CSIS published an analysis on 17 April finding that 69% of the memory hardware and 57% of the processors in Russia's AI-enabled drone ecosystem are sourced from US firms, with only 9% from Chinese suppliers. That inverts the working assumption behind the FCC Covered List , which targets Chinese componentry as the primary national-security threat. Russia's V2U autonomous UAS runs on an Nvidia Jetson Orin module and uses YOLOv5 for target recognition, both US-origin technologies reaching Russian factories through third-country re-export routes.
The same CSIS report profiles Russia's Molniya-2 loitering munition at roughly $300 per unit against the Lancet at $50,000, a cost-per-effect ratio that reframes attritable mass economics. Russia is targeting 130,000 large UAS annually by 2030 and 350,000 by 2035, production volumes that only hold together if compute and memory supply keeps flowing from Western vendors.
The Merops deployment showed US battlefield capability flowing from Ukrainian lessons into Gulf operations as a deliberate tech-from-Ukraine pipeline. CSIS has now documented its dark-mirror version: Western chips crossing the other way into Russian drones at industrial scale. Regulators face an uncomfortable reading of the data. The FCC Covered List and Section 232 UAS Investigation both assume Chinese hardware is the primary risk in sensitive US drone applications; CSIS's numbers suggest the more acute risk is US componentry leaking into adversary production lines.
British exporters also face a diagnostic problem. Any Ukrainian supply line carrying British components faces the mirror-image problem of re-export to Russia, and any counter-drone solution procured in London needs to assume the adversary's compute stack looks more like a Bay Area datacentre than a Shenzhen consumer workshop.
