Session: 02-01-02: Product and Process Design 2
Paper Number: 167407
Engineering, Re-Engineering, and Reverse Engineering: Who Owns the Ip?
During the 1980s and 1990s, the Department of Defense (DoD) relied heavily on Original Equipment Manufacturers (OEMs) to design and sustain major weapon systems in the hopes of creating a high-quality and responsive supply chain for the Military Services. At the time, this approach was intended to ensure reliability, innovation, and rapid response to military needs by leveraging the expertise and capabilities of OEMs. However, in the present day, this expanded reliance has led to a complex, multifaceted approach for materiel sustainment that involves various aspects of policy, technology, and systems engineering. While this strategy aligns with the Department of Defense Instruction (DoDI) 5000.97 initiative for digital transformation, it also introduces significant challenges, particularly in the areas of intellectual property (IP) rights, re-engineering, and reverse engineering.
One of the most pressing challenges facing the DoD is the legal and ethical concerns associated with IP rights when attempting to maintain and upgrade weapon systems. Many OEMs retain proprietary control over critical technologies, making it difficult for the DoD to modify, repair, or enhance these systems without direct involvement from the original manufacturers. This dependence can result in increased costs, supply chain vulnerabilities, and delays in fielding necessary upgrades. Additionally, when reverse engineering is required to support sustainment efforts, the DoD must navigate a complex legal landscape to avoid potential litigation or breaches of contract.
Compounding this issue is the fact that many modern OEMs have transitioned to a "fabless" business model, outsourcing manufacturing to external entities rather than producing components in-house. While this model offers cost savings and increased efficiency, it also introduces new risks, particularly regarding IP security. The reliance on external manufacturers, some of which may be located in foreign countries, raises concerns about IP theft, counterfeiting, and supply chain integrity. To mitigate these risks, the DoD must implement stringent protective measures, such as enhanced cybersecurity protocols, supply chain risk management practices, and strengthened partnerships with trusted domestic suppliers.
To address these IP constraints and sustainment challenges, the DoD must explore potential solutions that enhance its capabilities in technology development and acquisition. One possible approach is increasing the use of open architecture systems, which promote modularity and interoperability while reducing dependency on proprietary technologies. Additionally, strengthening government rights in technical data and software deliverables during contract negotiations can provide the DoD with greater flexibility in sustaining and upgrading weapon systems without relying solely on OEMs. Furthermore, investing in domestic manufacturing and advanced technologies such as additive manufacturing (3D printing) can help reduce reliance on foreign suppliers and enhance the resilience of the defense supply chain.
Ultimately, ensuring the sustainability and technological superiority of DoD weapon systems requires a balanced approach that safeguards IP rights while fostering innovation and self-sufficiency. By addressing these challenges proactively, the United States can maintain its position at the forefront of defense innovation and national security.
Presenting Author: Jeff Weir RGBSI Aerospace & Defense
Presenting Author Biography: Dr. Weir holds a Ph.D. in Industrial and Systems Engineering from the Georgia Institute of Technology. Dr. Weir has more than 35 years of professional experience supporting the United States Federal Government. He left the his position as Head, Department of Operational Sciences, Air Force Institute of Technology in Aug of 2023 to Join RGBSI Aerospace & Defense.
Authors:
Jeff Weir RGBSI Aerospace & DefenseEngineering, Re-Engineering, and Reverse Engineering: Who Owns the Ip?
Paper Type
Technical Presentation
