{"id":296536,"date":"2025-06-02T12:00:49","date_gmt":"2025-06-02T11:00:49","guid":{"rendered":"https:\/\/www.transcend.org\/tms\/?p=296536"},"modified":"2025-06-02T11:03:10","modified_gmt":"2025-06-02T10:03:10","slug":"peace-and-war-2025-the-hot-chips-and-cold-wars-part-1","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2025\/06\/peace-and-war-2025-the-hot-chips-and-cold-wars-part-1\/","title":{"rendered":"Peace and War 2025: The Hot Chips and Cold Wars (Part 1)"},"content":{"rendered":"<p style=\"text-align: center;\"><em>Please note that this publication is rated for general readership. Parental guidance is recommended for minors, who might wish to use this paper as a resource material.<\/em><\/p>\n<p style=\"text-align: center;\">*****************<\/p>\n<blockquote><p><em>The Chip Is Gold, the Chip Is Power, the Chip Is the Future, and the Chip Is Nonedible: Who Has the Best Chip Controls the Universe<\/em>\u00a0<em><a href=\"#_edn1\" name=\"_ednref1\">[1]<\/a><\/em><\/p><\/blockquote>\n<div id=\"attachment_296537\" style=\"width: 310px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2025\/06\/1.jpg\" ><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-296537\" class=\"wp-image-296537\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2025\/06\/1.jpg\" alt=\"\" width=\"300\" height=\"156\" \/><\/a><p id=\"caption-attachment-296537\" class=\"wp-caption-text\">AI generated Imagery of the Superchip.<br \/>Photo Credit: Wikimedia Commons<\/p><\/div>\n<p><strong><em>\u00a0<\/em><\/strong><strong>Introduction<\/strong><\/p>\n<p>This publication, Part 1 in a two part series, examines and details the origins, precursor, types and uses of the semiconductor, commonly known as the computer chip..<\/p>\n<p><strong>Definition of a Chip<\/strong><\/p>\n<p>In the real world, there are two types of chips: Edible Chips, as a food item acquired from a fast-food outlet and Non-Edible Chips<a href=\"#_edn2\" name=\"_ednref2\">[2]<\/a><\/p>\n<div id=\"attachment_296538\" style=\"width: 410px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2025\/06\/2.jpg\" ><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-296538\" class=\"wp-image-296538\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2025\/06\/2-1024x606.jpg\" alt=\"\" width=\"400\" height=\"237\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2025\/06\/2-1024x606.jpg 1024w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2025\/06\/2-300x178.jpg 300w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2025\/06\/2-768x454.jpg 768w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2025\/06\/2.jpg 1200w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/a><p id=\"caption-attachment-296538\" class=\"wp-caption-text\">A plate of edible, hot chips &#8211; Photo Cr\u00e9dit: Wikimedia Commons<\/p><\/div>\n<p><strong>Definition of Non-edible CHIPS<\/strong><\/p>\n<p>Non-edible CHIPS refer to items that are not suitable or safe for consumption as food. These can be due to several factors, such as being toxic, harmful, or simply not designed to be consumed as food. The term &#8220;non-edible&#8221; is often used in contexts to describe objects, materials, or substances that should not be consumed by humans or animals. In the 21<sup>st<\/sup> Century, these electronic creations are called <strong>semiconductors.<a href=\"#_edn3\" name=\"_ednref3\">[3]<\/a><\/strong><\/p>\n<p><strong>Origins and Precursors<\/strong><\/p>\n<p>The origins of non-edible CHIPS can be traced back to various historical developments in technology and materials. For example, the abacus, invented in the Middle East around 500 BC, was one of the earliest calculating devices. This simple calculator made from beads and wires laid the groundwork for the development of more complex machines. Over time, mechanical calculators like the Pascaline<a href=\"#_edn4\" name=\"_ednref4\">[4]<\/a> and the Analytical Engine <a href=\"#_edn5\" name=\"_ednref5\">[5]<\/a>were developed, eventually evolving and leading to the creation of modern computers the heart of which are chips of various types, performance and capacity to process information rapidly.<\/p>\n<p><strong>Relationship with Abacus<\/strong><\/p>\n<p>The abacus is indeed related to present-day CHIPS in the sense that it represents one of the earliest forms of calculating devices. The principle of making repeated calculations more quickly than the human brain is the same in both the abacus and modern computers. The abacus laid the foundation for the development of more advanced calculating machines, which eventually led to the creation of silicon chips used in today&#8217;s computers.<\/p>\n<p><strong>Definition of Computer Chip<a href=\"#_edn6\" name=\"_ednref6\">[6]<\/a><\/strong><\/p>\n<p>A computer chip, also known as an integrated circuit, is a small wafer of semiconductor material embedded with integrated circuitry. These chips comprise the processing and memory units of modern digital computers.<\/p>\n<p><strong>Composition and Function<\/strong><\/p>\n<p>Technically speaking, a computer chip is a piece of silicon with an electronic circuit embedded in it. It contains millions of microscopic electronic components called transistors that transmit data signals. These transistors are responsible for the chip&#8217;s ability to process and store information.<\/p>\n<p><strong>Significance in Modern Technology<\/strong><\/p>\n<p>Computer chips are essential components in modern technology. They are used in various devices, including computers, smartphones, and other electronic gadgets. The development of computer chips has significantly advanced the capabilities of electronic devices, making them more powerful and efficient.<\/p>\n<p><strong>Definition of Semiconductor<\/strong><\/p>\n<p>A semiconductor is a material with electrical conductivity between that of a conductor and an insulator. Its conductivity can be modified by adding impurities, a process known as doping. Semiconductors are essential in the manufacture of various electronic devices, including diodes, transistors, and integrated circuits<\/p>\n<p><strong>Definition of Full Conductor<a href=\"#_edn7\" name=\"_ednref7\">[7]<\/a><\/strong><\/p>\n<p>A full conductor, or simply a conductor, is a material that allows the flow of electrical current with minimal resistance. Conductors have high electrical conductivity, typically from\u00a0104104\u00a0to\u00a0106106\u00a0siemens per centimeter. Common examples of conductors include metals like copper and aluminum<\/p>\n<p><strong>Comparison between Semiconductor and Full Conductor<\/strong><\/p>\n<ul>\n<li><strong>Conductivity<\/strong>: Semiconductors have intermediate conductivity, while conductors have high conductivity.<\/li>\n<\/ul>\n<p><strong>Modification<\/strong>: The conductivity of semiconductors can be modified through doping, whereas the conductivity of conductors is generally fixed.<\/p>\n<ul>\n<li><strong>Applications<\/strong>: Semiconductors are used in electronic devices for amplification, switching, and energy conversion. Conductors are used to transmit electrical power and signals.<\/li>\n<\/ul>\n<p><strong>Inventors of Computer Chips<\/strong><a href=\"#_edn8\" name=\"_ednref8\">[8]<\/a><\/p>\n<p>The invention of computer chips, also known as integrated circuits, is credited to two key individuals: Jack Kilby and Robert Noyce. In 1958, Jack Kilby of Texas Instruments created the first hybrid integrated circuit and received a U.S. patent for miniaturized electronic circuits in 1959. Around the same time, Robert Noyce of Fairchild Semiconductor developed the first monolithic integrated circuit, which used silicon-based technology.<\/p>\n<p><strong>First Prototypes\u00a0 <\/strong><\/p>\n<p>his initial prototype at Texas Instruments, while Robert Noyce&#8217;s work was conducted at Fairchild Semiconduct. These early prototypes laid the foundation for the modern computer chips we use today.<\/p>\n<p><strong>What is the most powerful computer chip today?<\/strong><\/p>\n<p>The world of computer chips is constantly evolving, with new advancements being made every year. As of 2025, the most powerful computer chip is the AMD EPYC 9965 &#8216;Turin&#8217; processor\u201d. \u00a0It is a 192-core processor running on AMD&#8217;s Zen 5c architecture.<\/p>\n<p><strong>Key Features and Performance<\/strong><\/p>\n<ul>\n<li><strong>Core Count<\/strong>: 192 cores<\/li>\n<li><strong>Base Clock Speed<\/strong>: 2.25 GHz<\/li>\n<li><strong>Maximum Boost Clock Speed<\/strong>: Up to 3.7 GHz<\/li>\n<li><strong>Architecture<\/strong>: Zen 5c<\/li>\n<li><strong>Performance<\/strong>: It is designed to more than double the performance of the fifth-generation Intel Xeon Scalable CPU, the 64-core Platinum 8592+<\/li>\n<\/ul>\n<div id=\"attachment_296539\" style=\"width: 360px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2025\/06\/3.jpg\" ><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-296539\" class=\"wp-image-296539\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2025\/06\/3.jpg\" alt=\"\" width=\"350\" height=\"298\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2025\/06\/3.jpg 650w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2025\/06\/3-300x256.jpg 300w\" sizes=\"auto, (max-width: 350px) 100vw, 350px\" \/><\/a><p id=\"caption-attachment-296539\" class=\"wp-caption-text\">The AMD Turin superchip as in 2025<br \/>Photo Credit: Wikimedia Commons<\/p><\/div>\n<p>The AMD Turin<a href=\"#_edn9\" name=\"_ednref9\">[9]<\/a> stands out as the most powerful computer chip in 2025, offering unparalleled performance for data centers, AI workloads, and computational fluid dynamics. The term &#8221; powerful computer chip&#8221; can be defined using various criteria, depending on the specific use case and performance metrics. Here are some of the key criteria used to determine the most powerful computer chip:<\/p>\n<p><strong>Performance Metrics<\/strong><\/p>\n<ol>\n<li><strong>Core Count<\/strong>: The number of cores in a chip is a significant factor. More cores generally mean better multitasking and parallel processing capabilities.<\/li>\n<li><strong>Clock Speed<\/strong>: The base and boost clock speeds of a chip determine how fast it can process instructions. Higher clock speeds usually result in better performance.<\/li>\n<li><strong>Transistor Count<\/strong>: The number of transistors on a chip can indicate its complexity and potential performance. More transistors typically mean more processing power.<\/li>\n<li><strong>Thermal Design Power (TDP)<\/strong>: This measures the amount of heat a chip generates and needs to dissipate. Lower TDP values are preferable for energy efficiency.