ASTM F1448-16
(Guide)Standard Guide for Selection of Security Technology for Protection Against Counterfeiting, Alteration, Diversion, Duplication, Simulation, and Substitution (CADDSS) of Products or Documents
Standard Guide for Selection of Security Technology for Protection Against Counterfeiting, Alteration, Diversion, Duplication, Simulation, and Substitution (CADDSS) of Products or Documents
SIGNIFICANCE AND USE
3.1 This guide is the first known attempt to focus on security requirements and compare them to available and known technologies capable of meeting these requirements. This guide describes several steps to select the appropriate anti-CADDSS technology. These steps are described in Section 4.
SCOPE
1.1 This general guide is intended to assist the user of the guide in selecting anti-CADDSS technologies to protect their product from CADDSS.
1.2 This guide does not address or evaluate specific anti-CADDSS technologies, but rather suggests a path that assists in the objective evaluation of features of anti-CADDSS technologies available protection of their product from CADDSS.
1.3 This guide provides a procedure to accomplish the proper selection of a security system. Specific technologies are not addressed, nor are any technologies recommended. There are many security systems available in the public marketplace today. Each has limitations and must be carefully measured against the parameters presented in this guide. Once this careful analysis is done, the user will be in a knowledgeable position to select a security system to meet his needs.
General Information
- Status
- Published
- Publication Date
- 30-Sep-2016
- Technical Committee
- F12 - Security Systems and Equipment
- Drafting Committee
- F12.60 - Controlled Access Security, Search, and Screening Equipment
Relations
- Effective Date
- 01-Oct-2016
Overview
ASTM F1448-16 is the Standard Guide for Selection of Security Technology for Protection Against Counterfeiting, Alteration, Diversion, Duplication, Simulation, and Substitution (CADDSS) of Products or Documents. Published by ASTM International, this guide provides a structured approach for organizations to objectively assess and select appropriate anti-counterfeiting and security technologies. While it does not recommend or evaluate specific anti-CADDSS solutions, it establishes a step-by-step process to match security requirements with suitable available technologies.
Counterfeiting and related security threats pose significant risks to a range of products and documents, impacting not only financial interests but also safety and brand integrity. ASTM F1448-16 is designed to aid industries in identifying their vulnerabilities and deploying security solutions tailored to their unique needs.
Key Topics
- CADDSS Definitions: The standard clearly defines key threats such as counterfeiting, alteration, diversion, duplication, simulation, and substitution, all of which can reduce the value and safety of genuine products and documents.
- Selection Process: Provides a systematic approach for identifying items at risk and assessing the magnitude and likelihood of various threats.
- Evaluation Matrices: Recommends the creation of assessment tables to compare potential anti-CADDSS solutions based on operational, performance, and usability criteria, such as cost, ease of use, training requirements, and effectiveness.
- Objective Evaluation: Encourages a data-driven, analytical process for weighing security solution strengths and weaknesses, helping users to make informed decisions matching their resources and risk tolerance.
- Implementation Guidance: Discusses the need for education and ongoing surveillance to optimize the effectiveness of security technologies.
Applications
ASTM F1448-16 is applicable across diverse industries where protection against counterfeiting and product diversion is critical, including:
- Brand Protection: Securing consumer goods, pharmaceuticals, designer apparel, and luxury items from imitation and unauthorized distribution.
- Document Security: Safeguarding financial instruments, currency, identification documents, certificates, and official paperwork from forgery and alteration.
- Industrial and Defense: Ensuring the authenticity and integrity of aeronautical parts, automotive components, electronics, and defense materials where counterfeit items could lead to safety or security hazards.
- Intellectual Property: Supporting copyright holders and patent owners in preventing unauthorized duplication or substitution of technology, media, and software.
By enabling organizations to systematically assess their risks and anti-counterfeiting options, ASTM F1448-16 facilitates the implementation of effective product authentication and security strategies.
Related Standards
Organizations implementing ASTM F1448-16 may also find value in referencing the following related standards:
- ISO 12931: Performance criteria for authentication solutions used to combat counterfeiting of material goods.
- ISO/IEC 20248: Data structure and encoding for anti-counterfeit traceability solutions.
- ASTM F2659: Standard Guide for the Design and Registration of Security Systems.
- ASTM F1789: Standard Terminology Relating to Industrial Platinum Counterfeit Deterrence.
These complementary standards can provide additional guidance on specific technologies, system integration, and performance criteria for robust security against counterfeiting and diversion.
Practical Value
Implementing ASTM F1448-16 allows organizations to:
- Clarify and prioritize their security requirements.
