证成绩单补办(办理原版一样)Flinders毕业证弗林德斯大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)Flinders毕业证弗林德斯大学毕业证学位证留信学历认证成绩单补办fqiuho152
 
办理(PITT毕业证书)美国匹兹堡大学毕业证成绩单原版一比一
办理(PITT毕业证书)美国匹兹堡大学毕业证成绩单原版一比一办理(PITT毕业证书)美国匹兹堡大学毕业证成绩单原版一比一
办理(PITT毕业证书)美国匹兹堡大学毕业证成绩单原版一比一F La
 
Independent Andheri Call Girls 9833363713
Independent Andheri Call Girls 9833363713Independent Andheri Call Girls 9833363713
Independent Andheri Call Girls 9833363713Komal Khan
 
-The-Present-Simple-Tense.pdf english hh
-The-Present-Simple-Tense.pdf english hh-The-Present-Simple-Tense.pdf english hh
-The-Present-Simple-Tense.pdf english hhmhamadhawlery16
 
Call Girls Vastrapur 7397865700 Ridhima Hire Me Full Night
Call Girls Vastrapur 7397865700 Ridhima Hire Me Full NightCall Girls Vastrapur 7397865700 Ridhima Hire Me Full Night
Call Girls Vastrapur 7397865700 Ridhima Hire Me Full Nightssuser7cb4ff
 
原版1:1复刻俄亥俄州立大学毕业证OSU毕业证留信学历认证
原版1:1复刻俄亥俄州立大学毕业证OSU毕业证留信学历认证原版1:1复刻俄亥俄州立大学毕业证OSU毕业证留信学历认证
原版1:1复刻俄亥俄州立大学毕业证OSU毕业证留信学历认证jdkhjh
 
定制(Plymouth文凭证书)普利茅斯大学毕业证毕业证成绩单学历认证原版一比一
定制(Plymouth文凭证书)普利茅斯大学毕业证毕业证成绩单学历认证原版一比一定制(Plymouth文凭证书)普利茅斯大学毕业证毕业证成绩单学历认证原版一比一
定制(Plymouth文凭证书)普利茅斯大学毕业证毕业证成绩单学历认证原版一比一fhhkjh
 
Dubai Call Girls Services Call 09900000000
Dubai Call Girls Services Call 09900000000Dubai Call Girls Services Call 09900000000
Dubai Call Girls Services Call 09900000000Komal Khan
 
UNIT-IV-STEERING, BRAKES AND SUSPENSION SYSTEMS.pptx
UNIT-IV-STEERING, BRAKES AND SUSPENSION SYSTEMS.pptxUNIT-IV-STEERING, BRAKES AND SUSPENSION SYSTEMS.pptx
UNIT-IV-STEERING, BRAKES AND SUSPENSION SYSTEMS.pptxDineshKumar4165
 
办理萨省大学毕业证成绩单|购买加拿大USASK文凭证书
办理萨省大学毕业证成绩单|购买加拿大USASK文凭证书办理萨省大学毕业证成绩单|购买加拿大USASK文凭证书
办理萨省大学毕业证成绩单|购买加拿大USASK文凭证书zdzoqco
 
原版1:1定制宾州州立大学毕业证(PSU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制宾州州立大学毕业证(PSU毕业证)#文凭成绩单#真实留信学历认证永久存档原版1:1定制宾州州立大学毕业证(PSU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制宾州州立大学毕业证(PSU毕业证)#文凭成绩单#真实留信学历认证永久存档208367051
 
定制(MSVU毕业证书)圣文森山大学毕业证毕业证成绩单原版一比一定制
定制(MSVU毕业证书)圣文森山大学毕业证毕业证成绩单原版一比一定制定制(MSVU毕业证书)圣文森山大学毕业证毕业证成绩单原版一比一定制
定制(MSVU毕业证书)圣文森山大学毕业证毕业证成绩单原版一比一定制miwhjk
 
Digamma - CertiCon Team Skills and Qualifications
Digamma - CertiCon Team Skills and QualificationsDigamma - CertiCon Team Skills and Qualifications
Digamma - CertiCon Team Skills and QualificationsMihajloManjak
 

Kürzlich hochgeladen (20)

2024 WRC Hyundai World Rally Team’s i20 N Rally1 Hybrid
2024 WRC Hyundai World Rally Team’s i20 N Rally1 Hybrid2024 WRC Hyundai World Rally Team’s i20 N Rally1 Hybrid
2024 WRC Hyundai World Rally Team’s i20 N Rally1 Hybrid
 
