Skip to content

1.7 Counterfeit avoidance (AS5553)

Counterfeit components pose a significant risk to manufacturing integrity. A “remarked” or “blacktopped” component might pass initial functional testing but fail later in the field due to thermal mismatch or latent ESD damage, leading to recalls and reliability issues. The objective is to maintain strict prevention strategies. Counterfeit avoidance involves proactively managing sourcing hierarchies and enforcing robust validation protocols to protect the supply chain.

Supply chain risk is heavily influenced by the Chain of Custody (CoC). The sourcing path determines the necessary level of inspection.

  • The Definition: The Original Component Manufacturer (OCM) direct, or a formally Franchised/Authorized Distributor (e.g. Digi-Key, Mouser, Avnet).
  • The Status: Authorized.
  • The Requirement: Unbroken paper traceability to the OCM. A formal Manufacturer CoC should be provided with the shipment.
  • The Risk: Very Low.

Tier 2: the open market (broker/independent)

Section titled “Tier 2: the open market (broker/independent)”
  • The Definition: Non-franchised, independent distributors sourcing from global excess inventory.
  • The Status: Restricted.
  • The Requirement: Sourcing from Tier 2 generally requires a formal approval or waiver from Supply Chain leadership or Engineering, typically when authorized channels cannot meet production needs.
  • The Risk: High. Material from the open market requires thorough verification and often destructive testing to prove authenticity.

The requirements for documentation and testing should scale based on the source’s transparency.

Risk ClassSource TypeDocumentation RequiredInspection / Testing Recommendation
Class IOCM / AuthorizedMfg CoC + Packing SlipStandard Incoming (Verify qty, check for damage, scan labels)
Class IIBroker (Traceable)3rd Party CoC + Trace DocsEnhanced Visual (Microscope) & Verify Supplier Solvency
Class IIIBroker (No Trace)Invoice Only (High Risk)Full Protocol (e.g. AS6081: X-Ray, Decap, XRF, Electrical)

Pro-Tip: Acetone swabbing (checking for “blacktopping” or laser remarking) is an effective initial test. If the top coating dissolves or the ink smears under an acetone swab, the part is highly suspect. This simple check on the receiving dock can flag issues before sending parts out for expensive lab analysis.

Apply a consistent validation flow to incoming lots based on their source.

  • When the Source is Tier 1 Authorized:
    • Verify the printed CoC aligns with the physical reel labels, then accept the lot for standard processing.
  • When the Source is a Tier 2 Broker:
    • Move the lot to enhanced inspection protocols before allowing the parts into general inventory.

Step 2: broker risk mitigation (enhanced protocols)

Section titled “Step 2: broker risk mitigation (enhanced protocols)”

When a component is sourced from the open market, especially Active components (ICs, Controllers) or high-value items, enhanced analysis is recommended:

  • Destructive Analysis (Sample Testing):
    • Decapsulation (Decap): Expose the silicon die to verify that microscopic die markings match the OCM datasheet.
    • X-Ray: Check internal bond wire integrity, die size, and lead frame attach, comparing against a known-good sample.
    • XRF (X-Ray Fluorescence): Verify the physical lead finish (e.g. confirming RoHS compliance) matches the MPN specification.
  • If the analysis result indicates a failure or high likelihood of counterfeit, initiate the Quarantine Protocol immediately.

If a part is identified as suspect counterfeit, handle it securely to prevent accidental use in production.

  • The Action: Isolate the suspect parts. Avoid returning them to the vendor immediately, as this may allow the counterfeit parts to re-enter the global supply chain.
  • The Storage: Secure the inventory in a segregated, clearly marked quarantine area (e.g. the MRB cage).
  • The Tagging: Apply clear “NON-CONFORMING / SUSPECT” labeling to the materials.
  • Internal Escalation: Notify the Supply Chain, Quality, and Leadership teams.
  • External Reporting: Consider filing a report with organizations like GIDEP (Government-Industry Data Exchange Program) or ERAI once counterfeit status is confirmed by an independent lab.
  • If a vendor supplies a confirmed counterfeit component, review their AVL status. They should typically be moved to a Disqualified or Blacklisted status.
  • Initiate appropriate financial actions, such as credit holds, regarding pending invoices with that vendor while the investigation is ongoing.

Final Checkout: Counterfeit avoidance (AS5553)

Section titled “Final Checkout: Counterfeit avoidance (AS5553)”
Control PointEngineering RequirementGoal
Sourcing RulePrioritize Authorized Channels.Target > 95% of spend
Broker WaiverExecutive/Engineering Approval for open market buys.Process followed
Validation RequirementEnhanced Testing (Decap/X-Ray) for high-risk sources.Applied to Broker Lots
Visual CheckMicroscope Inspection for physical anomalies.Standard practice
Solvent TestChemical resistance check for remarking (MIL-STD H106).Useful preliminary test
Disposition RuleIndustry Reporting for confirmed counterfeit parts.GIDEP / ERAI Submission engaged