ASTM F1448-16
(Guide)Standard Guide for Selection of Security Technology for Protection Against Counterfeiting, Alteration, Diversion, Duplication, Simulation, and Substitution (CADDSS) of Products or Documents
Standard Guide for Selection of Security Technology for Protection Against Counterfeiting, Alteration, Diversion, Duplication, Simulation, and Substitution (CADDSS) of Products or Documents
SIGNIFICANCE AND USE
3.1 This guide is the first known attempt to focus on security requirements and compare them to available and known technologies capable of meeting these requirements. This guide describes several steps to select the appropriate anti-CADDSS technology. These steps are described in Section 4.
SCOPE
1.1 This general guide is intended to assist the user of the guide in selecting anti-CADDSS technologies to protect their product from CADDSS.
1.2 This guide does not address or evaluate specific anti-CADDSS technologies, but rather suggests a path that assists in the objective evaluation of features of anti-CADDSS technologies available protection of their product from CADDSS.
1.3 This guide provides a procedure to accomplish the proper selection of a security system. Specific technologies are not addressed, nor are any technologies recommended. There are many security systems available in the public marketplace today. Each has limitations and must be carefully measured against the parameters presented in this guide. Once this careful analysis is done, the user will be in a knowledgeable position to select a security system to meet his needs.
General Information
Buy Standard
Standards Content (Sample)
This international standard was developed in accordance with internationally recognized principles on standardization established in the Decision on Principles for the
Development of International Standards, Guides and Recommendations issued by the World Trade Organization Technical Barriers to Trade (TBT) Committee.
Designation: F1448 − 16
Standard Guide for
Selection of Security Technology for Protection Against
Counterfeiting, Alteration, Diversion, Duplication,
Simulation, and Substitution (CADDSS) of Products or
1
Documents
This standard is issued under the fixed designation F1448; the number immediately following the designation indicates the year of
original adoption or, in the case of revision, the year of last revision. A number in parentheses indicates the year of last reapproval. A
superscript epsilon (´) indicates an editorial change since the last revision or reapproval.
INTRODUCTION
Any product or document of value has a risk of being counterfeited, altered, diverted, duplicated,
simulated, or substituted (CADDSS). The greater the value of the object or item, the greater is the
likelihood of CADDSS. Counterfeiting of brand names, designer clothes, accessories, jewelry, and
intellectual property was assessed to have a total global value of $650 billion in 2008, with 2015
projections exceeding $1 trillion, and employment losses of approximately 2.5 million. This dollar
figure does not include the losses in the financial community, including banknotes, stocks and bonds,
etc., the losses of which are unknown and unreported. Just as counterfeiting and alteration of
documents are severe problems in the financial sector, the counterfeiting, alteration, diversion,
duplication, simulation, and substitution (CADDSS) of products are life threatening when they relate
to aeronautical parts, auto parts, pharmaceuticals, life support equipment, and Department of Defense
material. The problem cannot be eliminated, but it can be controlled by using anticounterfeiting
technology selected to fit the user’s requirements.
The purpose of this document is to provide an overarching guide to protect against CADDSS.
Therefore, it is expected that additional standards will be generated that are more specific to a given
product, such as clothing, music and videos (and other data-centric products), medicine, currency,
official documentation, vehicles, etc. To protect against CADDSS, several steps have to be taken,
which include but are not limited to: (1) identification of the CADDSS sensitive product, (2)
documenting the nature, magnitude of likelihood, and magnitude of impact of different CADDSS on
the product, (3) list the possible anti-CADDSS solutions available to address the documented
CADDSS strategies, and (4) develop a strength and weakness analysis for each of the applicable
anti-CADDSS solutions. Whichever technology, or combination of technologies, is used, the
frequency of authentication and the education of personnel or the public using the technology are
vitally important in controlling counterfeiting, alteration, diversion, duplication simulation, and
substitution (CADDSS) of products and documents.
1. Scope in the objective evaluation of features of anti-CADDSS tech-
nologies available protection of their product from CADDSS.
1.1 This general guide is intended to assist the user of the
guide in selecting anti-CADDSS technologies to protect their 1.3 This guide provides a procedure to accomplish the
product from CADDSS. proper selection of a security system. Specific technologies are
not addressed, nor are any technologies recommended. There
1.2 This guide does not address or evaluate specific anti-
are many security systems available in the public marketplace
CADDSS technologies, but rather suggests a path that assists
today. Each has limitations and must be carefully measured
against the parameters presented in this guide. Once this
1
This guide is under the jurisdiction of ASTM Committee F12 on Security
careful analysis is done, the user will be in a knowledgeable
Systems and Equipment and is the direct responsibility of Subcommittee F12.60 on
position to select a security system to meet his needs.
Controlled Access Security, Search, and Screening Equipment.