原版1:1定制阳光海岸大学毕业证(JCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制阳光海岸大学毕业证(JCU毕业证)#文凭成绩单#真实留信学历认证永久存档原版1:1定制阳光海岸大学毕业证(JCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制阳光海岸大学毕业证(JCU毕业证)#文凭成绩单#真实留信学历认证永久存档
 
原版1:1定制中央昆士兰大学毕业证(CQU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制中央昆士兰大学毕业证(CQU毕业证)#文凭成绩单#真实留信学历认证永久存档原版1:1定制中央昆士兰大学毕业证(CQU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制中央昆士兰大学毕业证(CQU毕业证)#文凭成绩单#真实留信学历认证永久存档
 
15 Disadvantages of Automated Farming: Balancing Efficiency with Environment ...
15 Disadvantages of Automated Farming: Balancing Efficiency with Environment ...15 Disadvantages of Automated Farming: Balancing Efficiency with Environment ...
15 Disadvantages of Automated Farming: Balancing Efficiency with Environment ...
 
UNIT-III-TRANSMISSION SYSTEMS REAR AXLES
UNIT-III-TRANSMISSION SYSTEMS REAR AXLESUNIT-III-TRANSMISSION SYSTEMS REAR AXLES
UNIT-III-TRANSMISSION SYSTEMS REAR AXLES
 
UNIT-V-ELECTRIC AND HYBRID VEHICLES.pptx
UNIT-V-ELECTRIC AND HYBRID VEHICLES.pptxUNIT-V-ELECTRIC AND HYBRID VEHICLES.pptx
UNIT-V-ELECTRIC AND HYBRID VEHICLES.pptx
 
(办理原版一样)Flinders毕业证弗林德斯大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)Flinders毕业证弗林德斯大学毕业证学位证留信学历认证成绩单补办(办理原版一样)Flinders毕业证弗林德斯大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)Flinders毕业证弗林德斯大学毕业证学位证留信学历认证成绩单补办
 
办理(PITT毕业证书)美国匹兹堡大学毕业证成绩单原版一比一
办理(PITT毕业证书)美国匹兹堡大学毕业证成绩单原版一比一办理(PITT毕业证书)美国匹兹堡大学毕业证成绩单原版一比一
办理(PITT毕业证书)美国匹兹堡大学毕业证成绩单原版一比一
 
Independent Andheri Call Girls 9833363713
Independent Andheri Call Girls 9833363713Independent Andheri Call Girls 9833363713
Independent Andheri Call Girls 9833363713
 
-The-Present-Simple-Tense.pdf english hh
-The-Present-Simple-Tense.pdf english hh-The-Present-Simple-Tense.pdf english hh
-The-Present-Simple-Tense.pdf english hh
 
Call Girls Vastrapur 7397865700 Ridhima Hire Me Full Night
Call Girls Vastrapur 7397865700 Ridhima Hire Me Full NightCall Girls Vastrapur 7397865700 Ridhima Hire Me Full Night
Call Girls Vastrapur 7397865700 Ridhima Hire Me Full Night
 
原版1:1复刻俄亥俄州立大学毕业证OSU毕业证留信学历认证
原版1:1复刻俄亥俄州立大学毕业证OSU毕业证留信学历认证原版1:1复刻俄亥俄州立大学毕业证OSU毕业证留信学历认证
原版1:1复刻俄亥俄州立大学毕业证OSU毕业证留信学历认证
 
定制(Plymouth文凭证书)普利茅斯大学毕业证毕业证成绩单学历认证原版一比一
定制(Plymouth文凭证书)普利茅斯大学毕业证毕业证成绩单学历认证原版一比一定制(Plymouth文凭证书)普利茅斯大学毕业证毕业证成绩单学历认证原版一比一
定制(Plymouth文凭证书)普利茅斯大学毕业证毕业证成绩单学历认证原版一比一
 
Dubai Call Girls Services Call 09900000000
Dubai Call Girls Services Call 09900000000Dubai Call Girls Services Call 09900000000
Dubai Call Girls Services Call 09900000000
 
Indian Downtown Call Girls # 00971528903066 # Indian Call Girls In Downtown D...
Indian Downtown Call Girls # 00971528903066 # Indian Call Girls In Downtown D...Indian Downtown Call Girls # 00971528903066 # Indian Call Girls In Downtown D...
Indian Downtown Call Girls # 00971528903066 # Indian Call Girls In Downtown D...
 
