Skip to content

1.7 Counterfeit avoidance: AS5553

Counterfeit components pose a significant risk to manufacturing integrity. A “remarked” or “blacktopped” component might pass initial Functional Testing (FCT) but fail later in the field due to thermal mismatch or latent Electrostatic Discharge (ESD) damage, leading to recalls and reliability issues. The objective is to maintain strict prevention strategies. Counterfeit avoidance involves proactively managing sourcing hierarchies and enforcing robust validation protocols to protect the supply chain.

Supply chain risk is heavily influenced by the Chain of Custody (CoC). The sourcing path determines the necessary level of inspection.

  • The Definition: The Original Component Manufacturer (OCM) direct, or a formally Franchised/Authorized Distributor (e.g. Digi-Key, Mouser, Avnet).
  • The Status: Authorized.
  • The Requirement: Unbroken paper traceability to the OCM. A formal Manufacturer CoC should be provided with the shipment.
  • The Risk: Very Low.

Tier 2: the open market (broker/independent)

Section titled “Tier 2: the open market (broker/independent)”
  • The Definition: Non-franchised, independent distributors sourcing from global excess inventory.
  • The Status: Restricted.
  • The Requirement: Sourcing from Tier 2 generally requires a formal approval or waiver from Supply Chain leadership or Engineering, typically when authorized channels cannot meet production needs.
  • The Risk: High. Material from the open market requires thorough verification and often destructive testing to prove authenticity.

The requirements for documentation and testing should scale based on the source’s transparency.

Risk ClassSource TypeDocumentation RequiredInspection / Testing Recommendation
Class IOCM / AuthorizedMfg CoC + Packing SlipStandard Incoming (Verify qty, check for damage, scan labels)
Class IIBroker (Traceable)3rd Party CoC + Trace DocsEnhanced Visual (Microscope) & Verify Supplier Solvency
Class IIIBroker (No Trace)Invoice Only (High Risk)Full Protocol (e.g. AS6081: X-Ray, Decap, XRF, Electrical)

Pro-Tip: Acetone swabbing (checking for “blacktopping” or laser remarking) is an effective initial test. If the top coating dissolves or the ink smears under an acetone swab, the part is highly suspect. This simple check on the receiving dock can flag issues before sending parts out for expensive lab analysis.

A consistent validation flow must be applied to incoming lots based on their source.

  • When the Source is Tier 1 Authorized:
    • It must be verified that the printed CoC aligns with the physical reel labels, then the lot can be accepted for standard processing.
  • When the Source is a Tier 2 Broker:
    • The lot must be moved to enhanced inspection protocols before allowing the parts into general inventory.

Step 2: broker risk mitigation (enhanced protocols)

Section titled “Step 2: broker risk mitigation (enhanced protocols)”

When a component is sourced from the open market, especially Active components (ICs, Controllers) or high-value items, enhanced analysis is recommended:

  • Destructive Analysis (Sample Testing):
    • Decapsulation (Decap): The silicon die must be exposed to verify that microscopic die markings match the OCM datasheet.
    • X-Ray: Internal bond wire integrity, die size, and lead frame attach must be checked, comparing against a known-good sample.
    • XRF (X-Ray Fluorescence): The physical lead finish (e.g. confirming RoHS compliance) must be verified to match the MPN specification.
  • If the analysis result indicates a failure or high likelihood of counterfeit, the Quarantine Protocol must be initiated immediately.

If a part is identified as suspect counterfeit, it must be handled securely to prevent accidental use in production.

  • The Action: The suspect parts must be isolated. Returning them to the vendor immediately must be avoided, as this may allow the counterfeit parts to re-enter the global supply chain.
  • The Storage: The inventory must be secured in a segregated, clearly marked quarantine area (e.g. the MRB cage).
  • The Tagging: Clear “NON-CONFORMING / SUSPECT” labeling must be applied to the materials.
  • Internal Escalation: The Supply Chain, Quality, and Leadership teams must be notified.
  • External Reporting: Filing a report with organizations like GIDEP (Government-Industry Data Exchange Program) or ERAI should be considered once counterfeit status is confirmed by an independent lab.
  • If a vendor supplies a confirmed counterfeit component, review their AVL status. They should typically be moved to a Disqualified or Blacklisted status.
  • Appropriate financial actions, such as credit holds, must be initiated regarding pending invoices with that vendor while the investigation is ongoing.

Final Checkout: Counterfeit avoidance (AS5553)

Section titled “Final Checkout: Counterfeit avoidance (AS5553)”
Control PointEngineering RequirementGoal
Sourcing RulePrioritize Authorized Channels.Target > 95% of spend
Broker WaiverExecutive/Engineering Approval for open market buys.Process followed
Validation RequirementEnhanced Testing (Decapsulation/X-Ray) for high-risk sources.Applied to Broker Lots
Visual CheckMicroscope Inspection for physical anomalies.Standard practice
Solvent TestChemical resistance check for remarking (MIL-STD-883 Method 106).Useful preliminary test
Disposition RuleIndustry Reporting for confirmed counterfeit parts.GIDEP / ERAI Submission engaged