security

The Unwinding of Global Tech Supply Chains – BCG


  • Industries whose supply chains have national-security implications—especially producers of dual-use technologies, such as semiconductors or artificial intelligence, that can be used for military as well as civilian purposes—are likely to be forced to change substantially. Other dual-use offerings include certain production inputs, such as rare earth or other metals and so-called critical materials, that can be used in both military systems and consumer products. Governments may pursue targeted policies to ensure security, geopolitical advantage, and resilience.
  • Supply chains in areas deemed strategic, such as biotechnology, pharmaceuticals, and clean energy, may need to be reshored or built up from scratch in new geographies as governments aim for supply-chain resilience or economic competitiveness in sectors where innovation plays a large role.
  • Industries without obvious national-security implications or strategic criticality (such as commodity-based industries) are likely to remain optimized for cost; however, to balance growth and resilience, companies in these industries may diversify their networks by sourcing supplies from other low-cost geographies. The only concern for industries in this category should be having their products disrupted in a broader geopolitical dispute, as has occurred in numerous past trade disputes.

Tensions over Technology

The global business environment is moving on from an era when market forces were the primary drivers of corporate planning. Now, national policies designed to incentivize targeted sectors and protect strategic technological advantages are increasingly prevalent. The result is a domino-like escalation where one country’s trade restrictions and industrial policies cause other countries to respond. Consider just a few examples:

  • The US is implementing export controls to limit China’s access to the most advanced elements of the semiconductor value chain. Restrictions implemented in October 2022 curtail Chinese firms’ access to advanced AI semiconductor designs and chips above certain performance thresholds. They also limit access to manufacturing tools and parts for advanced chips, and to talent. Leading up to this, in August 2022, US President Joe Biden signed the CHIPS and Science Act, providing $39 billion in incentives to promote semiconductor-manufacturing resilience. And in the fall of 2022, US National Security Advisor Jake Sullivan said “computing-related technologies, biotech, and clean tech are truly ‘force multipliers,’” and “leadership in each of these is a national security imperative.”
  • Meanwhile, China, in its 14th Five-Year Plan (launched in 2021), accelerated industrial policies for the domestic semiconductor industry. In October 2022, President Xi Jinping called for China to “cultivate new growth engines such as next-generation information technology, artificial intelligence, biotechnology, new energy, new materials, high-end equipment, and green industry” and to “speed up efforts to achieve greater self-reliance and strength in science and technology.”
  • Elsewhere, the EU is expected to pass legislation in 2023 that aims to increase European semiconductor firms’ global market share to 20% over ten years. This effort would be backed by $30 billion to $50 billion in funding from public and private sources. As EU President Ursula von der Leyen said in 2019, “we must have mastery and ownership of key technologies,” such as quantum computing, semiconductors, AI, and blockchain. In addition, the Netherlands and Japan, generally following the US’s example, have implemented export controls targeting China’s semiconductor industry. Japan has also approved $6.8 billion in funding to support domestic semiconductor firms. And India committed $10 billion to incentivize domestic semiconductor manufacturing.
Readers Also Like:  India's Internet Is High On Security, But Could Improve Infrastructure And Market Readiness - Swarajya

While there is plenty of uncertainty about policy specifics in the future, the direction of policy is clear, and companies with exposure need to move quickly to prepare. We believe that government incentives or interventions are likely to continue in three types of technology supply chains:

  • Open-source AI and semiconductors
  • Quantum computing
  • Industrial technologies, such as clean energy and biotech

The Potential “Closing” of Open Source

Traditionally, the technology industry has benefited greatly from open-source software, such as Linux and its global community of open-source innovators. However, geopolitical competition and national-security concerns may threaten the “openness” of open source.

Many of today’s popular AI algorithms and frameworks are available as open-source software. Any data scientist can download software such as TensorFlow—a popular AI framework released by a US technology firm—and build AI models. A similar example is Volcano, open-source AI software released by a Chinese firm with contributions from numerous US firms. However, AI technologies are inherently dual use. An algorithm for spotting manufacturing defects can in theory be trained to help drones strike military targets.

Geopolitical competition and national-security concerns may threaten the “openness” of open source.

Certain nascent semiconductor technologies (for example, RISC-V) are also open source, and enable developers to design new chips. Entities in the US, China, and the EU have embraced RISC-V to drive innovation across sectors. However, as with AI, chips are also dual-use technologies.

Therefore, it is possible that policymakers will regulate open-source technologies. While open-source software is free, the code is typically hosted on company-owned developer platforms—for example, GitHub, the most popular platform for open-source software. In 2019, GitHub complied with US sanctions that prohibit developers from Iran, Syria, and Crimea from accessing open-source code. Given the current dynamics over semiconductors and AI, the possibility that governments will restrict access to open-source technologies cannot be ignored.

Readers Also Like:  Army combat veteran to take over key election security role working with state, local officials - KLAS - 8 News Now

With Quantum Computing, a Quantum Leap in Risk

Quantum computing promises to revolutionize industries by solving problems classical computers cannot solve, in such areas as drug discovery and optimizing supply-chain logistics. Quantum computing could create $450 billion to $850 billion in economic value in the coming decades.

On the other hand, quantum computing could potentially overwhelm modern cryptography defenses, posing cybersecurity risks of calamitous proportions. Scientists have already demonstrated that quantum computers could penetrate today’s security technologies. Another risk is that quantum computing will be considered as inherently dual use.

Quantum computing could potentially overwhelm modern cryptography defenses, posing cybersecurity risks of calamitous proportions.

Given this risk, nations can be expected to take precautions by implementing export controls and other regulatory measures. Bloomberg reported that the US is investigating the use of export controls to prevent this technology from going to China. In addition, Axios reported that the White House is considering a ban on US investment in Chinese companies engaged in quantum computing. Today, private, public, and academic organizations often collaborate on this technology. Going forward, however, policy interventions could disrupt collaborative innovation.

The Return of Industrial Policy in Strategic Technology Sectors

Beyond what is commercialized today, governments see advanced technologies in certain emerging sectors as also critical to economic competitiveness and national security; clean energy and biotech are two examples. Governments have begun to consider industrial policy and trade restrictions in these areas. (See Exhibit 2.)

Readers Also Like:  Securing the World's Energy Systems: Where Physical Security and ... - Dark Reading





READ SOURCE

This website uses cookies. By continuing to use this site, you accept our use of cookies.