<\/li>\n<\/ol>\n<p><strong>Benchmarks<\/strong><\/p>\n<ol>\n<li><strong>Single-Threaded Performance<\/strong>: Benchmarks like Cinebench and Geekbench measure the performance of a single core. High single-threaded performance is crucial for tasks that rely on single-core efficiency<\/li>\n<li><strong>Multi-Threaded Performance<\/strong>: Benchmarks that test multi-core performance, such as those used in productivity applications and rendering tasks, are essential for evaluating a chip&#8217;s ability to handle parallel workloads<\/li>\n<li><strong>Integrated Graphics Performance<\/strong>: For chips with integrated GPUs, benchmarks that measure gaming and graphical performance are also considered<\/li>\n<\/ol>\n<p><strong>Use Cases: Peace and War<\/strong><\/p>\n<ol>\n<li><strong>Gaming<\/strong>: For gaming, chips with high single-threaded performance and strong integrated graphics are often considered the most powerful<\/li>\n<li><strong>Workstations<\/strong>: For professional workstations, multi-threaded performance and high core counts are crucial for tasks like video editing, 3D rendering, and scientific simulations<\/li>\n<li><strong>Servers<\/strong>: In server environments, energy efficiency, thermal performance, and multi-core capabilities are critical for handling large-scale data processing and cloud computing<\/li>\n<\/ol>\n<p>These criteria collectively help define the most powerful computer chip, depending on the specific requirements and applications.<\/p>\n<p><strong>Computer Chips and links to Trade War<a href=\"#_edn10\" name=\"_ednref10\">[10]<\/a><\/strong><\/p>\n<p>Computer chips (semiconductors) are at the heart of modern trade wars due to their\u00a0<strong>strategic importance<\/strong>\u00a0in technology, military systems, and economic competitiveness. Here\u2019s how they intersect with trade conflicts, illustrated with real-world examples:<\/p>\n<ol>\n<li><strong> Chips as a Geopolitical Weapon<\/strong><\/li>\n<\/ol>\n<p><strong>Why?<\/strong><\/p>\n<ul>\n<li>Semiconductors power everything from smartphones to AI and missiles. Controlling their supply chain grants economic and military leverage.<\/li>\n<li>The U.S. and China are locked in a &#8220;<strong>Chip War<\/strong>&#8221; to dominate design, manufacturing, and access to advanced chips.<\/li>\n<\/ul>\n<p><strong>Example: U.S. vs. China Export Controls<\/strong><\/p>\n<ul>\n<li>In 2025, the U.S. imposed\u00a0<strong>145% tariffs<\/strong>\u00a0on Chinese chips and banned exports of advanced AI chips (e.g., Nvidia\u2019s H100) to cripple China\u2019s tech\/military growth\u00a036.<\/li>\n<li>China retaliated by restricting exports of\u00a0<strong>gallium<\/strong>\u00a0and\u00a0<strong>germanium<\/strong>\u00a0(critical for chipmaking), hurting U.S. defense contractors.<\/li>\n<\/ul>\n<p><strong>Outcome<\/strong>: A global scramble to secure chip supplies, with companies like TSMC building plants in the U.S. to avoid tariffs.<\/p>\n<ol start=\"2\">\n<li><strong> Tariffs Disrupting Supply Chains<\/strong><\/li>\n<\/ol>\n<p><strong>Why?<\/strong><\/p>\n<ul>\n<li>Chips rely on a\u00a0<strong>global supply chain<\/strong>: Designed in the U.S. (Nvidia)<a href=\"#_edn11\" name=\"_ednref11\">[11]<\/a>, made in Taiwan (TSMC<a href=\"#_edn12\" name=\"_ednref12\">[12]<\/a>, <a href=\"#_edn13\" name=\"_ednref13\">[13]<\/a>), assembled in China, and used globally. Tariffs disrupt this flow.<\/li>\n<\/ul>\n<p><strong>Example: Gaming Consoles Hit by Tariffs<\/strong><\/p>\n<ul>\n<li>In 2025, U.S. tariffs on Chinese-made electronics (e.g., PlayStation 5, Nintendo Switch) raised console prices by\u00a0<strong>30\u201340%<\/strong><\/li>\n<li>Sony and Nintendo shifted production to Vietnam, but new U.S. tariffs (up to\u00a0<strong>46% on Vietnam<\/strong>) nullified the cost savings<\/li>\n<\/ul>\n<p><strong>Outcome<\/strong>: Higher consumer prices and supply chain chaos, with companies stockpiling chips preemptively\u00a014.<\/p>\n<ol start=\"3\">\n<li><strong> Subsidies and &#8220;Chip Nationalism&#8221;<\/strong><\/li>\n<\/ol>\n<p><strong>Why?<\/strong><\/p>\n<ul>\n<li>Countries are spending billions to\u00a0<strong>onshore<\/strong>\u00a0chip production, fearing over-reliance on rivals.<\/li>\n<\/ul>\n<p><strong>Examples:<\/strong><\/p>\n<ul>\n<li><strong>U.S.\u00a0 CHIPS Act<\/strong>:\u00a052.7billiontoboostdomesticchipmaking,counteredbyChina\u2019s52.7<em>billiontoboostdomesticchipmaking<\/em>,<em>counteredbyChina<\/em>\u2019<em>s<\/em>150 billion subsidy for SMIC<a href=\"#_edn14\" name=\"_ednref14\">[14]<\/a> (its top chipmaker).<\/li>\n<li><strong>EU Chips Act<\/strong>: \u20ac43 billion to reduce dependence on U.S.\/Asian chips.<\/li>\n<\/ul>\n<p><strong>Outcome<\/strong>: A subsidies arms race, with TSMC (Taiwan) caught in the crossfire as it builds plants in the U.S., Japan, and Germany<\/p>\n<ol start=\"4\">\n<li><strong> Tech Decoupling and &#8220;Silicon Blockades&#8221;<\/strong><\/li>\n<\/ol>\n<p><strong>Why?<\/strong><\/p>\n<ul>\n<li>The U.S. aims to\u00a0<strong>cut China off<\/strong>\u00a0from advanced chips (e.g., for AI\/supercomputers), while China pushes self-sufficiency.<\/li>\n<\/ul>\n<p><strong>Example: Huawei\u2019s Survival Tactics<\/strong><a href=\"#_edn15\" name=\"_ednref15\">[15]<\/a><\/p>\n<ul>\n<li>After U.S. sanctions, Huawei developed its\u00a0<strong>7nm chips<\/strong>\u00a0(via SMIC) despite export bans, using older tech to bypass restrictions.<\/li>\n<li>China now produces\u00a0<strong>60% of global surveillance chips<\/strong>\u00a0(e.g., HiSilicon), reducing reliance on U.S. firms like Intel.<\/li>\n<\/ul>\n<p><strong>Outcome<\/strong>: A fragmented tech ecosystem, with Chinese chips powering domestic products but lagging in cutting-edge innovation\u00a0.<\/p>\n<ol start=\"5\">\n<li><strong> Secondary Effects: Shortages and Inflation<\/strong><\/li>\n<\/ol>\n<p><strong>Why?<\/strong><\/p>\n<ul>\n<li>Trade wars create\u00a0<strong>bottlenecks<\/strong>. In 2025, chip lead times hit\u00a0<strong>4+ months<\/strong>, and prices rose\u00a0<strong>18%<\/strong>\u00a0due to tariffs and hoarding.<\/li>\n<\/ul>\n<p><strong>Example: Auto Industry Crisis<\/strong><\/p>\n<ul>\n<li>U.S. tariffs on Chinese\/Mexican auto parts (25%) disrupted car production, echoing the 2021 chip shortage.<\/li>\n<li>Ford and GM warned of\u00a0<strong>$1,000+ price hikes<\/strong>\u00a0per vehicle.<\/li>\n<\/ul>\n<p><strong>Outcome<\/strong>: Higher costs for consumers and stalled tech adoption (e.g., AI, EVs).<\/p>\n<p><strong>Key Takeaways<\/strong><\/p>\n<ol>\n<li><strong>Chips = Power<\/strong>: Control over semiconductors translates to economic\/military dominance.<\/li>\n<li><strong>Tariffs Reshape Supply Chains<\/strong>: Companies flee China but face new trade barriers (e.g., Vietnam tariffs).<\/li>\n<li><strong>Subsidies Fuel Rivalry<\/strong>: The U.S., EU, and China are spending trillions to &#8220;win&#8221; the chip war.<\/li>\n<li><strong>Tech Decoupling is Accelerating<\/strong>: Separate U.S. and Chinese tech ecosystems are emerging.<\/li>\n<\/ol>\n<p>For additional reference please see: <a target=\"_blank\" href=\"https:\/\/cepa.org\/commentary\/part-five-chips-war-2025\/\" >CEPA on the &#8220;Chips War&#8221;<\/a> <a target=\"_blank\" href=\"#_edn16\" name=\"_ednref16\">[16]<\/a> <a href=\"https:\/\/www2.deloitte.com\/us\/en\/insights\/industry\/technology\/technology-media-telecom-outlooks\/semiconductor-industry-outlook.html\" >Deloitte\u2019s 2025 Semiconductor Outlook<\/a>\u00a0<a href=\"#_edn17\" name=\"_ednref17\">[17]<\/a><\/p>\n<p><strong>Final Thought<\/strong>: The chip trade war is a high-stakes game of\u00a0<strong>&#8220;musical chairs\u201d,<\/strong>nations and firms are scrambling to secure their place before the music stops.<\/p>\n<p><strong>Classification of ABACUS <a href=\"#_edn18\" name=\"_ednref18\">[18]<\/a><\/strong><\/p>\n<p>The abacus is not classified as a computer chip. While both the abacus and computer chips are used for calculations, they are fundamentally different in their design and function. The abacus is a manual calculating tool made from beads and wires, used for performing arithmetic operations. On the other hand, a computer chip is an electronic device that processes and stores data using integrated circuits and transistors.<\/p>\n<p><strong>First Record of ABACUS<\/strong><\/p>\n<p>The earliest record of the abacus dates back to ancient Babylon around 300 BC\u00a0It was initially a board or slab on which a Babylonian spread sand to trace letters for general writing purposes. Over time, it evolved into a board marked with lines and equipped with counters for numerical values<\/p>\n<p><strong>Discovery of ABACUS<\/strong><\/p>\n<p>The exact individual who discovered the abacus is not known. However, it is believed to have originated in Babylon and was later used in various ancient civilizations, including Egypt, Greece, and Rome. Greek historian Herodotus mentioned the use of the abacus in Ancient Egypt<\/p>\n<p><strong>History of computers &#8211; from the Abacus to the iPhone \u2013 Is Abacus a Computer?<\/strong><a href=\"#_edn19\" name=\"_ednref19\">[19]<\/a><\/p>\n<p><strong>Introduction<\/strong><\/p>\n<p>The word &#8220;abacus&#8221; has a rich history and its etymology can be traced back to ancient languages.<\/p>\n<p><strong>Etymology<\/strong><\/p>\n<p>The term &#8220;abacus&#8221; dates back to at least 1387 AD when it was borrowed into Middle English from Latin. The Latin word &#8220;abacus&#8221; itself is derived from the ancient Greek word &#8220;\u1f04\u03b2\u03b1\u03be&#8221; (abax), which means &#8220;counting table&#8221; or &#8220;board for drawing&#8221;\u00a0The Greek term &#8220;abax&#8221; is believed to have originated from a Semitic source, such as the Phoenician or Hebrew word &#8220;abaq,&#8221; which means &#8220;dust&#8221;\u00a0This is because the earliest abacuses were boards covered with dust or sand on which mathematical equations or calculations could be traced and erased<\/p>\n<p><strong>Summary<\/strong><\/p>\n<p>The word &#8220;abacus&#8221; has evolved over centuries, originating from ancient Greek and Semitic languages, and has been used to describe a counting tool that has been essential in various cultures for performing arithmetic operations.<\/p>\n<p><strong>Use Cases: War and \u201cKill Chips\u201d<\/strong><\/p>\n<p><strong>Can National Producers Embed &#8220;Kill Chips&#8221; to Sabotage Products in Adverse Conditions?<\/strong><\/p>\n<p>The idea of a\u00a0<strong>&#8220;kill chip&#8221;<\/strong>\u2014a hidden mechanism that allows a manufacturer to remotely disable or degrade a product\u2014is not purely science fiction. While no confirmed cases exist of such chips being deployed in commercial products, the\u00a0<strong>technology, motives, and risks<\/strong>\u00a0make it a plausible (though extreme) tactic in trade wars or geopolitical conflicts.<\/p>\n<ol>\n<li><strong> Technical Feasibility: How &#8220;Kill Chips&#8221; Could Work<\/strong><\/li>\n<li><strong> Hardware-Based Kill Switches<\/strong><\/li>\n<\/ol>\n<ul>\n<li><strong>Embedded Microcontrollers<\/strong>: A secondary chip could be designed to receive a signal (via Wi-Fi, Bluetooth, or cellular) and trigger a failure (e.g., overheating, voltage spike).