TM_F_1448_
_16
Designation:F144816Standard Guide forSelection of Security Technology for Protection AgainstCounterfeiting,Alteration,Diversion,Duplication,Simulation,and Substitution(CADDSS)of Products orDocuments1This standard is issued under the fixed designation F1448;the number immediately following the designation indicates the year oforiginal adoption or,in the case of revision,the year of last revision.A number in parentheses indicates the year of last reapproval.Asuperscript epsilon()indicates an editorial change since the last revision or reapproval.INTRODUCTIONAny product or document of value has a risk of being counterfeited,altered,diverted,duplicated,simulated,or substituted(CADDSS).The greater the value of the object or item,the greater is thelikelihood of CADDSS.Counterfeiting of brand names,designer clothes,accessories,jewelry,andintellectual property was assessed to have a total global value of$650 billion in 2008,with 2015projections exceeding$1 trillion,and employment losses of approximately 2.5 million.This dollarfigure does not include the losses in the financial community,including banknotes,stocks and bonds,etc.,the losses of which are unknown and unreported.Just as counterfeiting and alteration ofdocuments are severe problems in the financial sector,the counterfeiting,alteration,diversion,duplication,simulation,and substitution(CADDSS)of products are life threatening when they relateto aeronautical parts,auto parts,pharmaceuticals,life support equipment,and Department of Defensematerial.The problem cannot be eliminated,but it can be controlled by using anticounterfeitingtechnology selected to fit the users requirements.The purpose of this document is to provide an overarching guide to protect against CADDSS.Therefore,it is expected that additional standards will be generated that are more specific to a givenproduct,such as clothing,music and videos(and other data-centric products),medicine,currency,official documentation,vehicles,etc.To protect against CADDSS,several steps have to be taken,which include but are not limited to:(1)identification of the CADDSS sensitive product,(2)documenting the nature,magnitude of likelihood,and magnitude of impact of different CADDSS onthe product,(3)list the possible anti-CADDSS solutions available to address the documentedCADDSS strategies,and(4)develop a strength and weakness analysis for each of the applicableanti-CADDSS solutions.Whichever technology,or combination of technologies,is used,thefrequency of authentication and the education of personnel or the public using the technology arevitally important in controlling counterfeiting,alteration,diversion,duplication simulation,andsubstitution(CADDSS)of products and documents.1.Scope1.1 This general guide is intended to assist the user of theguide in selecting anti-CADDSS technologies to protect theirproduct from CADDSS.1.2 This guide does not address or evaluate specific anti-CADDSS technologies,but rather suggests a path that assistsin the objective evaluation of features of anti-CADDSS tech-nologies available protection of their product from CADDSS.1.3 This guide provides a procedure to accomplish theproper selection of a security system.Specific technologies arenot addressed,nor are any technologies recommended.Thereare many security systems available in the public marketplacetoday.Each has limitations and must be carefully measuredagainst the parameters presented in this guide.Once thiscareful analysis is done,the user will be in a knowledgeableposition to select a security system to meet his needs.2.Terminology2.1 Definitions:1This guide is under the jurisdiction of ASTM Committee F12 on SecuritySystems and Equipment and is the direct responsibility of Subcommittee F12.60 onControlled Access Security,Search,and Screening Equipment.Current edition approved Oct.1,2016.Published October 2016.Originallyapproved in 1993.Last previous edition approved in 2012 as F1448 12.DOI:10.1520/F1448-16.Copyright ASTM International,100 Barr Harbor Drive,PO Box C700,West Conshohocken,PA 19428-2959.United States1 2.1.1 alterationthe modification of an object or item thatis not the genuine object or time with the intent that it will passas the genuine object or item.2.1.2 counterfeita reproduction of a genuine object oritem or security feature thereof so that the reproduction canpass as genuine after detailed inspection by a qualified exam-iner.2.1.3 diversionthe distribution and sale of a genuineobjects or items through unauthorized dealers,often resultingin tax evasion.2.1.4 duplicationthe reproduction of a genuine object oritem so that reproduction generally looks like the genuineobject or item.2.1.5 simulationthe imitation of article genuine object oritem,or features thereof,including similar security features.2.1.6 substitutionthe act of putting or using one object oritem in place of the genuine object or item.2.2 In all cases,it is assumed the object or item generated byCADDSS is(1)of lesser quality and cost than the ge