UNIT-IV-STEERING, BRAKES AND SUSPENSION SYSTEMS.pptx
UNIT-IV-STEERING, BRAKES AND SUSPENSION SYSTEMS.pptxUNIT-IV-STEERING, BRAKES AND SUSPENSION SYSTEMS.pptx
UNIT-IV-STEERING, BRAKES AND SUSPENSION SYSTEMS.pptx
 
办理萨省大学毕业证成绩单|购买加拿大USASK文凭证书
办理萨省大学毕业证成绩单|购买加拿大USASK文凭证书办理萨省大学毕业证成绩单|购买加拿大USASK文凭证书
办理萨省大学毕业证成绩单|购买加拿大USASK文凭证书
 
原版1:1定制宾州州立大学毕业证(PSU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制宾州州立大学毕业证(PSU毕业证)#文凭成绩单#真实留信学历认证永久存档原版1:1定制宾州州立大学毕业证(PSU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制宾州州立大学毕业证(PSU毕业证)#文凭成绩单#真实留信学历认证永久存档
 
定制(MSVU毕业证书)圣文森山大学毕业证毕业证成绩单原版一比一定制
定制(MSVU毕业证书)圣文森山大学毕业证毕业证成绩单原版一比一定制定制(MSVU毕业证书)圣文森山大学毕业证毕业证成绩单原版一比一定制
定制(MSVU毕业证书)圣文森山大学毕业证毕业证成绩单原版一比一定制
 
Digamma - CertiCon Team Skills and Qualifications
Digamma - CertiCon Team Skills and QualificationsDigamma - CertiCon Team Skills and Qualifications
Digamma - CertiCon Team Skills and Qualifications
 

Counterfeiting and Semiconductor Value Chain Economics by Mr. Rory King - IHS Inc.

