Submit your essay to the AI-Cybersecurity Essay Prize Competition by January 2, 2025.
The AI-Cybersecurity Essay Prize Competition

Europe will struggle to curtail Russian tech theft

Russia has been plundering Europe’s high tech for decades
Main Top Image
This image was created with the assistance of Midjourney

Russia has long depended on imported technology to develop, manufacture, and sustain its weapons programmes and defence industry. The invasion of Ukraine and the retrieval of debris from the battlefield have exposed the Russian defence industry’s reliance on cutting-edge Western microelectronics and other goods, such as high-end manufacturing equipment. 

Russia’s technological needs

Much of the imported technology in Russian weapons systems—particularly advanced semiconductors—is produced or sourced outside of Europe. Nevertheless, the continent has historically been a rich hunting ground for Russian procurement. 

European states are both creators of state-of-the-art technology and importers from other manufacturing powers, such as the United States and Japan. These dual characteristics create openings for Russian operatives. They can exploit exporters, prey on naive manufacturers, and set up front companies to benefit from the relative trust in European states within the global system of export controls. 

As recently as 2020, France allegedly continued to deliver military technology to Russia under contracts concluded before the 2014 seizure of Crimea and the implementation of an EU arms embargo. This included navigation systems, cockpit displays, viewfinders, helmets, and electro-optical infrared systems for combat aircraft and helicopters.

Since the passage of the EU’s arms embargo in 2014 and the embargo on transferring dual-use technology in 2022, Russian procurement has been far less overt. 

A 2022 RUSI study examined over 450 components from 27 of Russia’s most modern weapons systems. It found that the vast majority (318) originated in the United States, but over 10% (at least 55 unique components) originated from the European continent. Although transit routes for the goods are unclear, the greatest single European source of components in the study was Switzerland. It supplied 18 components and ranked fourth after the United States, Japan, and Taiwan in supplying technical equipment to Russia. 

European states have also harboured front companies engaging in brokering, without the shipments physically travelling through the continent. Trade data suggests that a company registered in a house in suburban London facilitated the sale of electronics and chips valued at $1.2 billion to Russia from February 2022 to April 2023. The ease of registering companies provides an opportunity Russia has exploited.

Historically, a soft target? 

From the earliest days of the USSR, Soviet operatives sought technology through trade delegations and espionage networks in Europe in the 1920s and 1930s. In the 1940s and 1950s, the Soviets reaped the benefits of technology developed by the Nazis during the Second World War through German reparations. Following the division of Germany, the Soviets benefitted from controlling east Germany, but also looked for technology in the west. Before the border was solidified, they moved much tech across—and also exploited Berlin before and after the wall. 

In the early 1960s, the Soviet KGB intelligence agency elevated its technology procurement activities to directorate level as “Directorate T”. By the mid-1980s, the CIA had uncovered what Reagan administration officials described as a technology “haemorrhage” that triggered a full-scale technology-transfer scare:

Virtually every Soviet military research project—well over 4,000 each year in the late 1970s and over 5,000 in the early 1980s—benefits from these technical documents and hardware. The assimilation of Western technology is so broad that the United States and other Western nations are thus subsidising the Soviet military buildup.

The CIA report noted that most of the diversion of technology took place through Europe—although Asia was also growing in this role in the 1980s.

A 1982 US Special National Intelligence Estimate offers glimpses into the strategies pursued by the European allies within the Coordinating Committee for Multilateral Export Controls (CoCoM)—the Cold War export control arrangement that included NATO allies, Japan and Australia. It noted that Western Europe and Japan saw their political and security interests “best served by maintaining and increasing contacts with Eastern Europe and the Soviet Union to promote political and economic stability and establish a web of interdependence between East and West”. There were often clear tensions between security and commercial priorities in the Western alliance. 

Germany remained central to the story. With its high-tech industry—and what the CIA allegedly described in 1985 as “ineffective” export controls—it was ripe for further Soviet exploitation. Communist operatives utilised the country as a transit hub. This was exemplified in a 1982 incident where US-origin electronic components were diverted from Germany to the USSR.

European defence

Forty-years later and employing many of the same methods, Soviet operatives—now Russian—still plunder Europe’s rich technological resources. European governments are now intensifying efforts to curtail the technological seepage and disrupt Putin’s military pursuits. 

The EU has implemented 11 rounds of sanctions on Russia—including significant provisions to curb technology transfer. Washington also formed what it termed a “Global Export Control Coalition” to harmonise export controls on Russia in the early days of the war. The 27 EU member states, as well as the United Kingdom, Liechtenstein, Norway, and Switzerland, formed the majority of states involved in this effort.

Many states are clamping down on Russian networks—although the United States still takes a far more assertive approach. German law enforcement, for example, raided a series of companies in February 2023 under suspicion of supplying components to Russia through Turkish intermediaries. 

Although some transshipments of US-origin goods through European jurisdictions persist, greater implementation of export controls since the onset of the war, coupled with the evolution of global supply chains, have triggered a shift in networks. Third-country hubs, with closer ties to Russia and further away from the US-led export control coalition, are both more prominent now and more difficult to address. 