- Objectively compare anti-counterfeiting technologies based on relevant operational parameters.
- Optimize investment in security by focusing on the most significant threats.
- Ensure continuous improvement through education, monitoring, and regular reassessment of their anti-CADDSS strategies.
By following the structured approach outlined in ASTM F1448-16, businesses and government entities can significantly reduce the risks associated with counterfeit, diverted, or altered products and documents, safeguarding their assets, reputations, and customers.
Buy Documents
ASTM F1448-16 - Standard Guide for Selection of Security Technology for Protection Against Counterfeiting, Alteration, Diversion, Duplication, Simulation, and Substitution (CADDSS) of Products or Documents
REDLINE ASTM F1448-16 - Standard Guide for Selection of Security Technology for Protection Against Counterfeiting, Alteration, Diversion, Duplication, Simulation, and Substitution (CADDSS) of Products or Documents
Get Certified
Connect with accredited certification bodies for this standard
Great Wall Tianjin Quality Assurance Center
Established 1993, first batch to receive national accreditation with IAF recognition.
Hong Kong Quality Assurance Agency (HKQAA)
Hong Kong's leading certification body.

Innovative Quality Certifications Pvt. Ltd. (IQCPL)
Known for integrity, providing ethical & impartial Assessment & Certification. CMMI Institute Partner.
Sponsored listings
Frequently Asked Questions
ASTM F1448-16 is a guide published by ASTM International. Its full title is "Standard Guide for Selection of Security Technology for Protection Against Counterfeiting, Alteration, Diversion, Duplication, Simulation, and Substitution (CADDSS) of Products or Documents". This standard covers: SIGNIFICANCE AND USE 3.1 This guide is the first known attempt to focus on security requirements and compare them to available and known technologies capable of meeting these requirements. This guide describes several steps to select the appropriate anti-CADDSS technology. These steps are described in Section 4. SCOPE 1.1 This general guide is intended to assist the user of the guide in selecting anti-CADDSS technologies to protect their product from CADDSS. 1.2 This guide does not address or evaluate specific anti-CADDSS technologies, but rather suggests a path that assists in the objective evaluation of features of anti-CADDSS technologies available protection of their product from CADDSS. 1.3 This guide provides a procedure to accomplish the proper selection of a security system. Specific technologies are not addressed, nor are any technologies recommended. There are many security systems available in the public marketplace today. Each has limitations and must be carefully measured against the parameters presented in this guide. Once this careful analysis is done, the user will be in a knowledgeable position to select a security system to meet his needs.
SIGNIFICANCE AND USE 3.1 This guide is the first known attempt to focus on security requirements and compare them to available and known technologies capable of meeting these requirements. This guide describes several steps to select the appropriate anti-CADDSS technology. These steps are described in Section 4. SCOPE 1.1 This general guide is intended to assist the user of the guide in selecting anti-CADDSS technologies to protect their product from CADDSS. 1.2 This guide does not address or evaluate specific anti-CADDSS technologies, but rather suggests a path that assists in the objective evaluation of features of anti-CADDSS technologies available protection of their product from CADDSS. 1.3 This guide provides a procedure to accomplish the proper selection of a security system. Specific technologies are not addressed, nor are any technologies recommended. There are many security systems available in the public marketplace today. Each has limitations and must be carefully measured against the parameters presented in this guide. Once this careful analysis is done, the user will be in a knowledgeable position to select a security system to meet his needs.
ASTM F1448-16 is classified under the following ICS (International Classification for Standards) categories: 03.140 - Patents. Intellectual property. The ICS classification helps identify the subject area and facilitates finding related standards.
ASTM F1448-16 has the following relationships with other standards: It is inter standard links to ASTM F1448-12. Understanding these relationships helps ensure you are using the most current and applicable version of the standard.
ASTM F1448-16 is available in PDF format for immediate download after purchase. The document can be added to your cart and obtained through the secure checkout process. Digital delivery ensures instant access to the complete standard document.
Standards Content (Sample)
This international standard was developed in accordance with internationally recognized principles on standardization established in the Decision on Principles for the
Development of International Standards, Guides and Recommendations issued by the World Trade Organization Technical Barriers to Trade (TBT) Committee.
Designation: F1448 − 16
Standard Guide for
Selection of Security Technology for Protection Against
Counterfeiting, Alteration, Diversion, Duplication,
Simulation, and Substitution (CADDSS) of Products or
Documents
This standard is issued under the fixed designation F1448; the number immediately following the designation indicates the year of
original adoption or, in the case of revision, the year of last revision. A number in parentheses indicates the year of last reapproval. A
superscript epsilon (´) indicates an editorial change since the last revision or reapproval.
