BACKGROUND NOTES: TECHNOLOGY TRANSFER LOSSES AND SOME ACTIONS TO STOP THEM
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP84B00049R001102690018-9
Release Decision:
RIPPUB
Original Classification:
T
Document Page Count:
7
Document Creation Date:
December 20, 2016
Document Release Date:
March 19, 2007
Sequence Number:
18
Case Number:
Content Type:
REPORT
File:
Attachment | Size |
---|---|
![]() | 218.91 KB |
Body:
MEMORANDUM FO
The attached is for the DCI's meeting with the
k=r
- A paper on what might be done to stop
technology transfer losses.
- A copy of the material (in table form)
of what I presented the PFIAB S&T Working
Group (John Foster's group) in April.
- Several copies of the Unclassified paper.
Approved For Release 2007/03/19: CIA-RDP84B00049R001102690018-9
Approved For Release 2007/03/19: CIA-RDP84B00049R001102690018-9
Approved For Release 2007/03/19: CIA-RDP84B00049RO01102690018-9
SECRET
Background Notes
TECHNOLOGY TRANSFER LOSSES AND SOME ACTIONS TO STOP THEM
1. The loss of militarily significant US technology can be
traced to three basic technology transfer channels:
1. Open Source Acquisitions
2. Trade-related Transfer
3. Soviet Bloc Intelligence Operations
The principal responsibility for stemming losses through the
first two channels, Trade and Open Sources, resides within the
Export Control Community and other appropriate Government
Departments. The Intelligence Community can help with these
efforts and does; for example:
-- by providing intelligence support for export control
license and CoCom List reviews;
-- by providing intelligence for export control enforcement
activities, particularly those involving evasion or diversion of
CoCom countries' controlled exports;
--by alerting government and private organizations that
Soviet acquisition of their publications, S&T information, and
data bases is contributing to Soviet military capabilities; and
--by working with joint government public groups such as the
one underway now at the National Academy of Sciences seeking to
find an equitable way to protect defense-sensitive technology
being developed on University campuses.
1
SECRET
Approved For Release 2007/03/19: CIA-RDP84B00049RO01102690018-9
SECRET
SOVIET INTELLIGENCE THREAT:
2. Stopping Soviet Bloc Intelligence operations--
clandestine, technical and overt -- aimed at the acquisition of
US and other Western (including Japanese technology), both in the
US and abroad, is viewed as solely an Intelligence Community (IC)
responsibility, whether the technology is classified, export
controlled, company proprietary or openly available. The IC is
expected to stop the Soviet and East European intelligence
service acquisitions of technology that can harm our national
security.
3. Based on recent analyses of extremely hard intelligence
we now believe that the vast majority--as much as three-fourths
(3/4)-- of militarily significant Western technology being
acquired by the Soviet Bloc is the result of Soviet and East
European intelligence activities. Furthermore, we believe:
-- that the overwhelming majority of classified US technology
is being acquired abroad,
-- that East European intelligence services are significant
contributors to the Soviet acquisition effort,
-- that Soviet and East European intelligence services,
working closely with their ministries of foreign trade,
play the key role in illegal trade acquisitions, both in
the United States and abroad, operating through agents,
cooperating businessmen, and cover organizations in Soviet
Bloc trade and manufacturing ministries,
-- that more and more, militarily significant technology is
being acquired through the illegal acquisition of company
2
SECRET
Approved For Release 2007/03/19: CIA-RDP84B00049R001102690018-9
SECRET
proprietary technology and defense-sensitive but
unclassified government S&T publications and sponsored
research, and
-- that Soviet Bloc intelligence acquires some of the
militarily significant technologies through overt
collection from open sources such as universities, S&T
conferences, and exchange programs, and trade fairs in the
United States.
4. Possible Countermeasure Actions: To effectively counter
Soviet Bloc intelligence efforts, the US must develop a strategy
and plan to cope with all three intelligence related acquisition
activities simultaneous) : clandestine, technical (mainly
SIGINT), and overt. At the same time these US intelligence
counter actions must be closely coordinated with Export Control
enforcement and Government-led efforts to protect open sources
and alert the general public to the problem. And, possibly even
more important, the US effort to stop the loss of our technology
in the US must be projected abroad. Among the actions that can
be initiated to accomplish this are the following:
First
The US Government must develop an integrated program to
cope with US technology losses abroad.
US counterintelligence-- CIA and the Military-- must be
explicitly focused on the problem as a joint effort, with
the protection of US defense related technology, persons
(including companies), and organizations, located abroad
3
SECRET
roved For Release 2007/03/19: CIA-RDP84B00049RO01102690018-9
Approved For Release 2007/03/19: CIA-RDP84B00049R001102690018-9
SECRET
being the primary objective.
Allied counterintelligence and internal security services
must be alerted to our concerns for the protection of US
technology abroad and the nature of the overall threat.
John McMahon's recent European trip has now started this
process.
US intelligence elements abroad should be directed to
support US export control efforts at each key post,
working as part of a country-team effort. US
counterintelligence should also assist US Customs' efforts
worldwide in their efforts.
A foreign public awareness effort concerning technology
transfer losses should be mounted through CIA's liaison
activities with allied intelligence services.
Secondly
These international efforts of the US Intelligence
Community should be closely coordinated with new programs
and initiatives being implemented in the United States:
-- Counterintelligence operations aimed at stopping the
losses of classified and export controlled US technology
in the US should be conducted through normal CIA-FBI
channels, such as is presently being done.
-- A long-range strategy for disrupting the Soviet technology
acquisition programs and undermining Soviet Bloc
intelligence services in the minds of their military-
industrial consumers should be developed for
4
SECRET
Approved For Release 2007/03/19: CIA-RDP84B00049R001102690018-9
counterintelligence and covert action operations; this
should be done with great care and high security.
-- Defense contractor industrial security, which is mainly
directed at protecting classified documentary technology,
must be improved to account for the HUMINT threat posed by
Soviet Bloc intelligence that often seeks company
unclassified proprietary technology associated with
defense production and not the weapon system itself.
-- Foreign intelligence operations involving US technology
and US persons should be closely coordinated through the
Justice Department-led Interagency Working Group (IAWG) on
Domestic Enforcement; such activity is just now beginning.
-- Protection of unclassified, defense-sensitive S&T
information and related Government sponsored research must
be better protected from Soviet Bloc intelligence
activities.
-- Protection from hostile intelligence services must be
developed for non-defense firms engaged in high technology
R&D that may either assist Warsaw Pact military efforts or
may be used as critical components in future US weapons.
If we are to be successful in stopping the flow of militarily
significant technologies to our military adversaries, all of
these intelligence related activities will have to be as well
coordinated as the overall Soviet acquisition program itself.
5
SECRET
Approved For Release 2007/03/19: CIA-RDP84B00049R001102690018-9