PROTECTING U.S. TECHNOLOGY
The swift illegal
commercial and military imitation of technology does not astonish anyone, but
what really surprises is the persistent technological gap between the U.S. and the
West. How has the United States preserved its critical military technological
advances' gap, estimated to be ten years and over compared with its next rivals, and prevented other
countries from acquiring it during these years?
Methods of Acquiring
Technology
In its 2013
report, the U.S. Defense Security Services (DSS) stated that "adversaries
surround us with a pervasive miasmatic atmosphere". Once it seeps from any
direction, it will poison the U.S. Industry, military, economy and ultimately
national security. European, Asian and other countries pursue critical
technology persistently through many means including;
1.
Cyberspace: trying to
access contractors' websites to get protected information
2.
Acquisition
of Technology: through acquisition of
U.S. companies, locally or abroad. In order to obtain schematic diagrams, there
are attempts to acquire methods of manufacturing or specification of military
equipment.
3.
Academic
Solicitation: requesting presentation and lectures, peer reviewing papers,
providing consultations or actually joining a university as a student or as an
employee.
4.
Requests for
information: requesting protected information through telephone, emails or
websites under the cover of quotations or market research.
5.
Solicitations
or Marketing Services: through sales, representations or demonstrations. The target is
to interact with contractors and get the required information.
6.
Foreign
Visits:
to get access to the site and get information that otherwise cannot be shared.
7.
Direct
Employment: wittingly or unwittingly seeking employment to get access to
protected information.
8.
Exploitation
of Relationship: through joint ventures, official agreements, foreign military
sales or business management.
9.
Surveillance: via
visual, aural, electronic, photographic or other means to tap information from
personnel, equipment and facilities.
10. Criminal
Activities: like theft.
11. Search
and Seizure: searching personnel or properties.
Top Targeted
Technologies:
1. Information
Technology
2. Electronics
3. Lasers,
Optics and Sensors
4. Aeronautics
5. Material
Process
6. Space
Systems
7. Global
Positioning Systems
8. Marine
Systems
9. Information
Security
10. Processing
and Manufacturing
There is an
extensive list that can be googled under the name "Military Critical
Technologies List". Here is a case study on how missile technology is
pursued.
Acquiring
Missiles Technology:
Missiles are
manufactured by civilian companies specialized in military industry. The
Department of Defense deals with these companies, so called contractors. For
such sensitive technologies, contractors must be reliable and certified. To be
more accurate and lethal, missile manufacturers are in continuous search for
the best technologies, see Figure 1.
Figure 1. Technologies Used in
Missile Systems
In the past
years, countries that are developing missiles have been interested in such U.S.
missile technologies and sought to acquire them legally or illegally. Here is a
case study of one of their methods.
In 2012,
someone in Asia sent an email to a missile contractor in Alabama in the United
States asking for temperature resistant ceramic standards C1211. After
investigation, the contractor found that this person is an employee of a
defense company specialized in military systems, electronics and guided weapon
systems. The contractor also found that this standard is the same as the
military standard MIL STD 1942 ceramic that is used in missile structure.
The above
was a piece example on how other pieces are integrated to build the complete
system.
U.S.
Critical Technology Protection Programs
To protect
its critical technology, the U.S. Government (represented by Defense, Defense
Security Services, Department of Justice, the intelligence and Homeland
security) authorize reliable contractors and thwart foreign ambition to collect
secrets information. They enacted many protection programs to protect this
technology involving the regulation of export and investigating U.S. companies'
acquisitions. These programs are;
1.
Military Critical Technology Program: Headed by
Defense and aims to specify technology that is vital to American military
dominance.
2.
Dual-Use Export Control System: Headed by
Commerce with members from the Defense, CIA, Energy, Homeland Security and Justice
to balance interests and control Exports.
3.
Arms Export Control System: lead by the State with members from Defense,
Homeland Security and Justice to regulate exports of arms by U.S. Companies and
to give priority to national security and foreign policy. The program
maintains munitions list.
4.
Foreign Military Sales Program: Headed by the State and Defense with members
from Homeland Security to provide foreign governments with U.S. weapons and
services. One of its main objectives is interoperability and lowering the
unit cost of weapon systems.
5.
National Disclosure Policy Process: a program where the State, Defense and
intelligence community determine when to release classified information,
weapons or military technology to foreign governments
6.
Committee on Foreign Investment in
the United States:
Headed by
the Treasury with members from Commerce, Defense, Homeland Security, Justice,
State, and offices from the President Executive Office to investigate the
effects of foreign investments on national security and to prevent acquisitions
that threatens its security.
7.
National Industrial Security Program: Supervised by Defense as a lead with members
from other departments and agencies to ensure that contractors, licensees
and grantees have the appropriate procedures to protect information under their
custody.
8.
Anti-Tamper Policy: Supervised by Defense to prevent or
postpone the acquisition or exploitation of weapon system critical technology.
The attack on American technology is relentless
and will not stop. The defense to safeguard the technology will also continue.
These technologies are the sure way to companies' profit and growth and it is
also the way to build any country's military capabilities, confront threats and
protect national security.
References:
Defense
Security Services.2013. Targeting US Technologies. A trend Analysis of Cleared
Industry Reporting.
United
States Government Accountability Office. Protecting Defense Technologies.
GAO-13-157. Report to Congressional Committees. January 2013
ليست هناك تعليقات:
إرسال تعليق