Resource Review: Suspect/Counterfeit (S/CI) Awareness

The course is an online part 1 of a two-part course. Part 2 is a LBNL classroom training that is not offered to the general public.

Separating Line

Resource Details


Lawrence Berkeley National Laboratory


Computer, iPad, Android html 5

Review Date


Program Design Elements

  Yes No Unavailable or N/A
Clear, consistent screen design
User-friendly; intuitive navigation
Pace is learner controlled
Job-like examples included
Module map/table of contents
Exit option with bookmark feature

Content Elements

  Yes No Unavailable or N/A
Contains accurate information
Relevant and accurate graphics
Relevant job-like examples or other
Definitions for technical terms
Logical sequence
Separating Line


This Part 1 course covers the following topic areas:

  • Definitions of S/CIs
  • Risks of S/Cis
  • S/Cis in the Global Supply Chain
  • Types of S/Cis
  • Visually detecting potential S/Cis
  • LBNL S/Cis Policy and ways to protect against potential S/Cis
  • LBNL resources
Includes several examples/photographs of suspect/counterfeit items.


Scroll to Top

For information contact Will Artley, IH/OS SIG Coordinator, Oak Ridge Associated Universities, PO Box 117, MS 10, Oak Ridge, TN 37831-0117.

Provision of this Web site by the Oak Ridge Associated Universities (ORAU) does not constitute endorsement of the views expressed or an endorsement or recommendation of specific commercial products, processes, services, manufacturers, or companies mentioned. The opinions and conclusions expressed are those of the authors and not necessarily those of ORAU or the IH/OS SIG and their DOE sponsor, DOE AU-11.

The U. S. Government, DOE, or its contractors, including ORAU or the IH/OS SIG do not warrant or assume legal responsibility for the completeness and accuracy of the information and data presented on this Web site. Some links are provided to Web sites outside of this site and should not be considered as an official endorsement or verification of the accuracy of their content. Users are subject to the privacy policies of those sites.