INTRODUCTION
Any product or document of value has a risk of being counterfeited, altered, diverted, duplicated,
simulated, or substituted (CADDSS). The greater the value of the object or item, the greater is the
likelihood of CADDSS. Counterfeiting of brand names, designer clothes, accessories, jewelry, and
intellectual property was assessed to have a total global value of $650 billion in 2008, with 2015
projections exceeding $1 trillion, and employment losses of approximately 2.5 million. This dollar
figure does not include the losses in the financial community, including banknotes, stocks and bonds,
etc., the losses of which are unknown and unreported. Just as counterfeiting and alteration of
documents are severe problems in the financial sector, the counterfeiting, alteration, diversion,
duplication, simulation, and substitution (CADDSS) of products are life threatening when they relate
to aeronautical parts, auto parts, pharmaceuticals, life support equipment, and Department of Defense
material. The problem cannot be eliminated, but it can be controlled by using anticounterfeiting
technology selected to fit the user’s requirements.
The purpose of this document is to provide an overarching guide to protect against CADDSS.
Therefore, it is expected that additional standards will be generated that are more specific to a given
product, such as clothing, music and videos (and other data-centric products), medicine, currency,
official documentation, vehicles, etc. To protect against CADDSS, several steps have to be taken,
which include but are not limited to: (1) identification of the CADDSS sensitive product, (2)
documenting the nature, magnitude of likelihood, and magnitude of impact of different CADDSS on
the product, (3) list the possible anti-CADDSS solutions available to address the documented
CADDSS strategies, and (4) develop a strength and weakness analysis for each of the applicable
anti-CADDSS solutions. Whichever technology, or combination of technologies, is used, the
frequency of authentication and the education of personnel or the public using the technology are
vitally important in controlling counterfeiting, alteration, diversion, duplication simulation, and
substitution (CADDSS) of products and documents.
1. Scope in the objective evaluation of features of anti-CADDSS tech-
nologies available protection of their product from CADDSS.
1.1 This general guide is intended to assist the user of the
guide in selecting anti-CADDSS technologies to protect their 1.3 This guide provides a procedure to accomplish the
product from CADDSS. proper selection of a security system. Specific technologies are
not addressed, nor are any technologies recommended. There
1.2 This guide does not address or evaluate specific anti-
are many security systems available in the public marketplace
CADDSS technologies, but rather suggests a path that assists
today. Each has limitations and must be carefully measured
against the parameters presented in this guide. Once this
This guide is under the jurisdiction of ASTM Committee F12 on Security
careful analysis is done, the user will be in a knowledgeable
Systems and Equipment and is the direct responsibility of Subcommittee F12.60 on
position to select a security system to meet his needs.
Controlled Access Security, Search, and Screening Equipment.
Current edition approved Oct. 1, 2016. Published October 2016. Originally
2. Terminology
approved in 1993. Last previous edition approved in 2012 as F1448 – 12. DOI:
10.1520/F1448-16. 2.1 Definitions:
Copyright © ASTM International, 100 Barr Harbor Drive, PO Box C700, West Conshohocken, PA 19428-2959. United States
F1448 − 16
2.1.1 alteration—the modification of an object or item that 4.4.4 Sum the products found in 5.4.3 and enter in the
is not the genuine object or time with the intent that it will pass leftmost column labeled “decision values.” These values will
as the genuine object or item. be the basis upon which a user will determine if an anti-
CADDSS program will be considered.
2.1.2 counterfeit—a reproduction of a genuine object or
4.4.5 The user determines the lower limit for a decision
item or security feature thereof so that the reproduction can
value below which an anti-CADDSS program will not be
pass as genuine after detailed inspection by a qualified exam-
iner. initiated. This lower limit may be based on resources, public
acceptance, safety, etc.
2.1.3 diversion—the distribution and sale of a genuine
objects or items through unauthorized dealers, often resulting
NOTE 1—The information generated thus far indicates the importance,
in tax evasion.
to the user, of different CADDSS threats on products. Moreover, the user
has defined a threshold of CADDSS threats below which the user will not
2.1.4 duplication—the reproduction of a genuine object or
address, which helps to focus resources on the threats most likely to cause
item so that reproduction generally looks like the genuine
harm, damage, or loss to the user.This assessment is dynamic and can and
object or item.
should be revisited periodically.
