Authors: Dr. Andrea Little-Limbago, SVP, Applied AI and Mackenzie Clark, Lead Computational Social Scientist
The 90-day tariff détente between the US and China is not the only macro-trend upending global supply chains recently. US officials claim communication equipment and cellular radios not listed in product documentation were found within batteries and solar equipment.
These inserted components can pose a security risk to critical infrastructure, potentially leading to power blackouts, destabilization, or other damage to the energy infrastructure.
The revelation of technology supply chain tampering in Chinese-made devices is the latest indication of the growing risk of technology supply chain manipulation. As Chinese President Xi Jinping asserted, “The scientific and technological revolution and the great power game are intertwined.”
With hyperspecialized and complex technology supply chains at the center of both the global economy and great power geopolitical competition, this is the latest indication that trusted supply chain networks are more critical than ever before.
Shifting Norms around Supply Chain Security
In 2018, Bloomberg reported evidence of Chinese tampering of servers that enabled access to data on computer networks. US-based Supermicro was the focus of the investigation, with potential manipulation of their products via supply chain infiltration. The devices were manufactured in Guangzhou, China, where the tampered hardware was found. In sum, approximately 30 US companies were potentially compromised, including major tech giants. No US company nor the government has corroborated this account, but Bloomberg has since produced numerous reports and remains steadfast in their authenticity.
Regardless of whether this ‘Spy-Chip Gate’ occurred or not, it is indicative of the growing risk of technology supply chain manipulation through one of the many insertion points along the supply chain.
A new era in these risks emerged last fall with the pager attacks targeting Hezbollah. Explosives planted in pagers and walkie talkies killed dozens and injured thousands, representing an inflection point in lethality and shifting norms around supply chain security.
While the front companies and tampering were not new, the extensive lethality and complexity of the operation was. As noted cybersecurity expert Bruce Schneier wrote, these attacks have changed the world forever. Supply chain resilience and trusted networks are crucial, especially in technology supply chains that are targeted for geopolitical objectives.
Emerging Technology Infiltration & Propagation Effects
Section 154 of the 2024 National Defense Authorization Act (NDAA) prohibits Department of Defense acquisition from specific Chinese battery manufacturing companies by 2027. These companies are front and center of this recent claim reported by Reuters. As interos.ai analysis highlights, these companies extend deep within utilities, automotive, and electronics industries.
The companies referenced in the Reuters report align with those companies restricted under Section 154, and include:
- Contemporary Amperex Technology Company, Ltd.
- BYD Company, Ltd.
- Envision Energy, Ltd.
- EVE Energy Company, Limited
- Gotion High Tech Company, Limited
- Hithium Energy Storage Technology Company, Limited
These six companies alone directly supply almost 1000 companies, over half of which are in the United States, followed by India, Mexico, Germany, and China. These direct customers include companies concentrated in the following five industries:
- Vehicle Manufacturing
- Electronic Component Manufacturing
- Computers and Computer Peripherals Manufacturing and Sales
- Automotive Dealers
- Utilities
Among these companies include major manufacturers and distributors of vehicles electronics, most of which have been observed as customers of at least one of the Section 154 suppliers at least once since the beginning of 2024 in interos.ai data.
When expanding this analysis out to Tier 3, the impact of the restricted Section 154 companies becomes much more far-reaching.
interos.ai Identifies Over 47 Million Buyer-Supplier Relationships as Vulnerabilities in Extended Supply Chain
Across three tiers of supplier relationships, interos.ai data identified over 47 million supplier relationships with almost 3.2 million unique customers that could be exposed to the products supplied by these high-risk Chinese suppliers.
Again, these customers are primarily concentrated in the United States, but companies across the globe are also at risk of exposure:
- United States (35% of Tier 1-Tier 3 customers)
- United Kingdom (7%)
- India (6%)
- France (4%)
- China (3%)
These Tier 1-Tier 3 customers include companies concentrated in a variety of industries:
- Consumer Goods
- Business Management and Legal Services
- Software and IT Services
- Architectural, Engineering, and Design Services
- Building and Civil Engineering Construction
Trusted Networks and Minimizing Supply Chain Risk
As noted, these companies are already on NDAA Section 154 due to the security risk within such significant emerging technology produced in China. While this Section 154 targets companies partnering with the US government, as this latest incident highlights, all companies should heed these risks.
With geopolitical competition at the heart of the technological revolution, ‘know your supplier’ is more important than ever, but so too is knowing their extended supply chain.
From the software and hardware bill of materials to ongoing regulations and restrictions regarding risky technologies, there is both the regulatory and the security momentum pushing organizations toward trusted networks. From drones to 5G, strategic decoupling and derisking of technology supply chains has been ongoing for years. Solar inverters may have not been immune to this decoupling. In 2019, the US banned solar inverters from Huawei, while Europe recently explored a ban on Chinese inverters due to perceived security risks. Of course, with Chinese solar companies’ enormous grip on the market, decoupling is easier said than done.
Nevertheless, global technological bifurcation is already well underway; if anything, the insertion of rogue devices found in Chinese batteries and solar inverters will only accelerate it. As corporate and government technology stacks restructure to gain greater security, supply chain visibility and trusted networks must be front and center of these strategies.
interos.ai continues to track the growing list of restricted companies – ranging from emerging tech companies to those linked to unethical labor – and helps our customers quickly identify these risks in the extended supply chain.
As these emerging technologies continue to permeate all aspects of society, it does not come without risks. Given the scope of risks, they are simply too complex and unwieldy to manage alone. Trusted networks have always been an important part of supply chain security. In this new era, they are indispensable.