  • 1. - 1 - Counterfeiting and Semiconductor Value Chain Economics Supply Chain Risk Insight into Market Sense and Respond Actions of Counterfeiters Rory King Global Director, Supply Chain, IHS Inc. 321 Inverness Drive South Englewood, Colorado, 80112 Abstract Counterfeit parts have proliferated dramatically in recent years, presenting huge challenges for electronics manufacturing and specifically military and aerospace application. This session will offer unique new market trends, observations, and best practices on the issue of economics, semiconductor value chains, obsolescence, counterfeit electronics, and market impacts such as fact-based insight into market indicators like correlation among counterfeits, semiconductor factory utilization, component obsolescence, semiconductor availability, price volatility, and supply-and-demand equilibrium.
  • 2. - 2 - 1. Introduction While counterfeiting is a decades old issue, growing safety and securing concerns as well as scrutiny over supply chain and procurement practices around counterfeit or suspect counterfeit electronics become widely known as a result of the November 8, 2011 hearing of the U.S. Senate Armed Services Committee on Counterfeit Electronic Parts in the Department of Defense Supply Chain. Subsequent to the hearing, the National Defense Authorization Act (NDAA) of 2012 included Section 818, Counterfeit Detection & Avoidance. Generally speaking, some key supply chain implications considered at all tiers of the global defense supply chain included:  Contractor responsibility for detecting and avoiding the use or inclusion of counterfeit electronic parts or suspect counterfeit parts  Contractor responsibility for any rework or corrective action that may be required to remedy the use or inclusion of such parts  Defense contracts no longer allowing the cost of counterfeit electronic parts and suspect counterfeit electronic parts or the cost associated with rework or corrective action to resolve the use or inclusion of such parts  Qualification procedures and processes must be established to use trusted suppliers and procure electronics from authorized suppliers Cost is a major concern for the defense industry. As publicized at the U.S. Senate Armed Services Committee (SASC) hearings in 2012, a single counterfeit incident – like that of the THAAD missile system – can cost in excess of $2 million dollars. According to the Missile Defense Agency, if the devices had failed, the THAAD missile itself would likely have failed. “The cost of that fix was nearly $2.7 million,” stated Senator Carl Levin (D-MI).i Human safety and national security also come to the forefront when the potential impact of counterfeiting is assessed. Counterfeits not only pose an increasing risk to the safety of men and women in uniform, but they also endanger civilians in other parts applications subject to counterfeiting such as medical devices, consumer products, or perhaps automobiles. Counterfeiting is a challenge to companies of all sizes and across all industries – from the small domestic manufacturer to the global organization, and all entities in between. This paper discusses supply chain risk and an apparent relationship between counterfeit supplier behaviours to rapidly sense and respond to semiconductor market economic conditions, as measured through counterfeit incident reports and component production, inventory, and obsolescence insight -- over time. 2. Sophistication of Counterfeiters As Vivek Kamath, Vice President for Supply Chain Operations for Raytheon Company stated, “What keeps us up at night is the dynamic nature of this threat because by the time we’ve figured out how to test for these counterfeits, they’ve figured out how to get around it. And it’s literally on almost a daily basis they change and the sophistication of the counterfeiting is amazing to us.”ii To illustrate the apparent sophistication of counterfeiters to sense and respond to market conditions, consider the Lehman Brothers bankruptcy filing in the United States and resultant downturn of the global economy. As the largest bankruptcy filing in U.S. history, the incident – which took place on September 15, 2008 – correlates with a pronounced decline in
  • 3. - 3 - semiconductor factory production. In Figure 1 you can see that semiconductor factory utilization remained fairly steady until the economic collapse triggered by Lehman Brothers filing Chapter 11 bankruptcy, after which there was an immediate precipitous drop in semiconductor factory utilization. This is the reaction of semiconductor producers to demand side weakness. Figure 1 – Total Semiconductor Factory Utilization Original Component Manufacturers (OCMs) responded to the event by trying to maintain profitability in the face of big slashes in demand and cancellations of orders. They also started issuing end of life (EOL) notices to discontinue their products. IHS tracks these notices and, as you can see in Figure 2, the number of EOLs skyrocketed just after the filing by Lehman Brothers, which at the time was holding over $600 billion in assets. This pronounced spike illustrates how component manufacturers ultimately discontinued their products in an effort to work smarter and leaner in the midst of a tumultuous business environment. Figure 2—Manufacturer Product EOL vs. Total Semiconductor Factory Utilization
  • 4. - 4 - So how did counterfeiters respond to the bankruptcy filing and subsequent increase in EOLs? As illustrated in Figure 3, counterfeiters responded to the event as an opportunity supply counterfeit product to buyers, many of whom may not have been aware of authentic product being discontinued by the OCMs. Figure 3—Manufacturer Product EOL vs. Counterfeit Incidents Now, much discussion over counterfeit parts is around obsolete components, but in reality the problem runs much deeper. As reported by IHS, a total of 57 percent of counterfeit-part reports from 2001 through 2012 have involved obsolete or end-of- life (EOL) components, as presented in the figure below. Another 37 percent were active parts.iii If you look at Figure 4 you’ll see overall inventory trends (in the shaded areas of the chart) and a line showing counterfeit products trending along with ebbs and flows in inventory. This represents inventory of active, commercial electronic components. Keep these points in mind as we move on to Figure 5. Figure 4—Total Semiconductor Industry Inventory vs. Counterfeit Incidents
