Protecting the Supply Chain
Counterfeit electronic parts remain among the most significant threats to product reliability and end-user safety in today’s global marketplace. At Direct Components, we take this risk seriously. We implemented our Fraudulent/Counterfeit Parts Control Plan to protect the supply chain. This plan isn’t just a response to industry requirements—it’s a proactive strategy that secures every link of our supply chain, ensuring our customers receive authentic, high-quality components. In this blog, we’d like to share our multifaceted approach, built around five key pillars: Prevention, Risk Mitigation, Detection, Disposition & Reporting, and Training & Compliance.
Prevention

Discovery of Customer Risk Mitigation & Flowdown
Every customer’s project is different, which means the risks associated with counterfeit parts can vary. Our first step is always understanding the risks and incorporating preventive measures specific to each project. By doing so, we create and follow tailored protocols for quality, traceability, and supplier communication.

Supplier Approval & Source Selection
We maintain a rigorous supplier vetting process. Our detailed assessments include historical performance reviews, vendor surveys, risk assessments, and certification checks. Only suppliers who meet our agreed standards become part of our supply network.

Rigorous Verification
Before a part is considered for purchase, it goes through screening procedures. From verifying part numbers to validating documentation, we make sure every detail is consistent and reliable.

When Available, Purchase from Authorized Sources
Our top preference is purchasing directly from Original Component Manufacturers (OCMs) or their Authorized Distributors. This greatly reduces the risk of introducing counterfeit parts into our inventory and the supply chain.

Supply Chain Traceability
When supply chain traceability is available, we retain documentation of the component’s journey from the manufacturer. If unavailable, records are retained to track the parts by lot to external parties.
Risk Mitigation

Risk Assessments
We regularly conduct formal risk assessments to identify potential vulnerabilities. This includes but is not limited to screening suppliers through the consolidated screening list, reviewing performance history, researching external reports of suspect counterfeit, evaluating part history and criticality, and end of use product.

Continuous Evaluation & Enhanced Monitoring
Once suppliers are approved, our vigilance doesn’t end. We continuously monitor supplier quality, investigate any anomalies, and reevaluate supplier status as needed.

Enhanced Testing Procedures & Additional Verification
Implementing testing protocols to verify authenticity is key to keeping counterfeit parts off the market. By layering multiple verification methods, we minimize the possibility of counterfeit parts slipping through.

Part History Review & GIDEP Searches
Our team uses historical data and government-industry data exchange (GIDEP) resources. This ensures we are up to date on any warnings or reports of counterfeit activity tied to specific parts or suppliers.
Detection

In-House Testing
Our state-of-the-art testing facilities are central to our detection process. From basic visual inspections to more enhanced testing methods, we are able to identify most nonconformances.

Advanced Techniques
We use a range of inspection techniques—such as X-ray, decapsulation, and scanning electron microscopy—to uncover hidden markers of counterfeit construction. This approach can give us multiple data points to confirm a chip’s authenticity.

Detailed Records
Every test conducted is recorded and documented. This ensures accountability and also provides essential data for trend analysis and future preventive strategies.

AS6081 Testing
AS6081 outlines globally recognized best practices for detecting fraudulent and counterfeit parts. When AS6081 is required, test reports are verified to ensure all applicable AS6081 testing requirements are met.
Disposition & Reporting

Handling Nonconforming Parts
If a component fails testing or inspection, it is immediately segregated. Further evaluation may be required to confirm the findings. Once confirmed, the part is promptly quarantined to await disposition.

Quarantine & Isolation
By isolating suspect components from our main inventory, we prevent them from re-entering the supply chain or risking contamination of verified stock.

Proper Disposition
Once parts are confirmed counterfeit or otherwise nonconforming, we follow strict disposal procedures to ensure they don’t reappear on the market.

Reporting Mechanisms
We take reporting seriously. Our processes ensure timely communication with affected customers and relevant external parties, such as GIDEP, as applicable.
Training & Compliance

Employee Training & Ongoing Programs
Our workforce is our first line of defense against counterfeit components. We provide regular training sessions on prevention, mitigation, and detection techniques tailored to each position. Additionally, we stay up-to-date on evolving counterfeit tactics to ensure our team is well-prepared.

Compliance with Standards & Certification Adherence
Beyond AS6081:2012, our operational framework is aligned with ISO9001 and AS9120 certifications. These stringent standards help us maintain a culture of continuous improvement and accountability, reinforcing every aspect of our counterfeit mitigation plan.
Check Out our Counterfeit Mitigation Page & Testing and Inspection Page for more details
Questions on AS6081 or our Quality Processes? Email Natalie at qc@directics.com