The problem: why counterfeit and fraudulent parts matter

Table of Contents
01
What is the global scale of counterfeit parts in aerospace, defense, and electronics?
A DUST digital thread is a structured, append-only record associated with a unique physical object identity. It has two layers. The identity layer stores the enrolled DUST fingerprint, the substrate and formulation metadata, the enrollment timestamp, the location and operator who performed enrollment, and the unique object identifier. The data layer stores everything else: every scan event with its timestamp, location, operator, and match confidence score; every custody transfer with sender, receiver, and transfer documentation; every structured data field defined for the deployment (serial number, part number, lot number, material specification, manufacturing date, and so on); every document attachment (certificates, inspection reports, photographs, videos, purchase orders, shipping records); and every data field appended by downstream supply chain participants with permissions to write. The record is append-only — existing entries cannot be modified, only new entries can be added — creating a tamper-evident history. The structure is defined at deployment configuration and can be customized per object class, with different field schemas for raw materials, manufactured components, assemblies, and finished goods.
02
What is the cost of a single counterfeit component failure in a safety-critical system?
The cost of a single counterfeit part failure extends far beyond the component itself. Direct costs include failure investigation, fleet-wide inspections, grounding or recall, replacement parts, and labor. Indirect costs include regulatory action, legal liability, reputational damage, and — in the worst cases — loss of life and program cancellation. Several high-profile incidents have resulted in regulatory fines in the tens of millions of dollars and class-action settlements that dwarf the value of the affected supply contract. In defense applications, a compromised component can also represent a national security incident, triggering government investigations with indefinite program delays. The asymmetry is stark: a counterfeit fastener costing a few cents can ground an aircraft costing hundreds of millions of dollars.
03
Why is supply chain fraud getting worse despite increased awareness and regulation?
Three forces are compounding simultaneously. First, globalization has lengthened supply chains to the point where many Tier 2 and Tier 3 suppliers are invisible to the original equipment manufacturer — creating gaps that counterfeiters exploit. Second, geopolitical pressure and materials shortages have driven procurement teams toward non-standard sources they would not have considered previously, increasing exposure to fraud. Third, and most critically, technology has dramatically lowered the cost of document forgery: certificates of conformance, airworthiness tags, and material test reports that once required professional printing equipment can now be reproduced convincingly with off-the-shelf software. Awareness and regulation have increased, but the tools available to fraudsters have outpaced the tools available to those trying to detect them.
04
How does artificial intelligence make document fraud and certificate forgery easier?
Generative AI has fundamentally changed the economics of document fraud. Creating a convincing fake certificate of conformance, airworthiness tag, or material test report previously required specialized knowledge of document formats, access to authentic templates, and either printing infrastructure or digital editing expertise. Today, large language models can generate plausible text on demand, and image generation models can produce documents that are visually indistinguishable from authentic ones. The barrier has dropped from thousands of dollars and significant criminal risk to effectively zero. This is not theoretical: aerospace regulators and defense procurement offices have already identified AI-generated documentation in active supply chain audits. In the luxury sector, the same dynamic applies to certificates of authenticity, provenance letters, and purchase receipts that underpin secondary market valuations: documents that once required skill to forge convincingly can now be generated at negligible cost, eroding the evidentiary value of paperwork-based authentication. Physics-based authentication — binding identity to the physical object rather than its paperwork — is the only class of solution that is immune to this development, because no improvement in generative AI changes the physics of diamond nanoparticles.
05
What is the difference between a supply chain visibility problem and a supply chain security problem?
Visibility tools — track-and-trace systems, IoT sensors, GPS tags, and enterprise software — tell you where an object is and when it moved. They answer the question: where is this item right now? Security tools tell you whether the object in front of you is the genuine, unaltered item it claims to be. They answer the question: is this item what it says it is? Most supply chain investment over the past decade has gone into visibility. Security — cryptographic or physical authentication of the object itself — has been far less developed. A sophisticated counterfeiter can appear perfectly visible in a track-and-trace system while still delivering a fraudulent product, because visibility systems log whatever documentation accompanies the shipment, not the identity of the physical object. DUST solves the security problem: it makes the object its own proof of authenticity.
06
What is the weakest link in most enterprise anti-counterfeiting programs today?
The weakest link is almost always the gap between documentation and the physical object. Most enterprise programs are built around document verification: checking certificates, inspecting holograms, validating QR codes, and confirming database records. All of these verify that a document is authentic — but none of them verify that the physical object in front of the inspector corresponds to that document. A fraudster who obtains a genuine certificate and attaches it to a counterfeit part passes every document-based check. Closing this gap — permanently binding the physical object to its verifiable identity — is precisely what DUST is designed to do.

Build on identity that cannot be copied

Talk to us