Beyond Turkey, the list of prominent hubs also includes Armenia, Georgia, Kazakhstan and the United Arab Emirates, according to a US State Department sanctions coordinator in June 2023. Russia is hungry for chips that are mostly available off the shelf, which allows its procurement networks to be more easily adapted.

Another threat for Europe than Russia’s quest for technology is China’s illicit procurement and industrial espionage. European industry, universities, and research institutes have frequently been targeted for their wares. Europe is softer on China than the United States, and has more extensive commercial connections, which makes European countries more vulnerable to technology theft.

More controls on the horizon

Between Russia’s war in Ukraine and renewed US efforts to use export controls to slow China’s military development, countering the illicit procurement of technology has risen up the Western agenda. It will only become more prominent in due course. The heightened interest in using export controls as a tool in great power competition has echoes of the 1980s. 

Whatever the future of multilateral export control arrangements, in all likelihood—as in the 1980s—the United States will ask more of its European allies in the future and there may be more difficult choices ahead.

Terms and Conditions for the AI-Cybersecurity Essay Prize Competition

Introduction

The AI-Cybersecurity Essay Prize Competition (the “Competition”) is organized by Virtual Routes (“Virtual Routes”) in partnership with the Munich Security Conference (“MSC”). It is sponsored by Google (the “Sponsor”). By entering the Competition, participants agree to these Terms and Conditions (T&Cs).

Eligibility

The Competition is open to individuals worldwide who are experts in the fields of cybersecurity and artificial intelligence (“AI”). Participants must ensure that their participation complies with local laws and regulations.

Submission Guidelines

Essays must address the question: “How will Artificial Intelligence change cybersecurity, and what are the implications for Europe? Discuss potential strategies that policymakers can adopt to navigate these changes.”

Submissions must be original, unpublished works between 800-1200 words, excluding footnotes but including hyperlinks for references.

Essays must be submitted by 2 January 2025, 00:00 am CET., through the official submission portal provided by Virtual Routes.

Only single-authored essays are accepted. Co-authored submissions will not be considered.

Participants are responsible for ensuring their submissions do not infringe upon the intellectual property rights of third parties.

Judging and Awards

Essays will be judged based on insightfulness, relevance, originality, clarity, and evidence by a review board comprising distinguished figures from academia, industry, and government.

The decision of the review board is final and binding in all matters related to the Competition.

Prizes are as follows: 1st Place: €10,000; Runner-Up: €5,000; 3rd Place: €2,500; 4th-5th Places: €1,000 each. The winner will also be invited to attend The Munich Security Conference

Intellectual Property Rights

The author retains ownership of the submitted essay.

By submitting the essay, the author grants Virtual Routes exclusive, royalty-free rights to use, reproduce, publish, distribute, and display the essay for purposes related to the Competition, including but not limited to educational, promotional, and research-related activities.

The author represents, warrants, and agrees that no essay submitted as part of the essay prize competition violates or infringes upon the rights of any third party, including copyright, trademark, privacy, publicity, or other personal or proprietary rights, breaches, or conflicts with any obligation, such as a confidentiality obligation, or contains libellous, defamatory, or otherwise unlawful material.

The author agrees that the organizers can use your name (or your pseudonym) and an image of you in association with your essay for purposes of publicity, promotion and any other activity related to the exercise of its rights under these Terms.

The organizers may remove any essay-related content from its platforms at any time and without explanation.

The organizers may block contributions from particular email or IP addresses without notice or explanation.

The organizers may enable advertising on its platforms and associated social media accounts, including in connection with the display of your essay. The organizers may also use your Material to promote its products and services.

The organizers may, at its sole discretion, categorise Material, whether by means of ranking according to popularity or by any other criteria.

Data Protection

Personal information collected in connection with the Competition will be processed in accordance with Virtual Routes’ Privacy Policy. Participants agree to the collection, processing, and storage of their personal data for the purposes of the Competition.

Liability and Indemnity

Virtual Routes, MSC, and the Sponsor will not be liable for any damages arising from participation in the Competition, except where prohibited by law.

Participants agree to indemnify Virtual Routes, MSC, and the Sponsor against any claims, damages, or losses resulting from a breach of these T&Cs.

General Conditions

Virtual Routes reserves the right to cancel, suspend, or modify the Competition or these T&Cs if fraud, technical failures, or any other factor beyond Virtual Routes’ reasonable control impairs the integrity or proper functioning of the Competition, as determined by Virtual Routes in its sole discretion.

Any attempt by any person to deliberately undermine the legitimate operation of the Competition may be a violation of criminal and civil law, and, should such an attempt be made, Virtual Routes reserves the right to seek damages from any such person to the fullest extent permitted by law.

Governing Law

These Terms and Conditions are governed by the laws of the United Kingdom, without regard to its conflict of law principles. Any dispute arising out of or in connection with these Terms and Conditions, including any question regarding its existence, validity, or termination, shall be referred to and finally resolved by the courts of the United Kingdom. The participants agree to submit to the exclusive jurisdiction of the courts located in the United Kingdom for the resolution of all disputes arising from or related to these Terms and Conditions or the Competition.