• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Uncle Sam to Stop Buying Used IT Gear?

    January 5, 2009 Timothy Prickett Morgan

    If you don’t buy or sell a lot of computer and networking hardware, then you will probably be perplexed about this story. Judging from the context of a recent government hearing on the topic, counterfeit IT gear is apparently a much bigger problem than many of us might think. The U.S. federal government is so annoyed by the problem that it held a hearing about implementing acquisition rules that would severely curtail the use of secondhand equipment among major government agencies.

    Back on November 18, the General Services Administration and the National Aeronautics and Space Administration placed an announcement in the Federal Register giving advance notice that it was proposing changes in a set of regulations known as the Federal Acquisition Regulation that stipulated that only vendor-authenticated equipment, whether it was new or used, could be acquired by government agencies. (This is FAR case 2008-019, Authentic Information Technology Products, in governmentese.) The notice gave advance notice to the public about the rule change and set up a public meeting seeking comment on the tweaks to the acquisition rules. The meeting was held on December 11.

    Here is the government’s position, as laid out in the proposal put forth by the Civil Agency Acquisition Council and the Defense Acquisition Regulations Council:

    “The widespread availability of counterfeit Information Technology (IT) products presents a multidimensional threat to our nation. While it is estimated that our nation’s industries and governments lose millions of dollars each year to counterfeiters, the trade in counterfeit IT products also presents serious threats to our national security and consumer safety.”

    “Today, IT products, such as computer network hardware, (the infrastructure of business, healthcare, education, and communication and information networks) and integrated circuits (IC), are used in a wide range of applications; including automobiles, aircraft, computers, telecommunications, medical devices, and consumer electronics. These IT products are also essential to our national infrastructure systems; such as air traffic control, financial and telecommunication networks, and government and military communications, information, and operating systems.”

    “Counterfeit network hardware and ICs pose a risk in that they frequently do not meet the quality standards of genuine equipment. Various information indicates that these products have a higher failure rate than genuine equipment, and often fail upon installation, or weeks or months after installation. Thus, these counterfeit IT products pose a threat to the national security and consumer safety because when they rnfail, the entire systems in which they are embedded may also fail.”

    “The Councils believe requiring contractors to represent that the IT products they sell to the Government are authentic, will aid in efforts to combat counterfeit IT products. In addition to commenting on the Government proposal, the public and industry are invited to offer suggestions on other ways to limit the risk to the Government from acquiring counterfeit IT products.”

    In plain English–well, actually American–Uncle Sam is suggesting that the only way to get rid of the dirty water of counterfeit IT gear is to throw the baby of the secondhand equipment market out the window, too.

    The Department of Defense, the GSA, and NASA gave presentations at the meeting, where most of the 100 people who attended were from various government agencies affected by the rule change. World Data Products, one of the largest dealers of secondhand IT equipment in the United States that is based in Minnetonka, Minnesota, had representatives at the meeting, as did the Society of Automotive Engineers (yup, that raised my eyebrow, too, but this is democracy). Joe Marion, who heads up the Asssociation of Service and Computer Dealers, represented the ASCDI as well as the North American Association of Telecommunications Dealers (which stupidly abbreviates itself the NATD).

    According to a statement put out by Marion on behalf of the ASCDI and NATD, which you can read in full here, the secondhand IT market represents $312 billion in sales a year (presumably on a global scale) and in the United States, there are over 100,000 people who pay taxes, Marion reminded everyone, who work in the used equipment market. He said further that sales of gear to the U.S. government represented about 15 percent of sales in the secondhand IT market, so a rule requiring that only vendor-certified new or used gear be acquired by Uncle Sam would be very disruptive to the industry. Moreover, the availability of used equipment can save the government money, and this is just as important these days as having equipment being certified as authentic, whether it is new or used.