  • 5. - 5 - In Figure 5, you will notice that semiconductor factory utilization is the top line, but instead of EOLs what you now see are the counterfeit trends. The interesting correlation is how these trends fluctuate right along with the ups and downs of semiconductor factory utilization. As utilization ebbs and flows, the counterfeiting activity reacts similarly. In other words, the counterfeiters are sensing market demand and supply factors much like the original manufacturers of components. Counterfeit suppliers introduce a greater number of counterfeit products to market (as measured by counterfeit incident reports) in concert with legitimate producers responding to an uptick or forecast of semiconductor demand. As the market picks up, the counterfeit incidents increase. Figure 5—Total Semiconductor Utilization vs. Counterfeit Incidents Reported 3. Top Counterfeit Parts Classes Counterfeiters are more prolific than ever in a handful of parts classes. Entering 2012, the top five commodities subject to counterfeiting according to IHS were:iv  Transistors – 7.6%  Programmable Logics Integrated Circuits – 8.3%  Memory Integrated Circuits – 13.1%  Microprocessor Integrated Circuits – 13.4%  Analog Integrated Circuits – 25.2% In Figure 6, using IHS iSuppli Application Market Forecast Tool (AMFT), one can plot the counterfeit incidents by component classes against the semiconductor application markets where those components are consumed. The top five
  • 6. - 6 - component families are listed on the left side of the chart while the relative percentage distribution of where those products are used is reflected on the graphic’s horizontal axis. For example, 14% of analog integrated circuits products are in the industrial market; 17% in automotive; 21% in consumer; 29% in wireless; 6% in wired; and 14% in compute. (It’s important to note that medical device, military and civil aerospace components fall under the industrial market segment or the 14% of the analog integrated circuits products.) Cumulatively, analog integrated circuits are the biggest target for counterfeiters and represent a roughly $47.7 billion semiconductor application market. It is possible to imagine the potential risk and cost implications of issues associated with damages resulting from those counterfeit parts. While a great deal of attention is placed on defense supply chains, the issue plainly doesn’t just threaten the men and women in armed services or national security, but it poses potential risk and disruption to businesses and consumers who rely on products throughout these application markets. The potential challenges are apparent for other application markets. The consumer electronics segment in 2011 consumed $9.8 billion worth of analog integrated circuits, or 21 percent of the global market. Automotive electronics amounted to $8 billion, or 17 percent; computing represented $6.7 billion, or 14 percent; industrial electronics was at $6.5 billion, or 14 percent; and wired communications was $2.9 billion, or 6 percent. Figure 6—Percent Distribution of Total Market Revenue by Application Market for Most Commonly Counterfeited Product Types in 2011 4. High-Risk Suppliers Even in the face of increasing government regulation and scrutiny, the number of high-risk suppliers abounds. These firms engage in high-risk, fraudulent, and suspect counterfeit product or conduct, as identified by the U.S. government. There are literally tens of thousands of these
  • 7. - 7 - high-risk providers, and their numbers are growing daily. They push the issue of counterfeiting well beyond just the production of fake parts. As you can see in Figure 7, we’re talking about thousands of organizations emerging on an annual basis, and not just in an aggregated, collective fashion either. The environment literally changes daily and impacts every link in the supply chain. Figure 7—High Risk Suppliers from 2002-2011 5. The Monetary Impacts of Counterfeiting Concerns over the impact of counterfeits are well known throughout industry. One general example draws from an IHS and Supply & Demand Chain Executive survey of 1,001 practitioners, executives, academics, vendors and other industry professionals. Summarized key findings on the impact of counterfeits experienced or believed by these survey respondents include those shown in Figure 8. As was apparent, counterfeits cause a wide range of potential issues from serious financial and brand consequences to daily operational cost, service, and safety disruption. Figure 8—Significant Costs of Counterfeit Riskv
  • 8. - 8 - 6. Conclusions Counterfeiting concerns and impacts continue to be widely discussed, documented, and shared throughout industry on a worldwide basis. Through unique information and insight now available to plot real counterfeit incidents reported by industry against semiconductor factory utilization, inventory, product lifecycle, and application market forecasts one can begin to see the degree to which counterfeit behaviours appear to correlate with semiconductor industry responses to marketplace economics. When this insight is analyzed, it seems apparent that counterfeiters sense and respond to marketplace dynamics in a sophisticated manner, by taking such action as supplying counterfeit product to market in concert with semiconductor factories increasing capacity to do satisfy demand. While these correlations seem apparent, other interesting questions that cannot be proved emerge as well – for instance, could these factories (or their equipment or entire replicas thereof) be the sources of illegitimate product entering the counterfeit supply chain? In conclusion, some key points can be considered as organisation assess risk vulnerabilities and implement counterfeit detection and avoidance measures:  Counterfeiters are not simple individuals with rudimentary capabilities; they are sophisticated operators and they are in tune with the market.  Counterfeiting is not exclusively a military and defense parts issue, but rather counterfeit parts impact all commercial & military markets.  Counterfeiting is not restricted to old, obsolete components, but rather counterfeiting impacts active components (in fact, nearly half are active parts).  Counterfeit detection and avoidance is not just a “cost burden,” but counterfeit risk mitigation creates significant cost avoidance.  Counterfeit mitigation is not just about “the parts,” but counterfeit mitigation requires knowledge of high-risk suppliers. i HEARING TO RECEIVE TESTIMONY ON THE COMMITTEE’S INVESTIGATION INTO COUNTERFEIT ELECTRONIC PARTS IN THE DEPARTMENT OF DEFENSE SUPPLY CHAIN, Tuesday, November 8, 2011, U.S. SENATE COMMITTEE ON ARMED SERVICES, Washington, DC ii HEARING TO RECEIVE TESTIMONY ON THE COMMITTEE’S INVESTIGATION INTO COUNTERFEIT ELECTRONIC PARTS IN THE DEPARTMENT OF DEFENSE SUPPLY CHAIN, Tuesday, November 8, 2011, U.S. SENATE COMMITTEE ON ARMED SERVICES, Washington, DC iii Rory King and Mark Snider, IHS Inc. with ERAI Inc., 2012 iv Rory King and Mark Snider, IHS Inc. with ERAI Inc., 2012 v Supply & Demand Chain Executive and IHS Inc., Benchmarking Counterfeits and Inferior Grade Components, 2009