<\/li>\n<li><strong>Firmware Backdoors<\/strong>: Pre-installed malware in a device\u2019s firmware could execute a &#8220;self-destruct&#8221; command if activated.<\/li>\n<li><strong>Time-Based Degradation<\/strong>: Some chips already have\u00a0<strong>planned obsolescence<\/strong>\u00a0features (e.g., slowing down after a set period). A more aggressive version could render hardware unusable.<\/li>\n<\/ul>\n<p><strong>Example<\/strong>:<\/p>\n<ul>\n<li>In 2018, reports surfaced that\u00a0<strong>Chinese-made surveillance chips<\/strong>\u00a0(used in U.S. military equipment) had hidden backdoors for remote access. While not a &#8220;kill switch,&#8221; the risk was similar .<\/li>\n<\/ul>\n<ol>\n<li><strong> Software-Based Sabotage<\/strong><\/li>\n<\/ol>\n<ul>\n<li><strong>OTA (Over-the-Air) Updates<\/strong>: Companies like Tesla can push software updates that disable features or reduce performance.<\/li>\n<li><strong>DRM Lockouts<\/strong>: Some printers and industrial machines already refuse to function if they detect &#8220;unauthorized&#8221; parts.<\/li>\n<\/ul>\n<p><strong>Example<\/strong>:<\/p>\n<ul>\n<li><strong>Russia\u2019s Kamaz trucks<\/strong>\u00a0(used in Ukraine) reportedly had\u00a0<strong>French-made engine control units (ECUs)<\/strong>\u00a0that could be remotely disabled. After sanctions, Russia had to replace them with domestic chips .<\/li>\n<\/ul>\n<ol start=\"2\">\n<li><strong> Geopolitical Precedents &amp; Motivations<\/strong><\/li>\n<li><strong> Why Would a Country Do This?<\/strong><\/li>\n<\/ol>\n<ol>\n<li><strong>Economic Warfare<\/strong>:\n<ul>\n<li>If a nation (e.g., China) dominates a critical supply chain (e.g., chips, EVs, drones), it could\u00a0<strong>threaten to disable exports<\/strong>\u00a0during a trade war.<\/li>\n<li>Example: If China controlled\u00a0<strong>90% of global EV batteries<\/strong>, it could theoretically brick them if the U.S. imposed extreme sanctions.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Military Sabotage<\/strong>:\n<ul>\n<li>State-sponsored kill chips could disable enemy weapons, drones, or communication systems in wartime.<\/li>\n<li>Example: The U.S. has reportedly\u00a0<strong>tested cyberweapons<\/strong>\u00a0to disable North Korean missile systems mid-flight .<\/li>\n<\/ul>\n<\/li>\n<li><strong>Coercive Diplomacy<\/strong>:\n<ul>\n<li>A &#8220;kill switch&#8221; could be used to force compliance in negotiations (e.g., &#8220;Lift sanctions, or we disable your infrastructure&#8221;).<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<ol>\n<li><strong> Real-World Parallels <\/strong><\/li>\n<\/ol>\n<ul>\n<li><strong>Stuxnet (2010)<\/strong>: A U.S.-Israeli cyberweapon physically destroyed Iranian nuclear centrifuges by overloading them.<\/li>\n<li><strong>Huawei Backdoor Fears (2019)<\/strong>: The U.S. banned Huawei over concerns its 5G equipment could be remotely controlled by Beijing.<\/li>\n<\/ul>\n<ol start=\"3\">\n<li><strong> Risks &amp; Countermeasures<\/strong><\/li>\n<li><strong> Why It is Rare (So Far)<\/strong><\/li>\n<\/ol>\n<ol>\n<li><strong>Blowback Risk<\/strong>:\n<ul>\n<li>If a kill switch were exposed, global buyers would\u00a0<strong>boycott<\/strong>\u00a0the offending country\u2019s products.<\/li>\n<li>Example: After the\u00a0<strong>SolarWinds hack<\/strong>, Russian software faced global distrust.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Legal Consequences<\/strong>:\n<ul>\n<li>Sabotaging commercial products could trigger\u00a0<strong>WTO disputes, sanctions, or even war crimes charges<\/strong>.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Detection &amp; Mitigation<\/strong>:\n<ul>\n<li>Reverse engineering (e.g., by Apple, Tesla, or defense contractors) can uncover hidden kill mechanisms.<\/li>\n<li>Countries like the U.S. now\u00a0<strong>scan imported chips<\/strong>\u00a0for malware at Customs .<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<ol>\n<li><strong> How Nations Protect Themselves<\/strong><\/li>\n<\/ol>\n<ul>\n<li><strong>Onshoring Critical Tech<\/strong>: The U.S. CHIPS Act ($52B) and EU Chips Act (\u20ac43B) aim to reduce reliance on foreign semiconductors.<\/li>\n<li><strong>Air-Gapped Systems<\/strong>: Military and infrastructure networks avoid internet-connected chips.<\/li>\n<li><strong>Open-Source Hardware<\/strong>: Some governments mandate\u00a0<strong>transparent chip designs<\/strong>\u00a0to prevent backdoors.<\/li>\n<\/ul>\n<ol start=\"4\">\n<li><strong> Future Outlook: A New Era of &#8220;Hardware Wars&#8221;?<\/strong><\/li>\n<\/ol>\n<ul>\n<li><strong>China\u2019s Dominance in Legacy Chips<\/strong>: If it controls\u00a0<strong>60% of global chip production<\/strong>, could it embed kill switches in industrial machinery?<\/li>\n<li><strong>AI-Enabled Sabotage<\/strong>: Future chips with AI could\u00a0<strong>autonomously decide<\/strong>\u00a0to fail if geopolitical conditions change.<\/li>\n<li><strong>Counter-Kill Switch Tech<\/strong>: Firms like Lockheed Martin are developing\u00a0<strong>&#8220;self-healing&#8221; electronics<\/strong>\u00a0to resist sabotage.<\/li>\n<\/ul>\n<p><strong>Conclusion<\/strong><\/p>\n<p>While no confirmed &#8220;kill chips&#8221; have been deployed in trade wars yet, the\u00a0<strong>technology exists<\/strong>, and the\u00a0<strong>geopolitical incentives are growing<\/strong>. Nations are already preparing for this scenario by:<br \/>\n\u2714\u00a0<strong>Localizing chip production<\/strong>\u00a0(e.g., TSMC in Arizona)<br \/>\n\u2714\u00a0<strong>Scanning imports for malware<\/strong><br \/>\n\u2714\u00a0<strong>Developing cyber-resilient hardware<\/strong><\/p>\n<p><strong>Final Thought<\/strong>: The line between\u00a0<strong>trade war and cyberwar<\/strong>\u00a0is blurring\u2014future conflicts may be fought not just with tariffs, but with\u00a0<strong>silicon sabotage<\/strong>.<\/p>\n<p><strong>Case Studies: How &#8220;Kill Chips&#8221; Could Sabotage EVs, Civilian Planes, and Drones<\/strong><\/p>\n<p>The concept of\u00a0<strong>embedded sabotage mechanisms<\/strong>\u00a0in critical technologies is a growing concern, especially in industries dominated by geopolitical rivals. Below are detailed scenarios for\u00a0<strong>electric vehicles (EVs), civilian aircraft, and drones (both surveillance and military)<\/strong>, analyzing feasibility, real-world precedents, and potential countermeasures.<\/p>\n<ol>\n<li><strong> Electric Vehicles (EVs): Battery &amp; Software Sabotage<\/strong><\/li>\n<\/ol>\n<p><strong>Why EVs Are Vulnerable<\/strong><\/p>\n<ul>\n<li><strong>Battery Dependence<\/strong>: China controls\u00a0<strong>70%+ of global lithium-ion battery production<\/strong>.<\/li>\n<li><strong>Connected Systems<\/strong>: Most EVs rely on\u00a0<strong>OTA (Over-the-Air) updates<\/strong>\u00a0for performance tuning.<\/li>\n<\/ul>\n<p><strong>Possible Sabotage Methods<\/strong><\/p>\n<table>\n<thead>\n<tr>\n<td><strong>Method<\/strong><\/td>\n<td><strong>How It Works<\/strong><\/td>\n<td><strong>Real-World Precedent<\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td><strong>Battery Performance Throttling<\/strong><\/td>\n<td>Remote command reduces range or disables charging.<\/td>\n<td>Tesla\u2019s &#8220;Battery Gate&#8221; (2019) slowed older cars via software.<\/td>\n<\/tr>\n<tr>\n<td><strong>Thermal Runaway Trigger<\/strong><\/td>\n<td>Malicious firmware causes batteries to overheat, risking fires.<\/td>\n<td>LG Chem batteries in Chevy Bolts were recalled for fire risks (2021).<\/td>\n<\/tr>\n<tr>\n<td><strong>Geofencing Lockout<\/strong><\/td>\n<td>EVs refuse to operate in certain regions (e.g., during sanctions).<\/td>\n<td>Russian Kamaz trucks had French ECUs that failed post-sanctions.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>Potential Impact<\/strong><\/p>\n<ul>\n<li><strong>Economic Warfare<\/strong>: If China dominates EV supply chains, it could\u00a0<strong>disable exports<\/strong>\u00a0during a trade war.<\/li>\n<li><strong>Consumer Panic<\/strong>: A single incident (e.g., mass battery failures) could collapse trust in foreign EVs.<\/li>\n<\/ul>\n<p><strong>Countermeasures<\/strong><\/p>\n<p>\u2714\u00a0<strong>Localized battery production<\/strong>\u00a0(e.g., U.S. Inflation Reduction Act subsidies).<br \/>\n\u2714\u00a0<strong>Open-source firmware audits<\/strong>\u00a0to detect backdoors.<\/p>\n<ol start=\"2\">\n<li><strong> Civilian Aircraft: Hidden Kill Switches in Avionics<\/strong><\/li>\n<\/ol>\n<p><strong>Why Planes Are at Risk<\/strong><\/p>\n<ul>\n<li><strong>Global Supply Chains<\/strong>: Boeing\/Airbus rely on foreign-made chips and composites.<\/li>\n<li><strong>Critical Software<\/strong>: Modern planes use\u00a0<strong>fly-by-wire systems<\/strong>\u00a0controlled by code.<\/li>\n<\/ul>\n<p><strong>Possible Sabotage Methods<\/strong><\/p>\n<table>\n<thead>\n<tr>\n<td><strong>Method<\/strong><\/td>\n<td><strong>How It Works<\/strong><\/td>\n<td><strong>Real-World Precedent<\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td><strong>Firmware Backdoor<\/strong><\/td>\n<td>Malicious code disables engines mid-flight when triggered.<\/td>\n<td>Stuxnet (2010) physically destroyed Iranian centrifuges.<\/td>\n<\/tr>\n<tr>\n<td><strong>GPS Spoofing<\/strong><\/td>\n<td>Fake coordinates cause navigation failures.<\/td>\n<td>China has tested GPS spoofing near Taiwan (2023).<\/td>\n<\/tr>\n<tr>\n<td><strong>Component Degradation<\/strong><\/td>\n<td>Substandard parts (e.g., turbine blades) fail prematurely.<\/td>\n<td>FAA banned some Chinese-made aircraft parts (2022).<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>Potential Impact<\/strong><\/p>\n<ul>\n<li><strong>Airline Groundings<\/strong>: A single incident could ground entire fleets (like the 737 MAX crisis).<\/li>\n<li><strong>Geopolitical Leverage<\/strong>: A state could threaten to\u00a0<strong>disable rival airlines<\/strong>\u00a0during conflicts.<\/li>\n<\/ul>\n<p><strong>Countermeasures<\/strong><\/p>\n<p>\u2714\u00a0<strong>Dual-supplier policies<\/strong>\u00a0(e.g., Boeing diversifying away from Chinese composites).<br \/>\n\u2714\u00a0<strong>Air-gapped maintenance systems<\/strong>\u00a0to prevent remote hacking.<\/p>\n<ol start=\"3\">\n<li><strong> Drones: Surveillance &amp; Military Sabotage<\/strong><\/li>\n<\/ol>\n<p><strong>Why Drones Are Prime Targets<\/strong><\/p>\n<ul>\n<li><strong>Dual-Use Tech<\/strong>: Civilian drones (DJI) share components with military models.<\/li>\n<li><strong>Remote Control<\/strong>: Most rely on\u00a0<strong>proprietary software<\/strong>\u00a0vulnerable to kill commands.