    While no one in the used equipment business is looking for regulation, the question of authenticity is a touchy one, since only a vendor could really be the judge of that. And you can bet that a vendor of servers or switches is not going to be in any big hurry to do inspections in a timely fashion on behalf of secondhand equipment dealers who are competing with them in accounts. Marion proposed that Uncle Sam mandate that as part of all bids that manufacturers offer a maintenance agreement qualification inspection upon request. This is a spot audit of gear, not a check on all gear, and this strikes me as less than satisfactory. But at the same time, if you have to inspect and authenticate every piece of used equipment out there, it will potentially negate a lot of the economic value that comes with buying used, since you have to pay inspectors and do lots of paperwork. Right now, people trust secondhand dealers to not lie.

    Nothing has been decided upon yet, but ASCDI and NATD are being asked to provide supplemental public comment by January 20.

    The key question that did not seem to be answered–at least not in the material I could find on the meeting–is exactly how much counterfeit gear is out there and what kinds of things are being passed off. I heard some rumors a few years back about dealers rejiggering RAID disk controllers for one server so they would work on another that had more expensive components by monkeying around in the ROMs on the disk controllers. Sometimes, the new ROM settings didn’t hold after the operating system was patched with an update, which caused all sorts of problems. I could never get hard proof of this happening, but if IBM wasn’t screwing iSeries customers on price for essentially the same card it was using in the pSeries line, there would have been no motivation for any dealer to mess around with the ROM on the RAID card in the first place.

    The other question I have is this: What constitutes counterfeit? Is an x64 server with clone memory counterfeit? What if the vendor puts in a secondary processor in the box, one they buy off the shelf and not from the vendor? What if a dealer plugs in clone disk drives that the original manufacturer did not use but which are functionally equivalent?

    What the law should be is simple. Companies, whether they sell new or used gear, have to represent accurately each and every component and source in a piece of gear so buyers know exactly what they are buying. And if you lie about that, well, you should go to jail. (Congress should write a law covering this if there is not one already on the books if counterfeit IT gear is such a problem. For all I know, there already is one.) This issue seems to be a matter of law and enforcement, and if the secondhand market is the source of inauthentic IT gear, a little jail time with some publicity can clean this problem up pronto.

    RELATED STORY

    State of the System i: First-Hand Reports from Second-Hand Dealers



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: mtfh_rc, Volume 18, Number 1 -- January 5, 2009

    Sponsored by
    Raz-Lee Security

    Start your Road to Zero Trust!

    Firewall Network security, controlling Exit Points, Open DB’s and SSH. Rule Wizards and graphical BI.

    Request Demo

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Admin Alert: Upcoming i5/OS and AnyNet End of Service Dates Safestone Gives i Security Officers Greater Control

    Leave a Reply Cancel reply

TFH Volume: 18 Issue: 1

This Issue Sponsored By

    Table of Contents

    • Now What?
    • IT Doing Better Than Other Careers in 2009
    • Strengthening Dollar Whacks Oracle’s Second Fiscal Quarter
    • As I See It: The Rhythm of Things Unseen
    • Uncle Sam to Stop Buying Used IT Gear?
    • Dick Bains, Another System/38 Father, Dies at 64
    • BlueZone Gives Financial Firms Big Discounts on Emulators
    • CDSoft Buys ACT Group for Midrange Expertise
    • VAI Joins IBM’s SaaS Cloud Services Initiative
    • Avnet Partners with Sanko for Turkish Expansion

    Content archive

    • The Four Hundred
    • Four Hundred Stuff
    • Four Hundred Guru

    Recent Posts

    • Public Preview For Watson Code Assistant for i Available Soon
    • COMMON Youth Movement Continues at POWERUp 2025
    • IBM Preserves Memory Investments Across Power10 And Power11
    • Eradani Uses AI For New EDI And API Service
    • Picking Apart IBM’s $150 Billion In US Manufacturing And R&D
    • FAX/400 And CICS For i Are Dead. What Will IBM Kill Next?
    • Fresche Overhauls X-Analysis With Web UI, AI Smarts
    • Is It Time To Add The Rust Programming Language To IBM i?
    • Is IBM Going To Raise Prices On Power10 Expert Care?
    • IBM i PTF Guide, Volume 27, Number 20

    Subscribe

    To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

    Pages

    • About Us
    • Contact
    • Contributors
    • Four Hundred Monitor
    • IBM i PTF Guide
    • Media Kit
    • Subscribe

    Search

    Copyright © 2025 IT Jungle