Download Free National Security And Technology Transfer Book in PDF and EPUB Free Download. You can read online National Security And Technology Transfer and write the review.

The national security issues surrounding U.S. arms sales policies and practices have been the subjects or our research tor the past ten years. In this study the authors’ were determined to conduct a more focussed analysis of emerging policy issues tor security assistance; namely, the relationship between technology transfer and security assistance policies of the U.S. Government. This book assesses the development or indigenous arms production capabilities or recipients or U.S. security assistance. In particular we examine a seldom analyzed level of technology transfer: the transfer or less than state-of-the-art technologies and production capabilities to allies through routine security assistance decisions.
The deterioration of detente in the wake of the ongoing Soviet arms build-up has sharply focused the East-West trade debate on the question of advanced technology transfer from the United States and its allies to the Soviet bloc. The transfer and acquisition of high technology have become central ingredients in super-power relations and are key elements of any national security policy. President Reagan, among others, has questioned the wisdom of the policies of the 1960s and early 1970s, when trade with the Soviet Union and Eastern Europe expanded rapidly. At recent industrial nation summits, conferees of Western countries agreed to high-level review of their East-West technology trade policies. But in light of the apparent West European commitment to continue and expand trade with the East, as exemplified by the Siberian gas pipeline project, and the growing U.S. opposition to such technology transfer, divisions between U.S. and Western trade policies toward the East are likely to become increasingly acute in the years ahead. Professors Bertsch and McIntyre have selected comprehensive and representative articles to examine the question of technology transfer from a variety of perspectives--political, economic, and military- emphasizing both the U.S. and the Western allies' points of view and offering insights into the complex issues raised by the strategic dimensions of East-West trade.
As was the case during the cold war, the national military strategy of the United States relies on technologically superior forces to achieve our objectives when the armed forces are called on to protect the United States and its interests. However, as the military downsizes, preserving a technologically superior force while also maintaining a robust defense industrial base becomes more difficult. One means the United States uses to preserve the industrial base is to maintain demand by selling our military goods to other countries. While foreign military sales (FMS) alone will not keep the US industrial base viable, they have become more significant than in the days of larger US defense procurements. In 1996, for example, FMS exceeded $10 billion. Indeed, FMS can spell the difference between continued existence and bankruptcy for some of our defense contractors. The perceived need to sell overseas while safeguarding US advanced technologies appears to be a conflicting goal because of the technology transfer involved. In this important study, Lt Col Wayne Johnson, USAF, argues that systematic tightening of interagency cooperation and better work on defining sensitive technology prohibitions are needed to maintain the US technological edge. He also maintains that the US government requires a new and disciplined export control process--not the cur -rent mosaic of rules, regulations, and perspectives that came out of the cold war, but a process that provides a revamped, systemic approach with consistent implementation. Colonel Johnson explores the problem of defining which technologies the United States is willing to transfer (military or dual-use) and the need to ensure that national security objectives do not take a backseat to economic expediency. To accomplish this end, he argues for better interagency cooperation as a first step leading to a more centralized, coordinated, and strategic view of technology transfer and how it impacts US national security. Recent events concerning missile technology transfers point out the timeliness of this debate. These recommendations deserve to be read by a wide Department of Defense audience, as the United States evaluates its policies to determine if short-term interests in selling high-technology arms to foreign countries can actually weaken rather than strengthen our national security.
This paper examines U.S. export control, with particular emphasis on technology transfer as it affects our relationship with Japan. It describes the evolution of export control in the United States, including the Bucy Report, the impact of Afghanistan, and policy changes regarding the People's Republic of China. U.S. control mechanisms for critical technology currently in place are described; these include the Export Administration Regulations, the International Traffic in Arms Regulations (ITAR), and the Militarily Critical Technologies List (MCTL). The evolution of Japan's technology base and export control mechanisms are discussed, as well as its military capabilities. Japan and the United States have had different philosophies regarding export control, with the United States more likely to use controls as part of its foreign policy. However, U.S. export control policy is increasingly seen as having an important economic security aspect in addition to its national security objectives. Changes in Eastern Europe and the Soviet Union have placed the issue of export control in a new perspective. Therefore, the paper also examines in some detail the major developments in the European community which will affect the future technology environment and its relationship to national security. This paper was originally presented at a workshop of the Japan-U.S. Joint Study Group on Trade, Finance and Technology in East-West Economic Relations. A primary purpose of the paper was to enhance mutual understanding between the United States and Japan, and to facilitate the resolution of differences in the technology security arena.
This new book is the first full account, inside or outside government, of China’s efforts to acquire foreign technology. Based on primary sources and meticulously researched, the book lays bare China’s efforts to prosper technologically through others' achievements. For decades, China has operated an elaborate system to spot foreign technologies, acquire them by all conceivable means, and convert them into weapons and competitive goods—without compensating the owners. The director of the US National Security Agency recently called it "the greatest transfer of wealth in history." Written by two of America's leading government analysts and an expert on Chinese cyber networks, this book describes these transfer processes comprehensively and in detail, providing the breadth and depth missing in other works. Drawing upon previously unexploited Chinese language sources, the authors begin by placing the new research within historical context, before examining the People’s Republic of China’s policy support for economic espionage, clandestine technology transfers, theft through cyberspace and its impact on the future of the US. This book will be of much interest to students of Chinese politics, Asian security studies, US defence, US foreign policy and IR in general.