<\/li>\n<\/ul>\n<p><strong>Possible Sabotage Methods<\/strong><\/p>\n<table>\n<thead>\n<tr>\n<td><strong>Type<\/strong><\/td>\n<td><strong>Sabotage Method<\/strong><\/td>\n<td><strong>Real-World Precedent<\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td><strong>Surveillance Drones (e.g., DJI)<\/strong><\/td>\n<td>&#8220;Geofencing&#8221; blocks operation in conflict zones.<\/td>\n<td>DJI drones already restrict flight near airports\/military sites.<\/td>\n<\/tr>\n<tr>\n<td><strong>Military Drones<\/strong><\/td>\n<td>Firmware update disables guidance systems mid-mission.<\/td>\n<td>Ukraine repurposed DJI drones with hacked firmware.<\/td>\n<\/tr>\n<tr>\n<td><strong>Swarm Drones<\/strong><\/td>\n<td>Kill command causes swarm to self-destruct or attack friendly forces.<\/td>\n<td>Iran spoofed U.S. drone GPS (2011), forcing a crash.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>Potential Impact<\/strong><\/p>\n<ul>\n<li><strong>Battlefield Disruptions<\/strong>: Imagine\u00a0<strong>1,000 drones failing simultaneously<\/strong>\u00a0during a Taiwan invasion.<\/li>\n<li><strong>Corporate Espionage<\/strong>: A hacked industrial drone could leak sensitive site data (e.g., oil refineries).<\/li>\n<\/ul>\n<p><strong>Countermeasures<\/strong><\/p>\n<p>\u2714\u00a0<strong>Military-grade encryption<\/strong>\u00a0(e.g., U.S. banning DJI drones for govt use).<br \/>\n\u2714\u00a0<strong>&#8220;Dumb&#8221; drones<\/strong>\u00a0(manual controls only, no OTA updates).<\/p>\n<ol start=\"4\">\n<li><strong> The Bigger Picture: Are Kill Chips Already in Use?<\/strong><\/li>\n<\/ol>\n<p>While no\u00a0<strong>overt<\/strong>\u00a0cases exist, circumstantial evidence suggests\u00a0<strong>covert testing<\/strong>:<\/p>\n<ul>\n<li><strong>Huawei 5G Backdoor Fears<\/strong>: U.S. claims Chinese telecom gear could be remotely disabled.<\/li>\n<li><strong>Russia\u2019s Kamaz Trucks<\/strong>: French ECUs failed post-sanctions, forcing manual replacements.<\/li>\n<li><strong>Stuxnet<\/strong>: Proves states\u00a0<strong>will<\/strong>\u00a0weaponize firmware when stakes are high.<\/li>\n<\/ul>\n<p><strong>Future Threats<\/strong><\/p>\n<ul>\n<li><strong>AI-Enabled Sabotage<\/strong>: Chips could\u00a0<strong>autonomously decide<\/strong>\u00a0to fail based on news feeds (e.g., &#8220;If China invades Taiwan, disable all exports&#8221;).<\/li>\n<li><strong>Supply Chain Attacks<\/strong>: A single compromised chip factory could infect millions of devices.<\/li>\n<\/ul>\n<p><strong>Conclusion: Preparing for Silicon Sabotage<\/strong><\/p>\n<table>\n<thead>\n<tr>\n<td><strong>Industry<\/strong><\/td>\n<td><strong>Greatest Risk<\/strong><\/td>\n<td><strong>Best Defense<\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td><strong>EVs<\/strong><\/td>\n<td>Battery\/software kill switches<\/td>\n<td>Localized production<\/td>\n<\/tr>\n<tr>\n<td><strong>Aircraft<\/strong><\/td>\n<td>Firmware backdoors<\/td>\n<td>Air-gapped systems<\/td>\n<\/tr>\n<tr>\n<td><strong>Drones<\/strong><\/td>\n<td>Remote deactivation<\/td>\n<td>Open-source firmware<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>Final Thought<\/strong>: The next trade war may not just raise prices\u2014it could\u00a0<strong>brick entire industries overnight<\/strong>. Nations are already reacting:<\/p>\n<ul>\n<li><strong>U.S. CHIPS Act<\/strong>\u00a0($52B to onshore semiconductors).<\/li>\n<li><strong>EU\u2019s Critical Raw Materials Act<\/strong>\u00a0(reducing reliance on Chinese batteries).<\/li>\n<li><strong>India\u2019s Drone Policy<\/strong>\u00a0(banning Chinese components).<\/li>\n<\/ul>\n<p>It is to be noted that intensive cybersecurity, as well as physical security, measures are implemented by Boeing and Airbus as well as Chinese civilian aircraft manufacturer with reference to safeguarding<\/p>\n<ol>\n<li>Intellectual Property of these companies<\/li>\n<li>Spyware, Kill Switches safeguarding and Malware protection<\/li>\n<li>Analysing avionic equipment for Kill Switches<\/li>\n<li>How can these malactions be diagnosed and prevented?<\/li>\n<\/ol>\n<p><strong>How Military Aircraft Manufacturers Can Prevent Chip Sabotage in Third-Party Components<\/strong><\/p>\n<p>Military aircraft manufacturers (e.g., Lockheed Martin, Boeing, Dassault, Sukhoi) rely on\u00a0<strong>global supply chains<\/strong>\u00a0for critical components, including semiconductors. However, foreign-made chips could contain\u00a0<strong>hidden kill switches, backdoors, or malware<\/strong>\u00a0designed to sabotage aircraft in a conflict. Here\u2019s how defense firms mitigate these risks:<\/p>\n<ol>\n<li><strong> Supply Chain Vetting &amp; &#8220;Trusted Foundries&#8221;<\/strong><\/li>\n<li><strong> Strict Supplier Certification<\/strong><\/li>\n<\/ol>\n<ul>\n<li><strong>US DoD\u2019s &#8220;Trusted Foundry&#8221; Program<\/strong>: Only approved fabs (e.g., Intel, GlobalFoundries) supply chips for sensitive defence systems.<\/li>\n<li><strong>NATO\/EU &#8220;Cyber Resilience&#8221; Standards<\/strong>: Suppliers must prove no foreign state influence (e.g., banning Chinese-owned SMIC).<\/li>\n<\/ul>\n<ol>\n<li><strong> Component Traceability<\/strong><\/li>\n<\/ol>\n<ul>\n<li><strong>Blockchain Tracking<\/strong>: Some firms use blockchain to log each chip\u2019s origin, testing, and installation.<\/li>\n<li><strong>X-Ray &amp; Decapsulation<\/strong>: Suspect chips are physically inspected for tampering.<\/li>\n<\/ul>\n<p><strong>Example<\/strong>:<\/p>\n<ul>\n<li>The\u00a0<strong>F-35\u2019s Turkish ejection seat crisis<\/strong>\u00a0(2019) led to a full audit of all foreign-supplied components.<\/li>\n<\/ul>\n<ol start=\"2\">\n<li><strong> Secure Chip Design &amp; Redundancy<\/strong><\/li>\n<li><strong> Custom ASICs (No Off-the-Shelf Chips)<\/strong><\/li>\n<\/ol>\n<ul>\n<li>Military jets use\u00a0<strong>radiation-hardened, proprietary chips<\/strong>\u00a0(e.g., BAE Systems\u2019 RH-series) instead of commercial CPUs.<\/li>\n<li><strong>FPGAs (Field-Programmable Gate Arrays)<\/strong>\u00a0can be reconfigured to disable suspicious circuits.<\/li>\n<\/ul>\n<ol>\n<li><strong> &#8220;Dumb&#8221; Backup Systems<\/strong><\/li>\n<\/ol>\n<ul>\n<li>Critical systems (e.g., flight controls) have\u00a0<strong>non-digital backups<\/strong>\u00a0(hydraulic\/mechanical overrides).<\/li>\n<li>Example: The\u00a0<strong>F-16\u2019s analog flight control<\/strong>\u00a0still works if digital systems fail.<\/li>\n<\/ul>\n<ol start=\"3\">\n<li><strong> Firmware &amp; Software Safeguards<\/strong><\/li>\n<li><strong> Air-Gapped Updates<\/strong><\/li>\n<\/ol>\n<ul>\n<li>No OTA (over-the-air) updates\u2014firmware is manually installed via\u00a0<strong>secure terminals<\/strong>.<\/li>\n<li>Example:\u00a0<strong>F-22 Raptor<\/strong>\u00a0software is updated only in shielded hangars.<\/li>\n<\/ul>\n<ol>\n<li><strong> Checksum &amp; Cryptographic Signing<\/strong><\/li>\n<\/ol>\n<ul>\n<li>All firmware must pass\u00a0<strong>SHA-256\/512 hash verification<\/strong>\u00a0before installation.<\/li>\n<li>Example:\u00a0<strong>Eurofighter Typhoon<\/strong>\u00a0uses NATO-certified crypto modules.<\/li>\n<\/ul>\n<ol>\n<li><strong> &#8220;Self-Destruct&#8221; If Tampered<\/strong><\/li>\n<\/ol>\n<ul>\n<li>Some military chips\u00a0<strong>erase their firmware<\/strong>\u00a0if unauthorized access is detected.<\/li>\n<\/ul>\n<ol start=\"4\">\n<li><strong> Testing &amp; Counter-Sabotage Measures<\/strong><\/li>\n<li><strong> &#8220;Red Team&#8221; Hacking<\/strong><\/li>\n<\/ol>\n<ul>\n<li>Ethical hackers simulate attacks (e.g.,\u00a0<strong>triggering fake kill commands<\/strong>) to find vulnerabilities.<\/li>\n<\/ul>\n<ol>\n<li><strong> EMP &amp; Radiation Testing<\/strong><\/li>\n<\/ol>\n<ul>\n<li>Chips are bombarded with\u00a0<strong>electromagnetic pulses (EMP)<\/strong>\u00a0to ensure they don\u2019t fail catastrophically.<\/li>\n<\/ul>\n<ol>\n<li><strong> &#8220;Golden Unit&#8221; Comparison<\/strong><\/li>\n<\/ol>\n<ul>\n<li>A\u00a0<strong>reference chip<\/strong>\u00a0(kept in a vault) is compared to new batches for discrepancies.<\/li>\n<\/ul>\n<ol start=\"5\">\n<li><strong> Legal &amp; Geopolitical Strategies<\/strong><\/li>\n<li><strong> &#8220;No Chinese Components&#8221; Clauses<\/strong><\/li>\n<\/ol>\n<ul>\n<li>Contracts ban suppliers from using Chinese-made chips, even in subcomponents.<\/li>\n<\/ul>\n<ol>\n<li><strong> Onshoring Critical Production<\/strong><\/li>\n<\/ol>\n<ul>\n<li><strong>U.S. CHIPS Act<\/strong>\u00a0funds Intel\/TSMC fabs in Arizona to reduce reliance on Asia.<\/li>\n<li><strong>EU\u2019s Chips Act<\/strong>\u00a0subsidizes STMicroelectronics for local production.<\/li>\n<\/ul>\n<ol>\n<li><strong> Export Controls<\/strong><\/li>\n<\/ol>\n<ul>\n<li><strong>ITAR (Intl. Traffic in Arms Regs)<\/strong>: Stops adversaries from buying sensitive tech.<\/li>\n<\/ul>\n<p><strong>Real-World Failures &amp; Lessons<\/strong><\/p>\n<table>\n<thead>\n<tr>\n<td><strong>Incident<\/strong><\/td>\n<td><strong>What Went Wrong<\/strong><\/td>\n<td><strong>Fix Implemented<\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td><strong>Russian Su-35s with French Chips (2022)<\/strong><\/td>\n<td>Sanctions disabled navigation systems.<\/td>\n<td>Switched to domestic chips.<\/td>\n<\/tr>\n<tr>\n<td><strong>Chinese-made chips in U.S. drones (2018)<\/strong><\/td>\n<td>Suspected backdoors found.<\/td>\n<td>Pentagon banned DJI drones.<\/td>\n<\/tr>\n<tr>\n<td><strong>F-35 Turkish parts ban (2019)<\/strong><\/td>\n<td>Geopolitical risk from Ankara.<\/td>\n<td>Replaced with U.S.\/UK suppliers.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>Conclusion: The Future of Anti-Sabotage Chips<\/strong><\/p>\n<ol>\n<li><strong>AI-Enhanced Detection<\/strong>: Machine learning scans chip designs for hidden kill logic.<\/li>\n<li><strong>Quantum Encryption<\/strong>: Unhackable firmware signing (DARPA is testing this).<\/li>\n<li><strong>3D-Printed Chips On-Demand<\/strong>: Print trusted chips in secure facilities.<\/li>\n<\/ol>\n<p>Military aircraft makers\u00a0<strong>cannot eliminate<\/strong>\u00a0third-party risks entirely\u2014but through\u00a0<strong>design, testing, and supply chain control<\/strong>, they reduce sabotage chances to near zero. Special security measures are in place to minimize, but not completely eliminate breaches in the manufacturing processes of <strong>specific military aircraft<\/strong>\u00a0(e.g., F-35, Su-57) and their chip security? These measures are not made public and form part of the cyber security division of these companies.<\/p>\n<p><strong>Can In-House Sabotage Occur in Chip Manufacturing Plants?<\/strong><\/p>\n<p>I<strong>nsider sabotage<\/strong>\u00a0is a real threat in semiconductor manufacturing, especially in facilities producing chips for military, aerospace, or critical infrastructure. Bank clients experience with a cloned Visa card (likely due to a compromised payment terminal or skimming device) is a small-scale example, similar risks exist in chip fabs, but with far greater consequences.