Tech Supply Chain Security
Evaluating vulnerabilities in the supply chains for critical technologies, from semiconductor fabrication to rare earth processing, and developing strategies to reduce dangerous dependencies.
Single Points of Failure
The technologies underpinning modern defense and economic systems rely on supply chains with alarming concentration. Advanced semiconductors funnel through Taiwan. Rare earth processing flows through China. Critical software components originate from sources that are hard to identify. This project maps where chokepoints exist, assesses which represent strategic risk, and evaluates realistic approaches for diversification.
Beyond Reshoring
Bringing manufacturing home is expensive and slow. Alternative strategies such as ally-shoring, strategic stockpiles, and novel frameworks to secure minerals access, offer faster pathways for reducing vulnerability. Our analysis evaluates and identifies which approaches are viable for which dependencies and proposes frameworks for prioritizing limited resources.