2.1.5 simulation—the imitation of article genuine object or
4.4.6 Once the above CADDSS threat assessment has been
item, or features thereof, including similar security features.
completed, the user must identify the possible anti-CADDSS
2.1.6 substitution—the act of putting or using one object or solutions.To identify these solutions requires an analysis of the
item in place of the genuine object or item.
application-specific or product-specific anti-CADDSS strate-
gies and technologies. Identification of these solutions is
2.2 Inallcases,itisassumedtheobjectoritemgeneratedby
beyond the scope of this standard. It is recommended that
CADDSS is (1) of lesser quality and cost than the genuine
separate anti-CADDSS standards development working groups
object or item or (2) intended to deceive the party in possession
be started for the purpose of generating these application-
of the CADDSS generated object or item and to do this with a
specific or product-specific anti-CADDSS standards. To assist
low likelihood of detection or discovery, or both.
those standards development working groups, suggestions on
how to proceed are now given (it is assumed that the working
3. Significance and Use
group is addressing unique applications or products):
3.1 Thisguideisthefirstknownattempttofocusonsecurity
4.4.6.1 Identify and tabulate the possible anti-CADDSS
requirements and compare them to available and known
solutions for each CADDSS threat determined previously. As
technologies capable of meeting these requirements. This
an example, Table A1.3 lists arbitrary anti-CADDSS solutions
guide describes several steps to select the appropriate anti-
in the leftmost column and, in the adjacent column, the
CADDSS technology. These steps are described in Section 4.
operational, performance, and use parameters of those solu-
tions for the CADDSS threats. As mentioned in the caption of
4. Selection Guide for Anti-CADDSS Technology
TableA1.3, these anti-CADDSS operational, performance, and
4.1 Identify and develop a tabulated list of the object(s) or
use parameters may include, but are not limited to, cost of use,
item(s) susceptible to CADDSS. cost of authentication, ease of application/use, ease of
authentication, training requirements, ex
...
This document is not an ASTM standard and is intended only to provide the user of an ASTM standard an indication of what changes have been made to the previous version. Because
it may not be technically possible to adequately depict all changes accurately, ASTM recommends that users consult prior editions as appropriate. In all cases only the current version
of the standard as published by ASTM is to be considered the official document.
Designation: F1448 − 12 F1448 − 16
Standard Guide for
Selection of Security Technology for Protection Against
Counterfeiting, Alteration, Diversion, Duplication,
Simulation, and Substitution (CADDSS) of Products or
Documents
This standard is issued under the fixed designation F1448; the number immediately following the designation indicates the year of
original adoption or, in the case of revision, the year of last revision. A number in parentheses indicates the year of last reapproval. A
superscript epsilon (´) indicates an editorial change since the last revision or reapproval.
INTRODUCTION
Any product or document of value has a risk of being counterfeited, altered, diverted, duplicated,
simulated, or substituted (CADDSS). The greater the value of the object or item, the greater is the
likelihood of CADDSS. Counterfeiting of brand names, designer clothes, accessories, jewelry, and
intellectual property was assessed in 2006 as a 60-billion-dollar per year problem worldwide. to have
a total global value of $650 billion in 2008, with 2015 projections exceeding $1 trillion, and
employment losses of approximately 2.5 million. This dollar figure does not include the losses in the
financial community, including banknotes, stocks and bonds, etc., the losses of which are unknown
and unreported. Just as counterfeiting and alteration of documents are severe problems in the financial
sector, the counterfeiting, alteration, diversion, duplication, simulation, and substitution (CADDSS) of
products are life threatening when they relate to aeronautical parts, auto parts, pharmaceuticals, life
support equipment, and Department of Defense material. The problem cannot be eliminated, but it can
be controlled by using anticounterfeiting technology selected to fit the user’s requirements.
The purpose of this document is to provide an overarching guide to protect against CADDSS.
Therefore, it is expected that additional standards will be generated that are more specific to a given
product, such as clothing, music and videos (and other data-centric products), medicine, currency,
official documentation, vehicles, etc. To protect against CADDSS, several steps have to be taken,
which include but are not limited to: (1) identification of the CADDSS sensitive product, (2)
documenting the nature, magnitude of likelihood, and magnitude of impact of different CADDSS on
the product, (3) list the possible anti-CADDSS solutions available to address the documented
CADDSS strategies, and (4) develop a strength and weakness analysis for each of the applicable
anti-CADDSS solutions. Whichever technology, or combination of technologies, is used, the
frequency of authentication and the education of personnel or the public using the technology are
vitally important in controlling counterfeiting, alteration, diversion, duplication simulation, and
substitution (CADDSS) of products and documents.
