Introduction What unites Byzantium, Woodrow Wilson, and Beethoven? Around 550 CE, Byzantine emperor Justinian I’s efforts to produce silk—a highly valued luxury commodity—within the confines of his empire, and thus break the Chinese and Persian monopolies over its production and export, finally bore fruit when silkworms and secret methods of silk production were smuggled over from China by two travelling Indian monks. [1] In 1914, during the First World War, United States (US) President Woodrow Wilson, frustrated by his inability to prohibit US arms manufacturers from selling their wares to European powers, regretted that he “could do nothing else than leave the matter to settle itself”, as “the sales proceed from so many sources, and my lack of power is so evident.” [2] And in 2024, the Dutch government would launch a covert operation named after the classical composer, Ludwig van Beethoven, earmarking close to 3 billion euros to prevent semiconductor manufacturer ASML from moving its operations outside the Netherlands, where the possibility of compromise or trade theft is likelier. [3]
Authors
- Attribution
- Archishman Goswami, “Securing the Critical Technology Supply Chain as a Function of National Intelligence,” ORF Occasional Paper No. 445 , August 2024, Observer Research Foundation.
- Pages
- 23
- Published in
- India
Table of Contents
- Securing the Critical Technology Supply Chain as a Function of National Intelligence 2
- Introduction 3
- Introduction 4
- Amid global power shifts 4
- Intelligence 5
- Intelligence 6
- There is a clear 9
- Counterintelligence 10
- Activity 10
- Counterintelligence 11
- Activity 11
- Counterintelligence 12
- Activity 12
- An estimated 56 percent of reported insider threat cases in the cyber sector 12
- Covert Action and 13
- Supply Chains 13
- Covert Action and 14
- Supply Chains 14
- Covert Action and 15
- Supply Chains 15
- Covert Action and 16
- Supply Chains 16
- Conclusion 17
- Endnotes 18
- Endnotes 19
- Endnotes 20
- Endnotes 21
- Endnotes 22