An attacker undermines the integrity of a product, software, or technology at some stage of the distribution channel. The core threats of modification or manipulation during distribution arise from the many stages of distribution, as a product may traverse multiple suppliers and integrators as the final asset is delivered. Components and services provided from a manufacturer to a supplier may be tampered with during integration or packaging. A malicious OEM provider may install software, or modify existing code, during distribution. Additionally, external contractors may be involved in the packaging or testing of products or components, granting another window of opportunity to modify or undermine the integrity of the technology.