Industry Overview
Defense manufacturing is one of the most metals-intensive industries, requiring specialized alloys and materials that create unique commodity dependencies. Fighter jets consume titanium for airframes and engine components, with the F-35 program alone representing significant titanium demand. Tungsten is critical for armor-piercing munitions and ballistic protection. Rare earth elements power precision-guided weapons, radar systems, and electronic warfare equipment -- with China controlling 60%+ of global rare earth processing, this creates a geopolitical supply vulnerability. The global defense rearming cycle, with NATO nations targeting 2-3% GDP defense spending, is creating sustained demand growth for these strategic metals.
Commodity Exposure
Key Companies
Related ETFs
Industry exposure thesis
Defense is analyzed as a commodity pass-through system. The useful question is where the benchmark reaches input cost, revenue indexation, operating reliability, and customer demand.
Cost pass-through mechanism
Track benchmark movement, contract reset timing, company-level margin impact, and demand response. Separate direct input exposure from pricing flexibility, regulated recovery, surcharges, inventory buffers, and natural hedges.
- Input-cost: feedstock, fuel, power, packaging, freight, or material expense.
- Revenue: realized pricing, contract indexation, surcharges, and product mix.
- Operating: utilization, downtime, logistics reliability, and supplier concentration.
- Demand: substitution, affordability, inventory destocking, or delayed purchases.
Scenario workflow
Start with the largest input or revenue benchmark, check hub freshness, compare exposed companies by business model, and identify the data release that would confirm or weaken the route.
Research operating notes
For Defense, the final research step is to compare the narrative with observable evidence: benchmark confirmation, spread behavior, inventory direction, company commentary, and whether the route is direct or second order.
If the signal depends on a proxy or analysis-only hub, treat the page as a scenario map rather than a live benchmark. Finish with a concise next-action list: open the relevant hub, run the simulator for shock size, add exposed companies to the watchlist, and review methodology and model limitations.
Research operating notes
For Defense, compare the narrative with observable evidence and keep the memo bounded when the route depends on proxy, stale, or analysis-only data.