HomeNewsOpinionReconfiguring supply chains in a world where trust’s eroding

Reconfiguring supply chains in a world where trust’s eroding

Thinking about supply chains has moved from just-in-time to just-to-be secure following geopolitical turmoil. A risk-based framework for reconfiguring India’s supply chains can address security considerations without jeopardising the country's economic growth

June 30, 2025 / 09:23 IST
Story continues below Advertisement
supply chain
Knee-jerk extreme approaches such as fully localised supply chains or unencumbered supply chains may benefit either security or the economy but not both at the same time.

The US imposing a ban on connected car technologies linked to China and Israel mounting a supply chain attack in Lebanon over the past year have led to a shift in how global supply chains are conceptualised and operationalised — from just-in-time (efficiency) and just-in-case (resiliency) to just-to-be-secure (security). How can a globally interlinked developing country like India address supply chain security risks without jeopardising the country's economic growth?

From a geopolitical point of view, there are three primary supply chain security risks for India: espionage, undermining of cognitive autonomy, and sabotage. We argue that a nuanced risk-based framework can address supply chain security concerns without necessarily damaging the economy. Knee-jerk extreme approaches such as fully localised supply chains or unencumbered supply chains may benefit either security or the economy but not both at the same time.

Story continues below Advertisement

Framing India’s response

As far as espionage is considered, all devices connected to and transacting in cyberspace can be potentially used for espionage. While Chinese electronics may be theoretically more vulnerable (by having backdoors), ensuring that electronics supply chains do not contain Chinese components is not going to necessarily address the espionage concern. Vulnerabilities in devices such as smartphones and connected car tech can still be exploited by a determined malicious actor (Chinese or otherwise). In any case, addressing supply chain security risks for all consumer electronics may be a mammoth task with low returns. It would be beneficial if greater efforts are directed towards making consumers aware of cybersecurity practices to take care of concerns at the software end, and to employ ‘trust but verify’ for concerns at the hardware end.