Current edition approved Oct. 1, 2016. Published October 2016. Originally
2. Terminology
approved in 1993. Last previous edition approved in 2012 as F1448 – 12. DOI:
10.1520/F1448-16. 2.1 Definitions:
Copyright © ASTM International, 100 Barr Harbor Drive, PO Box C700, West Conshohocken, PA 19428-2959. United States
1
---------------------- Page: 1 ----------------------
F1448 − 16
2.1.1 alteration—the modification of an object or item that 4.4.4 Sum the products found in 5.4.3 and enter in the
is not the genuine object or time with the intent that it will pass leftmost column labeled “decision values.” These values will
as the genuine object or item. be the basis upon which a user will determine if an anti-
CADDSS program will be considered.
2.1.2 counter
...
This document is not an ASTM standard and is intended only to provide the user of an ASTM standard an indication of what changes have been made to the previous version. Because
it may not be technically possible to adequately depict all changes accurately, ASTM recommends that users consult prior editions as appropriate. In all cases only the current version
of the standard as published by ASTM is to be considered the official document.
Designation: F1448 − 12 F1448 − 16
Standard Guide for
Selection of Security Technology for Protection Against
Counterfeiting, Alteration, Diversion, Duplication,
Simulation, and Substitution (CADDSS) of Products or
1
Documents
This standard is issued under the fixed designation F1448; the number immediately following the designation indicates the year of
original adoption or, in the case of revision, the year of last revision. A number in parentheses indicates the year of last reapproval. A
superscript epsilon (´) indicates an editorial change since the last revision or reapproval.
INTRODUCTION
Any product or document of value has a risk of being counterfeited, altered, diverted, duplicated,
simulated, or substituted (CADDSS). The greater the value of the object or item, the greater is the
likelihood of CADDSS. Counterfeiting of brand names, designer clothes, accessories, jewelry, and
intellectual property was assessed in 2006 as a 60-billion-dollar per year problem worldwide. to have
a total global value of $650 billion in 2008, with 2015 projections exceeding $1 trillion, and
employment losses of approximately 2.5 million. This dollar figure does not include the losses in the
financial community, including banknotes, stocks and bonds, etc., the losses of which are unknown
and unreported. Just as counterfeiting and alteration of documents are severe problems in the financial
sector, the counterfeiting, alteration, diversion, duplication, simulation, and substitution (CADDSS) of
products are life threatening when they relate to aeronautical parts, auto parts, pharmaceuticals, life
support equipment, and Department of Defense material. The problem cannot be eliminated, but it can
be controlled by using anticounterfeiting technology selected to fit the user’s requirements.
The purpose of this document is to provide an overarching guide to protect against CADDSS.
Therefore, it is expected that additional standards will be generated that are more specific to a given
product, such as clothing, music and videos (and other data-centric products), medicine, currency,
official documentation, vehicles, etc. To protect against CADDSS, several steps have to be taken,
which include but are not limited to: (1) identification of the CADDSS sensitive product, (2)
documenting the nature, magnitude of likelihood, and magnitude of impact of different CADDSS on
the product, (3) list the possible anti-CADDSS solutions available to address the documented
CADDSS strategies, and (4) develop a strength and weakness analysis for each of the applicable
anti-CADDSS solutions. Whichever technology, or combination of technologies, is used, the
frequency of authentication and the education of personnel or the public using the technology are
vitally important in controlling counterfeiting, alteration, diversion, duplication simulation, and
substitution (CADDSS) of products and documents.
1. Scope
1.1 This general guide is intended to assist the user of the guide in selecting anti-CADDSS technologies to protect their product
from CADDSS.
1.2 This guide does not address or evaluate specific anti-CADDSS technologies, but rather suggests a path that assists in the
objective evaluation of features of anti-CADDSS technologies available protection of their product from CADDSS.
1.3 This guide provides a procedure to accomplish the proper selection of a security system. Specific technologies are not
addressed, nor are any technologies recommended. There are many security systems available in the public marketplace today.
1
This guide is under the jurisdiction of ASTM Committee F12 on Security Systems and Equipment and is the direct responsibility of Subcommittee F12.60 on Controlled
Access Security, Search, and Screening Equipment.
Current edition approved Dec. 1, 2012Oct. 1, 2016. Published January 2013October 2016. Originally approved in 1993. Last previous edition approved in 20062012 as
F1448 – 93a (2006).F1448 – 12. DOI: 10.1520/F1448-12.10.1520/F1448-16.
Copyright © ASTM International, 100 Barr Harbor Drive, PO Box C700, West Conshohocken, PA 19428-2959. United States
1
---------------------- Page: 1 ----------------------
F1448 − 16
Each has limitations and must be carefully measured against the parameters presented in this guide. Once this careful analysis is
done, the user will be in a knowledgeable position to select a security system to meet his needs.
2. Terminology
2.1 Definitions:
2.1.1 alteration—the modification of an object or item that is not the genuine object or time with the intent that it will pass
...
Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.