1. Scope
1.1 This general guide is intended to assist the user of the guide in selecting anti-CADDSS technologies to protect their product
from CADDSS.
1.2 This guide does not address or evaluate specific anti-CADDSS technologies, but rather suggests a path that assists in the
objective evaluation of features of anti-CADDSS technologies available protection of their product from CADDSS.
1.3 This guide provides a procedure to accomplish the proper selection of a security system. Specific technologies are not
addressed, nor are any technologies recommended. There are many security systems available in the public marketplace today.
This guide is under the jurisdiction of ASTM Committee F12 on Security Systems and Equipment and is the direct responsibility of Subcommittee F12.60 on Controlled
Access Security, Search, and Screening Equipment.
Current edition approved Dec. 1, 2012Oct. 1, 2016. Published January 2013October 2016. Originally approved in 1993. Last previous edition approved in 20062012 as
F1448 – 93a (2006).F1448 – 12. DOI: 10.1520/F1448-12.10.1520/F1448-16.
Copyright © ASTM International, 100 Barr Harbor Drive, PO Box C700, West Conshohocken, PA 19428-2959. United States
F1448 − 16
Each has limitations and must be carefully measured against the parameters presented in this guide. Once this careful analysis is
done, the user will be in a knowledgeable position to select a security system to meet his needs.
2. Terminology
2.1 Definitions:
2.1.1 alteration—the modification of an object or item that is not the genuine object or time with the intent that it will pass as
the genuine object or item.
2.1.2 counterfeit—a reproduction of a genuine object or item or security feature thereof so that the reproduction can pass as
genuine after detailed inspection by a qualified examiner.
2.1.3 diversion—the distribution and sale of a genuine objects or items through unauthorized dealers, often resulting in tax
evasion.
2.1.4 duplication—the reproduction of a genuine object or item so that reproduction generally looks like the genuine object or
item.
2.1.5 simulation—the imitation of article genuine object or item, or features thereof, including similar security features.
2.1.6 substitution—the act of putting or using one object or item in place of the genuine object or item.
2.2 In all cases, it is assumed the object or item generated by CADDSS is (1) of lesser quality and cost than the genuine object
or item or (2) intended to deceive the party in possession of the CADDSS generated object or item and to do this with a low
likelihood of detection or discovery, or both.
3. Significance and Use
3.1 This guide is the first known attempt to focus on security requirements and compare them to available and known
technologies capable of meeting these requirements. This guide describes several steps to select the appropriate anti-CADDSS
technology. These steps are described in Section 4.
4. Selection Guide for Anti-CADDSS Technology
4.1 Identify and develop a tabulated list of the object(s) or item(s) susceptible to CADDSS.
4.2 Determine the type, likelihood, and magnitude of effect of CADDSS for each of the object(s) or items(s) identified in 4.1.
Table A1.1 provides an example documentation of such a determination. The entries in Table A1.1 may contain links to maps,
tabulated data, and graphs, or may contain this information directly.
4.3 For each type of CADDSS determined in 4.2, list all possible and appropriate anti-CADDSS strategies and technologies.
4.4 Identify the most desirable candidate anti-CADDSS program by doing the following:
4.4.1 To facilitate selection of an anti-CADDSS program, develop a table similar to that in Table A1.1 except with information
contained in the three rightmost columns replaced by a single value (see Table A1.2).
4.4.2 The user then determines an appropriate weighting factor for each of the elements of Table A1.2 listed under the column
labeled “%” and places this weight in the column labeled “weight.”
4.4.3 Multiply the weighting factor by the table entry, as shown in Table A1.2, and enter in the column labeled “product.”
4.4.4 Sum the products found in 5.4.3 and enter in the leftmost column labeled “decision values.” These values will be the basis
upon which a user will determine if an anti-CADDSS program will be considered.
4.4.5 The user determines the lower limit for a decision value below which an anti-CADDSS program will not be initiated. This
lower limit may be based on resources, public acceptance, safety, etc.
NOTE 1—The information generated thus far indicates the importance, to the user, of different CADDSS threats on products. Moreover, the user has
defined a threshold of CADDSS threats below which the user will not address, which helps to focus resources on the threats most likely to cause harm,
damage, or loss to the user. This assessment is dynamic and can and should be revisited periodically.
4.4.6 Once the above CADDSS threat assessment has been completed, the user must identify the possible anti- CADDSS
anti-CADDSS solutions. To
...








Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.
Loading comments...