<\/p>\n<ol>\n<li><strong> How Employees Could Sabotage Chip Production<\/strong><\/li>\n<li><strong> Physical Tampering<\/strong><\/li>\n<\/ol>\n<ul>\n<li><strong>Defective Masking<\/strong>: A malicious engineer could tweak photolithography masks to introduce microscopic flaws in chips.<\/li>\n<li><strong>Contamination<\/strong>: Introducing impurities (e.g., dust, chemicals) into cleanrooms to cause chip failures.<\/li>\n<li><strong>&#8220;Kill Switch Chip&#8221; Implants<\/strong>: Adding hidden circuits that activate under specific conditions (e.g., a signal, date, or voltage trigger).<\/li>\n<\/ul>\n<p><strong>Real-World Example<\/strong>:<\/p>\n<ul>\n<li><strong>2008 Taiwan DRAM Sabotage<\/strong>: A disgruntled engineer at ProMOS (a DRAM manufacturer)\u00a0<strong>allegedly altered equipment settings<\/strong>, causing $50M in losses.<\/li>\n<\/ul>\n<ol>\n<li><strong> Firmware\/Software Sabotage<\/strong><\/li>\n<\/ol>\n<ul>\n<li><strong>Backdoored Firmware<\/strong>: An insider could insert malicious code into chip firmware (e.g., disabling a drone\u2019s guidance system).<\/li>\n<li><strong>Test Manipulation<\/strong>: Skipping or falsifying quality tests to let defective chips slip through.<\/li>\n<\/ul>\n<p><strong>Example<\/strong>:<\/p>\n<ul>\n<li><strong>Stuxnet (2010)<\/strong>: While not insider sabotage, it proved firmware attacks can physically destroy hardware.<\/li>\n<\/ul>\n<ol>\n<li><strong> Intellectual Property Theft<\/strong><\/li>\n<\/ol>\n<ul>\n<li><strong>Stealing Designs<\/strong>: Employees could leak chip blueprints to foreign adversaries (e.g., China\u2019s SMIC accused of IP theft from TSMC).<\/li>\n<li><strong>Reverse Engineering<\/strong>: Taking proprietary chip designs to a competitor.<\/li>\n<\/ul>\n<p><strong>Example<\/strong>:<\/p>\n<ul>\n<li><strong>2019 TSMC vs. SMIC Lawsuit<\/strong>: A former TSMC engineer took secrets to China\u2019s SMIC, leading to a $200M settlement.<\/li>\n<\/ul>\n<ol start=\"2\">\n<li><strong> Why Chip Fabs Are Vulnerable to Insider Threats<\/strong><\/li>\n<\/ol>\n<ul>\n<li><strong>High Expertise Needed<\/strong>: Only a few engineers understand chip manufacturing, making oversight difficult.<\/li>\n<li><strong>Global Workforce<\/strong>: Employees from rival nations (e.g., China, Russia) may have divided loyalties.<\/li>\n<li><strong>Complex Supply Chains<\/strong>: Hard to track if a single worker tampers with a batch.<\/li>\n<\/ul>\n<ol start=\"3\">\n<li><strong> How Companies Prevent Insider Sabotage<\/strong><\/li>\n<li><strong> Strict Personnel Vetting<\/strong><\/li>\n<\/ol>\n<ul>\n<li><strong>Background Checks<\/strong>: Extreme scrutiny for employees handling sensitive tech (e.g.,\u00a0<strong>TSMC\u2019s 6-month vetting<\/strong>\u00a0for R&amp;D staff).<\/li>\n<li><strong>Citizenship Restrictions<\/strong>: Some U.S. fabs (e.g., Intel\u2019s Ohio plant) limit foreign nationals in critical roles.<\/li>\n<\/ul>\n<ol>\n<li><strong> Surveillance &amp; Access Control<\/strong><\/li>\n<\/ol>\n<ul>\n<li><strong>AI Monitoring<\/strong>: Cameras track unusual behavior (e.g., someone accessing restricted areas at odd hours).<\/li>\n<li><strong>Air-Gapped Networks<\/strong>: No USB drives or internet access in secure zones.<\/li>\n<\/ul>\n<ol>\n<li><strong> Redundancy &amp; Verification<\/strong><\/li>\n<\/ol>\n<ul>\n<li><strong>Golden Samples<\/strong>: A &#8220;reference chip&#8221; is compared to production batches for discrepancies.<\/li>\n<li><strong>Multi-Person Authentication<\/strong>: Critical steps require\u00a0<strong>two engineers<\/strong>\u00a0to approve.<\/li>\n<\/ul>\n<ol>\n<li><strong> Legal Deterrents<\/strong><\/li>\n<\/ol>\n<ul>\n<li><strong>NDAs &amp; Non-Compete Clauses<\/strong>: Heavy penalties for leaks (e.g.,\u00a0<strong>10+ years in prison<\/strong>\u00a0for stealing trade secrets).<\/li>\n<li><strong>Whistleblower Rewards<\/strong>: Incentives for reporting suspicious activity.<\/li>\n<\/ul>\n<ol start=\"4\">\n<li><strong> Real-World Cases of Chip Industry Sabotage<\/strong><\/li>\n<\/ol>\n<table>\n<thead>\n<tr>\n<td><strong>Incident<\/strong><\/td>\n<td><strong>What Happened<\/strong><\/td>\n<td><strong>Outcome<\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td><strong>Samsung Fab Sabotage (2014)<\/strong><\/td>\n<td>Worker allegedly damaged equipment, costing $1M.<\/td>\n<td>Fired + blacklisted.<\/td>\n<\/tr>\n<tr>\n<td><strong>UMC vs. Micron (2018)<\/strong><\/td>\n<td>Employees stole DRAM tech for China.<\/td>\n<td>UMC fined $60M.<\/td>\n<\/tr>\n<tr>\n<td><strong>Chinese Spy at Apple (2018)<\/strong><\/td>\n<td>Employee tried stealing self-driving car secrets.<\/td>\n<td>Arrested by FBI.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<ol start=\"5\">\n<li><strong> Could a civilian Visa Credit Card Incident Happen in a Chip Fab?<\/strong><\/li>\n<\/ol>\n<ul>\n<li><strong>Yes, but scaled up<\/strong>:\n<ul>\n<li>Visa bank cards are cloned via\u00a0<strong>physical\/digital skimming<\/strong>\u00a0(a low-tech attack).<\/li>\n<li>In a chip fab, a rogue insider could\u00a0<strong>alter millions of chips<\/strong>\u00a0with a single tweak.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Difference<\/strong>:\n<ul>\n<li>Banks detect fraud via AI and refund victims.<\/li>\n<li>A sabotaged military chip could\u00a0<strong>fail mid-combat<\/strong>, causing deaths.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong>Conclusion: Insider Threats Are a Silent War<\/strong><\/p>\n<p>While companies invest heavily in security,\u00a0<strong>determined insiders<\/strong>\u00a0(disgruntled employees, spies, or coerced workers) remain a risk.<\/p>\n<p>The best defenses are:<br \/>\n\u2714\u00a0<strong>Extreme vetting<\/strong>\u00a0(like TSMC\u2019s 6-month background checks).<br \/>\n\u2714\u00a0<strong>Air-gapped production lines<\/strong>\u00a0(no external connections).<br \/>\n\u2714\u00a0<strong>AI-powered anomaly detection<\/strong>\u00a0(catches sabotage early).<\/p>\n<p><strong>Final Thought<\/strong>: Just as the bank improved security after clients\u2019 cards\u2019 were cloned, chip fabs must\u00a0<strong>evolve constantly<\/strong>\u00a0to stay ahead of saboteurs, inhouse.<\/p>\n<p><strong>How Insider Sabotage in Chip Manufacturing Ties into Trade Wars<\/strong><\/p>\n<p>The risk of\u00a0<strong>insider sabotage in semiconductor fabs<\/strong>\u00a0is not just a corporate security issue\u2014it\u2019s a\u00a0<strong>geopolitical weapon<\/strong>\u00a0in modern trade wars. Here\u2019s how it connects:<\/p>\n<ol>\n<li><strong> Trade Wars Create Incentives for Sabotage<\/strong><a href=\"#_edn20\" name=\"_ednref20\">[20]<\/a><\/li>\n<li><strong> Retaliation Against Sanctions<\/strong><\/li>\n<\/ol>\n<ul>\n<li>If Country A bans chips from Country B (e.g.,\u00a0<strong>U.S. blacklisting SMIC<\/strong>), Country B may\u00a0<strong>coerce or recruit insiders<\/strong>\u00a0to sabotage rival fabs.<\/li>\n<li>Example: A Chinese engineer at TSMC could deliberately weaken chips destined for U.S. fighter jets.<\/li>\n<\/ul>\n<ol>\n<li><strong> Economic Espionage<\/strong><\/li>\n<\/ol>\n<ul>\n<li>Trade wars accelerate\u00a0<strong>IP theft<\/strong>\u00a0to bypass R&amp;D costs.<\/li>\n<li>Example:\u00a0<strong>China\u2019s &#8220;Made in China 2025&#8221;<\/strong>\u00a0relies partly on stolen semiconductor tech.<\/li>\n<\/ul>\n<ol>\n<li><strong> Supply Chain Attacks<\/strong><\/li>\n<\/ol>\n<ul>\n<li>A single compromised worker can\u00a0<strong>taint entire shipments<\/strong>, forcing reliance on domestic suppliers.<\/li>\n<li>Example: If Intel\u2019s Malaysia plant had a saboteur, the U.S. might push to reshore production.<\/li>\n<\/ul>\n<ol start=\"2\">\n<li><strong> Real-World Trade War Links<\/strong><\/li>\n<\/ol>\n<table>\n<thead>\n<tr>\n<td><strong>Incident<\/strong><\/td>\n<td><strong>Trade War Connection<\/strong><\/td>\n<td><strong>Impact<\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td><strong>Huawei\u2019s Alleged Backdoors (2019)<\/strong><\/td>\n<td>U.S. banned Huawei, fearing sabotage.<\/td>\n<td>Global telecoms dropped Chinese 5G gear.<\/td>\n<\/tr>\n<tr>\n<td><strong>SMIC\u2019s Stolen TSMC Tech (2019)<\/strong><\/td>\n<td>China needed advanced chips amid U.S. sanctions.<\/td>\n<td>SMIC accelerated 7nm production illegally.<\/td>\n<\/tr>\n<tr>\n<td><strong>Russian Microchip Shortage (2022)<\/strong><\/td>\n<td>Sanctions forced Russia to use\u00a0<strong>counterfeit chips<\/strong>\u00a0in missiles.<\/td>\n<td>High failure rates in Ukraine war.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<ol start=\"3\">\n<li><strong> How Nations Counter Insider Threats<\/strong><\/li>\n<li><strong> Export Controls &amp; Blacklists<\/strong><\/li>\n<\/ol>\n<ul>\n<li><strong>U.S. Entity List<\/strong>: Bans firms like SMIC from American tech, reducing sabotage risks.<\/li>\n<li><strong>EU\u2019s Chips Act<\/strong>: Funds local fabs to avoid reliance on adversarial suppliers.<\/li>\n<\/ul>\n<ol>\n<li><strong> &#8220;Trusted Foundry&#8221; Programs<\/strong><\/li>\n<\/ol>\n<ul>\n<li>Only vetted fabs (e.g., Intel, GlobalFoundries) can make chips for defense.<\/li>\n<\/ul>\n<ol>\n<li><strong> Worker Surveillance<\/strong><\/li>\n<\/ol>\n<ul>\n<li><strong>China<\/strong>: Mandates loyalty checks for tech employees.<\/li>\n<li><strong>U.S.<\/strong>: Restricts foreign nationals in sensitive fabs.<\/li>\n<\/ul>\n<ol start=\"4\">\n<li><strong> The Future: Trade Wars = Silicon Spy Games<\/strong><\/li>\n<\/ol>\n<ul>\n<li><strong>AI-Driven Sabotage Detection<\/strong>: Fabs will use AI to spot suspicious behavior.<\/li>\n<li><strong>Chip Passports<\/strong>: Blockchain tracks each component\u2019s origin.<\/li>\n<li><strong>Onshoring Arms Race<\/strong>: U.S.\/EU\/China spend billions to\u00a0<strong>control their own fabs<\/strong>.<\/li>\n<\/ul>\n<p><strong>Bottom Line<\/strong>: Insider sabotage is now a\u00a0<strong>trade war tactic<\/strong>\u2014nations must secure chips like they secure borders.<\/p>\n<p><strong>Countries Leading in Semiconductor Manufacturing (2025)<\/strong><\/p>\n<p>The global semiconductor industry is dominated by a few key nations, with\u00a0<strong>Taiwan, South Korea, the U.S., China, and Japan<\/strong>\u00a0accounting for the majority of production. Below is a breakdown of the top chip-manufacturing countries, along with insights into\u00a0<strong>South Africa\u2019s emerging role<\/strong>.<\/p>\n<ol>\n<li><strong> Top Semiconductor Manufacturing Countries<\/strong><\/li>\n<\/ol>\n<table>\n<thead>\n<tr>\n<td><strong>Rank<\/strong><\/td>\n<td><strong>Country<\/strong><\/td>\n<td><strong>Key Players<\/strong><\/td>\n<td><strong>Market Share (2025)<\/strong><\/td>\n<td><strong>Notable Fact<\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td><strong>1<\/strong><\/td>\n<td><strong>Taiwan<\/strong><\/td>\n<td>TSMC, UMC<\/td>\n<td>~50% of global output<\/td>\n<td>TSMC alone makes 50% of the world\u2019s advanced chips (\u22643nm).