Abstract
The risks to the Nation's ICT infrastructure and products, both in defense and in the private sector, are well understood. Yet nearly ten years after the initial classified initiative to address supply chain vulnerabilities in the telecommunications sector, the United States still lacks a broadly-accepted process to remedy them. These risks currently pose the greatest single gap in this nation's perimeter defenses. This paper presents a novel approach to making the remediation of supply-chain risks at all levels of the public and private sectors feasible, affordable and enforceable, based on establishing PGP style networks of hierarchically trusted suppliers.
Open Access License Notice:
This article is © its author(s) and is licensed under the Creative Commons Attribution 4.0 International License (CC BY 4.0). Beginning with Volume 13 (2026), this license is included directly within all published PDFs. For earlier articles, a cover page has been added to indicate the correct licensing terms. Any legacy copyright or pricing statements appearing within the PDF reflect prior print production workflows and do not represent the Journal’s current open access policy. For full details, please see the Journal’s License Terms.