abusesaffiliationarrow-downarrow-leftarrow-rightarrow-upattack-typeburgerchevron-downchevron-leftchevron-rightchevron-upClock iconclosedeletedevelopment-povertydiscriminationdollardownloademailenvironmentexternal-linkfacebookfiltergenderglobegroupshealthC4067174-3DD9-4B9E-AD64-284FDAAE6338@1xinformation-outlineinformationinstagraminvestment-trade-globalisationissueslabourlanguagesShapeCombined Shapeline, chart, up, arrow, graphLinkedInlocationmap-pinminusnewsorganisationotheroverviewpluspreviewArtboard 185profilerefreshIconnewssearchsecurityPathStock downStock steadyStock uptagticktooltiptwitteruniversalityweb

هذه الصفحة غير متوفرة باللغة العربية وهي معروضة باللغة English

المقال

31 أغسطس 2023

الكاتب:
KSE Institute,
الكاتب:
Yermak-McFaul Sanctions Group

Russia: Two-thirds of foreign components in drones used in attacks on Ukraine originate from US, new research shows revealing gaps in sanctions regime

2/3 of foreign components in Russian drones are made in the US, China is the main supplier, 31 August 2023

69% of the foreign components retrieved from the drones used by Russia in Ukraine originate from US companies, according to the Yermak-McFaul International Working Group and KSE Institute.

The researchers examined 174 foreign components removed from three drone models used by Russian troops on the battlefield in Ukraine.

The Russian army mainly uses three drone models: Shahed-136/131, Lancet, and Orlan-10. Since the beginning of the full-scale invasion, Russia has used more than 3,000 drones against Ukraine.

According to the report, in the production of its drones, Russia relies heavily on foreign-made components, including microelectronics.

Among the components analyzed, three American companies — Texas Instruments, Analog Devices, and Microchip Technology — as well as the Swiss STMicroelectronics — manufactured the most.

Most often, Russia receives critical drone components via third countries such as China that accounts for 67% of shipments, with 17% of them going through Hong Kong.

In response to escalating restrictions, Russia employs tactics to obscure its procurement efforts. Such tactics involve illegal networks, disguising customs data, one-day shell companies, expanding intermediary entities, diversifying suppliers, and orchestrating fake transit operations.

The group’s experts propose to align sanctions lists between partner countries, to unify lists of dual-use goods based on the Harmonized System and to expand the categories of goods subject to sanctions based on the Harmonized System.

It is recommended to improve cooperation between producers and authorities in order to improve compliance with sanctions and implement effective restrictive measures.

The authors of the report also call on governments to investigate well-known companies to demonstrate their commitment to enforcing sanctions.

According to experts, more effective use of existing institutions and mechanisms is needed...

الجدول الزمني

معلومات الخصوصية

هذا الموقع يستخدم ملفات تعريف الارتباط وتكنولوجيا التخزين الشبكي. يمكنك ضبط خيارات الخصوصية أدناه. تسري التغييرات فورًا.

للمزيد من المعلومات عن استخدامنا للتخزين الشبكي، انظر سياستنا في استخدام البيانات وملفات تعريف الارتباط

Strictly necessary storage

ON
OFF

Necessary storage enables core site functionality. This site cannot function without it, so it can only be disabled by changing settings in your browser.

ملفات تعريف الارتباط التحليلية

ON
OFF

When you access our website we use Google Analytics to collect information on your visit. Accepting this cookie will allow us to understand more details about your journey, and improve how we surface information. All analytics information is anonymous and we do not use it to identify you. Google provides a Google Analytics opt-out add on for all popular browsers.

Promotional cookies

ON
OFF

We share news and updates on business and human rights through third party platforms, including social media and search engines. These cookies help us to understand the performance of these promotions.

خيارات الخصوصية على هذا الموقع

هذا الموقع يستخدم ملفات تعريف الارتباط وتكنولوجيا التخزين الشبكي لتحسين تجربتك لما يتجاوز الخصائص الرئيسية الضرورية.