<\/td>\n<\/tr>\n<tr>\n<td><strong>2<\/strong><\/td>\n<td><strong>South Korea<\/strong><\/td>\n<td>Samsung, SK Hynix<\/td>\n<td>~17% (Foundry + Memory)<\/td>\n<td>Leads in DRAM\/NAND flash memory.<\/td>\n<\/tr>\n<tr>\n<td><strong>3<\/strong><\/td>\n<td><strong>United States<\/strong><\/td>\n<td>Intel, Micron, GlobalFoundries<\/td>\n<td>~12% (but 46% in sales)<\/td>\n<td>CHIPS Act aims to triple U.S. production by 2032.<\/td>\n<\/tr>\n<tr>\n<td><strong>4<\/strong><\/td>\n<td><strong>China<\/strong><\/td>\n<td>SMIC, Huawei\u2019s HiSilicon<\/td>\n<td>~9% (growing to 25% by 2030)<\/td>\n<td>Heavy investment in self-sufficiency.<\/td>\n<\/tr>\n<tr>\n<td><strong>5<\/strong><\/td>\n<td><strong>Japan<\/strong><\/td>\n<td>Tokyo Electron, Renesas, Sony<\/td>\n<td>~4% (Advanced nodes)<\/td>\n<td>Dominates semiconductor materials (50% global supply).<\/td>\n<\/tr>\n<tr>\n<td><strong>6<\/strong><\/td>\n<td><strong>Germany<\/strong><\/td>\n<td>Infineon, Bosch<\/td>\n<td>~3% (Automotive chips)<\/td>\n<td>Key in power semiconductors.<\/td>\n<\/tr>\n<tr>\n<td><strong>7<\/strong><\/td>\n<td><strong>Netherlands<\/strong><\/td>\n<td>ASML (Lithography machines), NXP<\/td>\n<td>~2% (Equipment focus)<\/td>\n<td>ASML is the sole maker of EUV lithography machines.<\/td>\n<\/tr>\n<tr>\n<td><strong>8<\/strong><\/td>\n<td><strong>Israel<\/strong><\/td>\n<td>Tower Semiconductor (Intel-owned)<\/td>\n<td>~1% (Specialized fabs)<\/td>\n<td>Strong in analog &amp; RF chips.<\/td>\n<\/tr>\n<tr>\n<td><strong>9<\/strong><\/td>\n<td><strong>Malaysia<\/strong><\/td>\n<td>Infineon, Osram<\/td>\n<td>~1% (Packaging &amp; testing)<\/td>\n<td>Major backend production hub.<\/td>\n<\/tr>\n<tr>\n<td><strong>10<\/strong><\/td>\n<td><strong>Singapore<\/strong><\/td>\n<td>GlobalFoundries, Micron<\/td>\n<td>~1% (Mature nodes)<\/td>\n<td>Key for legacy chip production.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>Other Notable Regions:<\/strong><\/p>\n<ul>\n<li><strong>India<\/strong>\u00a0\u2013 Expanding with Tata Group\u2019s new fabs.<\/li>\n<li><strong>France\/Italy<\/strong>\u00a0\u2013 STMicroelectronics leads in automotive chips.<\/li>\n<li><strong>Kenya<\/strong>\u00a0\u2013 New U.S. partnership to build Africa\u2019s first major fab\u00a013.<\/li>\n<\/ul>\n<ol start=\"2\">\n<li><strong> South Africa\u2019s Semiconductor Industry<\/strong><\/li>\n<\/ol>\n<p>While\u00a0<strong>South Africa is not yet a major chip producer<\/strong>, it is taking steps to enter the semiconductor value chain:<\/p>\n<ol>\n<li><strong> Current Landscape<\/strong><\/li>\n<\/ol>\n<ul>\n<li><strong>No large-scale fabs<\/strong>, but several electronics distributors &amp; design firms:\n<ul>\n<li><strong>Infineon Davitron<\/strong>\u00a0(power management ICs).<\/li>\n<li><strong>Vepac Electronics<\/strong>\u00a0(power supplies, sensors).<\/li>\n<li><strong>ChipLab<\/strong>\u00a0(education &amp; chip design training).<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ol>\n<li><strong> Future Prospects<\/strong><\/li>\n<\/ol>\n<ol>\n<li><strong>First Chip Plant Plans<\/strong>\u00a0\u2013 A partnership between\u00a0<strong>OAO Investments and ChipLab<\/strong>\u00a0aims to establish Africa\u2019s first semiconductor fab, focusing on:\n<ul>\n<li>Training local engineers (60% women target).<\/li>\n<li>Producing\u00a0<strong>legacy chips<\/strong>\u00a0(28nm+) for IoT, automotive.<\/li>\n<\/ul>\n<\/li>\n<li><strong>U.S.-Kenya Semiconductor Deal<\/strong>\u00a0\u2013 Could spur regional growth, with South Africa benefiting from spillover investments.<\/li>\n<li><strong>Critical Minerals<\/strong>\u00a0\u2013 South Africa has reserves of\u00a0<strong>gallium, germanium, and rare earths<\/strong>\u00a0needed for chipmaking.<\/li>\n<\/ol>\n<ol>\n<li><strong> Challenges<\/strong><\/li>\n<\/ol>\n<ul>\n<li><strong>Lack of existing infrastructure<\/strong>\u00a0(no advanced fabs).<\/li>\n<li><strong>Dependence on imports<\/strong>\u00a0for high-end chips.<\/li>\n<li><strong>Global competition<\/strong>\u00a0from established players like TSMC\/Samsung.<\/li>\n<\/ul>\n<ol start=\"3\">\n<li><strong> Key Takeaways<\/strong><\/li>\n<\/ol>\n<p>\u2705\u00a0<strong>Taiwan, South Korea, and the U.S.<\/strong>\u00a0dominate chipmaking.<br \/>\n\u2705\u00a0<strong>China is rapidly catching up<\/strong>, aiming for 25% global output by 2030.<br \/>\n\u2705\u00a0<strong>South Africa is in early stages<\/strong>, but initiatives like ChipLab could position it as a future niche player.<br \/>\n\u2705\u00a0<strong>Africa\u2019s first major fab may emerge in Kenya<\/strong>, with ripple effects for South Africa.<\/p>\n<p>For further reading, the following are recommended:<\/p>\n<ul>\n<li><a target=\"_blank\" href=\"https:\/\/worldpopulationreview.com\/country-rankings\/semiconductor-manufacturing-by-country\" >Semiconductor Manufacturing by Country 2025<\/a>\u00a01<\/li>\n<li><a target=\"_blank\" href=\"https:\/\/theafricanmirror.africa\/business\/africa-muscles-in-on-the-semiconductor-value-chain\/\" >Africa\u2019s Semiconductor Push<\/a>\u00a013<\/li>\n<\/ul>\n<p>Types of <strong>non-edible semiconductor chip categories<\/strong>\u00a0that power modern technology, excluding the crispy potato snack variety:<\/p>\n<ol>\n<li><strong> By Function (Core Types)<\/strong><\/li>\n<\/ol>\n<table>\n<thead>\n<tr>\n<td><strong>Category<\/strong><\/td>\n<td><strong>Purpose<\/strong><\/td>\n<td><strong>Examples<\/strong><\/td>\n<td><strong>Key Players<\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td><strong>Logic Chips<\/strong><\/td>\n<td>Process instructions (CPU\/GPU\/AI)<\/td>\n<td>Intel Core i9, Nvidia H100 GPU<\/td>\n<td>Intel, AMD, Nvidia, Apple<\/td>\n<\/tr>\n<tr>\n<td><strong>Memory Chips<\/strong><\/td>\n<td>Store data (volatile\/non-volatile)<\/td>\n<td>Samsung DRAM, Micron NAND Flash<\/td>\n<td>Samsung, SK Hynix, Micron<\/td>\n<\/tr>\n<tr>\n<td><strong>Analog Chips<\/strong><\/td>\n<td>Process real-world signals (sound\/power)<\/td>\n<td>Texas Instruments power management ICs<\/td>\n<td>TI, Analog Devices, Infineon<\/td>\n<\/tr>\n<tr>\n<td><strong>RF\/Wireless Chips<\/strong><\/td>\n<td>Enable communications (5G\/Wi-Fi\/Bluetooth)<\/td>\n<td>Qualcomm Snapdragon, Broadcom Wi-Fi<\/td>\n<td>Qualcomm, Broadcom, MediaTek<\/td>\n<\/tr>\n<tr>\n<td><strong>Sensor Chips<\/strong><\/td>\n<td>Detect environmental inputs<\/td>\n<td>Bosch MEMS accelerometers, Sony CMOS<\/td>\n<td>Bosch, Sony, STMicro<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<ol start=\"2\">\n<li><strong> By Manufacturing Node (Size)<\/strong><\/li>\n<\/ol>\n<table>\n<thead>\n<tr>\n<td><strong>Node (nm)<\/strong><\/td>\n<td><strong>Use Case<\/strong><\/td>\n<td><strong>Leader<\/strong><\/td>\n<td><strong>Example Products<\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td><strong>\u22643nm<\/strong><\/td>\n<td>Cutting-edge AI\/Phones<\/td>\n<td>TSMC<\/td>\n<td>Apple A18 Pro, Nvidia B100<\/td>\n<\/tr>\n<tr>\n<td><strong>7-14nm<\/strong><\/td>\n<td>Mid-range processors<\/td>\n<td>Samsung<\/td>\n<td>AMD Ryzen, Google Tensor<\/td>\n<\/tr>\n<tr>\n<td><strong>28-90nm<\/strong><\/td>\n<td>Automotive\/IoT<\/td>\n<td>SMIC<\/td>\n<td>Tesla FSD chips, ESP32 MCUs<\/td>\n<\/tr>\n<tr>\n<td><strong>&gt;90nm<\/strong><\/td>\n<td>Power\/legacy systems<\/td>\n<td>Infineon<\/td>\n<td>Industrial motor controllers<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<ol start=\"3\">\n<li><strong> By Specialization (Niche Applications)<\/strong><\/li>\n<\/ol>\n<table>\n<thead>\n<tr>\n<td><strong>Type<\/strong><\/td>\n<td><strong>Unique Role<\/strong><\/td>\n<td><strong>Example<\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td><strong>ASICs<\/strong><\/td>\n<td>Custom-designed for one task (e.g., Bitcoin mining)<\/td>\n<td>Bitmain Antminer chips<\/td>\n<\/tr>\n<tr>\n<td><strong>FPGAs<\/strong><\/td>\n<td>Reconfigurable circuits (military\/AI)<\/td>\n<td>Xilinx FPGAs in F-35 jets<\/td>\n<\/tr>\n<tr>\n<td><strong>SoCs<\/strong><\/td>\n<td>All-in-one chips (phone\/tablet brains)<\/td>\n<td>Qualcomm Snapdragon, Apple M-series<\/td>\n<\/tr>\n<tr>\n<td><strong>Optical Chips<\/strong><\/td>\n<td>Light-based computing (future AI)<\/td>\n<td>Ayar Labs\u2019 photonic processors<\/td>\n<\/tr>\n<tr>\n<td><strong>Quantum Chips<\/strong><\/td>\n<td>Next-gen encryption\/computing<\/td>\n<td>IBM Quantum Heron<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<ol start=\"4\">\n<li><strong> By Material (Beyond Silicon)<\/strong><\/li>\n<\/ol>\n<table>\n<thead>\n<tr>\n<td><strong>Material<\/strong><\/td>\n<td><strong>Advantage<\/strong><\/td>\n<td><strong>Applications<\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td><strong>GaN (Gallium Nitride)<\/strong><\/td>\n<td>Faster switching, less heat<\/td>\n<td>5G base stations, EV chargers<\/td>\n<\/tr>\n<tr>\n<td><strong>SiC (Silicon Carbide)<\/strong><\/td>\n<td>High-voltage endurance<\/td>\n<td>Tesla powertrains, solar inverters<\/td>\n<\/tr>\n<tr>\n<td><strong>Graphene<\/strong>\u00a0(Experimental)<\/td>\n<td>Ultra-fast electrons<\/td>\n<td>Future flexible electronics<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>South Africa\u2019s Emerging Role<\/strong><\/p>\n<p>While not yet a chip manufacturer, South Africa is focusing on:<\/p>\n<ul>\n<li><strong>Legacy chip design<\/strong>\u00a0(28nm+ for IoT)<\/li>\n<li><strong>Critical minerals<\/strong>\u00a0(gallium\/germanium for GaN\/SiC chips)<\/li>\n<li><strong>Chip packaging<\/strong>\u00a0(potential niche via partnerships)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>The Bottom Line<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>The Bottom Line is that there is an ongoing global tension, with reference to CHIPS.\u00a0 The &#8220;cold chip war&#8221; is a covert peace disruption. It is not just about making the minutest transistors, capable of storing and processing the maximum terabytes of information, in the quickest possible time.\u00a0 It is about controlling\u00a0<strong>specialized categories<\/strong>\u00a0(e.g., AI logic chips vs. automotive power chips). South Africa could carve out a role in\u00a0<strong>mature-node analog\/power chips<\/strong>\u00a0leveraging local minerals, of which it has an abundant supply on both underground, in local mines, as well as the possible presence of most valuable, <strong>Rare-Earth Elements<\/strong> <a href=\"#_edn21\" name=\"_ednref21\">[21]<\/a>in the numerous old mine dumps, scattered throughout the Province of Gauteng and elsewhere. The technology was unavailable at the time when gold, diamonds and other minerals were discovered, but today, the technology and expertise is at hand and it only needs government coordination, locally available expertise and finance to exploit these, much needed, globally valuable resources. South Africa\u00a0<strong>does have rare earth minerals<\/strong>. According to the U.S. Geological Survey, South Africa contains\u00a0<strong>23 rare earth-bearing minerals.