This last week saw two great new articles on supply chain security in two different industries: the first from Wired Magazine on the casino gaming industry, and the second from Dark Reading on the data breaches in various defense company networks through security authentication devices.
Effective this week, current Anti-Tamper Executive Agent for the Department of Defense Ernie Haendschke will be moving on to a new office of responsibility. Taking his place as the director of SAF/AQLS and effective/interim Anti-Tamper Executive Agent will be Kevin Kirk, who has worked previously in LO/CLO (Low Observable, Counter Low Observable) support and coordination of foreign military sales.
CPU Tech would like to thank Ernie for his time, effort, and representation of the Anti-Tamper technology area over the last few years, and welcome Kevin in his new set of responsibilities. Continue reading
Last week, Wired Magazine reported on the findings regarding a large number of counterfeit military IC’s purchased from the company VisionTech by the US Navy. Business Insider published a similar article with slightly more alarmist leanings. Both articles discuss the worst-case scenario: foreign installed ‘Trojan Horses’ found in counterfeit ICs that have self-destruct timers or watch for specific input triggers to stop working (‘Kill Switches’).
Cutting and pasting below some remarks this morning from Andrew Shapiro at the Defense Trade Advisory Group. He doesn’t give a lot of detail, other than to say ‘We’re working on it.’
Those familiar with CPU Tech know that the company does not publicly discuss the specific techniques and technologies used in the Secure Processor or the Secure Design Environment. However, today Military Embedded Systems published an article submitted by CPU Tech discussing a very specific set of technologies that can be used for silicon security, and some conclusions about how the technology should be used.
Practically all of CPU Tech’s press releases last year are about compatibility with secure operating systems and software providers. That has not changed this year.
Following up on previous posts on this blog about promoting our work with Flexera Software and Mocana, two more links are now available on the front page of CPU Tech’s website.
Posted in General
Tagged Flexera, Mocana
In this interview with Flexera Software, at their Software Summit last Fall, we explain how we are using entitlement management in our Acalis Sentry Security Server to partition security design and provide a unique supply chain solution to our customers.