THREAT ASSESSMENT: China’s Supply Chain Dominance and the Weaponization of Critical Minerals, Energy, and Software

flat color political map, clean cartographic style, muted earth tones, no 3D effects, geographic clarity, professional map illustration, minimal ornamentation, clear typography, restrained color coding, flat 2D world map, clean linework showing political boundaries, subtle color gradients indicating supply dependency levels from pale yellow to deep red, thin annotated lines tracing flows of critical minerals, hydrofluoric acid, and embedded software from China to allied nations, one line断裂 (broken) near Germany marked with a stark black asterisk, dim ambient overhead lighting, tense and precarious atmosphere [Z-Image Turbo]
If China formalizes export restrictions on critical minerals or cyber-enabled infrastructure components, then allied nations may accelerate localized refining capacity and software sovereignty initiatives to mitigate systemic vulnerability.
Bottom Line Up Front: Global supply chains have become central battlegrounds in geopolitical conflict, with China leveraging control over critical minerals, clean energy components, and industrial software to exert strategic influence, while Western nations struggle with fragmented policies and eroding state capacity [sites.tufts.edu, 2026]. Threat Identification: The primary threat is systemic dependence on adversarial or fragile supply chains across energy, critical minerals, and digital infrastructure. China dominates refining for up to 100% of certain critical minerals and produces 80% of solar inverters in the EU—devices with remote cloud access that pose cyber-physical risks during conflict [sites.tufts.edu, 2026]. Meanwhile, Russia’s use of a ‘shadow fleet’ to bypass sanctions demonstrates the limits of traditional maritime and financial controls. Probability Assessment: High probability within the 2026–2030 timeframe. Escalation risks are elevated due to ongoing tensions over Taiwan, potential disruptions in the Strait of Hormuz, and increasing formalization of China’s economic coercion tools in law. The recurrence of supply shocks is no longer exceptional but expected under current geopolitical trends [sites.tufts.edu, 2026]. Impact Analysis: A coordinated disruption in critical mineral flows, energy inputs like hydrofluoric acid, or compromised software in grid infrastructure could cripple defense production, renewable energy deployment, and civilian power systems across allied nations. The collapse of key non-Chinese suppliers—such as a German firm producing gallium arsenide wafers—further concentrates risk and reduces redundancy [sites.tufts.edu, 2026]. Recommended Actions: 1) Establish a permanent Allied Supply Chain Security Compact to pool demand and invest in resilient, non-Chinese supply chains; 2) Implement golden-share mechanisms and price floors for domestic critical mineral refining; 3) Enact cybersecurity mandates for imported infrastructure software, including solar inverters; 4) Revitalize state capacity for industrial strategy through dedicated public agencies modeled on historical precedents. Confidence Matrix: Confidence in threat identification and impact analysis is high, based on documented market concentrations and expert consensus at the Fletcher workshop. Probability assessment is assessed at moderate-to-high confidence due to observable trends in policy formalization and geopolitical posturing. Recommended actions are derived from proposed solutions discussed by panelists, including ‘allied scale’ and public-private integration, yielding moderate confidence in feasibility given current political constraints [sites.tufts.edu, 2026]. —Marcus Ashworth