Category Archives: Government Funding

Information specific to Government funding

Great Articles on Supply Chain Security

This last week saw two great new articles on supply chain security in two different industries: the first from Wired Magazine on the casino gaming industry, and the second from Dark Reading on the data breaches in various defense company networks through security authentication devices.

Continue reading


CPU Tech Welcomes Kevin Kirk as New Anti-Tamper Executive Agent

Effective this week, current Anti-Tamper Executive Agent for the Department of Defense Ernie Haendschke will be moving on to a new office of responsibility. Taking his place as the director of SAF/AQLS and effective/interim Anti-Tamper Executive Agent will be Kevin Kirk, who has worked previously in LO/CLO (Low Observable, Counter Low Observable) support and coordination of foreign military sales.

CPU Tech would like to thank Ernie for his time, effort, and representation of the Anti-Tamper technology area over the last few years, and welcome Kevin in his new set of responsibilities. Continue reading

Counterfeit Chips Traced to Weapon Programs

Last week, Wired Magazine reported on the findings regarding a large number of counterfeit military IC’s purchased from the company VisionTech by the US Navy. Business Insider published¬†a similar article with slightly more alarmist leanings. Both articles discuss the worst-case scenario: foreign installed ‘Trojan Horses’ found in counterfeit ICs that have self-destruct timers or watch for specific input triggers to stop working (‘Kill Switches’).

Continue reading

Where is ‘Export Control Reform’ at?

Cutting and pasting below some remarks this morning from Andrew Shapiro at the Defense Trade Advisory Group. He doesn’t give a lot of detail, other than to say ‘We’re working on it.’

Continue reading

Adding an ‘Anti-Counterfeiting Executive Agent’ Fails to Make 2011 Defense Authorization Bill

The headline on last week was that the provision to add a Supply Chain Executive Agent to address counterfeiting was dropped from the Defense Authorization Bill.

This means it is still everyone’s problem . . . and no one person’s.

Continue reading

IEEE Security and Privacy Article: Configuring Secure Processors

At the risk of a bit of ‘vanity blogging’, CPU Tech has just published an article in the IEEE Journal for Security and Privacy. IEEE members can access the article for free, or the abstract and purchase information can be reached at this link.

Continue reading

NIST Starts to Address Supply Chain with NISTIR 7622

Just last week, the National Institute of Standards (NIST) published the first draft of a new guidance on Supply Chain Security for Federal Information Systems. This publication is titled NISTIR 7622: Piloting Supply Chain Risk Management for Federal Information Systems.

Continue reading