The Defense Advanced Research Projects Agency (DARPA) Information Innovation Office (I2O) will conduct a briefing in support of the anticipated Broad Agency Announcement (BAA) for the VET – Vetting Commodity IT Software and Firmware program. When released, the BAA will be posted on the Federal Business Opportunities (FBO) website, http://www.fedbizopps.gov, and possibly the Grants.gov website, […]
Electrical testing to track fake military parts
Counterfeit electronic components are an increasing threat to the supply chain for consumer, industrial and, more importantly, military parts. Some counterfeit parts are like counterfeit money, unauthorized copies. Other cases include mislabeled parts where parts meant for one purpose are relabeled for another by changing the part number. Specifically, parts built for consumer purposes can […]
chip, counterfeit, fake, hardware, parts, testDOD requirement to mark parts with unique DNA
A new anti-counterfeiting requirement from the U.S. Defense Logistics Agency (DLA) at Fort Belvoir, Va., is triggering pushback from semiconductor manufacturers, who claim the new requirement is not an appropriate cure for electronics counterfeiting, does not adequate authenticate legacy semiconductors, has not been tested adequately, and will increase semiconductor manufacturing costs.The DNA-marking mandate, which became effective on 15 November […]
Applied, chip, counterfeit, Defense Logistics Agency, DLA, DNA, DOD, IC, marking, miltaryToshiba adds IP protection to automotive MCUs
Toshiba has revealed a security module for automotive microcontrollers meeting industry anti-hacking, anti-tamper and software theft standards. Developed at the company’s automotive development centre in Düsseldorf, the Toshiba Security Module will be built into future generations of the company’s ARM Cortex-based automotive microcontrollers. “The module’s firmware is, as a first release step, compliant with the Secure […]
ARM, automotive, chip, IC, Security, ToshibaReport calls China biggest cyberthreat
Ongoing Chinese cyberattacks on U.S. industry and government present a significant threat and the Defense Department should consider its ability to exclude “any foreign-produced equipment” that could pose cybersecurity vulnerabilities, a new report to Congress recommended Wednesday. The bipartisan U.S.-China Economic and Security Review Commission, in its annual report to Congress released Wednesday, found that China is […]
China, congress, cyberthreat, Huawei, report, ZTEHuawei, Altera mix FPGA, memory in 2.5-D device
Huawei and Altera will package an FPGA and a Wide I/O memory on a 2.5-D silicon interposer to bust through memory bandwidth limits in communications systems. The technology presents thorny challenges but could become critical in networking, said a senior scientist for Huawei. The new device, in the works only about three months, will significantly […]
2.5 D, 2.5D, Altera, Huawei, Interposer, networking, trojanMorning Bell: Cybersecurity: Do You Trust the Government with Your Computer?
“…Simply put, government regulations usually take 24–36 month to complete, but the power of computers doubles every 18–24 months. This means that any standards developed will be written for threats that are two or three computer generations old….” via Morning Bell: Cybersecurity: Do You Trust the Government with Your Computer?. Editor’s note: The government seems […]
bill, cybersecurity, executive, government, orderFake tech gear has infiltrated the U.S. government
A record number of tech products used by the U.S. military and dozens of other federal agencies are fake. That opens up a myriad of national security risks, from dud missiles to short-circuiting airplane parts to cyberespionage. Despite laws designed to crack down on counterfeiters, suppliers labeled by the U.S. government as “high risk” are […]
chips, fake, military, USNIST spells out baseline security requirements for next-gen mobile devices
Necessary, but sufficient? From Government Computer News: “The adoption of mobile devices in the workplace has outstripped the ability of smart phones and tablets to support basic security features needed in trusted enterprise tools. As a result, government agencies are being forced to accept the security risks inherent in mobile devices because their workers expect to […]
devices, hardware, mobile, risk, SecurityTwitter Password Security Breach
Twitter sent out e-mails to some of its users earlier today prompting them to reset their passwords because of possible security issues with third-party applications. “Twitter believes that your account may have been compromised by a website or service not associated with Twitter,” the e-mail says. “We’ve reset your password to prevent others from accessing […]
Breach, password, Security, twitter