الاثنين، 6 أكتوبر 2014

PROTECTING U.S. TECHNOLOGY

PROTECTING U.S. TECHNOLOGY

The swift illegal commercial and military imitation of technology does not astonish anyone, but what really surprises is the persistent technological gap between the U.S. and the West. How has the United States preserved its critical military technological advances' gap, estimated to be ten years and over compared with its next rivals, and prevented other countries from acquiring it during these years? 
Methods of Acquiring Technology
In its 2013 report, the U.S. Defense Security Services (DSS) stated that "adversaries surround us with a pervasive miasmatic atmosphere". Once it seeps from any direction, it will poison the U.S. Industry, military, economy and ultimately national security. European, Asian and other countries pursue critical technology persistently through many means including;
1.      Cyberspace: trying to access contractors' websites to get protected information
2.      Acquisition of Technology:  through acquisition of U.S. companies, locally or abroad. In order to obtain schematic diagrams, there are attempts to acquire methods of manufacturing or specification of military equipment.
3.      Academic Solicitation: requesting presentation and lectures, peer reviewing papers, providing consultations or actually joining a university as a student or as an employee.
4.      Requests for information: requesting protected information through telephone, emails or websites under the cover of quotations or market research.
5.      Solicitations or Marketing Services: through sales, representations or demonstrations. The target is to interact with contractors and get the required information.
6.      Foreign Visits: to get access to the site and get information that otherwise cannot be shared.
7.      Direct Employment: wittingly or unwittingly seeking employment to get access to protected information.
8.      Exploitation of Relationship: through joint ventures, official agreements, foreign military sales or business management.
9.      Surveillance: via visual, aural, electronic, photographic or other means to tap information from personnel, equipment and facilities.
10.  Criminal Activities: like theft.
11.  Search and Seizure: searching personnel or properties.
Top Targeted Technologies:
1.      Information Technology
2.      Electronics
3.      Lasers, Optics and Sensors
4.      Aeronautics
5.      Material Process
6.      Space Systems
7.      Global Positioning Systems
8.      Marine Systems
9.      Information Security
10.  Processing and Manufacturing
There is an extensive list that can be googled under the name "Military Critical Technologies List". Here is a case study on how missile technology is pursued.

Acquiring Missiles Technology:

Missiles are manufactured by civilian companies specialized in military industry. The Department of Defense deals with these companies, so called contractors. For such sensitive technologies, contractors must be reliable and certified. To be more accurate and lethal, missile manufacturers are in continuous search for the best technologies, see Figure 1.
Figure 1. Technologies Used in Missile Systems

In the past years, countries that are developing missiles have been interested in such U.S. missile technologies and sought to acquire them legally or illegally. Here is a case study of one of their methods.
In 2012, someone in Asia sent an email to a missile contractor in Alabama in the United States asking for temperature resistant ceramic standards C1211. After investigation, the contractor found that this person is an employee of a defense company specialized in military systems, electronics and guided weapon systems. The contractor also found that this standard is the same as the military standard MIL STD 1942 ceramic that is used in missile structure.
The above was a piece example on how other pieces are integrated to build the complete system.
U.S. Critical Technology Protection Programs
To protect its critical technology, the U.S. Government (represented by Defense, Defense Security Services, Department of Justice, the intelligence and Homeland security) authorize reliable contractors and thwart foreign ambition to collect secrets information. They enacted many protection programs to protect this technology involving the regulation of export and investigating U.S. companies' acquisitions.  These programs are;
1.       Military Critical Technology Program: Headed by Defense and aims to specify technology that is vital to American military dominance.
2.      Dual-Use Export Control System: Headed by Commerce with members from the Defense, CIA, Energy, Homeland Security and Justice to balance interests and control Exports.
3.      Arms Export Control System: lead by the State with members from Defense, Homeland Security and Justice to regulate exports of arms by U.S. Companies and to give priority to national security and foreign policy. The program maintains munitions list.
4.      Foreign Military Sales Program: Headed by the State and Defense with members from Homeland Security to provide foreign governments with U.S. weapons and services. One of its main objectives is interoperability and lowering the unit cost of weapon systems.
5.      National Disclosure Policy Process: a program where the State, Defense and intelligence community determine when to release classified information, weapons or military technology to foreign governments
6.       Committee on Foreign Investment in the United States: Headed by the Treasury with members from Commerce, Defense, Homeland Security, Justice, State, and offices from the President Executive Office to investigate the effects of foreign investments on national security and to prevent acquisitions that threatens its security.
7.       National Industrial Security Program: Supervised by Defense as a lead with members from other departments and agencies to ensure that contractors, licensees and grantees have the appropriate procedures to protect information under their custody.
8.       Anti-Tamper Policy: Supervised by Defense to prevent or postpone the acquisition or exploitation of weapon system critical technology.
The attack on American technology is relentless and will not stop. The defense to safeguard the technology will also continue. These technologies are the sure way to companies' profit and growth and it is also the way to build any country's military capabilities, confront threats and protect national security.
References:
Defense Security Services.2013. Targeting US Technologies. A trend Analysis of Cleared Industry Reporting. 
United States Government Accountability Office. Protecting Defense Technologies. GAO-13-157. Report to Congressional Committees. January 2013

ليست هناك تعليقات:

إرسال تعليق