<\/strong> These are most sought-after entities in the chip manufacturing industry and are primarily found in mineral-rich regions such as the\u00a0<strong>Bushveld Complex<\/strong>\u00a0and\u00a0<strong>Steenkampskraal<\/strong>\u00a0in the Western Cape<a href=\"#_edn22\" name=\"_ednref22\">[22]<\/a>, which is one of the richest thorium and rare earth deposits globally.\u00a0 South Africa is one of the most mineral-rich countries in the world. A list of key minerals found in the country\u00a0are:<\/p>\n<ul>\n<li><strong>Gold<\/strong><\/li>\n<li><strong>Platinum Group Metals (PGMs)<\/strong>\u00a0\u2013 platinum, palladium, rhodium, etc.<\/li>\n<li><strong>Diamonds<\/strong><\/li>\n<li><strong>Coal<\/strong><\/li>\n<li><strong>Chromium<\/strong><\/li>\n<li><strong>Manganese<\/strong><\/li>\n<li><strong>Iron Ore<\/strong><\/li>\n<li><strong>Copper<\/strong><\/li>\n<li><strong>Uranium<\/strong><\/li>\n<li><strong>Zirconium<\/strong><\/li>\n<li><strong>Vanadium<\/strong><\/li>\n<li><strong>Titanium<\/strong><\/li>\n<li><strong>Silver<\/strong><\/li>\n<li><strong>Beryllium<\/strong><\/li>\n<li><strong>Limestone<\/strong><\/li>\n<li><strong>Ilmenite, Rutile, and Zircon<\/strong>\u00a0(heavy minerals)<\/li>\n<\/ul>\n<p>South Africa has over\u00a0<strong>70 types of minerals<\/strong>\u00a0with proven reserves.<\/p>\n<p>Gold was first discovered in\u00a0<strong>1871<\/strong>\u00a0in\u00a0<strong>Barberton<\/strong>, Mpumalanga. However, the\u00a0<strong>major gold rush<\/strong>\u00a0began in\u00a0<strong>1886<\/strong>\u00a0when\u00a0<strong>George Harrison<\/strong>\u00a0discovered gold on the\u00a0<strong>Witwatersrand Reef<\/strong>\u00a0near present-day\u00a0<strong>Johannesburg<\/strong>. This discovery led to the founding of Johannesburg and transformed South Africa into the world&#8217;s largest gold producer for much of the 20th century.<a href=\"#_edn23\" name=\"_ednref23\">[23]<\/a><\/p>\n<p>Diamonds were first discovered in\u00a0<strong>1867<\/strong>\u00a0near the\u00a0<strong>Orange River<\/strong>, close to\u00a0<strong>Hopetown<\/strong>\u00a0in the Northern Cape.<a target=\"_blank\" href=\"#_edn24\" name=\"_ednref24\">[24]<\/a> The most famous early find was the\u00a0<strong>Eureka Diamond<\/strong><a href=\"#_edn25\" name=\"_ednref25\">[25]<\/a>, It originally weighed 21.25 carats (4.250\u00a0g), and was later cut to a 10.73-carat (2.146\u00a0g) cushion-shaped\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Brilliant_(diamond_cut)\" >brilliant<\/a>, which is currently on display at the Mine Museum in\u00a0<a target=\"_blank\" href=\"https:\/\/en.wikipedia.org\/wiki\/Kimberley,_Northern_Cape\" >Kimberley<\/a>.\u00a0 followed by the discovery of the\u00a0Star of South Africa\u00a0in 1869. These discoveries led to the establishment of\u00a0<strong>Kimberley<\/strong>, which became the epicentre of the diamond rush and the birthplace of the modern diamond industry.\u00a0 Diamonds are used in the Diamond Chips, as they are virtually indestructible and durable.\u00a0 This technology was prompted by the Fukushima Nuclear Disaster.<\/p>\n<div id=\"attachment_296540\" style=\"width: 535px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2025\/06\/4.jpg\" ><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-296540\" class=\"size-full wp-image-296540\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2025\/06\/4.jpg\" alt=\"\" width=\"525\" height=\"350\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2025\/06\/4.jpg 525w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2025\/06\/4-300x200.jpg 300w\" sizes=\"auto, (max-width: 525px) 100vw, 525px\" \/><\/a><p id=\"caption-attachment-296540\" class=\"wp-caption-text\">An old Gold Mine Dump in Johannesburg, Gauteng, South Africa, which is reworked for REEs, using modern technology.\u00a0 Note the Johannesburg City CBD Skyline with high rise skyscrapers, including the 50 storey Carlton Centre.<br \/>Photo Credit :\u00a0 Wikimedia Commons<\/p><\/div>\n<p><strong>What is in the Old Mine Dumps<a href=\"#_edn26\" name=\"_ednref26\">[26]<\/a>?<\/strong><\/p>\n<p>There is growing interest and evidence suggesting that\u00a0<strong>old mine dumps in Johannesburg<\/strong>, particularly those from the\u00a0<strong>Witwatersrand goldfields<\/strong>, may contain\u00a0<strong>rare earth elements (REEs)<\/strong>\u00a0along with other valuable minerals. The\u00a0<strong>legacy gold mine dumps<\/strong>\u00a0around Johannesburg, remnants of over a century of gold mining contain:<\/p>\n<ul>\n<li><strong>Residual gold<\/strong>\u00a0(still being reprocessed in some areas)<\/li>\n<li><strong>Uranium<\/strong><\/li>\n<li><strong>Heavy metals<\/strong>\u00a0(like lead, arsenic, and cadmium)<\/li>\n<li><strong>Rare Earth Elements (REEs)<\/strong>\u00a0\u2013 recent studies and exploratory projects have identified the\u00a0<strong>potential presence<\/strong>\u00a0of REEs in the\u00a0<strong>tailings and slimes dams<\/strong><\/li>\n<\/ul>\n<p><strong>Why Are REEs There?<\/strong><\/p>\n<p>During early gold extraction (especially pre-1950s), the technology was not advanced enough to extract all valuable elements. As a result:<\/p>\n<ul>\n<li><strong>REEs and other trace elements<\/strong>\u00a0were discarded with the tailings.<\/li>\n<li>These dumps now represent a\u00a0<strong>secondary source<\/strong>\u00a0of critical minerals, especially as global demand for REEs increases for use in electronics, green energy, and defence technologies.<\/li>\n<\/ul>\n<p><strong>Environmental and Economic Implications<\/strong><\/p>\n<ul>\n<li><strong>Environmental<\/strong>: These dumps are a source of\u00a0<strong>acid mine drainage<\/strong>, dust pollution, and heavy metal contamination.<\/li>\n<li><strong>Economic<\/strong>: Reprocessing them could be\u00a0<strong>economically viable<\/strong>\u00a0and environmentally beneficial if done responsibly.<\/li>\n<\/ul>\n<div id=\"attachment_296541\" style=\"width: 360px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2025\/06\/5.jpg\" ><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-296541\" class=\"wp-image-296541\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2025\/06\/5.jpg\" alt=\"\" width=\"350\" height=\"232\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2025\/06\/5.jpg 640w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2025\/06\/5-300x199.jpg 300w\" sizes=\"auto, (max-width: 350px) 100vw, 350px\" \/><\/a><p id=\"caption-attachment-296541\" class=\"wp-caption-text\">The Hyperchip: How Intel makes chips from raw earth sand to integrated circuits.<br \/>Photo credit: Wikimedia commons<\/p><\/div>\n<p><strong>References:<\/strong><\/p>\n<p><a href=\"#_ednref1\" name=\"_edn1\">[1]<\/a> Author\u2019s personal quote May 2025<\/p>\n<p><a target=\"_blank\" href=\"#_ednref2\" name=\"_edn2\">[2]<\/a> <a href=\"https:\/\/www.linkedin.com\/pulse\/non-edible-chips-wafers-vidya-shah\" >https:\/\/www.linkedin.com\/pulse\/non-edible-chips-wafers-vidya-shah<\/a><\/p>\n<p><a target=\"_blank\" href=\"#_ednref3\" name=\"_edn3\">[3]<\/a> <a href=\"https:\/\/www.bing.com\/search?q=semiconductors+pdf&amp;qs=CT&amp;pq=semiconductors.&amp;sc=12-15&amp;cvid=20292E436DF44D6C95EEA8AFCBD8D78B&amp;FORM=QBRE&amp;sp=1&amp;lq=0\" >semiconductors pdf &#8211; Search<\/a><\/p>\n<p><a target=\"_blank\" href=\"#_ednref4\" name=\"_edn4\">[4]<\/a> <a href=\"https:\/\/www.bing.com\/search?q=the+pascaline+calculator&amp;qs=UT&amp;pq=the+pascaline+&amp;sk=UT2&amp;sc=11-14&amp;cvid=546F73CDADB441F19B90CD827043C726&amp;FORM=QBRE&amp;sp=3&amp;ghc=1&amp;lq=0\" >the pascaline calculator &#8211; Search<\/a><\/p>\n<p><a target=\"_blank\" href=\"#_ednref5\" name=\"_edn5\">[5]<\/a> <a href=\"https:\/\/en.wikipedia.org\/wiki\/Analytical_Engine\" >https:\/\/en.wikipedia.org\/wiki\/Analytical_Engine<\/a><\/p>\n<p><a target=\"_blank\" href=\"#_ednref6\" name=\"_edn6\">[6]<\/a> <a href=\"https:\/\/www.bing.com\/search?q=Definition%20of%20Full%20Conductor&amp;qs=n&amp;form=QBRE&amp;sp=-1&amp;lq=0&amp;pq=definition%20of%20full%20conductor&amp;sc=5-28&amp;sk=&amp;cvid=098580D135D140DBA701DD15FEA41888efinition%20of%20Computer%20Chip%20-%20Search\" >https:\/\/www.bing.com\/search?q=Definition%20of%20Full%20Conductor&amp;qs=n&amp;form=QBRE&amp;sp=-1&amp;lq=0&amp;pq=definition%20of%20full%20conductor&amp;sc=5-28&amp;sk=&amp;cvid=098580D135D140DBA701DD15FEA41888efinition of Computer Chip &#8211; Search<\/a><\/p>\n<p><a target=\"_blank\" href=\"#_ednref7\" name=\"_edn7\">[7]<\/a> <a href=\"https:\/\/www.bing.com\/search?q=Definition%20of%20Full%20Conductor&amp;qs=n&amp;form=QBRE&amp;sp=-1&amp;lq=0&amp;pq=definition%20of%20full%20conductor&amp;sc=5-28&amp;sk=&amp;cvid=098580D135D140DBA701DD15FEA41888\" >https:\/\/www.bing.com\/search?q=Definition%20of%20Full%20Conductor&amp;qs=n&amp;form=QBRE&amp;sp=-1&amp;lq=0&amp;pq=definition%20of%20full%20conductor&amp;sc=5-28&amp;sk=&amp;cvid=098580D135D140DBA701DD15FEA41888<\/a><\/p>\n<p><a target=\"_blank\" href=\"#_ednref8\" name=\"_edn8\">[8]<\/a> <a href=\"https:\/\/www.bing.com\/search?q=Inventors+of+Computer+Chips&amp;cvid=a9a52a748d834fe5bf09c97a10748192&amp;gs_lcrp=EgRlZGdlKgYIABBFGDkyBggAEEUYOTIGCAEQABhAMgYIAhAAGEAyBggDEAAYQDIGCAQQABhAMgYIBRAAGEAyBggGEAAYQDIGCAcQABhAMgYICBAAGEAyCAgJEOkHGPxV0gEKMTE3MTUyajBqNKgCALACAA&amp;FORM=ANAB01&amp;PC=U531\" >Inventors of Computer Chips &#8211; Search<\/a><\/p>\n<p><a target=\"_blank\" href=\"#_ednref9\" name=\"_edn9\">[9]<\/a> <a href=\"https:\/\/www.techpowerup.com\/cpu-specs\/epyc-9965.c3904\" >AMD EPYC 9965 Specs | TechPowerUp CPU Database<\/a><\/p>\n<p><a href=\"#_ednref10\" name=\"_edn10\">[10]<\/a> <a href=\"https:\/\/www.transcend.org\/tms\/2025\/05\/global-peace-disruption-the-trump-trade-wars-2025\/\" >TRANSCEND MEDIA SERVICE \u00bb Global Peace Disruption: The Trump Trade Wars 2025<\/a><\/p>\n<p><a target=\"_blank\" href=\"#_ednref11\" name=\"_edn11\">[11]<\/a> <a href=\"https:\/\/www.bing.com\/ck\/a?!&amp;&amp;p=487190f1e480f0af88d6a7bf2a8d16dfb1db0f69accd8f203e7c0734df5023cfJmltdHM9MTc0ODA0NDgwMA&amp;ptn=3&amp;ver=2&amp;hsh=4&amp;fclid=0c3c9d6e-714f-6e96-05f4-88d2706c6f48&amp;psq=Designed+in+the+U.S.+(Nvidia)&amp;u=a1aHR0cHM6Ly9hcG5ld3MuY29tL2FydGljbGUvbnZpZGlhLWFpLWFydGlmaWNpYWwtaW50ZWxsaWdlbmNlLXRhcmlmZnMtZGNmNDgxMTJjZTk4YTdiNjFiZmQzMjE1NzM1OWNlMmY&amp;ntb=1\" >https:\/\/www.bing.com\/ck\/a?!&amp;&amp;p=487190f1e480f0af88d6a7bf2a8d16dfb1db0f69accd8f203e7c0734df5023cfJmltdHM9MTc0ODA0NDgwMA&amp;ptn=3&amp;ver=2&amp;hsh=4&amp;fclid=0c3c9d6e-714f-6e96-05f4-88d2706c6f48&amp;psq=Designed+in+the+U.S.+(Nvidia)&amp;u=a1aHR0cHM6Ly9hcG5ld3MuY29tL2FydGljbGUvbnZpZGlhLWFpLWFydGlmaWNpYWwtaW50ZWxsaWdlbmNlLXRhcmlmZnMtZGNmNDgxMTJjZTk4YTdiNjFiZmQzMjE1NzM1OWNlMmY&amp;ntb=1<\/a><\/p>\n<p><a target=\"_blank\" href=\"#_ednref12\" name=\"_edn12\">[12]<\/a> <a href=\"https:\/\/www.bing.com\/ck\/a?!&amp;&amp;p=0d28070d8ac7bdda0c18dd862d6ec4a351af4d2caedec976a4c85f1306875a4dJmltdHM9MTc0ODA0NDgwMA&amp;ptn=3&amp;ver=2&amp;hsh=4&amp;fclid=0c3c9d6e-714f-6e96-05f4-88d2706c6f48&amp;u=a1L25ld3Mvc2VhcmNoP3E9VFNNQytBbmQrVHJ1bXArVHJhZGUrV2FycyZxcHZ0PVRTTUMrYW5kK3RydW1wK3RyYWRlK3dhcnMmRk9STT1FV1JF&amp;ntb=1\" >https:\/\/www.bing.com\/ck\/a?!