Workshops Intelligence High-Integrity Supply Chain Verification
Intelligence Full Day Workshop

High-Integrity Supply Chain Verification

Intelligence organisations depend on the integrity of their equipment: from encrypted communication devices to surveillance hardware to data processing infrastructure. Supply chain compromise is a documented threat vector for intelligence agencies. This workshop examines quantum-enhanced verification technologies and PQC signing for protecting intelligence community supply chains from tampering, counterfeiting, and adversary insertion.

Full day (6 hours)
In person or online
Max 30 delegates

Proud to recommend our expert members

Qrypto Cyber
Eclypses
Arqit
QuantBond
Krown
Applied Quantum
Quantum Bitcoin
Venari Security
QuStream
BHO Legal
Census
QSP
IONQ - ID Quantique
Patero
Entopya
Belden
Atlant3D
Zenith Studio
Qudef
Aries Partners
GQI
Upperside Conferences
Austrade
Arrise Innovations
CyberRST
Triarii Research
QSysteme
WizzWang
DeepTech DAO
Xyberteq
Viavi
Entrust
Qsentinel
Nokia
Gopher Security
Quside
QIZ
Global Quantum Intelligence
Qrypto Cyber
Eclypses
Arqit
QuantBond
Krown
Applied Quantum
Quantum Bitcoin
Venari Security
QuStream
BHO Legal
Census
QSP
IONQ - ID Quantique
Patero
Entopya
Belden
Atlant3D
Zenith Studio
Qudef
Aries Partners
GQI
Upperside Conferences
Austrade
Arrise Innovations
CyberRST
Triarii Research
QSysteme
WizzWang
DeepTech DAO
Xyberteq
Viavi
Entrust
Qsentinel
Nokia
Gopher Security
Quside
QIZ
Global Quantum Intelligence

Workshop Description

Supply chain attacks against intelligence organisations carry uniquely severe consequences. A compromised encryption device exposes sources and methods. Tampered surveillance equipment provides unreliable intelligence or, worse, becomes a collection vector against the deploying agency. Classical verification methods (visual inspection, electrical testing, PKI-based attestation) face quantum-era challenges: the signature schemes underlying firmware verification will be broken by quantum computers, and classical authentication methods cannot provide the physical unclonability that PUF technology offers.

This workshop covers physically unclonable functions (PUFs) for hardware authentication, quantum token concepts for provenance tracking, PQC digital signatures (ML-DSA, SLH-DSA) for firmware and software integrity verification, and end-to-end cryptographic attestation chains from manufacturer to deployment. The interactive demonstration walks through a complete equipment verification pipeline designed for intelligence community requirements, including chain-of-custody tracking and tamper-evidence assessment.

What participants cover

  • PUF technology for intelligence equipment authentication: SRAM, arbiter, and optical PUF implementations
  • Quantum token concepts for physical provenance tracking and anti-counterfeiting in intelligence supply chains
  • PQC firmware signing: ML-DSA and SLH-DSA for equipment software integrity verification
  • Cryptographic attestation chains: manufacturer to deployment with intelligence community custody requirements
  • Tamper detection: quantum and classical sensing approaches for equipment integrity monitoring
  • Adversary supply chain attack vectors: documented intelligence community incidents and countermeasures

Preliminary Agenda

Full day workshop structure with scheduled breaks. Content is configurable to your organisation's technical level and operational environment.

# Session Topics
1 Intelligence Supply Chain Threat Landscape Documented attacks and adversary capabilities
  • Supply chain attack case studies relevant to intelligence organisations
  • Quantum computing threat to existing PKI-based firmware verification
  • Intelligence-specific requirements: chain of custody, TEMPEST, and compartmented equipment handling
2 Hardware Authentication Technologies PUFs, quantum tokens, and device fingerprinting for intelligence equipment
  • SRAM PUFs for encryption device authentication: unique fingerprints from manufacturing variation
  • Optical PUFs for tamper-evident physical seals on intelligence equipment
  • Quantum token concepts: exploiting no-cloning theorem for provenance verification
  • Challenge-response authentication protocols for field verification of intelligence equipment
Break, after 60 min
3 Cryptographic Integrity for Intelligence Systems PQC signing and attestation for firmware and software
  • ML-DSA (FIPS 204) for firmware signing: verification speed and signature size considerations
  • SLH-DSA (FIPS 205) for long-lived root certificates in intelligence equipment PKI
  • Hybrid signature schemes during PQC transition: maintaining verification with legacy systems
  • Attestation chain design for intelligence community compartmented equipment
4 Interactive Demonstration End-to-end equipment verification pipeline
  • Facilitator-led walkthrough of intelligence equipment verification: PUF enrolment, attestation, custody tracking
  • Tamper detection assessment: identifying physical and firmware integrity compromise indicators
  • Comparing classical versus PQC verification pipeline performance and security guarantees
Break, after 90 min
5 Implementation for Intelligence Organisations Building quantum-resilient equipment verification
  • Integration with intelligence community procurement and logistics processes
  • Vendor assessment: PUF providers, PQC libraries, and attestation platform options
  • Phased deployment: pilot programme design for high-value intelligence equipment classes
6 Case Studies: Intelligence Equipment Assurance Published approaches to supply chain integrity
  • US IC supply chain risk management frameworks and quantum readiness
  • Five Eyes equipment assurance coordination and shared evaluation standards
7 Q&A and Implementation Planning

Designed and Delivered By

Workshops are designed and delivered by QSECDEF in collaboration with sector specialists. All facilitators have direct experience in both quantum technologies and intelligence systems.

QD

Quantum Security Defence

Workshop design and delivery

QSECDEF brings world-leading expertise in post-quantum cryptography, quantum computing strategy, and defence-grade security assessment. Our advisory membership spans 600+ organisations and 1,200+ professionals working at the intersection of quantum technologies and critical infrastructure security.

IN

Intelligence Sector Partners

Domain expertise and operational validation

Intelligence workshops are co-delivered with sector specialists who bring direct operational experience in intelligence organisations. This ensures workshop content is grounded in regulatory, operational, and technical realities specific to the sector.

Commission This Workshop

Sessions are configured around your organisation's technical level, operational environment, and regulatory jurisdiction. Get in touch to discuss requirements and schedule a date.

Contact Us