Technology Transfer And U.S. Security Assistance

Technology Transfer And U.S. Security Assistance
Author: David J Louscher
Publisher: Routledge
Total Pages: 202
Release: 2019-09-05
Genre: Political Science
ISBN: 1000242331

The national security issues surrounding U.S. arms sales policies and practices have been the subjects or our research tor the past ten years. In this study the authors’ were determined to conduct a more focussed analysis of emerging policy issues tor security assistance; namely, the relationship between technology transfer and security assistance policies of the U.S. Government. This book assesses the development or indigenous arms production capabilities or recipients or U.S. security assistance. In particular we examine a seldom analyzed level of technology transfer: the transfer or less than state-of-the-art technologies and production capabilities to allies through routine security assistance decisions.

Technology Transfer

Technology Transfer
Author: United States. Congress. House. Committee on Science and Technology. Subcommittee on Science, Research, and Technology
Publisher:
Total Pages: 260
Release: 1985
Genre: Export controls
ISBN:

National Security And Technology Transfer

National Security And Technology Transfer
Author: Gary K. Bertsch
Publisher: Routledge
Total Pages: 232
Release: 2019-02-22
Genre: Political Science
ISBN: 0429725477

The deterioration of detente in the wake of the ongoing Soviet arms build-up has sharply focused the East-West trade debate on the question of advanced technology transfer from the United States and its allies to the Soviet bloc. The transfer and acquisition of high technology have become central ingredients in super-power relations and are key elements of any national security policy. President Reagan, among others, has questioned the wisdom of the policies of the 1960s and early 1970s, when trade with the Soviet Union and Eastern Europe expanded rapidly. At recent industrial nation summits, conferees of Western countries agreed to high-level review of their East-West technology trade policies. But in light of the apparent West European commitment to continue and expand trade with the East, as exemplified by the Siberian gas pipeline project, and the growing U.S. opposition to such technology transfer, divisions between U.S. and Western trade policies toward the East are likely to become increasingly acute in the years ahead. Professors Bertsch and McIntyre have selected comprehensive and representative articles to examine the question of technology transfer from a variety of perspectives--political, economic, and military- emphasizing both the U.S. and the Western allies' points of view and offering insights into the complex issues raised by the strategic dimensions of East-West trade.

Seller Beware

Seller Beware
Author: Wayne M. Johnson
Publisher:
Total Pages: 0
Release: 1998
Genre: Defense industries
ISBN:

As was the case during the cold war, the national military strategy of the United States relies on technologically superior forces to achieve our objectives when the armed forces are called on to protect the United States and its interests. However, as the military downsizes, preserving a technologically superior force while also maintaining a robust defense industrial base becomes more difficult. One means the United States uses to preserve the industrial base is to maintain demand by selling our military goods to other countries. While foreign military sales (FMS) alone will not keep the US industrial base viable, they have become more significant than in the days of larger US defense procurements. In 1996, for example, FMS exceeded $10 billion. Indeed, FMS can spell the difference between continued existence and bankruptcy for some of our defense contractors. The perceived need to sell overseas while safeguarding US advanced technologies appears to be a conflicting goal because of the technology transfer involved. In this important study, Lt Col Wayne Johnson, USAF, argues that systematic tightening of interagency cooperation and better work on defining sensitive technology prohibitions are needed to maintain the US technological edge. He also maintains that the US government requires a new and disciplined export control process--not the cur -rent mosaic of rules, regulations, and perspectives that came out of the cold war, but a process that provides a revamped, systemic approach with consistent implementation. Colonel Johnson explores the problem of defining which technologies the United States is willing to transfer (military or dual-use) and the need to ensure that national security objectives do not take a backseat to economic expediency. To accomplish this end, he argues for better interagency cooperation as a first step leading to a more centralized, coordinated, and strategic view of technology transfer and how it impacts US national security. Recent events concerning missile technology transfers point out the timeliness of this debate. These recommendations deserve to be read by a wide Department of Defense audience, as the United States evaluates its policies to determine if short-term interests in selling high-technology arms to foreign countries can actually weaken rather than strengthen our national security.

Technology Transfer in a Changing National Security Environment

Technology Transfer in a Changing National Security Environment
Author:
Publisher:
Total Pages: 118
Release: 1990
Genre: Export controls
ISBN:

This paper examines U.S. export control, with particular emphasis on technology transfer as it affects our relationship with Japan. It describes the evolution of export control in the United States, including the Bucy Report, the impact of Afghanistan, and policy changes regarding the People's Republic of China. U.S. control mechanisms for critical technology currently in place are described; these include the Export Administration Regulations, the International Traffic in Arms Regulations (ITAR), and the Militarily Critical Technologies List (MCTL). The evolution of Japan's technology base and export control mechanisms are discussed, as well as its military capabilities. Japan and the United States have had different philosophies regarding export control, with the United States more likely to use controls as part of its foreign policy. However, U.S. export control policy is increasingly seen as having an important economic security aspect in addition to its national security objectives. Changes in Eastern Europe and the Soviet Union have placed the issue of export control in a new perspective. Therefore, the paper also examines in some detail the major developments in the European community which will affect the future technology environment and its relationship to national security. This paper was originally presented at a workshop of the Japan-U.S. Joint Study Group on Trade, Finance and Technology in East-West Economic Relations. A primary purpose of the paper was to enhance mutual understanding between the United States and Japan, and to facilitate the resolution of differences in the technology security arena.

Chinese Industrial Espionage

Chinese Industrial Espionage
Author: William C. Hannas
Publisher: Routledge
Total Pages: 320
Release: 2013-06-14
Genre: History
ISBN: 113595254X

This new book is the first full account, inside or outside government, of China’s efforts to acquire foreign technology. Based on primary sources and meticulously researched, the book lays bare China’s efforts to prosper technologically through others' achievements. For decades, China has operated an elaborate system to spot foreign technologies, acquire them by all conceivable means, and convert them into weapons and competitive goods—without compensating the owners. The director of the US National Security Agency recently called it "the greatest transfer of wealth in history." Written by two of America's leading government analysts and an expert on Chinese cyber networks, this book describes these transfer processes comprehensively and in detail, providing the breadth and depth missing in other works. Drawing upon previously unexploited Chinese language sources, the authors begin by placing the new research within historical context, before examining the People’s Republic of China’s policy support for economic espionage, clandestine technology transfers, theft through cyberspace and its impact on the future of the US. This book will be of much interest to students of Chinese politics, Asian security studies, US defence, US foreign policy and IR in general.