&amp;&amp;p=0d28070d8ac7bdda0c18dd862d6ec4a351af4d2caedec976a4c85f1306875a4dJmltdHM9MTc0ODA0NDgwMA&amp;ptn=3&amp;ver=2&amp;hsh=4&amp;fclid=0c3c9d6e-714f-6e96-05f4-88d2706c6f48&amp;u=a1L25ld3Mvc2VhcmNoP3E9VFNNQytBbmQrVHJ1bXArVHJhZGUrV2FycyZxcHZ0PVRTTUMrYW5kK3RydW1wK3RyYWRlK3dhcnMmRk9STT1FV1JF&amp;ntb=1<\/a><\/p>\n<p><a target=\"_blank\" href=\"#_ednref13\" name=\"_edn13\">[13]<\/a> <a href=\"https:\/\/www.bing.com\/ck\/a?!&amp;&amp;p=81352f32de0fdc19bff17f450de8840e1518076099478a56825c915eeb3ec138JmltdHM9MTc0ODA0NDgwMA&amp;ptn=3&amp;ver=2&amp;hsh=4&amp;fclid=0c3c9d6e-714f-6e96-05f4-88d2706c6f48&amp;psq=TSMC+and+trump+trade+wars&amp;u=a1aHR0cHM6Ly93d3cubW9uZXljb250cm9sLmNvbS93b3JsZC90c21jLWhpdHMtYmFjay1hdC11cy13YXJucy10YXJpZmZzLWNvdWxkLWRlcmFpbC0xNjUtYmlsbGlvbi1hcml6b25hLWludmVzdG1lbnQtYXJ0aWNsZS0xMzA0NDM2MS5odG1s&amp;ntb=1\" >https:\/\/www.bing.com\/ck\/a?!&amp;&amp;p=81352f32de0fdc19bff17f450de8840e1518076099478a56825c915eeb3ec138JmltdHM9MTc0ODA0NDgwMA&amp;ptn=3&amp;ver=2&amp;hsh=4&amp;fclid=0c3c9d6e-714f-6e96-05f4-88d2706c6f48&amp;psq=TSMC+and+trump+trade+wars&amp;u=a1aHR0cHM6Ly93d3cubW9uZXljb250cm9sLmNvbS93b3JsZC90c21jLWhpdHMtYmFjay1hdC11cy13YXJucy10YXJpZmZzLWNvdWxkLWRlcmFpbC0xNjUtYmlsbGlvbi1hcml6b25hLWludmVzdG1lbnQtYXJ0aWNsZS0xMzA0NDM2MS5odG1s&amp;ntb=1<\/a><\/p>\n<p><a target=\"_blank\" href=\"#_ednref14\" name=\"_edn14\">[14]<\/a> <a href=\"https:\/\/www.bing.com\/ck\/a?!&amp;&amp;p=10cf798abd7d2ad2e0a6d38008b3bd4073e2491321d552f985459c81c6c42facJmltdHM9MTc0ODA0NDgwMA&amp;ptn=3&amp;ver=2&amp;hsh=4&amp;fclid=0c3c9d6e-714f-6e96-05f4-88d2706c6f48&amp;psq=Act%3a+52.7billiontoboostdomesticchipmaking%2ccounteredbyChina%e2%80%99s52.7billiontoboostdomesticchipmaking%2ccounteredbyChina%e2%80%99s150+billion+subsidy+for+SMIC+&amp;u=a1aHR0cHM6Ly9wZXJraW5zY29pZS5jb20vaW5zaWdodHMvdXBkYXRlL2NoaXBzLWFjdC1hbGxvY2F0ZXMtNTItYmlsbGlvbi1zdWJzaWRpZXMtcmV2aXRhbGl6ZS1zZW1pY29uZHVjdG9yLW1hbnVmYWN0dXJpbmc&amp;ntb=1\" >https:\/\/www.bing.com\/ck\/a?!&amp;&amp;p=10cf798abd7d2ad2e0a6d38008b3bd4073e2491321d552f985459c81c6c42facJmltdHM9MTc0ODA0NDgwMA&amp;ptn=3&amp;ver=2&amp;hsh=4&amp;fclid=0c3c9d6e-714f-6e96-05f4-88d2706c6f48&amp;psq=Act%3a+52.7billiontoboostdomesticchipmaking%2ccounteredbyChina%e2%80%99s52.7billiontoboostdomesticchipmaking%2ccounteredbyChina%e2%80%99s150+billion+subsidy+for+SMIC+&amp;u=a1aHR0cHM6Ly9wZXJraW5zY29pZS5jb20vaW5zaWdodHMvdXBkYXRlL2NoaXBzLWFjdC1hbGxvY2F0ZXMtNTItYmlsbGlvbi1zdWJzaWRpZXMtcmV2aXRhbGl6ZS1zZW1pY29uZHVjdG9yLW1hbnVmYWN0dXJpbmc&amp;ntb=1<\/a><\/p>\n<p><a target=\"_blank\" href=\"#_ednref15\" name=\"_edn15\">[15]<\/a> <a href=\"https:\/\/ecipe.org\/publications\/how-huawei-weathered-the-storm-resilience-market-conditions-or-failed-sanctions\/\" >https:\/\/ecipe.org\/publications\/how-huawei-weathered-the-storm-resilience-market-conditions-or-failed-sanctions\/<\/a><\/p>\n<p><a target=\"_blank\" href=\"#_ednref16\" name=\"_edn16\">[16]<\/a> <a href=\"https:\/\/www.bing.com\/ck\/a?!&amp;&amp;p=5510616d2a783237dcbb1a17068051dd8998fda9426931b5afb2251376b25e46JmltdHM9MTc0ODA0NDgwMA&amp;ptn=3&amp;ver=2&amp;hsh=4&amp;fclid=0c3c9d6e-714f-6e96-05f4-88d2706c6f48&amp;psq=CEPA+on+the+%22Chips+War%22+&amp;u=a1aHR0cHM6Ly9jZXBhLm9yZy9jb21tZW50YXJ5L3BhcnQtZml2ZS1jaGlwcy13YXItMjAyNS8&amp;ntb=1\" >https:\/\/www.bing.com\/ck\/a?!&amp;&amp;p=5510616d2a783237dcbb1a17068051dd8998fda9426931b5afb2251376b25e46JmltdHM9MTc0ODA0NDgwMA&amp;ptn=3&amp;ver=2&amp;hsh=4&amp;fclid=0c3c9d6e-714f-6e96-05f4-88d2706c6f48&amp;psq=CEPA+on+the+%22Chips+War%22+&amp;u=a1aHR0cHM6Ly9jZXBhLm9yZy9jb21tZW50YXJ5L3BhcnQtZml2ZS1jaGlwcy13YXItMjAyNS8&amp;ntb=1<\/a><\/p>\n<p><a target=\"_blank\" href=\"#_ednref17\" name=\"_edn17\">[17]<\/a> <a href=\"https:\/\/www.bing.com\/ck\/a?!&amp;&amp;p=adb7298cb774288dd6621892a88ecab09f9aa1d89dcbdab8a5b81168603736feJmltdHM9MTc0ODA0NDgwMA&amp;ptn=3&amp;ver=2&amp;hsh=4&amp;fclid=0c3c9d6e-714f-6e96-05f4-88d2706c6f48&amp;psq=Deloitte%e2%80%99s+2025+Semiconductor+Outlook+&amp;u=a1aHR0cHM6Ly93d3cyLmRlbG9pdHRlLmNvbS91cy9lbi9pbnNpZ2h0cy9pbmR1c3RyeS90ZWNobm9sb2d5L3RlY2hub2xvZ3ktbWVkaWEtdGVsZWNvbS1vdXRsb29rcy9zZW1pY29uZHVjdG9yLWluZHVzdHJ5LW91dGxvb2suaHRtbA&amp;ntb=1\" >https:\/\/www.bing.com\/ck\/a?!&amp;&amp;p=adb7298cb774288dd6621892a88ecab09f9aa1d89dcbdab8a5b81168603736feJmltdHM9MTc0ODA0NDgwMA&amp;ptn=3&amp;ver=2&amp;hsh=4&amp;fclid=0c3c9d6e-714f-6e96-05f4-88d2706c6f48&amp;psq=Deloitte%e2%80%99s+2025+Semiconductor+Outlook+&amp;u=a1aHR0cHM6Ly93d3cyLmRlbG9pdHRlLmNvbS91cy9lbi9pbnNpZ2h0cy9pbmR1c3RyeS90ZWNobm9sb2d5L3RlY2hub2xvZ3ktbWVkaWEtdGVsZWNvbS1vdXRsb29rcy9zZW1pY29uZHVjdG9yLWluZHVzdHJ5LW91dGxvb2suaHRtbA&amp;ntb=1<\/a><\/p>\n<p><a target=\"_blank\" href=\"#_ednref18\" name=\"_edn18\">[18]<\/a> <a href=\"https:\/\/www.bing.com\/search?pglt=41&amp;q=ABACUS&amp;cvid=e52a6b0a92664d83813839017a31d47e&amp;gs_lcrp=EgRlZGdlKgYIABBFGDkyBggAEEUYOTIGCAEQABhAMgYIAhAAGEAyBggDEAAYQDIGCAQQABhAMgYIBRAAGEAyBggGEAAYQDIGCAcQABhAMgYICBAAGEAyCAgJEOkHGPxV0gEIMzQzNGowajGoAgiwAgE&amp;FORM=ANSAB1&amp;PC=U531\" >ABACUS &#8211; Search<\/a><\/p>\n<p><a target=\"_blank\" href=\"#_ednref19\" name=\"_edn19\">[19]<\/a> <a href=\"https:\/\/www.bing.com\/search?q=History%20of%20computers%20-%20from%20the%20Abacus%20to%20the%20iPhone%20\u2013%20Is%20Abacus%20a%20Computer%3F&amp;qs=n&amp;form=QBRE&amp;sp=-1&amp;lq=0&amp;pq=history%20of%20computers%20-%20from%20the%20abacus%20to%20the%20iphone%20\u2013%20is%20abacus%20a%20computer%3F&amp;sc=0-76&amp;sk=&amp;cvid=8C856811790F4A38A6E19BD57E3126C4\" >https:\/\/www.bing.com\/search?q=History%20of%20computers%20-%20from%20the%20Abacus%20to%20the%20iPhone%20\u2013%20Is%20Abacus%20a%20Computer%3F&amp;qs=n&amp;form=QBRE&amp;sp=-1&amp;lq=0&amp;pq=history%20of%20computers%20-%20from%20the%20abacus%20to%20the%20iphone%20\u2013%20is%20abacus%20a%20computer%3F&amp;sc=0-76&amp;sk=&amp;cvid=8C856811790F4A38A6E19BD57E3126C4<\/a><\/p>\n<p><a target=\"_blank\" href=\"#_ednref20\" name=\"_edn20\">[20]<\/a> <a href=\"https:\/\/www.bing.com\/search?q=Trade+Wars+Create+Incentives+for+Sabotage&amp;cvid=ef8ca44deb3f4b22af5cd12f095863ad&amp;gs_lcrp=EgRlZGdlKgYIABBFGDkyBggAEEUYOTIICAEQ6QcY_FXSAQkyMTcyNGowajSoAgCwAgA&amp;FORM=ANAB01&amp;PC=U531\" >https:\/\/www.bing.com\/search?q=Trade+Wars+Create+Incentives+for+Sabotage&amp;cvid=ef8ca44deb3f4b22af5cd12f095863ad&amp;gs_lcrp=EgRlZGdlKgYIABBFGDkyBggAEEUYOTIICAEQ6QcY_FXSAQkyMTcyNGowajSoAgCwAgA&amp;FORM=ANAB01&amp;PC=U531<\/a><\/p>\n<p><a href=\"#_ednref21\" name=\"_edn21\">[21]<\/a> <a href=\"https:\/\/www.transcend.org\/tms\/2025\/03\/rare-earth-elements-enter-the-dragon-a-new-player-in-the-field-of-global-peace-disruptions\/#:~:text=7%20Mar%202025%20%E2%80%93%20This%20publication%20delves%20into,position%20in%20the%20global%20economy%20and%20geopolitical%20landscape.\" >TRANSCEND MEDIA SERVICE \u00bb Rare Earth Elements: Enter the Dragon-A New Player in the Field of Global Peace Disruptions<\/a><\/p>\n<p><a target=\"_blank\" href=\"#_ednref22\" name=\"_edn22\">[22]<\/a> <a href=\"https:\/\/www.geologyforinvestors.com\/geology-of-the-pge-deposits-in-the-bushveld-complex-south-africa\/\" >Geology of the PGE Deposits in the Bushveld Complex, South Africa | Geology for Investors<\/a><\/p>\n<p><a target=\"_blank\" href=\"#_ednref23\" name=\"_edn23\">[23]<\/a> <a href=\"https:\/\/southafrica.co.za\/barberton-gold-rush.html\" >The Barberton Gold Rush, Mpumalanga, South Africa<\/a><\/p>\n<p><a target=\"_blank\" href=\"#_ednref24\" name=\"_edn24\">[24]<\/a> <a href=\"https:\/\/wikisouthafrica.co.za\/diamond-mines-in-south-africa\/\" >List of Diamond Mines in South Africa &#8211; Wiki South Africa<\/a><\/p>\n<p><a target=\"_blank\" href=\"#_ednref25\" name=\"_edn25\">[25]<\/a> <a href=\"https:\/\/en.wikipedia.org\/wiki\/Eureka_Diamond\" >Eureka Diamond &#8211; Wikipedia<\/a><\/p>\n<p><a target=\"_blank\" href=\"#_ednref26\" name=\"_edn26\">[26]<\/a> <a href=\"https:\/\/www.bing.com\/search?qs=SSA&amp;pq=Johannesburg+ld+mine+dumps&amp;sk=CSYN1&amp;sc=6-26&amp;pglt=41&amp;q=mine+dumps+in+south+africa&amp;cvid=4f802969690b4968a0d875040210d32a&amp;gs_lcrp=EgRlZGdlKgYIARAAGEAyBggAEEUYOTIGCAEQABhAMgYIAhAAGEAyBggDEAAYQDIGCAQQABhAMgYIBRAAGEAyBggGEEUYPDILCAcQ6QcY9gcY-lUyCAgIEOkHGPxV0gEJMTk2OTBqMGoxqAIIsAIB&amp;FORM=ANNAB1&amp;PC=U531\" >mine dumps in south africa &#8211; Search<\/a><\/p>\n<p><em>______________________________________________<\/em><\/p>\n<p style=\"padding-left: 40px;\"><em><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2021\/04\/Hoosen-Vawda-e1618716350456.jpeg\" ><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-183185\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2021\/04\/Hoosen-Vawda-e1618716350456.jpeg\" alt=\"\" width=\"100\" height=\"100\" \/><\/a>Professor G. Hoosen M. Vawda (Bsc; MBChB; PhD.Wits) is a member of the <\/em><a href=\"https:\/\/www.transcend.org\/\" ><em>TRANSCEND Network for Peace Development Environment<\/em><\/a><em>.<br \/>\n<strong>Director<\/strong>: Glastonbury Medical Research Centre; Community Health and Indigent Programme Services; Body Donor Foundation SA.<\/em><br \/>\n<strong><em>Principal Investigator<\/em><\/strong><em>: Multinational Clinical Trials<\/em><br \/>\n<strong><em>Consultant<\/em><\/strong><em>: Medical and General Research Ethics; Internal Medicine and Clinical Psychiatry:UKZN, Nelson R. Mandela School of Medicine<\/em><br \/>\n<strong><em>Executive Member<\/em><\/strong><em>: Inter Religious Council KZN SA<\/em><br \/>\n<strong><em>Public Liaison<\/em><\/strong><em>: Medical Misadventures<\/em><br \/>\n<strong><em>Activism<\/em><\/strong><em>: Justice for All<\/em><br \/>\n<strong><em>Email<\/em><\/strong><em>: <\/em><a href=\"mailto:vawda@ukzn.ac.za\"><em>vawda@ukzn.ac.za<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Chip Is Gold, the Chip Is Power, the Chip Is the Future, and the Chip Is Nonedible: Who Has the Best Chip Controls the Universe\u00a0<\/p>\n","protected":false},"author":4,"featured_media":296537,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[40],"tags":[1733,813,119,481],"class_list":["post-296536","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-transcend-members","tag-artificial-intelligence-ai","tag-cold-war","tag-peace","tag-warfare"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/296536","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=296536"}],"version-history":[{"count":1,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/296536\/revisions"}],"predecessor-version":[{"id":296542,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/296536\/revisions\/296542"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media\/296537"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=296536"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=296536"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=296536"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}